A Project Presentation
on
Design and Development of a Web-based Application
Online Voting System (OVS)
DEVELOPED BY:
Md. Milton Hossain (ID-21213)
Nasir Uddin Ahamed (ID-21214)
Md. Shohel Rana (ID-21217)
Md. Motaleb Hossain (ID-21219)
UNDER THE GUIDANCE OF:
Md. Biplob Hosen,
Lecturer,
Institute of Information Technology (IIT)
Jahangirnagar University.
Date: 16th September, 2022
ABOUT ONLINE VOTING SYSTEM (OVS)
PROJECT JUSTIFICATION
PROJECT REQUIREMENTS
1.DATA FLOW DIAGRAM (DFD)
ERD AND DATABASE TABLES
1.SYSTEM SNAPSHOTS
1.TESTING AND SECURITY
1.FUTURE ENHANCEMENT
Q & A SESSION
AGENDA
ABOUT ONLINE VOTING SYSTEM
•Online Voting System is an online voting technique
•Citizens above 18 years of age can vote online
ONLINE VOTING
TECHNIQUE
•Registration is mainly done by the system administrator
VOTING REGISTRATION
•If invalid/wrong details are submitted, then the citizen
will not be registered to the system.
REGISTRATION
VALIDATION
•After registration, the voter is assigned a secret Login
ID and password to log into the system
LOGIN AND VOTE
CASTING
•During voting, the voters can enjoy online vote services
without going to vote center physically.
ENJOY SERVICES
PROJECT JUSTIFICATION
•OVS will reduce the time spend making long queues at
the polling stations during voting.
LESS EXPENSIVE AND
LESS TIME CONSUMING
•It enable the voters to vote from any part of the globe
as explained since this is an online application
available on the internet.
CAN VOTE FORM ANY
PART OF THE GOLOBE
•Less effort and less labor intensive, as the primary cost
and focus primary on creating, managing, and running
a secure web voting portal.
LESS EFFORT AND LESS
LABOUR INTENSIVE
•It will increase the number of voters as individuals will
find it easier and more convenient to vote, especially
those abroad.
INCREASED NUMBER
OF VOTERS
•Cases of vote miscounts shall also be solved since at
the backend of this system resides a well-developed
database
MISCOUNT OF VOTES
WILL BE SOLVED
PROJECT REQUIREMENTS
•Registration of the voter will be done by the ELECTION
AUTHORITY
VOTER REGISTRATION
•ELECTION AUTHORITY can change the information any
time if required.
ELECTION AUTHORITY
•Registration of the Voter depends upon the information
filled by the user manually to the ELECTION AUTHORITY
INFORMATION FILLED
BY THE VOTERS
•Voter is given a unique Login ID and PASSWORD.
UNIQUE ID AND
PASSWORD
•In the DATABASE information of every voter is stored.
•Database shows the information of every user
DATA STORAGE
DATA FLOW DIAGRAM (DFD)
•In this diagram, voters/ general public, candidates and
administrators functions are presented.
BLOCK DIAGRAM
•In this diagram, voters sign in with user and password;
and administrators access to the system is presented.
ACTIVITY DIAGRAM
•This DFD is represented the whole system as a single
process for the administrators/ admin users.
FIRST LEVEL DFD
(FOR ADMIN)
•This DFD is represented the whole system as a single
process for the voters.
FIRST LEVEL DFD
(FOR VOTER)
DATA FLOW DIAGRAM (DFD)-Cont.
BLOCK
DIAGRAM
DATA FLOW DIAGRAM (DFD)-Cont.
ACTIVITY
DIAGRAM
DATA FLOW DIAGRAM (DFD)-Cont.
FIRST
LEVEL
DFD
(FOR
ADMIN)
DATA FLOW DIAGRAM (DFD)-Cont.
FIRST
LEVEL
DFD
(FOR
VOTER)
ERD AND DATABASE TABLES
ERD AND DATABASE TABLES- Cont.
ERD AND DATABASE TABLES- Cont.
ERD AND DATABASE TABLES- Cont.
SYSTEM SNAPSHOTS –Login Screen
SYSTEM SNAPSHOTS – Create Voter
SYSTEM SNAPSHOTS – Create Candidate
SYSTEM SNAPSHOTS – Edit Voter
SYSTEM SNAPSHOTS – Edit Candidate
SYSTEM SNAPSHOTS – Vote Cast
SYSTEM SNAPSHOTS – Results Screen
TESTING AND SECURITY
•All the modules are being separately tested.
UNIT TESTING
•All the components are being separately tested.
a. Accessibility Testing b. Functional Testing
SYSTEM TESTING
•Not only outsider (such as voters and attackers) but
also insider (such as system developers and
administrators
SECURITY ISSUE:
INSIDER & OUTSIDER
•Inheritance of some objects in the source code are
unsuitable. These errors caused the voting system to
crash.
SECURITY ISSUE:
UNSTABLE SYSTEM
•We can design our system to transmit data without
network.
•limit voter to input particular data, so that we can
prevent the command injection.
SECURITY ISSUE
SOLUTIONS
FUTURE ENHANCEMENT
•Ensure more security concern during password
changing of voters/ public access.
PASSWORD
CHANGING
•Mandatory finger printing options for each users
could be introduced for more security concern.
FINGER PRINTING
•Cornea Detection options for each users should be
introduced for more security concern.
CORNEA DETECTION
The Online Voting System (OVS) platform can be made
more secure by using the following methods
Q & A SESSION
Q & A

Online Voting System

  • 1.
    A Project Presentation on Designand Development of a Web-based Application Online Voting System (OVS) DEVELOPED BY: Md. Milton Hossain (ID-21213) Nasir Uddin Ahamed (ID-21214) Md. Shohel Rana (ID-21217) Md. Motaleb Hossain (ID-21219) UNDER THE GUIDANCE OF: Md. Biplob Hosen, Lecturer, Institute of Information Technology (IIT) Jahangirnagar University. Date: 16th September, 2022
  • 2.
    ABOUT ONLINE VOTINGSYSTEM (OVS) PROJECT JUSTIFICATION PROJECT REQUIREMENTS 1.DATA FLOW DIAGRAM (DFD) ERD AND DATABASE TABLES 1.SYSTEM SNAPSHOTS 1.TESTING AND SECURITY 1.FUTURE ENHANCEMENT Q & A SESSION AGENDA
  • 3.
    ABOUT ONLINE VOTINGSYSTEM •Online Voting System is an online voting technique •Citizens above 18 years of age can vote online ONLINE VOTING TECHNIQUE •Registration is mainly done by the system administrator VOTING REGISTRATION •If invalid/wrong details are submitted, then the citizen will not be registered to the system. REGISTRATION VALIDATION •After registration, the voter is assigned a secret Login ID and password to log into the system LOGIN AND VOTE CASTING •During voting, the voters can enjoy online vote services without going to vote center physically. ENJOY SERVICES
  • 4.
    PROJECT JUSTIFICATION •OVS willreduce the time spend making long queues at the polling stations during voting. LESS EXPENSIVE AND LESS TIME CONSUMING •It enable the voters to vote from any part of the globe as explained since this is an online application available on the internet. CAN VOTE FORM ANY PART OF THE GOLOBE •Less effort and less labor intensive, as the primary cost and focus primary on creating, managing, and running a secure web voting portal. LESS EFFORT AND LESS LABOUR INTENSIVE •It will increase the number of voters as individuals will find it easier and more convenient to vote, especially those abroad. INCREASED NUMBER OF VOTERS •Cases of vote miscounts shall also be solved since at the backend of this system resides a well-developed database MISCOUNT OF VOTES WILL BE SOLVED
  • 5.
    PROJECT REQUIREMENTS •Registration ofthe voter will be done by the ELECTION AUTHORITY VOTER REGISTRATION •ELECTION AUTHORITY can change the information any time if required. ELECTION AUTHORITY •Registration of the Voter depends upon the information filled by the user manually to the ELECTION AUTHORITY INFORMATION FILLED BY THE VOTERS •Voter is given a unique Login ID and PASSWORD. UNIQUE ID AND PASSWORD •In the DATABASE information of every voter is stored. •Database shows the information of every user DATA STORAGE
  • 6.
    DATA FLOW DIAGRAM(DFD) •In this diagram, voters/ general public, candidates and administrators functions are presented. BLOCK DIAGRAM •In this diagram, voters sign in with user and password; and administrators access to the system is presented. ACTIVITY DIAGRAM •This DFD is represented the whole system as a single process for the administrators/ admin users. FIRST LEVEL DFD (FOR ADMIN) •This DFD is represented the whole system as a single process for the voters. FIRST LEVEL DFD (FOR VOTER)
  • 7.
    DATA FLOW DIAGRAM(DFD)-Cont. BLOCK DIAGRAM
  • 8.
    DATA FLOW DIAGRAM(DFD)-Cont. ACTIVITY DIAGRAM
  • 9.
    DATA FLOW DIAGRAM(DFD)-Cont. FIRST LEVEL DFD (FOR ADMIN)
  • 10.
    DATA FLOW DIAGRAM(DFD)-Cont. FIRST LEVEL DFD (FOR VOTER)
  • 11.
  • 12.
    ERD AND DATABASETABLES- Cont.
  • 13.
    ERD AND DATABASETABLES- Cont.
  • 14.
    ERD AND DATABASETABLES- Cont.
  • 15.
  • 16.
  • 17.
    SYSTEM SNAPSHOTS –Create Candidate
  • 18.
  • 19.
    SYSTEM SNAPSHOTS –Edit Candidate
  • 20.
  • 21.
    SYSTEM SNAPSHOTS –Results Screen
  • 22.
    TESTING AND SECURITY •Allthe modules are being separately tested. UNIT TESTING •All the components are being separately tested. a. Accessibility Testing b. Functional Testing SYSTEM TESTING •Not only outsider (such as voters and attackers) but also insider (such as system developers and administrators SECURITY ISSUE: INSIDER & OUTSIDER •Inheritance of some objects in the source code are unsuitable. These errors caused the voting system to crash. SECURITY ISSUE: UNSTABLE SYSTEM •We can design our system to transmit data without network. •limit voter to input particular data, so that we can prevent the command injection. SECURITY ISSUE SOLUTIONS
  • 23.
    FUTURE ENHANCEMENT •Ensure moresecurity concern during password changing of voters/ public access. PASSWORD CHANGING •Mandatory finger printing options for each users could be introduced for more security concern. FINGER PRINTING •Cornea Detection options for each users should be introduced for more security concern. CORNEA DETECTION The Online Voting System (OVS) platform can be made more secure by using the following methods
  • 24.
    Q & ASESSION Q & A