0% found this document useful (0 votes)
8 views38 pages

Decentralised Voting System Report - 1

Uploaded by

21e11a0502
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views38 pages

Decentralised Voting System Report - 1

Uploaded by

21e11a0502
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

A DECENTRALIZED VOTING SYSTEM USING

ETHEREUM BLOCKCHAIN
A Industry-Oriented Mini Project Report Submitted to

Jawaharlal Nehru Technological University Hyderabad

In partial fulfillment of the requirements for the award


of the degree of
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
Submitted By
NISHANT KUMAR MISHRA (21E11A0545)
RAM CHARAN SINGH RAJPOOT (21E11A0527)
G. SANTHOSH REDDY (21E11A0514)
K. ARUN KUMAR (21E11A0518)

Under the Supervision of

Dr. Deepak Kachave Associate


professor, CSE department.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


BHARAT INSTITUTE OF ENGINEERING AND TECHNOLOGY
Accredited by NAAC, Accredited by NBA (UG Programmes: CSE, ECE)
Approved by AICTE, Affiliated to JNTUH Hyderabad
Hyderabad-501 510, Telangana. Jan 2025

i
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
BHARAT INSTITUTE OF ENGINEERING AND TECHNOLOGY
Accredited by NAAC, Accredited by NBA (UG Programmes: CSE, ECE) Approved
by AICTE, Affiliated to JNTUH Hyderabad
Hyderabad-501 510, Telangana.

Certificate
This is to certify that the project work entitled “ A DECENTRALIZED VOTING
SYSTEM USING ETHEREUM BLOCKCHAIN” is the bonafide work done

By
NISHANT KUMAR MISHRA (21E11A0545)
RAM CHARAN SINGH RAJPOOT (21E11A0527)
G. SANTHOSH REDDY (21E11A0514)
K. ARUN KUMAR (21E11A0518)

in the Department of Computer Science and Engineering, BHARAT INSTITUTE OF


ENGINEERING AND TECHNOLOGY, Hyderabad is submitted to Jawaharlal Nehru
Technological University, Hyderabad in partial fulfillment of the requirements for the award of B.
Tech degree in Computer Science and Engineering during 2024-2025.
Guide: Head of the Department:
Dr. Deepak Kachave Dr. Deepak Kachave
ASSOCIATE PROFESSOR ASSOCIATE PROFESSOR
Dept of CSE, Dept of CSE,
Bharat Institute of Engineering and Bharat Institute of Engineering and
Technology, Technology,
Hyderabad – 501 510 Hyderabad – 501 510

Viva-Voce held on……………………………………………

ii
Internal Examiner External Examiner

ACKNOWLEDGEMENT
The satisfaction that accompanies the successful completion of the task would be put incomplete
without the mention of the people who made it possible, whose constant guidance and encouragement
crown all the efforts with success.

We avail this opportunity to express our deep sense of gratitude and hearty thanks to Shri CH.
Venugopal Reddy, Secretary & Correspondent of BIET, for providing congenial atmosphere and
encouragement.

We would like to thank Prof. G. Kumaraswamy Rao, Director, Former Director & O.S. of DLRL
Ministry of Defence, and Dr. V. Srinivas Rao, Dean CSE for having provided all the facilities and
support.

We would like to thank our Academic Incharge Dr. Deepak Kachave, Associate Professor of CSE, for
their expert guidance and encouragement at various levels of Project.

We are thankful to our Project Supervisor Dr. Deepak Kachave, Assistant Professor, Computer
Science and Engineering for his support and cooperation throughout the process of this Project.

We are thankful to Project Coordinator Dr. Rama Prakasha Reddy Ch, Assistant Professor, Computer
Science and Engineering for his support and cooperation throughout the process of this project.

We place highest regards to our Parent, our Friends and Well-wishers who helped a lot in making the
report of this project.

iii
iv
B.Tech -Project Phase-1
2024-2025
DECLARATION

We hereby declare that this Project Report is titled “A DECENTRALIZED VOTING


SYSTEM USING ETHEREUM BLOCKCHAIN” is a genuine project work carried out by
us, in B.Tech (Computer Science and Engineering) degree course of Jawaharlal Nehru Technology
University Hyderabad, and has not been submitted to any other course or university for the award of
my degree by us.

Candidate Name(s) Roll Number Signature


NISHANT KUMAR MISHRA 21E11A0545
RAM CHARAN SINGH RAJPOOT 21E11A0527
G. SANTHOSH REDDY 21E11A0514
K. ARUN KUMAR 21E11A0518

DATE:
ABSTRACT

Decentralized voting using Ethereum blockchain is a secure, transparent and tamper-proof way of
conducting online voting. It is a decentralized application built on the Ethereum blockchain network,
which allows participants to cast their votes and view the voting results without the need for
intermediaries. In this system, votes are recorded on the blockchain, making it impossible for anyone
to manipulate or alter the results. The use of smart contracts ensures that the voting process is
automated, transparent, and secure. The use of the blockchain technology and the implementation of a
decentralized system provide a reliable and cost-effective solution for conducting trustworthy and fair
elections.
CONTENTS

Sl No Chapter Name Page No

1 Introduction 1

1.1 Introduction to Blockchain

1.2 Decentralized Voting Using Blockchain

2 Literature survey 3

2.1 Literature survey on Online Voting System Using


Blockchain

2.2 A Systematic Literature Review and Meta-Analysis on


Scalable Blockchain-Based Electronic Voting Systems

2.3 A Survey of Blockchain Based on E-voting Systems

2.4 Survey on Voting System using Blockchain Technology

2.5 A Survey on Smart Electronic Voting System Using


Blockchain Technology

3 Existing System 6

3.1 Brief Explanation of Existing Systems

3.2 Disadvantages of Existing System

4 Proposed System 7

4.1 Brief Explanation of Proposed System

4.2 Advantages of Proposed System

4.3 Objective of the Proposed Research

4.4 System Architecture


CONTENTS

Sl No Chapter Name Page No


5 Modules 10
6 System Design 11

6.1 Requirement Analysis

6.2 Data Flow Diagram


6.3 ER Diagram

6.4 Use Case Diagram

7 Coding 15
8 Testing 23

8.1 Types of Testing

8.2 Test Results

Conclusion and Future Enhancement 27

Screenshots 28

Sl No Figure Name Page No


1 System Architecture 8
2 Level 0 data flow diagram 12

3 Level 1 data flow diagram 12

4 Level 2 data flow diagram 13

5 ER Diagram 13
CHAPTER 1
INTRODUCTION

1.1 Introduction to Blockchain

Blockchain is a distributed digital ledger technology that allows participants in a network to


share and validate transactions in a secure and transparent manner without the need for
intermediaries. The technology is designed to be decentralized, meaning that the data is stored
on a network of computers instead of a central database. This makes it difficult to hack or
manipulate the data, ensuring the integrity and security of the system.

The blockchain technology gained popularity with the emergence of Bitcoin, which was the
first decentralized cryptocurrency. However, the technology has since been applied to various
industries, including finance, supply chain management, healthcare, and voting, among others.

Blockchain works by creating blocks of data that are linked together in a chain, hence the name
blockchain. Each block contains a unique code, known as a hash, that is generated based on
the contents of the block. This hash is then used to link the block to the previous one, forming
a chain of blocks.

Once a block is added to the blockchain, it cannot be altered or deleted without the consensus
of the network participants. This makes the technology immutable, ensuring that the data
stored on the blockchain is tamper-proof and transparent.

Overall, blockchain technology has the potential to revolutionize the way we store and share
data, making it more secure, transparent, and accessible.

1.2 Decentralized Voting Using Blockchain

A decentralized voting system built on the Ethereum blockchain has the potential to
revolutionize the way we conduct elections. By leveraging the security, transparency,
1
and immutability of blockchain technology, decentralized voting systems can
eliminate many of the challenges and risks associated with traditional voting systems.

In a decentralized voting system, each voter has a unique digital identity, and their vote
is recorded on the blockchain, ensuring that the vote is tamper-proof and cannot be
altered. Decentralized voting systems also eliminate the need for intermediaries, such
as government agencies, to oversee the election process, making it more efficient and
less susceptible to corruption or manipulation.

Furthermore, decentralized voting systems can increase voter participation by allowing voters to
cast their ballots from anywhere in the world, as long as they have an internet connection. This
can lead to a more democratic and inclusive electoral process, with greater voter engagement and
higher turnout. Overall, a decentralized voting system using the Ethereum blockchain has the
potential to bring significant benefits to the electoral process, making it more secure, transparent,
and accessible to everyone.

2
CHAPTER 2
LITERATURE SURVEY

2.1 Literature survey on Online Voting System Using Blockchain

Authors: Vaibhav Anasune, Pradeep Choudhari, Madhura Kelapure, Pranali Shirke and

Prasad Halgaonkar

Highly advanced security methods are necessary to introduce effective online voting system
in the whole world. The aspect of security and transparency is a threat from global election
with the conventional system. General elections still use a centralized system where one
organization that manages it. Some of the problems that can occur in traditional electoral
systems are with an organization that has full control over the database and system, it is
possible to manipulate with the database. This paper presents a survey on some previous voting
system that is used by different countries and organizations.

2.2 A Systematic Literature Review and Meta-Analysis on Scalable Blockchain-

Based Electronic Voting Systems

Authors: Uzma Jafar, Mohd Juzaiddin Ab Aziz, Zarina Shukur and Hafiz Adnan Hussain

Electronic voting systems must find solutions to various issues with authentication, data
privacy and integrity, transparency, and verifiability. On the other hand, Blockchain
technology offers an innovative solution to many of these problems. The scalability of
Blockchain has arisen as a fundamental barrier to realizing the promise of this technology,
especially in electronic voting. This study seeks to highlight the solutions regarding scalable
Blockchain-based electronic voting systems and the issues linked with them while also
attempting to foresee future developments. A systematic literature review (SLR) was used to
complete the task, leading to the selection of 76 articles in the English language from 1 January
2017 to 31 March 2022 from the famous databases. This SLR was conducted to

3
identify well-known proposals, their implementations, verification methods, various
cryptographic solutions in previous research to evaluate cost and time. It also identifies
performance parameters, the primary advantages and obstacles presented by different systems,
and the most common approaches for Blockchain scalability. In addition, it outlines several
possible research avenues for developing a scalable electronic voting system based on
Blockchain technology. This research helps future research before proposing or developing
any solutions to keep in mind all the voting requirements, merits, and demerits of the proposed
solutions and provides further guidelines for scalable voting solutions.

2.3 A Survey of Blockchain Based on E-voting Systems

Authors: Yousif Osman Abuidris, Rajesh Kumar and Wang Wenyong

Blockchain technology as a decentralized and distributed public ledger in a P2P network has
recently gained much attention. In this technology, a linked block structure is applied, and a
trusted consensus mechanism is established to synchronize data modifications, making it
possible to develop a tamper-proof digital platform for data storage and sharing. We think that
blockchain could be used in various interactive online systems, such as the Internet of Things,
supply chain systems, voting systems, etc. The scope of this survey is to shed light on some
recent contributions of the security and privacy issues associated with e-voting based on
blockchain. At the end of this paper, we provided a comparison for the security and privacy
requirements of the existing e-voting systems based on blockchain.

2.4 Survey on Voting System using Blockchain Technology

Authors: Mayur Shirsath, Mohit Zade, Riteshkumar Talke, Praful Wake and Maya Shelke

The use of information technology has in some ways revolutionized in many sectors. E- voting
is said to be a symbol of modern democracy. While research on the topic is still emerging, it
has mostly focused on the technical and legal issues instead of taking advantage of this
technology and implementing it for good cause. Usefulness of e-voting will perform best when
compared with the existing framework. The word Vote means to choose a candidate from a

4
given list of candidates who will lead the organization or the group .The main goal of voting
is to practice voting in such a way that every person votes to elect
leader. Most countries in the world, India is no exception, had trouble voting. Voting is still
carried out in countries in physical mode. This physical mode process is not safe as it can be
manipulated by members of voting commitment. There are many issues such as voting
stations being too far and improper voting tools. The proposed flagship internet-based online
voting system supported by blockchain technology solves this very problem. Blockchain
technology uses encryption and hashing techniques with which it makes voting secure. In this
case, each vote is considered as a unique transaction. A private blockchain is created using a
peer to peer network where we store voting transactions. This application is programmed in
such a way so that the details of voting are abstract from the user. Users will be given enough
time for voting with the system running. The main purpose of this paper is to come up with a
new unique solution, which does not require any technical skills. Since voting is in online
mode, increased voter turnout is likely. In this project, the concept of developing an electronic
voting system using blockchain technology is implemented.

2.5 A Survey on Smart Electronic Voting System Using Blockchain Technology

Authors: Naina Nagesh Dhepe and Dr. Pathan Mohd Shafi

India is the world’s largest democracy with a population of more than 1 billion; India has an
electorate of more than 668 million and covers 543 parliamentary constituencies. Voting is the
bridge between the governed and government. The last few years have brought a renewed
focus on to the technology used in the voting process. The current voting system has many
security holes, and it is difficult to prove even simple security properties about them. A voting
system that can be proven correct has many concerns. There are some reasons for a
government to use electronic systems are to increase elections activities and to reduce the
elections expenses. Still there is some scope of work in electronic voting system because there
is no way of identification by the electronic voting system whether the user is authentic or not
and securing electronic voting machine from miscreants. The proposed system is to develop
a compatible voting machine with high security by using Block-chain technology in order to
increase security and transparency between the users.

5
CHAPTER 3
EXISTING SYSTEM

3.1 Brief Explanation of existing system

The existing voting system typically involves voters physically visiting a designated polling
place to cast their vote on paper ballots. These ballots are then manually counted and recorded.
Some countries also have electronic voting systems in place, which allow voters to cast their
votes electronically through machines or the internet. However, electronic voting systems
have faced criticism due to security concerns and potential vulnerabilities.

3.2 Disadvantages of existing system


1. Lack of transparency: In most voting systems, it's difficult for voters to know
whether their vote was counted correctly, and for observers to ensure that the vote
counting process is fair.

2. Vulnerability to fraud: Both paper ballots and electronic voting machines can be
vulnerable to tampering, hacking and other types of fraud. This can be especially
problematic when there is no paper trail or other way to audit the results.

3. Slow results: Counting paper ballots can be a time-consuming and labor-intensive


process, which can delay the announcement of election results.

4. Cost: Running a traditional voting system can be expensive, requiring the hiring of
poll workers, the purchase of voting machines or paper ballots, and the rental of polling
places.

5. Centralization: Many traditional voting systems are centralized, meaning that they
are controlled by a small number of authorities. This can create the potential for abuse
of power or manipulation of the voting process.

6. Limited Accessibility: Some voting systems require voters to travel to specific polling
places, which can be difficult or impossible for people with disabilities, limited
mobility, or other challenges. This can result in voter disenfranchisement.

6
CHAPTER 4
PROPOSED SYSTEM

4.1 Brief explanation of proposed system

The proposed decentralized voting system using Ethereum blockchain aims to provide a
transparent and tamper-proof solution for conducting elections. By leveraging smart contracts
on the Ethereum network, the system enables secure and anonymous voting, while ensuring
the integrity and immutability of the voting data. This would increase voter trust in the election
process and reduce the risk of fraud or manipulation.

4.2 Advantages of Proposed System

• Decentralization ensures that no party controls the voting process.


• Transparency throughout the voting process.

• It is tamper proof.

• Voters can vote from any part of the world.

• This method of voting is cost effective.

• The results are provided in real time.

4.3 Objectives of the Proposed Research

1. Security: The proposed system aims to provide a secure platform for conducting
elections, eliminating the possibility of tampering with votes, and ensuring that the
election results are transparent and verifiable.

2. Transparency: The proposed system aims to provide complete transparency to the


voters, allowing them to view the entire voting process, including the vote counting
and results.

7
3. Accessibility: The proposed system aims to make the voting process more accessible
to all eligible voters by eliminating the need for physical presence at a polling station,
thus increasing voter turnout.

4. Efficiency: The system aims to increase the efficiency of the voting process by
reducing the time and resources required to conduct elections. Since the system is
automated and eliminates the need for intermediaries, it can significantly reduce the
cost and time associated with traditional voting methods.

5. Trust: The proposed system aims to increase trust in the voting process by providing
a transparent and tamper-proof mechanism for recording and tallying votes.

4.4 System Architecture

Figure 1 System Architecture

8
1. User Authentication
• The system prompts the user to enter their Voter ID and Password.
• These credentials are matched against the records stored in the database.
• If the credentials are invalid, the user is notified, and access is denied.
2. Role-Based Redirection
• If the credentials match, the system checks the role associated with the user:
o Admin: Redirected to the Admin Dashboard.
o Voter: Redirected to the Voter Page.

3. Admin Features
Once the admin logs in, they can perform the following actions:
• Start the Voting Process:
o Define the start and end dates for the voting process to ensure it runs during a specific
timeframe.
• Add Candidates:
o The admin can register the candidates eligible for the election by providing details such
as the candidate's name, ID, and other relevant information.
• Monitor Voting Progress:
o The admin has access to dashboards to monitor the voting process and check real-time
updates on votes.
4. Voter Features
Once the voter logs in, they can:
• Participate in Voting:
o Voters can only cast their vote once the voting process has been started by the admin.
o Each voter is allowed to cast one vote, ensuring fairness and transparency.
• Real-Time Updates:
o After voting, the voting page is updated in real time to reflect the latest vote counts for
each candidate.
5. Post-Voting Features
• The system prevents voters from voting again by marking their participation on the blockchain.
• Admins can end the voting process once the defined period is over.
• Results can be displayed securely, ensuring that the process is transparent and trustworthy.

9
CHAPTER 5
MODULES

5.1 Modules

1. Voter - The voter module is designed for individuals who are eligible to participate in the
voting process. It provides functionalities related to the voting experience and ensures the
integrity and security of the votes. The main features of the voter module include:

a. Voters can securely authenticate themselves to access the voting system using
their unique credentials.

b. Voters can access information about the candidates running for various
positions, such as their names, parties, and other relevant details.

c. Voters can verify the status of their votes and ensure that their choices are
accurately recorded in the blockchain.

2. Admin - The admin module is designed for administrators or election officials responsible
for managing and overseeing the voting system. It provides functionalities to configure
and monitor the voting process. The main features of the admin module include:

a. Admins can set up the system parameters, such as defining the start and end
dates of the voting period, candidate registration, and other administrative
settings.

b. Admin can manually verify the candidate and can start the voting process.

10
CHAPTER 6
SYSTEM DESIGN

6.1 Requirement Analysis

In order to effectively design and develop a system, it is important to understand and document
the requirements of the system. The process of gathering and documenting the requirements
of a system is known as requirement analysis. It helps to identify the goals of the system, the
stakeholders and the constraints within which the system will be developed. The requirements
serve as a blueprint for the development of the system and provide a reference point for testing
and validation.

• Hardware Requirements
o Processor – 2 GHz or more o RAM – 4 GB or more
o Disk Space – 100 GB or more

• Software Requirements
o Node.js (version – 18.14.0) o Web3.js (version – 1.8.2) o Truffle (version –
5.7.6) o Solidity (version – 0.5.16) o Ganache (version – 7.7.3) o Metamask
o Python (version – 3.9)
o FastAPI
o MySQL Database (port – 3306)

11
6.2 Data Flow Diagram

• Level 0 data flow diagram

Figure 2 Level 0 Data Flow Diagram

• Level 1 data flow diagram

Figure 3 Level 1 Data Flow Diagram

12
• Level 2 data flow diagram

Figure 4 Level 2 Data Flow Diagram

6.3 ER Diagram

Figure 5 ER Diagram

13
6.5 Use Case Diagram

Figure 6 Use Case Diagram

14
CHAPTER 7
CODING

1. Migrations.sol pragma

solidity ^0.5.15;

contract Migrations {
address public owner;
uint public last_completed_migration;
modifier restricted() {
require(msg.sender == owner, "Access restricted to owner"); _;
}
constructor() public {
owner = msg.sender;
}
function setCompleted(uint completed) public restricted {
last_completed_migration = completed;
}
function upgrade(address new_address) public restricted {
Migrations upgraded = Migrations(new_address);
upgraded.setCompleted(last_completed_migration); }
}
2. Voting.sol pragma

solidity ^0.5.15;

contract Voting {
struct Candidate {
uint id; string
name; string party;
uint voteCount;
}
mapping (uint => Candidate) public candidates;
mapping (address => bool) public voters;

uint public countCandidates;


uint256 public votingEnd;
uint256 public votingStart;

function addCandidate(string memory name, string memory party) public


returns(uint) { countCandidates ++;
candidates[countCandidates] = Candidate(countCandidates,

15
name, party, 0); return
countCandidates;
}
function vote(uint candidateID) public {
require((votingStart <= now) && (votingEnd > now));

require(candidateID > 0 && candidateID <= countCandidates);


require(!voters[msg.sender]);
voters[msg.sender] = true;
candidates[candidateID].voteCount ++; }
function checkVote() public view returns(bool){
return voters[msg.sender]; }
function getCountCandidates() public view returns(uint) {
return countCandidates;
}
function getCandidate(uint candidateID) public view returns
(uint,string memory, string memory,uint) { return
(candidateID,candidates[candidateID].name,candidates[candidateID].party,
candidates[candidateID].voteCount);
}
function setDates(uint256 _startDate, uint256 _endDate) public{
require((votingEnd == 0) && (votingStart == 0) && (_startDate +
1000000 > now) && (_endDate > _startDate));
votingEnd = _endDate; votingStart =
_startDate;
}
function getDates() public view returns (uint256,uint256) {
return (votingStart,votingEnd);
}
}

16
3. App.js
const Web3 = require('web3');
const contract = require('@truffle/contract');
const votingArtifacts = require('../../build/contracts/Voting.json');
var VotingContract = contract(votingArtifacts)

window.App = {
eventStart: function() {
window.ethereum.request({ method: 'eth_requestAccounts' });
VotingContract.setProvider(window.ethereum)
VotingContract.defaults({from:
window.ethereum.selectedAddress,gas:6654755})

// Load account data


App.account = window.ethereum.selectedAddress;
$("#accountAddress").html("Your Account: " +
window.ethereum.selectedAddress);
VotingContract.deployed().then(function(instance){
instance.getCountCandidates().then(function(countCandidates){

$(document).ready(function(){
$('#addCandidate').click(function() { var nameCandidate =
$('#name').val(); var partyCandidate =
$('#party').val();
instance.addCandidate(nameCandidate,partyCandidate).th
e
n(function(result){ })

});
$('#addDate').click(function(){
var startDate =
Date.parse(document.getElementById("startDate").value)/1000;
var endDate
= Date.parse(document.getElementById("endDate").value)/1000;

instance.setDates(startDate,endDate).then(function(rsl
t){
console.log("tarihler verildi");
});

});

instance.getDates().then(function(result){
var startDate = new Date(result[0]*1000);
var endDate = new Date(result[1]*1000);
17
$("#dates").text(
startDate.toDateString(("#DD#/#MM#/#YYYY#")) + " - " +
endDate.toDateString("#DD#/#MM#/#YYYY#"));
}).catch(function(err){
console.error("ERROR! " + err.message) });
});
for (var i = 0; i < countCandidates; i++ ){
instance.getCandidate(i+1).then(function(data){
var id = data[0]; var
name = data[1]; var
party = data[2]; var
voteCount = data[3];
var viewCandidates = `<tr><td> <input class="form-check-
input" type="radio" name="candidate" value="${id}" id=${id}>` + name +
"</td><td>" + party + "</td><td>" + voteCount + "</td></tr>"
$("#boxCandidate").append(viewCandidates)
})
}
window.countCandidates = countCandidates });
instance.checkVote().then(function (voted) {
console.log(voted); if(!voted) {
$("#voteButton").attr("disabled", false);

}
});

}).catch(function(err){
console.error("ERROR! " + err.message) })
},
vote: function() {
var candidateID = $("input[name='candidate']:checked").val();
if (!candidateID) {
$("#msg").html("<p>Please vote for a candidate.</p>") return
}
VotingContract.deployed().then(function(instance){
instance.vote(parseInt(candidateID)).then(function(result){
$("#voteButton").attr("disabled", true);
$("#msg").html("<p>Voted</p>");
window.location.reload(1);
})
}).catch(function(err){
console.error("ERROR! " + err.message) })
}
}
window.addEventListener("load", function() {

18
if (typeof web3 !== "undefined") {
console.warn("Using web3 detected from external source like
Metamask") window.eth = new
Web3(window.ethereum)
} else { console.warn("No web3 detected. Falling
back to
http://localhost:9545. You should remove this fallback when you deploy
live, as it's inherently insecure. Consider switching to Metamask for
deployment. More info here:
http://truffleframework.com/tutorials/truffle-and-metamask")
window.eth = new Web3(new
Web3.providers.HttpProvider("http://127.0.0.1:9545"))
}
window.App.eventStart()
})

4. Login.js const loginForm =

document.getElementById('loginForm');

loginForm.addEventListener('submit', (event) => {


event.preventDefault();
const voter_id = document.getElementById('voter-id').value;
const password = document.getElementById('password').value;
const token = voter_id;

const headers = {
'method': "GET",
'Authorization': `Bearer ${token}`, };
fetch(`http://127.0.0.1:8000/login?voter_id=${voter_id}&password=${pas
sword}`, { headers })
.then(response => { if
(response.ok) {
return response.json();
} else { throw new Error('Login
failed');
}
})
.then(data => { if (data.role
=== 'admin') {
console.log(data.role)
localStorage.setItem('jwtTokenAdmin', data.token);
window.location.replace(`http://127.0.0.1:8080/admin.html?Authoriz
ation=Bearer ${localStorage.getItem('jwtTokenAdmin')}`);
} else if (data.role === 'user'){
localStorage.setItem('jwtTokenVoter', data.token);

19
window.location.replace(`http://127.0.0.1:8080/index.html?Authoriz
ation=Bearer ${localStorage.getItem('jwtTokenVoter')}`);
}
})
.catch(error => { console.error('Login failed:',
error.message); });
});

5. Main.py
# Import required modules
import dotenv import os
import mysql.connector
from fastapi import FastAPI, HTTPException, status, Request
from fastapi.middleware.cors import CORSMiddleware from
fastapi.encoders import jsonable_encoder from
mysql.connector import errorcode import jwt

# Loading the environment variables


dotenv.load_dotenv()

# Initialize the todoapi app app


= FastAPI()

# Define the allowed origins for CORS origins


= [
"http://localhost:8080",
"http://127.0.0.1:8080",
]

# Add CORS middleware


app.add_middleware(
CORSMiddleware,
allow_origins=origins,
allow_credentials=True,
allow_methods=["*"],
allow_headers=["*"],
)

# Connect to the MySQL database try:


cnx = mysql.connector.connect(
user=os.environ['MYSQL_USER'],
password=os.environ['MYSQL_PASSWORD'],
host=os.environ['MYSQL_HOST'],
database=os.environ['MYSQL_DB'],
)
cursor = cnx.cursor()

20
except mysql.connector.Error as err:
if err.errno == errorcode.ER_ACCESS_DENIED_ERROR:
print("Something is wrong with your user name or password")
elif err.errno == errorcode.ER_BAD_DB_ERROR:
print("Database does not exist")
else:
print(err)

# Define the authentication middleware async


def authenticate(request: Request):
try: api_key =
request.headers.get('authorization').replace("Bearer
", "") cursor.execute("SELECT * FROM voters WHERE voter_id = %s",
(api_key,)) if api_key not in [row[0] for row in
cursor.fetchall()]:
raise HTTPException(
status_code=status.HTTP_401_UNAUTHORIZED,
detail="Forbidden"
)
except:
raise HTTPException(
status_code=status.HTTP_401_UNAUTHORIZED,
detail="Forbidden"
)

# Define the POST endpoint for login


@app.get("/login") async def login(request: Request, voter_id:
str, password: str):
await authenticate(request)
role = await get_role(voter_id, password)

# Assuming authentication is successful, generate a token token


= jwt.encode({'password': password, 'voter_id': voter_id,
'role': role}, os.environ['SECRET_KEY'], algorithm='HS256')
return {'token': token, 'role': role}

# Replace 'admin' with the actual role based on authentication async


def get_role(voter_id, password):
try:
cursor.execute("SELECT role FROM voters WHERE voter_id = %s AND
password = %s", (voter_id, password,))
role = cursor.fetchone() if
role: return role[0]
else:

21
raise HTTPException(
status_code=status.HTTP_401_UNAUTHORIZED,
detail="Invalid voter id or password"
) except mysql.connector.Error as err: print(err)
raise HTTPException(
status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
detail="Database error"
)

6. Package.json

{
"name": "decentralized-voting",
"version": "1.0.0",
"description": "",
"main": "index.js",
"scripts": {
"test": "echo \"Error: no test specified\" && exit 1"
},
"author": "",
"license": "ISC",
"dependencies": {
"jsonwebtoken": "^9.0.0",
"@truffle/contract": "^4.6.18",
"browserify": "^17.0.0",
"dotenv": "^16.0.3",
"express": "^4.18.2",
"web3": "^1.9.0"
}
}

22
CHAPTER 8
TESTING

Testing is the process of evaluating a system or its component(s) with the intent to find whether it
satisfies the specified requirements or not. It includes a set of techniques and methods to identify
defects, bugs, performance issues and providing a reliable and quality product. The goal is to
identify issues as early as possible and improve the overall quality of the system.

8.1 Types of Testing

8.1.1 Unit Testing


Unit testing is a type of testing that is used to evaluate the individual units or components
of a software system. This type of testing helps ensure that each unit or component of the
system is working correctly and is able to perform its intended function.

8.1.2 Integration Testing


Integration testing is a type of testing that is used to evaluate how well the different units
or components of a software system work together. This type of testing helps to identify
and resolve issues related to compatibility, performance, and data flow between the
different units or components.

8.1.3 Functional Testing


Functional testing is a type of testing that is used to evaluate how well a system or
software performs the specific functions or tasks that it is designed to perform. It is done
by testing the system or software with various inputs and verifying that the outputs are
correct. This type of testing ensures that the system or software is working as intended
and is able to perform the functions it was designed to perform.

23
8.1.4 White Box Testing
White box testing, also known as structural testing or glass-box testing, is a type of testing
that examines the internal structure and implementation of a software system. It involves
testing the code itself and checking that it is functioning correctly and adhering to coding
standards. This type of testing helps to identify and resolve issues related to logic, control
flow, and data structures within the system.

8.1.4 Black Box Testing


Black box testing, also known as functional testing, is a type of testing that examines the
external behavior and interfaces of a software system. It involves testing the system from
the user's perspective, without looking at the internal structure or implementation, and
checking that it is functioning correctly and meeting the requirements. This type of testing
helps to identify and resolve issues related to usability, compatibility, and performance.

8.2 Test Results

8.2.1 Test Case 1

Test Case No. 1


Test Type Unit Test
Name of Test Checking JWT Authorization
Test Case Description The objective of this test case is to check jwt authorization.
Input Login and Password
Expected Output User should not be able to login without proper authorization.
Actual Output User cannot access voting or admin page without authorization.
Result Pass
Comments Working properly.

24
8.2.2 Test Case 2

Test Case No. 2


Test Type Functional Test
Name of Test Verify user login
Test Case Description The objective of this test case is to verify that user can login to the
voting portal.
Input Voter_id and password
Expected Output User must be able to login if credentials match the database, else
unauthorized error is shown.
Actual Output User is able to login with correct credentials only.
Result Pass
Comments Working properly.

8.2.3 Test Case 3

Test Case No. 3


Test Type Unit Test
Name of Test Verify candidate registration
Test Case Description The objective of this test case is to verify that candidate can be
registered by admin.
Input Candidate name and party.
Expected Output Registration transaction should be successful.
Actual Output Registration transaction is successful.
Result Pass
Comments Working properly.

25
8.2.4 Test Case 4

Test Case No. 4


Test Type Unit Test
Name of Test Verify date registration
Test Case Description The objective of this test case is to verify that date of voting can
be specified by admin.
Input Starting and ending date
Expected Output Date transaction should be successful.
Actual Output Date transaction is successful.
Result Pass
Comments Working properly.

8.2.5 Test Case 5

Test Case No. 5


Test Type Functional Test
Name of Test Verify voting
Test Case Description The objective of this test case is to verify that voter is able to cast
their vote.
Input Select a candidate and click “Vote” button.
Expected Output Vote transaction should be successful.
Actual Output Vote transaction is successful.
Result Pass
Comments Working properly.

26
CONCLUSION AND FUTURE ENHANCEMENT

Conclusion:

Decentralized Voting with Ethereum Blockchain offers a robust and transparent solution for
secure elections. By leveraging blockchain technology, it ensures the integrity of votes and
provides a tamper-proof platform. With continued enhancements, including improved user
experience, scalability, and integration with other cutting-edge technologies, it has the
potential to revolutionize the democratic process and empower citizens to participate in a
trusted and efficient voting system. It represents a significant step towards building a more
democratic and accountable society.

Future Enhancement:

➢ Real-time vote counting: Implement a system to display and update vote counts in real time.
➢ Secure voter identification mechanisms: Introduce robust methods to authenticate voters
securely.
➢ Advanced data analytics for voter insights: Use analytics to gather insights into voter behavior
and preferences.
➢ Integration with emerging technologies:
• Artificial Intelligence: Leverage AI to improve voting accuracy and detect potential
anomalies.
• Biometrics: Use biometric systems for secure and unique voter verification.
➢ Enhanced efficiency, security, and accessibility: Improve the overall inclusiveness and
trustworthiness of the voting process.

27
SCREENSHOTS

28
29
REFERENCES
1. A. Shah, N. Sodhia, S. Saha, S. Banerjee, M. Chavan, Blockchain Enabled OnlineVoting System, in
Proceedings of the International Conference on Automation, Computing and Communication 2020
(ICACC-2020), ITM Web Conf 32, 03018, (2020)

2. A. B. Ayed,Intl. J. Netw. Secu. Appl 9, 3 (2017)

3. A. K. Tyagi, T. F. Fernandez and S. U. Aswathy, Blockchain and Aadhaarbased Electronic Voting


System, in Proceedings of the 2020 4th International Conference on Electronics, Communication and
Aerospace Technology (ICECA), Coimbatore, India, (2020)

4. A. Benny, A. Kumar, A. Basit, B. Cherian, A. Kharat, SSRN 20, 3648870 (2020)

5. F. Fusco, M. Lunesu, F. Pani, A. Pinna, Crypto-voting, a Blockchain based e-Voting System, in


Proceedings of the 10th International Joint Conference on Knowledge Discovery, Knowledge
Engineering and Knowledge Management (IC3K2018), 01C3K (2018)

6. K. B. Pranav, J. Manikandan, Proced. Comp. Sci 171, 04 (2019)

7. U. Jafar, A. Aziz, A State of the Art Survey and Research Directions on Blockchain Based Electronic
Voting System, in Proceedings of the Anbar, Abdullah, Manickam(eds) Advances in Cyber Security,
ACeS 2020, Communications in Computer and Information Science, 1347, Springer, Singapore
(2021)

8. R. Bulut, A. Kantarcı, S. Keskin, Ş. Bahtiyar, Blockchain-Based Electronic Voting System for


Elections in Turkey, in Proceedings of the 2019 4th International Conference on Computer Science
and Engineering (UBMK), Samsun, Turkey (2019)

9. C. H. Roh, I. Y. Lee, J. Infor. Proc. Sys 6, 2 (2020)

10. S. Sridharan, Implementation of authenticated and secure online voting system, in Proceedings
of the 2013 Fourth International Conference on Computing, Communications and Networking
Technologies (ICCCNT), Tiruchengode, India, (2013)

30

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy