Close X
Saturday, September 21, 2024
ADVT 
International

Online Voting Can Be A Reality In Britain By 2020 Thanks To This Indian-Origin Man Gurchetan Grewal

Darpan News Desk IANS, 01 May, 2015 11:37 AM
    Even as voters gear up to stand in queue for Britain's upcoming general election this month, researchers, including one of Indian-origin, have developed a technique to allow people to vote online - even if their home computers are suspected of being infected with viruses.
     
    Taking inspiration from the security devices issued by some banks, Gurchetan Grewal and colleagues from the University of Birmingham have developed a system that allows people to vote by employing independent hardware devices in conjunction with their personal computers.
     
    "This is currently the only piece of work that addresses a core problem of e-voting - namely, that someone may have viruses or other malware on their computer," noted Grewal, who is part of the project team and recently completed his doctorate in online voting at Birmingham.
     
    The new technique offers a fresh contribution to the debate surrounding e-voting and could be ready for use in time for the 2020 or 2025 general election, the study noted.
     
    "This system works by employing a credit card-sized device similar to those used in online banking," said lead researcher professor Mark Ryan.
     
    "It is called Du-Vote, and we have been developing it over the past two years. From the voter's perspective, it is straightforward: you receive a code on the device and type it back into the computer," Ryan explained.
     
    Online voting carries a strong security requirement because of the possibility of undetectable interference in an election by foreign governments, criminal gangs, or petty fraudsters.
     
    Malware affects an estimated 20 percent to 40 percent of personal computers globally, and specific election-targeted malware could be developed to attempt to alter votes cast or compromise ballot secrecy.
     
    "The main advantage of this system is that it splits the security between the independent security device and a voter's computer or mobile device," Ryan noted.
     
    The research paper is scheduled to be presented at the 28th IEEE Computer Security Foundations Symposium in Verona, Italy, in July.

    MORE International ARTICLES

    Man in Scotland charged with Sikh waiter's murder

    Man in Scotland charged with Sikh waiter's murder
     A man has been charged with murdering Indian waiter Surjit Singh Chhokar in Overtown, in Scotland's North Lanarkshire council area, 16 years back, media reported Friday....

    Man in Scotland charged with Sikh waiter's murder

    Psychoactive magic mushroom found in Buckingham Palace

    Psychoactive magic mushroom found in Buckingham Palace
    A hallucinogenic toadstool mushroom has been found growing in the gardens of Britain's Buckingham Palace, a media report said Friday....

    Psychoactive magic mushroom found in Buckingham Palace

    German court foils bid to make Snowden testify in Berlin

    German court foils bid to make Snowden testify in Berlin
    Germany's top court Friday threw out an opposition bid to get whistle-blower Edward Snowden invited to testify in Berlin before a parliamentary committee...

    German court foils bid to make Snowden testify in Berlin

    India visit productive and positive: Putin

    In a meeting here with the permanent members of the Russian Security Council, Putin described his India visit Dec 10-11 as "productive and...

    India visit productive and positive: Putin

    Indian charged with rape, sodomy of Indonesian woman

    Indian charged with rape, sodomy of Indonesian woman
    An Indian national was charged in a sessions court here with three counts of raping and sodomising an Indonesian woman...

    Indian charged with rape, sodomy of Indonesian woman

    CIA chief admits use of brutal interrogation techniques

    CIA chief admits use of brutal interrogation techniques
    Some officers of the Central Intelligence Agency (CIA) used brutal techniques on terrorist suspects and there was no proof of useful information yielded...

    CIA chief admits use of brutal interrogation techniques