Securing Mobile Phone Based Voting By Integrating Location Services with Encryption Algorithm

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-23 Number-1
Year of Publication : 2015
Authors : Bhavana Sinha, Reetika Singh
  10.14445/22312803/IJCTT-V23P106

MLA

Bhavana Sinha, Reetika Singh "Securing Mobile Phone Based Voting By Integrating Location Services with Encryption Algorithm". International Journal of Computer Trends and Technology (IJCTT) V23(1):27-30, May 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Voting is a formal means by which a candidate gets selected by existing population for an important responsibility related to governmental actions .This conversation is normally carried out through manual paper ballots or by hand based communication methods. It is needed that voting methods needs to be simple and reliable. Also it is required that the voting strategies should be productive and secure . Business around the globe has broadly, of later, been increasingly started utilizing means relating to mobile based conversation methods. As mobile based conversation grows, it will not take much time until each methodology gets adapted towards these methods. The entrance of mobile technologies in existing manual methods has made the methods more reliable and versatile . Because of the advantages they offer, various government and private business methodologies are being migrated towards mobile platform. Augmenting the present voting frameworks with proposed voting methodology will improve the voting process by expanding voter participation. The proposed work plans to expand security to lessen the possibilities of fake voting and build adaptability.

References
[1] Barbara Ondrisek “E-Voting System Security Optimization ” Proceedings of the 42nd Hawaii International Conference on System Sciences - 2009
[2] Jonathan Bannet, David W. Price,Algis Rudys,Justin Singer, And Dan S.Wallach “Hack-A-Vote: Security Issues With Electronic Voting Systems” Ieee Computer Society 1540- 7993/04/$20.00 © 2004 Ieee , Ieee Security & Privacy
[3] Rong Chen, Xianhua Shu, Zhenjun Du,”Research on mobile loctation service design based on android, “fifth international conference on Wireless communications networking and mobile computing, pp 1-4, 2009.
[4] Tor-Morten,Gronli Jarle,Hansen Gheorghita,Ghinea,”Android,Java ME and Windows Mobile interplay,”IEEE 24th International Conference on Advanced information networking and applications workshop,2010.
[5] Xianhua Shu; Zhenjun Du ,Rong Chen “Research on Mobile Location Service Design Based on Android”, Wireless Communications, Networking and Mobile Computing, 2009.
[6] http://www.tutorialspoint.com/sqlite/sqlite_overview.htm [7] http://en.wikipedia.org/wiki/Google_Analytics
[8] Jan nealbert v. Calimag, pamela anne g. Miguel, romel s. Conde & luisa b. Aquino, “Ubiquitous Learning Environment Using Android Mobile Application IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET), , Feb 2014
[9] Fan Jiang and Saoping Ku,”How to display the data from database by Listview on Android,” second International workshop on Intelligent Systems and Applications(ISA),2010.
[10] Gupta.A.kumar,S.Qadeer,M.A.,”Location based services using android(LBSOID),” IEEE International conference on Multimedia services architecture and applications,pp 1-5,2009.
[11] Hassan,Z.S ,”Ubiquitous computing and android,” third international conference on Digital information management,pp. 166-171,2008.

Keywords
Cloud Computing, Apriori Algorithm ,K-Means Algorithm.