{"id":"https://openalex.org/W4313451400","doi":"https://doi.org/10.1109/iccr56254.2022.9996026","title":"A Cost-efficient and Scalable Framework for E-Voting System based on Ethereum Blockchain","display_name":"A Cost-efficient and Scalable Framework for E-Voting System based on Ethereum Blockchain","publication_year":2022,"publication_date":"2022-10-06","ids":{"openalex":"https://openalex.org/W4313451400","doi":"https://doi.org/10.1109/iccr56254.2022.9996026"},"language":"en","primary_location":{"id":"doi:10.1109/iccr56254.2022.9996026","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iccr56254.2022.9996026","pdf_url":null,"source":{"id":"https://openalex.org/S4363608155","display_name":"2022 International Conference on Cyber Resilience (ICCR)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Cyber Resilience (ICCR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086205776","display_name":"Uzma Jafar","orcid":"https://orcid.org/0000-0002-8832-0548"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Uzma Jafar","raw_affiliation_strings":["Software Technology &#x0026; Management Research Center (Softam), Universiti Kebangsaan Malaysia,Selangor,Malaysia"],"affiliations":[{"raw_affiliation_string":"Software Technology &#x0026; Management Research Center (Softam), Universiti Kebangsaan Malaysia,Selangor,Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114079919","display_name":"Mohd Juzaiddin Ab Aziz","orcid":null},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohd Juzaiddin Ab Aziz","raw_affiliation_strings":["Software Technology &#x0026; Management Research Center (Softam), Universiti Kebangsaan Malaysia,Selangor,Malaysia"],"affiliations":[{"raw_affiliation_string":"Software Technology &#x0026; Management Research Center (Softam), Universiti Kebangsaan Malaysia,Selangor,Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027418901","display_name":"Zarina Shukur","orcid":"https://orcid.org/0000-0002-1096-5354"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]},{"id":"https://openalex.org/I2802910988","display_name":"University of Cyberjaya","ror":"https://ror.org/04f1eek20","country_code":"MY","type":"education","lineage":["https://openalex.org/I2802910988"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Zarina Shukur","raw_affiliation_strings":["Center of Cyber Security (Cyber), Universiti Kebangsaan Malaysia,Selangor,Malaysia","Center of Cyber Security (Cyber), Universiti Kebangsaan Malaysia, Selangor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Center of Cyber Security (Cyber), Universiti Kebangsaan Malaysia,Selangor,Malaysia","institution_ids":["https://openalex.org/I2802910988","https://openalex.org/I885383172"]},{"raw_affiliation_string":"Center of Cyber Security (Cyber), Universiti Kebangsaan Malaysia, Selangor, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018574632","display_name":"Hafiz Adnan Hussain","orcid":null},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Hafiz Adnan Hussain","raw_affiliation_strings":["Software Technology &#x0026; Management Research Center (Softam), Universiti Kebangsaan Malaysia,Selangor,Malaysia"],"affiliations":[{"raw_affiliation_string":"Software Technology &#x0026; Management Research Center (Softam), Universiti Kebangsaan Malaysia,Selangor,Malaysia","institution_ids":["https://openalex.org/I885383172"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5086205776"],"corresponding_institution_ids":["https://openalex.org/I885383172"],"apc_list":null,"apc_paid":null,"fwci":1.0186,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.79640371,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"5","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.844414472579956},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7721340656280518},{"id":"https://openalex.org/keywords/voting","display_name":"Voting","score":0.7051136493682861},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6322364807128906},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.5776845216751099},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5256417989730835},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.504524827003479},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44057315587997437},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4205421805381775},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.18472671508789062}],"concepts":[{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.844414472579956},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7721340656280518},{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.7051136493682861},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6322364807128906},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.5776845216751099},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5256417989730835},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.504524827003479},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44057315587997437},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4205421805381775},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.18472671508789062},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccr56254.2022.9996026","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iccr56254.2022.9996026","pdf_url":null,"source":{"id":"https://openalex.org/S4363608155","display_name":"2022 International Conference on Cyber Resilience (ICCR)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Cyber Resilience (ICCR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W2917351259","https://openalex.org/W2946214936","https://openalex.org/W2965629122","https://openalex.org/W2968254374","https://openalex.org/W2969971691","https://openalex.org/W2982075440","https://openalex.org/W2982212956","https://openalex.org/W2989439229","https://openalex.org/W3017009158","https://openalex.org/W3023785634","https://openalex.org/W3034157597","https://openalex.org/W3037299667","https://openalex.org/W3092369757","https://openalex.org/W3102641144","https://openalex.org/W3120889596","https://openalex.org/W3126319754","https://openalex.org/W3129545517","https://openalex.org/W3130815982","https://openalex.org/W3154095569","https://openalex.org/W3155923922","https://openalex.org/W3168690835","https://openalex.org/W3170362456","https://openalex.org/W3184600775","https://openalex.org/W3186678486","https://openalex.org/W3198867935","https://openalex.org/W3200848566","https://openalex.org/W3202990235","https://openalex.org/W4205158692","https://openalex.org/W4281725668","https://openalex.org/W4282938279","https://openalex.org/W4285115185","https://openalex.org/W6779090356"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W4386732777","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4304136894","https://openalex.org/W2989851257","https://openalex.org/W4303984095"],"abstract_inverted_index":{"The":[0,147],"importance":[1],"of":[2,13,28,61,178],"democratic":[3],"voting":[4,15,19],"systems":[5],"in":[6,51,63,161,176],"any":[7],"nation":[8],"has":[9],"increased":[10],"the":[11,59,64,101,135,140,164,168,190],"mistrust":[12],"conventional":[14],"methods.":[16],"Other":[17],"digital":[18],"methods":[20],"have":[21,83,96],"been":[22,97],"challenged":[23,57],"due":[24],"to":[25,99,133,138,143,195],"a":[26,37,112,117,131],"lack":[27],"transparency,":[29],"security,":[30],"rigging":[31],"and":[32,44,70,73,88,105,124,154,173,181],"scalability.":[33],"Blockchain":[34],"(BC)":[35],"is":[36,54,116,150,160,174],"decentralized,":[38],"distributed":[39,151],"ledger":[40],"technology":[41],"for":[42,111,120],"recording":[43],"keeping":[45],"safe":[46],"transactions.":[47],"Unfortunately,":[48],"BC":[49,81,113,137],"implementation":[50],"large-scale":[52],"elections":[53],"still":[55],"being":[56],"because":[58],"amount":[60],"information":[62],"Electronic":[65],"Voting":[66],"(EV)":[67],"system":[68,149],"increased,":[69],"storage":[71],"space":[72],"processing":[74],"costs":[75],"are":[76,107,186],"also":[77],"growing.":[78],"Moreover,":[79],"existing":[80],"technologies":[82],"scaling":[84,102],"problems.":[85],"Off-chain":[86],"(OC)":[87],"Directed":[89],"Acyclic":[90],"Graph":[91],"(DAG)":[92],"solutions,":[93],"among":[94],"others,":[95],"suggested":[98],"alleviate":[100],"problem.":[103],"Throughput":[104],"latency":[106],"crucial":[108],"performance":[109,125,145],"metrics":[110],"system.":[114],"Sharding":[115],"viable":[118],"option":[119],"addressing":[121],"BC's":[122],"scalability":[123,180],"issues.":[126],"Therefore,":[127],"this":[128],"paper":[129],"proposes":[130],"model":[132],"shard":[134],"current":[136],"scale":[139],"main":[141],"chain":[142],"achieve":[144],"securely.":[146],"proposed":[148],"using":[152],"Ethereum":[153],"works":[155],"as":[156,189],"an":[157],"OC":[158],"that":[159],"sync":[162],"with":[163],"district-level":[165],"databases,":[166],"updated":[167],"main-chin":[169],"periodically":[170],"by":[171],"authorities,":[172],"faster":[175],"terms":[177],"cost-effectiveness,":[179],"data":[182],"storage.":[183],"Some":[184],"limitations":[185],"involved,":[187],"such":[188],"authorities":[191],"should":[192],"be":[193],"trusted":[194],"avoid":[196],"malicious":[197],"attacks.":[198]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
