Open Access Open Access  Restricted Access Subscription Access

An New Approach for Email Security

Rahul Mehta, Anil Kumar

Abstract


Email is the most widely recognized approach to impart today. Email is utilized for sending instant messages and to send connection and sounds and recordings. For business information exchange email is the main means. It is the most common way to communicate over internet with different people all over the world. Also, it’s had disadvantages like cybercrime, people can use this means of communication for sending false mails spam, dangers, Phishing-messages and proliferating destructive programming like worms and infection and some more. So, it is important to secure the email system and take required measures to solve them by following certain protocols and punishing the criminal under the law court.


Keywords


Email, Email Protocol, Email Security Protocol, Cybercrime, Phishing-Messages

Full Text:

PDF

References


Behrouz A Forouzan, Data Communications and Networking. New Delhi: Tata McGraw-Hill, 2011.

Sunny gill, Gaurav Rupnar, Vaibhav Ramteke, Dipti Patil and Vijay M.Wadhai, "Email Security Protocol", International Journal of Computer Trends and Technology- March to April Issue 2011.

Justin Paglierani, Mike Mabey, Gail-Joon Ahn, “Towards Comprehensive and Collaborative Forensics on Email Evidence”, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2013.

RadicatiGroup,Inc.,“EmailMarket,2012-2016,” http://www.radicati.com/wp/wpcontent/uploads/ 2012/04/Email-Statistics-Report-20122016-Executive-Summary.pdf, October 2012.

Suresh Kumar B., Jagathy Raj V. P., "A Secure Email System Based on IBE, DNS and Proxy Service", Journal of Emerging Trends in Computing and Information Sciences, Vol. 3, No. 9, Sep. 2012.

William Stallings, "Cryptography and Network Security Principles and Practice", Fifth Edition, 2011.

R. Chandramouli, S. Garfinkel, S. Nightingale, and S. Rose. Trusted Email. SECOND DRAFT NIST SpecialPublication 800-177, March 2018. https://csrc.nist.gov/publications/detail/sp/800-177/rev-1/draf.

Duckett, Chris. (2018, February 26). Australian decryption legislation will not undermine ‘legitimate encryption’: Home Affairs, March 2018. http://www.zdnet.com/article/australian- decryption-legislation-will-not-undermine-legitimate-encryption-home-affairs/

Ajish S, Rajasree R., 2014. "Secure Mail using Visual Cryptography (SMVC)". In Proceedings of the International Conference on Computing Communication and Networking Technologies (ICCCNT), Hefei, China.

Shweta Umredkar, Snehal Badhe and Hemali kondhekar, "Secure Server Verification", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol. 4 Issue 4, April 2015.

Samir A. Elsagheer Mohamed, "Efficient Spam Filtering System Based on Smart Cooperative Subjective and Objective Methods", International Journal Communications, Network and System Sciences, Vol. 6, Issue 2, 88-99, Feb. 2013.

B.V.R.R.Nagarjuna, V. Sujatha, "An Innovative Approach for Detecting Targeted Malicious E-mail", International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 2, Issue 7, July 2013.

Sarwat Nizamani, Nasrullah Memon, Mathies Glasdam and Dong Duong Nguyen, "Detection of fraudulent Emails by employing advanced feature abundance", Production and hosting by Elsevier B.V. on behalf of Faculty of Computers and Information, Cairo University Egyptian Informatics Journal, Vol. 15, Issue 3, 169–174, 2014.

XiaoQing Gu, TongGuang Ni and Wei Wang, "Online Imbalanced Support Vector Machine for Phishing Emails Filtering", TELKOMNIKA Indonesian Journal of Electrical Engineering Vol. 12, No.6, pp. 4306 - 4313, June 2014.

Tejaswini Herath, Rui Chen, Jingguo Wang, Ketan Banjara, Jeff Wilbur & H. Raghav Rao, "Security services as coping mechanisms: an investigation into user intention to adopt an Email authentication service," Information Systems Journal, Vol. 24, Issue 1Pages 61– 84 24, January 2014.




DOI: https://doi.org/10.37591/ctit.v11i3.828

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Current Trends in Information Technology

  • eISSN: 2249-4707
  • ISSN: 2348-7895