SlideShare a Scribd company logo
1 of 4
Download to read offline
Ashwin Shinde et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 4) January 2016, pp.162-165
www.ijera.com 162 | P a g e
Online Votes and Fund analysis for political parties with Data
Security
Ashwin Shinde*, Sumedha Chokhandre**, Ketki Khante***, Chandrashekhar
Gode****
*(Department of Computer Science and Engineering, RTMNU University, Nagpur-Maharashtra)
** (Department of Information Technology, RTMNU University, Nagpur-Maharashtra)
*** (Department of Information Technology, RTMNU University, Nagpur-Maharashtra)
*** (Department of Computer Technology, RTMNU University, Nagpur-Maharashtra)
ABSTRACT
With the traditional fund management and vote bank analysis, it was difficult to manage and analyze the details
of fund collection and vote bank where all the records and relevant details were maintained at manual level,
which is always a troublesome process. To overcome these problems, an online web application is being
developed which provide the means of maintaining the funds gathered, Analyzing vote bank generated, Analysis
of area wise grievances and providing data security using encryption algorithms like Advanced Encryption
standard enabling two step verification mechanisms such as legitimate user authentication and secured access to
data. Also various reports will be generated depicting graphical assessment of information gathered.
Keywords - Registration and Fund donations, Data Security, Report Generation
I. INTRODUCTION
With the changing nature of today’s politics it is
necessary to have a professional approach towards it.
Politicians need to analyze the “Vote Bank” on the
various categories (State wise, City wise). This
project as title “Fund analysis and management
with Data Security over Website” comes under the
Relational Database Management System
(RDBMS). This application is developed with the
help of Visual Studio 2008 and SQL server.
Fig. 1. Research Work Flow
II. User Registration
In order to be a member or volunteer of a
political Party user will have to register him/her by
filling an online registration form. The analysis of
the members or donors will be done State, City,
Gender, Age category etc. The problem analysis will
be done with the problem specified by the people.
III. Fund Donations
There will be no need for the user to be a
member of this party for donating. Name of the
person will be kept as anonymous or will be
displayed on the web-site as per his/her wish.
IV. Vote Bank Analysis
This website is going to prove beneficial for the
political party which is going to use It will give a
complete analysis about the funds which they
are going to be receiving through various donors.
This facility will enable to keep all the tracks of their
receiving funds and also the transparency will be
persevered.
V. Data Security(Administrator Mode)
Administrator will have all the rights to access
any part of the database. Only he can register the
new committee members (volunteers). He will also
have rights to share database with trusted third
party‟ with some predicates such as number of
attempts to access the database within a
mentioned time span. If some intruder tries to hack
the system through invalid random no.
(Authentication code) he will get an access to the
fake database in-order to prevent any kind of
unauthorized access.
VI. Data Security(Member Mode)
Member will have certain rights but not all
as compared to Administrator. Data is protected
through different encryptions algorithms in here.
Whenever, the member will enter his/her user
RESEARCH ARTICLE OPEN ACCESS
Ashwin Shinde et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 4) January 2016, pp.162-165
www.ijera.com 163 | P a g e
name and the password a random key will be
automatically generated and will be sent to his/her
mobile no or e-mail id for authentication.
VII. Data Security(Member Mode)
Privacy of the data will be maintained as per
users’ wish.
VIII. Algorithms
8.1 Random Key Generation Algorithm
This is one of the most important
algorithms used for data security. A random key will
be sent to the user’s mobile/email id as soon as
he/she logs in. This will provide a tight security as
well as prevent any intruder from hacking the
important data.
1.2 Mechanism in Project
This is process involves two steps to verify the
identity of the legitimate user. Whenever a user will
try to login his/her account by valid username and
password he/she will receive an auto-generated
random key which will help that user to prove
his/her legitimacy. Following are the steps that will
show how this algorithm works: -
 Initially two character sets will be defined by
the developer (which will generate a random
key.).
 The length will be also defined by the
developer.
 Now the shuffling will take place between the
two character sets and finally a random key will
be generated.
This key will be sent to the users mobile or
email id.when that user will enter this random key,
access to his/her account will be provided.
IX. Encryption/Decryption Algorithm
9.1 Advanced Encryption Standard
Cryptography plays an important role in the
security of data. It enables us to store sensitive
information or transmit it across insecure networks
so that unauthorized persons cannot read it. The
basic unit for processing in the AES algorithm is
byte (a sequence of eight bits), so the input bit
sequence is first transformed into byte sequence. In
the next step a two bi-dimensional array of bytes
(called the State) is built. The State array consists of
four rows of bytes, each containing Nb bytes, where
Fig.2 Mechanism Implemented
No
Obtaining random
key for use
Is the
serial
number
repeate
d?
Finish
Yes
No
Yes
Yes
Applying
Permutations and
transformation
randomly
Start
Enter user-id
and
password
Are user
name and
password
valid?
Generate the
random number
Finish
Start
Character sets
including alphabets
and digits.
Ashwin Shinde et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 4) January 2016, pp.162-165
www.ijera.com 164 | P a g e
Nb is the block size divided by 32 (number of
words). All internal operations (Cipher and Inverse
Cipher) of the AES algorithms are then performed
on the State array, after which its final value is
copied to the output (State array is transformed back
to the bit sequence). [2]
The input and output for the AES algorithm
each consist of sequences of 128 bits (digits with
values of 0 or 1). These sequences will sometimes be
referred to as blocks and the number of bits they
contain will be referred to as their length. The
Cipher Key for the AES algorithm is a sequence of
128,192 or 256 bits. The AES algorithm consists of
ten rounds of encryption, as can be seen in Figure 3
First the 128-bit key is expanded into eleven so-
called round keys, each of them 128 bits in size.
Each round includes a transformation using the
corresponding cipher key to ensure the security of
the encryption.
Fig. 3 AES Algorithm Structure [3]
X. Report Generation.
Following Reports will be generated: -
I. Area wise collection of Total Fund Amount
II. Area wise Vote Density
III. Area wise grievance
Following reports are shown on the basis of
amount collected and there possible required graph.
The input to the database are from donor and output
i.e. graph are generated accordingly.
Likewise other reports will be generated.
Fig. 4 AES Encryption Flow [3]
Fig. 5 Snapshot of database
Ashwin Shinde et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 4) January 2016, pp.162-165
www.ijera.com 165 | P a g e
Fig. 6. Snapshot of Graph
XI. Conclusion
This research deals with various aspect of
analysis. Here we have analyzed total fund amount,
vote density and grievances according to area. We
have applied two-step verification and AES
algorithm for data security. This will enable data to
access in a secure manner.
REFERENCES
[1] William Stallings, Cryptography and network
Security principles and Practices”
International Edition, 2007.
[2] William Stallings, Cryptography and network
Security principles and Practices”
International Edition, 2003.
[3] National Institute of Standards and
Technology (NIST). NIST FIPS PUB 185,
Escrowed Encryption Standard, February
1994.
[4] Gohil, Rikitaben, Karsanbhai, Mary Grace
Shajan,”AES Algorithm for Secured
Wireless Communication”, National
Conference on Recent Trends in Engineering
and Technology, 13-14 May 2011.

More Related Content

What's hot

Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
Associate Professor in VSB Coimbatore
 
Iaetsd confidential multiparty computation with
Iaetsd confidential multiparty computation withIaetsd confidential multiparty computation with
Iaetsd confidential multiparty computation with
Iaetsd Iaetsd
 
Online voting job presentation
Online voting job presentationOnline voting job presentation
Online voting job presentation
bondito
 

What's hot (16)

Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using BlockchainIRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using Blockchain
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
 
Biometric Electronic Voting Machine
Biometric Electronic Voting MachineBiometric Electronic Voting Machine
Biometric Electronic Voting Machine
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Convenient voting machine
Convenient voting machineConvenient voting machine
Convenient voting machine
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD  USING BLOCK CHAINPATIENT DRIVEN ELECTRONIC HEALTH RECORD  USING BLOCK CHAIN
PATIENT DRIVEN ELECTRONIC HEALTH RECORD USING BLOCK CHAIN
 
Iaetsd confidential multiparty computation with
Iaetsd confidential multiparty computation withIaetsd confidential multiparty computation with
Iaetsd confidential multiparty computation with
 
Ijcet 06 07_002
Ijcet 06 07_002Ijcet 06 07_002
Ijcet 06 07_002
 
Secure Fog Computing System using Emoticon Technique
Secure Fog Computing System using Emoticon TechniqueSecure Fog Computing System using Emoticon Technique
Secure Fog Computing System using Emoticon Technique
 
IRJET- Biometric Voting Machine using Aadhar Authentication
IRJET-  	  Biometric Voting Machine using Aadhar AuthenticationIRJET-  	  Biometric Voting Machine using Aadhar Authentication
IRJET- Biometric Voting Machine using Aadhar Authentication
 
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
 
Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010
 
Wcc elise features
Wcc elise featuresWcc elise features
Wcc elise features
 
Online voting job presentation
Online voting job presentationOnline voting job presentation
Online voting job presentation
 

Viewers also liked

Absorption Reduction Capacity with Chromium (Cr) and Cadmium (Cd) Contaminant...
Absorption Reduction Capacity with Chromium (Cr) and Cadmium (Cd) Contaminant...Absorption Reduction Capacity with Chromium (Cr) and Cadmium (Cd) Contaminant...
Absorption Reduction Capacity with Chromium (Cr) and Cadmium (Cd) Contaminant...
IJERA Editor
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
IJERA Editor
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
IJERA Editor
 
Ergonomic Evaluation of the Angle of Abduction in Laptops Environment
Ergonomic Evaluation of the Angle of Abduction in Laptops EnvironmentErgonomic Evaluation of the Angle of Abduction in Laptops Environment
Ergonomic Evaluation of the Angle of Abduction in Laptops Environment
IJERA Editor
 
Analysis of Stress and Deflection of Cantilever Beam and its Validation Using...
Analysis of Stress and Deflection of Cantilever Beam and its Validation Using...Analysis of Stress and Deflection of Cantilever Beam and its Validation Using...
Analysis of Stress and Deflection of Cantilever Beam and its Validation Using...
IJERA Editor
 
Optimization of Ultrasound-Assisted Extraction of Arbutin from Leaves of Pyru...
Optimization of Ultrasound-Assisted Extraction of Arbutin from Leaves of Pyru...Optimization of Ultrasound-Assisted Extraction of Arbutin from Leaves of Pyru...
Optimization of Ultrasound-Assisted Extraction of Arbutin from Leaves of Pyru...
IJERA Editor
 

Viewers also liked (18)

Evaluation the Impact of Human Interaction/Debate on Online News to Improve U...
Evaluation the Impact of Human Interaction/Debate on Online News to Improve U...Evaluation the Impact of Human Interaction/Debate on Online News to Improve U...
Evaluation the Impact of Human Interaction/Debate on Online News to Improve U...
 
The Effect of Chitosan, Sorbitol, and Heating Temperature Bioplastic Solution...
The Effect of Chitosan, Sorbitol, and Heating Temperature Bioplastic Solution...The Effect of Chitosan, Sorbitol, and Heating Temperature Bioplastic Solution...
The Effect of Chitosan, Sorbitol, and Heating Temperature Bioplastic Solution...
 
Study on hardening mechanisms in aluminium alloys
Study on hardening mechanisms in aluminium alloysStudy on hardening mechanisms in aluminium alloys
Study on hardening mechanisms in aluminium alloys
 
Nanofluid Flow past an Unsteady Permeable Shrinking Sheet with Heat Source or...
Nanofluid Flow past an Unsteady Permeable Shrinking Sheet with Heat Source or...Nanofluid Flow past an Unsteady Permeable Shrinking Sheet with Heat Source or...
Nanofluid Flow past an Unsteady Permeable Shrinking Sheet with Heat Source or...
 
Absorption Reduction Capacity with Chromium (Cr) and Cadmium (Cd) Contaminant...
Absorption Reduction Capacity with Chromium (Cr) and Cadmium (Cd) Contaminant...Absorption Reduction Capacity with Chromium (Cr) and Cadmium (Cd) Contaminant...
Absorption Reduction Capacity with Chromium (Cr) and Cadmium (Cd) Contaminant...
 
Nanofluid Flow past an Unsteady Permeable Shrinking Sheet with Heat Source or...
Nanofluid Flow past an Unsteady Permeable Shrinking Sheet with Heat Source or...Nanofluid Flow past an Unsteady Permeable Shrinking Sheet with Heat Source or...
Nanofluid Flow past an Unsteady Permeable Shrinking Sheet with Heat Source or...
 
Assessment of Performance Characteristic of Solar Air Heater with Assorted Ge...
Assessment of Performance Characteristic of Solar Air Heater with Assorted Ge...Assessment of Performance Characteristic of Solar Air Heater with Assorted Ge...
Assessment of Performance Characteristic of Solar Air Heater with Assorted Ge...
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
 
Tuning the Ionic and Dielectric Properties of Electrospun Nanocomposite Fiber...
Tuning the Ionic and Dielectric Properties of Electrospun Nanocomposite Fiber...Tuning the Ionic and Dielectric Properties of Electrospun Nanocomposite Fiber...
Tuning the Ionic and Dielectric Properties of Electrospun Nanocomposite Fiber...
 
Analysis and Design of One Dimensional Periodic Foundations for Seismic Base ...
Analysis and Design of One Dimensional Periodic Foundations for Seismic Base ...Analysis and Design of One Dimensional Periodic Foundations for Seismic Base ...
Analysis and Design of One Dimensional Periodic Foundations for Seismic Base ...
 
Ergonomic Evaluation of the Angle of Abduction in Laptops Environment
Ergonomic Evaluation of the Angle of Abduction in Laptops EnvironmentErgonomic Evaluation of the Angle of Abduction in Laptops Environment
Ergonomic Evaluation of the Angle of Abduction in Laptops Environment
 
Improved Reliability Memory’s Module Structure for Critical Application Systems
Improved Reliability Memory’s Module Structure for Critical Application Systems Improved Reliability Memory’s Module Structure for Critical Application Systems
Improved Reliability Memory’s Module Structure for Critical Application Systems
 
A Framework for Curved Videotext Detection and Extraction
A Framework for Curved Videotext Detection and ExtractionA Framework for Curved Videotext Detection and Extraction
A Framework for Curved Videotext Detection and Extraction
 
Identifying Structures in Social Conversations in NSCLC Patients through the ...
Identifying Structures in Social Conversations in NSCLC Patients through the ...Identifying Structures in Social Conversations in NSCLC Patients through the ...
Identifying Structures in Social Conversations in NSCLC Patients through the ...
 
Analysis of Stress and Deflection of Cantilever Beam and its Validation Using...
Analysis of Stress and Deflection of Cantilever Beam and its Validation Using...Analysis of Stress and Deflection of Cantilever Beam and its Validation Using...
Analysis of Stress and Deflection of Cantilever Beam and its Validation Using...
 
Effect of Fines on Liquefaction Resistance in Fine Sand and Silty Sand
Effect of Fines on Liquefaction Resistance in Fine Sand and Silty SandEffect of Fines on Liquefaction Resistance in Fine Sand and Silty Sand
Effect of Fines on Liquefaction Resistance in Fine Sand and Silty Sand
 
Optimization of Ultrasound-Assisted Extraction of Arbutin from Leaves of Pyru...
Optimization of Ultrasound-Assisted Extraction of Arbutin from Leaves of Pyru...Optimization of Ultrasound-Assisted Extraction of Arbutin from Leaves of Pyru...
Optimization of Ultrasound-Assisted Extraction of Arbutin from Leaves of Pyru...
 

Similar to Online Votes and Fund analysis for political parties with Data Security

Similar to Online Votes and Fund analysis for political parties with Data Security (20)

IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris Recognition
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
 
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
 
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCESURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
 
IRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting SystemIRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting System
 
IRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using BlockchainIRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using Blockchain
 
Smart Voting System using Aadhar Card
Smart Voting System using Aadhar CardSmart Voting System using Aadhar Card
Smart Voting System using Aadhar Card
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based Voting
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...
 
Online Credit Card Fraud Detection and Anomaly User Blocking
Online Credit Card Fraud Detection and Anomaly User Blocking Online Credit Card Fraud Detection and Anomaly User Blocking
Online Credit Card Fraud Detection and Anomaly User Blocking
 
IRJET - Hostile to Rigging Voting System using Finger Print
IRJET - Hostile to Rigging Voting System using Finger PrintIRJET - Hostile to Rigging Voting System using Finger Print
IRJET - Hostile to Rigging Voting System using Finger Print
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key OrderIRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
 

Recently uploaded

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 

Online Votes and Fund analysis for political parties with Data Security

  • 1. Ashwin Shinde et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 4) January 2016, pp.162-165 www.ijera.com 162 | P a g e Online Votes and Fund analysis for political parties with Data Security Ashwin Shinde*, Sumedha Chokhandre**, Ketki Khante***, Chandrashekhar Gode**** *(Department of Computer Science and Engineering, RTMNU University, Nagpur-Maharashtra) ** (Department of Information Technology, RTMNU University, Nagpur-Maharashtra) *** (Department of Information Technology, RTMNU University, Nagpur-Maharashtra) *** (Department of Computer Technology, RTMNU University, Nagpur-Maharashtra) ABSTRACT With the traditional fund management and vote bank analysis, it was difficult to manage and analyze the details of fund collection and vote bank where all the records and relevant details were maintained at manual level, which is always a troublesome process. To overcome these problems, an online web application is being developed which provide the means of maintaining the funds gathered, Analyzing vote bank generated, Analysis of area wise grievances and providing data security using encryption algorithms like Advanced Encryption standard enabling two step verification mechanisms such as legitimate user authentication and secured access to data. Also various reports will be generated depicting graphical assessment of information gathered. Keywords - Registration and Fund donations, Data Security, Report Generation I. INTRODUCTION With the changing nature of today’s politics it is necessary to have a professional approach towards it. Politicians need to analyze the “Vote Bank” on the various categories (State wise, City wise). This project as title “Fund analysis and management with Data Security over Website” comes under the Relational Database Management System (RDBMS). This application is developed with the help of Visual Studio 2008 and SQL server. Fig. 1. Research Work Flow II. User Registration In order to be a member or volunteer of a political Party user will have to register him/her by filling an online registration form. The analysis of the members or donors will be done State, City, Gender, Age category etc. The problem analysis will be done with the problem specified by the people. III. Fund Donations There will be no need for the user to be a member of this party for donating. Name of the person will be kept as anonymous or will be displayed on the web-site as per his/her wish. IV. Vote Bank Analysis This website is going to prove beneficial for the political party which is going to use It will give a complete analysis about the funds which they are going to be receiving through various donors. This facility will enable to keep all the tracks of their receiving funds and also the transparency will be persevered. V. Data Security(Administrator Mode) Administrator will have all the rights to access any part of the database. Only he can register the new committee members (volunteers). He will also have rights to share database with trusted third party‟ with some predicates such as number of attempts to access the database within a mentioned time span. If some intruder tries to hack the system through invalid random no. (Authentication code) he will get an access to the fake database in-order to prevent any kind of unauthorized access. VI. Data Security(Member Mode) Member will have certain rights but not all as compared to Administrator. Data is protected through different encryptions algorithms in here. Whenever, the member will enter his/her user RESEARCH ARTICLE OPEN ACCESS
  • 2. Ashwin Shinde et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 4) January 2016, pp.162-165 www.ijera.com 163 | P a g e name and the password a random key will be automatically generated and will be sent to his/her mobile no or e-mail id for authentication. VII. Data Security(Member Mode) Privacy of the data will be maintained as per users’ wish. VIII. Algorithms 8.1 Random Key Generation Algorithm This is one of the most important algorithms used for data security. A random key will be sent to the user’s mobile/email id as soon as he/she logs in. This will provide a tight security as well as prevent any intruder from hacking the important data. 1.2 Mechanism in Project This is process involves two steps to verify the identity of the legitimate user. Whenever a user will try to login his/her account by valid username and password he/she will receive an auto-generated random key which will help that user to prove his/her legitimacy. Following are the steps that will show how this algorithm works: -  Initially two character sets will be defined by the developer (which will generate a random key.).  The length will be also defined by the developer.  Now the shuffling will take place between the two character sets and finally a random key will be generated. This key will be sent to the users mobile or email id.when that user will enter this random key, access to his/her account will be provided. IX. Encryption/Decryption Algorithm 9.1 Advanced Encryption Standard Cryptography plays an important role in the security of data. It enables us to store sensitive information or transmit it across insecure networks so that unauthorized persons cannot read it. The basic unit for processing in the AES algorithm is byte (a sequence of eight bits), so the input bit sequence is first transformed into byte sequence. In the next step a two bi-dimensional array of bytes (called the State) is built. The State array consists of four rows of bytes, each containing Nb bytes, where Fig.2 Mechanism Implemented No Obtaining random key for use Is the serial number repeate d? Finish Yes No Yes Yes Applying Permutations and transformation randomly Start Enter user-id and password Are user name and password valid? Generate the random number Finish Start Character sets including alphabets and digits.
  • 3. Ashwin Shinde et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 4) January 2016, pp.162-165 www.ijera.com 164 | P a g e Nb is the block size divided by 32 (number of words). All internal operations (Cipher and Inverse Cipher) of the AES algorithms are then performed on the State array, after which its final value is copied to the output (State array is transformed back to the bit sequence). [2] The input and output for the AES algorithm each consist of sequences of 128 bits (digits with values of 0 or 1). These sequences will sometimes be referred to as blocks and the number of bits they contain will be referred to as their length. The Cipher Key for the AES algorithm is a sequence of 128,192 or 256 bits. The AES algorithm consists of ten rounds of encryption, as can be seen in Figure 3 First the 128-bit key is expanded into eleven so- called round keys, each of them 128 bits in size. Each round includes a transformation using the corresponding cipher key to ensure the security of the encryption. Fig. 3 AES Algorithm Structure [3] X. Report Generation. Following Reports will be generated: - I. Area wise collection of Total Fund Amount II. Area wise Vote Density III. Area wise grievance Following reports are shown on the basis of amount collected and there possible required graph. The input to the database are from donor and output i.e. graph are generated accordingly. Likewise other reports will be generated. Fig. 4 AES Encryption Flow [3] Fig. 5 Snapshot of database
  • 4. Ashwin Shinde et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 4) January 2016, pp.162-165 www.ijera.com 165 | P a g e Fig. 6. Snapshot of Graph XI. Conclusion This research deals with various aspect of analysis. Here we have analyzed total fund amount, vote density and grievances according to area. We have applied two-step verification and AES algorithm for data security. This will enable data to access in a secure manner. REFERENCES [1] William Stallings, Cryptography and network Security principles and Practices” International Edition, 2007. [2] William Stallings, Cryptography and network Security principles and Practices” International Edition, 2003. [3] National Institute of Standards and Technology (NIST). NIST FIPS PUB 185, Escrowed Encryption Standard, February 1994. [4] Gohil, Rikitaben, Karsanbhai, Mary Grace Shajan,”AES Algorithm for Secured Wireless Communication”, National Conference on Recent Trends in Engineering and Technology, 13-14 May 2011.