Abstract
In this paper we constructed a formal performance model for a secure and scalable e-voting scheme known as DRE-i voting scheme. The well-known formal stochastic performance evaluation process algebra (PEPA) language and PEPA Eclipse plug-in were used to represent the voting scheme and analyse its performance characteristics. Timely responses of remote electronic voting protocols are important to increase voters’ confidence in e-voting systems. Therefore we evaluated the average response time that voters may observe when they cast their votes using remote electronic voting systems, such as DRE-i, and we also evaluated the throughput and queue length of the DRE-i server’s actions for different number of voters inside the DRE-i e-voting system. The performance evaluation of the DRE-i scheme reveals that PEPA language is efficient in investigating the performance properties of large scale e-voting schemes.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Backes, M., Hritcu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: 2008 21st IEEE Computer Security Foundations Symposium. IEEE (2008)
Bradley, J.T., Gilmore, S.T.: Stochastic simulation methods applied to a secure electronic voting model. Electron. Notes Theor. Comput. Sci. 151(3), 5–25 (2006)
Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Seberry, J., Zheng, Y. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-57220-1_66
Gritzalis, D.A.: Principles and requirements for a secure e-voting system. Comput. Secur. 21(6), 539–556 (2002)
Hao, F., Kreeger, M., Randell, B., Clarke, D., Shahandashti, S., Lee, P.J.: Every vote counts: ensuring integrity in large-scale electronic voting. In: 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 2014), vol. 2, pp. 1–25 (2014)
Hao, F., Clarke, D., Shepherd, C.: Verifiable classroom voting: where cryptography meets pedagogy. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J., Bonneau, J. (eds.) Security Protocols 2013. LNCS, vol. 8263, pp. 245–254. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41717-7_28
Hillston, J.: A Compositional Approach to Performance Modelling, vol. 12. Cambridge University Press, Cambridge (2005)
Hillston, J.: Fluid flow approximation of PEPA models. In: Second International Conference on the Quantitative Evaluation of Systems (QEST 2005). IEEE (2005)
Kremer, S., Ryan, M.: Analysis of an electronic voting protocol in the applied Pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186–200. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-31987-0_14
Madise, Ü., Martens, T.: E-voting in Estonia 2005. The first practice of country-wide binding internet voting in the world. In: Electronic Voting, vol. 86 (2006)
Network, M.D.: Web workers API, March 2015. https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API. Accessed on 22 Nov 2017
Stathakidis, E., Schneider, S., Heather, J.: Robustness modelling and verification of a Mix Net protocol. In: Chen, L., Mitchell, C. (eds.) SSR 2014. LNCS, vol. 8893, pp. 131–150. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-14054-4_9
Thomas, N.: Performability of a secure electronic voting algorithm. Electron. Notes Theor. Comput. Sci. 128, 45–58 (2005)
Thomas, N., Zhao, Y.: Fluid flow analysis of a model of a secure key distribution centre. In: Proceedings 24th Annual UK Performance Engineering Workshop, Imperial College, London, pp. 44–57 (2008)
Thomas, N., Zhao, Y.: Mean value analysis for a class of PEPA models. In: Bradley, J.T. (ed.) EPEW 2009. LNCS, vol. 5652, pp. 59–72. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02924-0_5
Tribastone, M., Duguid, A., Gilmore, S.: The PEPA eclipse plugin. ACM SIGMETRICS Perform. Eval. Rev. 36(4), 28–33 (2009)
William, S.: Cryptography and Network Security: Principles and Practice, pp. 23–50. Prentice-Hall, Inc., Upper Saddle River (1999)
Zhao, Y., Thomas, N.: Efficient Analysis of PEPA model of Non-repudiation Protocols (2009)
Zhao, Y., Thomas, N.: Approximate solution of a PEPA model of a key distribution centre. In: Kounev, S., Gorton, I., Sachs, K. (eds.) SIPEW 2008. LNCS, vol. 5119, pp. 44–57. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69814-2_5
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Alotaibi, M., Thomas, N. (2018). Performance Evaluation of a Secure and Scalable E-Voting Scheme Using PEPA. In: Balsamo, S., Marin, A., Vicario, E. (eds) New Frontiers in Quantitative Methods in Informatics. InfQ 2017. Communications in Computer and Information Science, vol 825. Springer, Cham. https://doi.org/10.1007/978-3-319-91632-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-91632-3_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-91631-6
Online ISBN: 978-3-319-91632-3
eBook Packages: Computer ScienceComputer Science (R0)