Professional Documents
Culture Documents
Proceedings of ICRMET-2016
Smart
2.EXISTING SYSTEM
1.INTRODUCTION
www.iaetsd.in
15
IAETSD 2016
ISBN:978-1535061506
Proceedings of ICRMET-2016
,otherwise they are denied. This system
provides safe and secure polling. Cloud
provides a service for voting to all
authenticated user.
4.Biometric Authentication
Biometric data should be collected
from the voters as part of the election preregistration process. Database regarding the
candidates are managed with iris recognition
as primary key. While casting vote the iris
recognition of the candidate is matched with
the existing database if the match is found the
casted vote is considered otherwise discarded.
No candidate is recognized twice. In prior to
polling, biometric authentication can also be
used to check whether the candidate is eligible
for casting vote or not. Many notebook
computers include fingerprint readers. In the
near future, the mobile handset industry will
begin to embed some type of biometric
identification system into their devices.
3.PROPOSED SYSTEM
www.iaetsd.in
IAETSD 2016
ISBN:978-1535061506
Proceedings of ICRMET-2016
connected to the client.Thus it makes use of
the local resource.
17
ISBN:978-1535061506
Proceedings of ICRMET-2016
The another advantage of using cloud is you
have to pay for what you are using.
Candidate
Biometric
7.1Data Protection:
To be considered protected, data from
one candidate must be properly protected, it
must be stored securely when at rest and it
must be able to move securely from one
location to
6.6Simple Scalability:
In addition to bringing processing to the data,
the next-generation cloud storage scales
simply. Cloud storage requires a high degree
of automation with self-management, selfconfiguration and self-healing, all orchestrated
through high-level policies specified by the
storage administrator. Next generation storage
provides administrators flexibility and control.
As the cloud grows, additional nodes are able
to service the data requests in parallel. If
administrators require more performance, they
can add a processing node. If they need more
capacity, they can add disks. Each can be
added independently or scaled simultaneously.
www.iaetsd.in
18
ISBN:978-1535061506
Proceedings of ICRMET-2016
Advantages of Proposed System Over
Existing one
As Authentication is based on
Biometrics, our system is fake proof. In the
existing system, candidates are restricted to
vote in their residential area whereas in our
approach candidate are free to caste their vote
at all places irrespective of their residence.
Data backup is present unlike the EVM, where
if one device fails all data will be lost.
Because the software is online, you don't need
as powerful a computer to run the
application.There's no need to buy and update
software. Use the application you need. All
your data is stored online, so you don't have to
worry about the capacity of your hard
drive.You can access the applications and
your files from anywhere.so you can vote any
place where you are staying at that particular
time. Cloud computing has everything online
fosters collaboration. Whether you use a PC,
Mac or smartphone, applications will run and
you can open and share files.these are some of
the advantages over the existing technology.
Voting
9.CONCLUSION
Some countries and states will probably
move ahead with this voting systems
quickly.The advancement of biometric
databases, point-to-point security for both the
end-user and the network, and on-demand
application delivery solutions via the cloud
and regulatory controls would play a pivotal
role in this next-generation technology
definitely. Thus we have implemented the
cloud computing technology for the purpose
of voting .By implementing this the candidate
can vote at any polling booth irrespective of
his booth, Since all the polling booth are
combined to form the cloud structure and also
he can also vote through his mobile phone
with the support of smart client technology.
There is the question of how to build Evoting systems that could sustain voting
storms" of millions of connections. Cloud
computing technology could be used to handle
this issue. Instead of building a dedicated data
center to process these one-time transactions,
the infrastructure should be built through the
cloud-computing model to allow for real-time
on-demand availability of the necessary
additional resources through the cloud.
Election authorities in one state might use the
secure computing facilities in another to
handle the bursts of traffic they experience at
a particular hour of the day. The ability of
global application delivery through the cloud
would be critical to ensure efficiency and
performance in the event of voting storms
on the network.
www.iaetsd.in
10.REFERENCES
19
IAETSD 2016
ISBN:978-1535061506
Proceedings of ICRMET-2016
www.iaetsd.in
20
IAETSD 2016