DJCCMT

Delta Journal of Computing, Communications and Media Technologies

ISSN:3092-8478

Advancing research and innovation at the intersection of computing technology and media. A publication of Southern Delta University, Ozoro.

Delta Journal of Computing, Communications and Media Technologies(DJCCMT) is an open access double-blind peer reviewed and refereed Journal that brings together reasoned thoughts, research, and industry practice in areas of Computing, Artificial Intelligence, Robotics, System Engineering, Data Science, Analytics, Embedded Systems, Information and System Security, Media Studies, Communication Technologies, Information Science, Library Science, Educational Technologies, Applied Computing, and related disciplines in a reader-friendly format. The Journal is published online monthly with print version issue in February, May, August and November.

Delta Journal of Computing, Communications and Media Technologies

Volume 1 · Issue 1 · December 2024
Title of Paper

FORTIFYING ELECTORAL INTEGRITY: A BLOCKCHAIN-BASED FRAMEWORK FOR IMMUTABLE AND TRANSPARENT ELECTION RESULTS

Abstract

Amid escalating political tensions and technological vulnerabilities, electoral processes worldwide face unprecedented scrutiny and risk. This study introduces a model with permissioned blockchain technology to enhance the confidentiality, consistency, and immutability of election results. We conducted a comprehensive assessment on existing election platforms, adopting Zero Trust principles - continuous authentication, least-privilege access, and micro-segmentation, we developed a blockchain-based consensus mechanism to secure vote transactions. The developed N-Zero Trust–Blockchain prototype undergoes rigorous testing, demonstrating robust resistance to unauthorized access, tampering attempts, and data breaches without sacrificing system performance. Results show that our framework provides end-to-end verifiability and auditability, empowering election authorities and stakeholders with transparent, tamper-evident records. By delivering a scalable, resilient solution for secure electoral management, this research offers a practical roadmap for deploying advanced security strategies in national and organizational elections, thereby bolstering democratic resilience and public confidence.

Authors

Osakwe Godwin, Adejumo Samul Olujimi, V. E. Ejiofor, A. O. Agbakwuru,Wilson Nwankwo

Keywords

Blockchain, BVAS, Encription, PoW and Hashing

References
  1. Abimboye, M. (2015). INEC website hacked. Premium Times. https://www.premiumtimesng.com/news/top-news/179539-inec-website-hacked.html
  2. Adeshina, S. A., & Ojo, A. (2020). Factors for e-voting adoption: Analysis of general elections in Nigeria. Government Information Quarterly, 37(3), 101257.
  3. Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., … & Vukolic, M. (2018). Hyperledger Fabric: A distributed operating system for permissioned blockchains. In Proceedings of the Thirteenth EuroSys Conference (EuroSys ’18) (pp. 1–15). Association for Computing Machinery. https://doi.org/10.1145/3190508.3190538
  4. Anne-Marie, S. (2021). Blockchain and election integrity: Building trust in democracy [Blog series, part 3]. New America. https://www.newamerica.org
  5. Bellini, E., Ceravolo, P., & Damiani, E. (2019). Blockchain-based e-Vote-as-a-Service. In Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD) (pp. 484–486). IEEE.
  6. Braghin, C., Cimato, S., Cominesi, R., Damiani, E., & Mauri, L. (2019). Towards blockchain-based e-voting systems. In Business Information Systems Workshops (pp. 274–286). Springer.
  7. Brooke, J. (1996). SUS: A “quick and dirty” usability scale. In P. W. Jordan, B. Thomas, B. A. Weerdmeester, & I. L. McClelland (Eds.), Usability Evaluation in Industry (pp. 189–194). Taylor & Francis.
  8. Castro, M., & Liskov, B. (1999). Practical Byzantine Fault Tolerance. In Proceedings of the Third Symposium on Operating Systems Design and Implementation (pp. 173–186). USENIX Association.
  9. Chinnasamy, P. (2020). Intelligent data security solution for e-health application. ScienceDirect. https://www.sciencedirect.com/topics/computer_science/biba-model
  10. Creswell, J. W., & Plano Clark, V. L. (2017). Designing and conducting mixed methods research (3rd ed.). SAGE Publications.
  11. Daramola, O., & Thebus, D. (2020). Architecture-centric evaluation of blockchain-based smart contract e-voting for national elections. Informatics, 7(2), 16.
  12. Denen, G. M. (2013). Political violence and socio-economic development in Nigeria. Mediterranean Journal of Social Sciences, 4(7), 41–47.
  13. Duvenage, W. (2020). Deployment of artificial intelligence (AI) and blockchain technology in elections. ScienceDirect. https://www.sciencedirect.com/topics/computer_science/biba-model
  14. Fullmer, D., & Morse, A. (2018). Analysis of difficulty control in bitcoin and proof-of-work blockchains. In Proceedings of the 2018 IEEE Conference on Decision and Control (CDC) (pp. 5988–5992). IEEE.
  15. Igbokwe, O. K. (2023). Enhancing cybersecurity through blockchain technology: A review. ResearchGate. https://www.researchgate.net/publication/376520002_Enhancing_Cybersecurity_through_Blockchain_Technology_A_Review#full-text
  16. International Data Corporation. (2022). Cyber security Nigeria: A digital transformation imperative. https://info.microsoft.com/rs/157-GQE-382/images/EN
  17. International Organization for Standardization & International Electrotechnical Commission. (2018). ISO/IEC 27000:2018 Information technology—Security techniques—Information security management systems—Overview and vocabulary. ISO.
  18. Kayode, A. (2023). Evaluation of bimodal voter accreditation system (BVAS) data capture processes. Journal of Electoral Technology, 3(1), 23–30.
  19. Mao, J., Li, K., & Xu, X. (2011). Privacy protection scheme in cloud computing environment. Journal of Tsinghua University (Natural Science Edition).
  20. Mosero, R. (2022). In Kenya: Balancing election technology and data privacy. Carnegie Endowment for International Peace. https://carnegieendowment.org/2022/08/08/in-kenya
  21. Mueller, H., & Tobias, J. (2016). The cost of violence: Estimating the economic impact of conflict (IGC Growth Brief). International Growth Centre.
  22. National Institute of Standards and Technology. (2012). Technical guide to information security testing and assessment (NIST SP 800-115). https://doi.org/10.6028/NIST.SP.800-115
  23. National Institute of Standards and Technology. (2020). Zero trust architecture (NIST SP 800-207). https://doi.org/10.6028/NIST.SP.800-207
  24. Nwankwo, W., & Njoku, C. C. (2019). Adoption of internet voting platform: Containing data injection threats with structured LINQ. Nigerian Research Journal of Engineering and Environmental Sciences, 4(2), 724–739.
  25. Nwankwo, W., & Njoku, C. C. (2020). Adoption of i-voting platform in Nigeria: Dealing with network-level cybersecurity concerns. Technology Reports of Kansai University, 62(3).
  26. Nwankwo, W., Chinedu, P. U., Masajuwa, F. U., Njoku, C. C., & Imoisi, S. E. (2023). Adoption of i-voting infrastructure: Addressing network-level cybersecurity breaches. E-Government: An International Journal, 19(3), 273–303. https://doi.org/10.1504/EG.2023.130582
  27. Peter, S. A., & AbdulRahman, I. (2018). Political and economic effects of post-election violence on national development. Net Journal of Social Sciences, 6(2), 18–26.
  28. Premium Times Nigeria. (2023, April 4). INEC deliberately withheld uploading presidential election results on IReV – Lai Mohammed. Premium Times Nigeria.
  29. Premium Times Nigeria. (2024, February 20). INEC gives details of IReV failure during 2023 presidential election. Premium Times Nigeria.
  30. Shostack, A. (2024). Threat modeling: Designing for security. John Wiley & Sons.
  31. Slaughter, A. M. (2021). Blockchain for mobile voting: Opportunities and challenges [Report]. New America Foundation.
  32. Sophiya, & Amit. (2020). Data science and data analytics: Opportunities and challenges. Retrieved from https://ndi.org/e-voting-guide/common-elections
  33. Yin, R. K. (2014). Case study research: Design and methods (5th ed.). SAGE Publications.
  34. Zheng, Z., Xie, S., Dai, H.-N., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE International Congress on Big Data (BigData Congress) (pp. 557–564). IEEE.