6 CONCLUSIONS
In this work we propose an Electronic Voting System
(EVS) based on the law 892 of 2004 for the electoral
process at universities in Colombia. The solution im-
plements the registration process of the voters with
their respective formulas, voters and juries. It also
implements the electronic voting process and the gen-
eration of the reports with the respective results.
With the different algorithms implemented in the
EVS the attack risks of the electoral process and the
data stored in the database engine can be reduced.
This because in the user interface the input parameters
are validated and stored procedures are implemented.
We also use secure URLs and MAC validation for all
the teams involved in the process in order to verify
and control the transactions made.
For the tests that were carried out of the EVS a
segmented network without access to the Internet was
defined for the teams involved in the electoral pro-
cess. The purpose of this configuration is to define
security policies to avoid the modification of files, di-
rectories and the database that are found in the pro-
duction server.
With the tests carried out at the EVS it was identi-
fied that the costs and response times of the electoral
process are significantly reduced compared to the tra-
ditional method. This because the actions carried out
and the materials used in each phase of the process
are optimized.
REFERENCES
Al-Ameen, A. and Talab, S. A. (2013). The technical feasi-
bility and security of e-voting. Int. Arab J. Inf. Tech-
nol., 10(4):397–404.
Ayala, A., Daniel, S., and Vinzoneo, M. Los procesos elec-
torales y las nuevas tecnolog
´
ıas.
Bonifaz, M. S. (2014). Percepciones de los peruanos so-
bre el voto electr
´
onico presencial. Consejo editorial,
page 99.
Ccalicskan, M. and Varaksin, O. (2015). PrimeFaces cook-
book. Packt Publishing Ltd.
Giraldo, F. (2007). Partidos y sistema de partidos en colom-
bia. La pol
´
ıtica por dentro: Cambios y continuidades
en las organizaciones pol
´
ıticas de los pa
´
ıses andinos,
pages 123–159.
Heffelfinger, D. R. (2014). Java EE 7 with GlassFish 4
Application Server. Packt Publishing Ltd.
Hussien, H. and Aboelnaga, H. (2013). Design of a se-
cured e-voting system. In 2013 International Confer-
ence on Computer Applications Technology (ICCAT),
pages 1–5. IEEE.
Juba, S., Vannahme, A., and Volkov, A. (2015). Learning
PostgreSQL. Packt Publishing Ltd.
Kim, J.-J. and Hong, S.-P. (2011). A method of risk as-
sessment for multi-factor authentication. Journal of
Information Processing Systems, 7(1):187–198.
Kohno, T., Stubblefield, A., Rubin, A. D., and Wallach,
D. S. (2004). Analysis of an electronic voting system.
In IEEE Symposium on Security and Privacy, 2004.
Proceedings. 2004, pages 27–40. IEEE.
McLoone, M. and McCanny, J. V. (2002). Efficient
single-chip implementation of sha-384 and sha-512.
In 2002 IEEE International Conference on Field-
Programmable Technology, 2002.(FPT). Proceed-
ings., pages 311–314. IEEE.
Medvidovic, N. and Taylor, R. N. (2000). A classification
and comparison framework for software architecture
description languages. IEEE Transactions on software
engineering, 26(1):70–93.
Mendoza Suarez, C. R. et al. (2016). El voto electr
´
onico
en colombia: an
´
alisis de viabilidad de su imple-
mentaci
´
on.
Mohammed, D. A. A. and Timour, R. A. (2013). Efficient
e-voting android based system. International Journal
of Advanced Research in Computer Science and Soft-
ware Engineering, 3(11).
Olaniyi, O. M., Arulogun, O. T., Omidiora, E. O., and Olu-
dotun, A. (2013). Design of secure electronic voting
system using multifactor authentication and crypto-
graphic hash functions.
OWASP, O. T. (2017). Top 10-2017.
Pantoja, E. B. (2004). El patr
´
on de dise
˜
no modelo-vista-
controlador (mvc) y su implementaci
´
on en java swing.
Acta Nova, 2(4):493.
Pech-May, F., Gomez-Rodriguez, M. A., Luis, A., and
Lara-Jeronimo, S. U. (2011). Desarrollo de aplica-
ciones web con jpa, ejb, jsf y primefaces.
P
´
erez Duharte, J. A. (2013). El impacto de la adminis-
traci
´
on electoral en la democracia latinoamericana.
PhD thesis, Universidad Complutense de Madrid.
Singh, J. P. (2016). Analysis of sql injection detection tech-
niques. arXiv.org.
Wichers, D. (2013). Owasp top-10 2013. OWASP Founda-
tion, February.
ICINCO 2019 - 16th International Conference on Informatics in Control, Automation and Robotics
332