Vous êtes sur la page 1sur 9

CMS COLLEGE OF ENGINEERING

CLOUD COMPUTING BASED FUTURE E-POLLING SYSTEM


IN SUPPORT WITH SMART CLIENT TECHNOLOGY

PRESENTED BY,
 R.BANUPRIYA
 III YEAR CSE
 gobicatchme@gmail.com
 9566790272
 K.VINOTHINI
 III YEAR CSE
 Thunderraj064@gmail.com
Abstract:- When the internet service over the thus can be used in
connection fails it internet to the polling system
The cloud does not work with cloud user. Users
computing has mobile phone. We need not have 2. EXISTING
become more have introduced knowledge of, SYSTEM
popular these days. the smart client expertise in or over The security
Cloud computing technology to technologies level in existing
is a computing overcome this infrastructure in voting system is
paradigm in which difficulty in mobile the “cloud” that not up to the mark.
tasks are assigned phones. supports them. As we do not have
to a combination of Biometric any back up,
connections,  Keywords - identification refers
Cloud consider the case
software and to identifying an of EVM
services that can be Computing, individual based on
Smart (Electronic Voting
accessed over his/her Machine)data
internet. This paper Client, E- distinguishing
polling, reliability is not
proposes the usage physiological and assured. EVM is
of cloud computing Biometrics. or behavioral based on
in E-polling. The 1. characteristics. Our microcontroller on
main aim of this INTRODUCTIO system uses thumb which the program
project is to avoid N print as and the memory
fake votes in distinguishable can be protected
polling by having a Polling is a choice factor. Cloud from external read,
cloud database that is made by computing refers to but that is very low
about the voters. counting the the next evolution level security and
Thumb impression number of people of the Internet. chip centric. In
of candidates is in favor of each Instead of buying case of chip failure
used for alternative. Current software, installing data loss occurs. In
authentication. A polling system is it on your many voting
candidate can vote not so secure. The computer, system the
at any place main aim of our upgrading it candidate are
irrespective of his system is to periodically and restricted to vote at
polling booth, and provide high storing all your their respective
can vote through security internet data on your hard places. Internet
mobile phones. We polling. Our drive, with cloud voting system
have used the min- system is computing you use SERVE (Security
min average implemented using software Electronic
algorithm to cloud computing applications online, Registration and
increase the and biometrics. as a service. All Voting
communication Cloud computing you need is your Experiment) is
workflow in cloud. is a paradigm in computing device found to be
The cloud which virtualized and an Internet vulnerable to
computing relies resource are connection. The denial of service
on the internet. provided as a cloud computing attack and website
spooling .This can Database).While server. Due to a instances of which
compromise the casting vote the huge number of may involve
results. Moreover thumb impression concurrent considerable
there are a number of candidate is workflow communication
of technical issues, being matched instances, the overheads among
including with the existing algorithms should relevant tasks.
authentication and database. If the focus on Thus it is
validation of the match is found minimizing the necessary to
end-point, candidates are mean execution consider multiple
protecting the allowed to caste time of all process instances of
voting system their vote, in order to multiple
against the otherwise they are maximize the workflows with
inevitable attempts denied. This overall throughput communication
by hostile parties to system provides rather than overheads when
disrupt the safe and secure minimizing the designing
election, and polling. Cloud execution time of scheduling
ensuring that the provides a service individual process. algorithms for
network is capable for voting to all Mean execution such workflows.
of handling traffic authenticated user. time is the time
storms if spent from the Workflows
potentially millions beginning of the on service-based
of citizens cast 4. MIN-MIN first task to the cloud computing
their E-ballots in a AVERAGE end of the last task environment, we
short period of ALGORITHM for a workflow construct the
time. FOR CLOUD instance. simulation
WORKFLOW Throughput is the environment
ability of a focusing for the
3. PROPOSED The resource to MMA algorithm,
SYSTEM polling processing process a certain we use testing
application may number of nodes located in
Fig 1.cloud need to process instances in a different places
structure millions of given period of connected via the
transactions per time. Hence they Internet, and thus
In the day, store the can be modeled as the communication
proposed system biometric instance-intensive overheads vary.
the database information of the cloud workflows
creation is done people. The main with considerable
with the details of purpose of using communication
the candidate along this algorithm is to overheads. The
with thumb improve the main characteristic 4.1 Scheduling
impression which communication of such workflows Infrastructure
serve as the key for overhead between is a huge number
authentication the local cloud of relatively
(Biometric servers to the main simple concurrent
node simply joins capable nodes with requested check whether the
resources.
it; otherwise, it 14 for each task group pollcandidate
booth is
creates a new 15 if the host has the resource to execute the
eligible for casting
service cloud and tasks in pole then vote or not. Many
16 select a list of capable nodes with required
joins it as a notebook
resources from hash table;
creator. There are 17 else if nodes can be found computers
in the cachedinclude
two kinds of hash table fingerprint readers.
nodes, namely, // for all selected neighbors,Insend
the request
near future,
ordinary and messages and wait for responses.
the mobile handset
monitor. Ordinary 18 if response is found storeindustry
in hash.will begin
end for
node maintains the to embed some
entire nearest type of biometric
nodes. The 4.2 Biometric identification
monitor node Authentication system into their
keeps track of all devices.
the connected Biometric
node. It should be data should be
noted that all collected from the
service clouds are voters as part of
Fig 2.Scheduling registered and the election pre-
infrastructure maintained by the registration
process. Database
monitor nodes.
As Figure regarding the
shows, the candidates are
MMA Scheduling
workflow managed with
Algorithm
execution thumb impression
environment is as primary key.
Algorithm: Min-Min-Average Scheduling
divided into Algorithm While casting vote
several service Input: the
An array of workflow thumb
instances
clouds according Instances[ ] impression of the Fig 3.Voting using
to different Output: A schedule candidate is cloud
services available. matched with the
For each new existing database if
computing node, it 3 for each task t in polling the match is found 5. CLOUD
4 if polling is ready then STORAGE
joins the service the casted vote is
5 add t to ReadyTasks[];
clouds according 6 end if considered
In the cloud
to individual 7 end for otherwise
computing
polling booth it // divide ready tasks to taskdiscarded.
groups against No technology we can
provides, and all required resources; candidate is
8 for each task polling in ready tasks store the details of
the polling booth recognized twice.
9 If polling requires resource the people along
grouped in the In rprior to polling,
10 add the task group that requires resource r; with their thumb
cloud. If the biometric
11 end if impression. The
service cloud 12 end for authentication can
database creation is
already exists, the also
//Step 2: for each task group, bea list
select usedof to done with the
details of the candidate want to 6.1 Utilizes Local
candidate along vote at the time Resources:
with thumb where the internet
A smart client
impression which connection is not
application
serve as the key for available it is always has
authentication impossible. So we the ability on
(Biometric have introduced a the client that
Database).While smart client enables local
casting vote the technology to resources to
thumb impression overcome this be utilized.
What do we
of candidate is problem.
mean by
being matched local
with the existing 6. SMART resources?
database. If the CLIENT We mean
match is found APPROAC everything
H from
candidates are
allowed to caste hardware to Fig 4.Smart Client
The term Smart software
their vote, technology
Client was resources. A
otherwise they are coined to smart client
denied. This highlight the may take
system provides differences advantage of
between the Because they are
safe and secure the local running on
typical "Rich CPU, local
polling. Cloud Client" the local
provides a service memory or machine, one
applications disk, or any
for voting to all of yesteryear of the key
local devices benefits that
authenticated user. and the next connected to
generation of smart client
The cloud the client. applications
computing mainly client Thus it
applications. offer is that
works based only makes use of they can be
To the local
on the internet understand made to
resource. work even
facility. All your these
data is stored differences when the
6.2 Offline user is not
online, so you don't and to Capable:
understand connected.
have to worry For
about the capacity. how they are
likely to applications
change the running in
5.1 Problem with occasional or
cloud computing face of
client-side intermittent
computing connectivity
The main situations,
problem with the .The smart
client such as those
cloud computing is technology used by
it requires an provides the traveling
internet following workers or
connection. If the advantages: even those
running on It enables providing structure so
laptops, application functionality that they can
tablets, artifacts to be appropriate share the
PDA's, and deployed to its usage. resources.
so on, where using a The storage
connectivity variety of 6.5 Storing in the cloud
cannot be techniques, Candidate has the
guaranteed at including Biometric several
all times, simple file information features to be
being able to copy or discussed.
work while download We are storing the The main
disconnected over HTTP. biometric advantage of
is essential. Applications information using the
Even when can be of the cloud
the client is updated candidate in computing
connected, while the local storage is
the smart running and database. listed below
client can be The
application deployed on biometric 6.6 Simple
can improve demand by information Scalability:
performance clicking on a which we
and usability URL. have used is In addition to
by caching the thumb bringing
data and 6.4 Client Device impression. processing to
managing the Flexibility The main the data, the
connection in purpose of next-
an intelligent This technology using the generation
way. provides a local cloud storage
common database in scales
6.3 Intelligent platform the server is simply.
Install and upon which to store the Cloud
Update: smart client data of the storage
applications candidate requires a
Smart client can be built. and update high degree
applications Often, there them in the of
manage their will be cloud automation
deployment multiple instantly with with self-
and update in versions of the main management,
a much more the smart server. There self-
intelligent client are many configuration
way than application, local servers and self-
traditional each available healing, all
rich client targeting a across orchestrated
applications. specific various through high-
There are device type polling booth level policies
many frame and taking .All of them specified by
work that advantage of have been the storage
provides the the devices combined to administrator
smart client unique form the . Next
technology. features and cloud generation
storage security" is To be and/or
provides an evolving considered monitoring
administrator sub-domain protected, cannot be
s flexibility of computer data from defeated,
and control. security, one even by
As the cloud network candidate privileged
grows, security, and, must be users at the
additional more properly cloud
nodes are broadly, protected, it provider.
able to information must be Providers
service the security. It stored ensure that
data requests refers to a securely physical
in parallel. If broad set of when “at machines are
administrator policies, rest” and it adequately
s require technologies, must be able secure and
more and controls to move that access to
performance, deployed to securely these
they can add protect data, from one machines as
a processing applications, location to well as all
node. If they and the relevant
need more associated customer
capacity, infrastructure data is not
they can add of cloud only
disks. Each computing. restricted but
can be added There is that access is
independentl number of documented.
y or scaled security All the
simultaneous issues attacks has to
ly. Another associated be prevented
advantage of with cloud in the cloud
using cloud computing computing.
is you have but these Finally,
to pay for issues fall providers
what you are into two ensure that
using. broad Fig 5.Security all critical
categories: Aspect in cloud data (thumb
7 ENSURING Security impression)
DATA issues for the another. Cloud are masked
STORAGE polling providers digital
IN CLOUD system and have systems identities and
COMPUTI security of in place to credentials
NG the candidate prevent data must be
biometric leaks or protected as
Cloud authenticatio access by should any
computing n. third parties. data that the
security Proper provider
sometimes 7.1 Data separation of collects or
referred to Protection: duties should produces
simply as ensure that about
"cloud auditing customer
activity in at any place cloud. are free to caste
the cloud. and also Election their vote at all
through other authorities in places irrespective
8. VOTING devices one state
of their residence.
THROUGH might use the
MOBILE 8.1 Cloud- secure Data backup is
PHONES Computing computing present unlike the
to Address facilities in EVM, where if one
Since we Voting another to device fails all data
are using the Storms handle the will be lost.
cloud bursts of Because the
computing There is the traffic they
software is online,
technology, question of experience at
many devices how to build a particular you don't need as
can be E-voting hour of the powerful a
grouped in systems that day. The computer to run the
the cloud could sustain ability of application.
including “voting global There’s no need to
PC, Mac or storms" of application buy and update
smartphone.h millions of delivery
software. Use the
ere we use connections. through the
the local Cloud cloud would application you
database to computing be critical to need. All your data
store the technology ensure is stored online, so
information could be efficiency you don't have to
of the thumb used to and worry about the
impression handle this performance capacity of your
when the issue. Instead in the event
hard drive. You can
internet of building a of “voting
connection is dedicated storms” on access the
failed. When data center to the network. applications and
the internet process these your files from
connection is one-time Advantages of anywhere.so you
available, it transactions, Proposed System can vote any place
can send the the over existing one where you are
data to the infrastructure
main server. should be staying at that
As
If the internet built through particular time.
Authentication is
connection is the cloud- Cloud computing
based on
available computing has everything
directly it model to Biometrics, our
online fosters
can send the allow for system is fake
collaboration.
candidate real-time on- proof. In the
Whether you use a
information demand existing system,
directly to availability PC, Mac or
candidates are
the server. of the smartphone,
restricted to vote in
Thus in our necessary applications will
their residential
system we additional run and you can
vote at the resources area whereas in our
open and share
polling booth through the approach candidate
files. These are
some of the polling booth wireless access
advantages over irrespective technologies”,
the existing of his booth, Converge,
Since all the
technology. November 04,
polling booth
are combined 2008.
9. CONCLUSION to form the
[4].B. Miller,
cloud
Some countries structure and “Everything you
and states also he/she need to know about
will probably can also vote automated
move ahead through his Biometric
with this mobile phone
voting identification”
with the Security Technol.
system support of
quickly. The Design, Apr.1997.
smart client
advancement technology.
of biometric [5]Wenmoth, D.
databases, (2008) Education
10.
point-to- in the age of cloud
REFERENCES
point security computing.
for both the [1]. Anil K. Jain,
end-user and Advanced
“An Identity-
the network, Networks,
and on- Authentication
Virtualization,
demand System Using
cloud computing,
application Fingerprints”,
delivery emerging
Proceedings of the
solutions via technologies,
IEEE, Vol. 85, No.
the cloud and networks and
9, pp 1365 – 1387,
regulatory learning.
controls September 1997.
would play a [6]. M. Bacca, K.
[2]. Michael
pivotal role Rabuzin:
in this next- Miller, “Cloud
“Biometrics in
generation Computing- A Web
Network Security”,
technology Based Applications
definitely. The Proceedings of
That Change the
Thus we the XXVIII
Way You Work and
have International
Collaborate
implemented Convention
Online”, ISBN-13:
the cloud MIPRO 2005,
computing 978-0-7897-3803-
Rijeka, Croatia.
technology 5, ISBN-100-7897-
for the 3803-1,
purpose of August 2008.
voting .By
implementin [3].Mr. Aviv, "All
g this the IP- national carrier
candidate can network based on
vote at any

Vous aimerez peut-être aussi