Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Proposing Enhanced E-Mail Security Mechanism (EEMSM) for Reducing Cyber Crimes

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Prabhdeep Kaur
10.5120/ijca2016911972

Prabhdeep Kaur. Proposing Enhanced E-Mail Security Mechanism (EEMSM) for Reducing Cyber Crimes. International Journal of Computer Applications 153(2):19-23, November 2016. BibTeX

@article{10.5120/ijca2016911972,
	author = {Prabhdeep Kaur},
	title = {Proposing Enhanced E-Mail Security Mechanism (EEMSM) for Reducing Cyber Crimes},
	journal = {International Journal of Computer Applications},
	issue_date = {November 2016},
	volume = {153},
	number = {2},
	month = {Nov},
	year = {2016},
	issn = {0975-8887},
	pages = {19-23},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume153/number2/26375-2016911972},
	doi = {10.5120/ijca2016911972},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Now a days, Criminals use various methods for launching sophisticated attacks via internet. Most commonly e-mail channel is preferred by the attackers for launching phishing attacks by sending fake or junk emails. As authors studied due to absence of privacy, authentication and integrity of email message somewhere SMTP (Simple Mail Transfer Protocol) lacks security. So, for making more secure email communication channel, authors designed a new methodology “EEMSM” that is named as Enhanced E-Mail Security Mechanism whose function is to provide “Content Base Encryption” (CBE) on a simple mouse button click on email body before sending email to receiver end. The working of EEMSM is based on the type of encryption algorithm applied on the type of content carried by email body viz. text based content, image based content and audio/video based content etc. The motive of this new designed methodology is to keep data safe or private from the third party without data stolen on the time of data sending on the network. That ultimately helps to improve email body content security on the network. This paper also discusses about the current scenario used by the G-mail for sending E-mail. And at the end, authors compares how new designed methodology provides more secure results than the present scenario.

References

  1. Rimmy Chuchra and Shubham Chuchra, May 2015. Proposing OTBP(Operational technology Based procedure) Using RRSA(Round Robin Scheduling Algorithm),International Journal of Computer Application.
  2. Rimmy Chuchra, Reenuka Gujral and Priyanka Sharma, December 2013.On the Mechanism of detection and prevention from Phishing attacks by analyzing the attacker behavior, International Journal of Advanced Research in Computer Science and software Engg.
  3. M.Tariq Banday, May 2011.Effectiveness and Limitations of email security protocols, International Journal of distributed and parallel systems.
  4. Pam Cocca, 2004. E-mail Security Threats, GIAC Security Essentials Certification (GSEC).
  5. Jon Oltsik, January 2013. Good Enough- E-Mail Security is no longer Good Enough.
  6. Shahira Banu.N, M.Mohammed Mohideen & Gori Mohamed J February 2014. E-Mail Phishing-An open threat to Everyone, International journal of Scientific & research Publications.
  7. A.S Deokar,Madhuri Baful,Rahul Jagtap,Vishakha Panjabi & Shrihari Ahire, January 2014. Secure E-Mail System for SOHO (small Office Home Office), International Journal of Advanced Research in Computer.
  8. White paper on Data security by the DMA E-Mail Marketing Council best Practice Hub, 2012.
  9. Analysis of cyber-attack and Incident data from IBM worldwide security operations, IBM Global Technology Service, Research Report 2014.
  10. Zix Crop, November 2010.A New Standard in Encrypted E-Mail.
  11. Wayne Jansen, Miles Hacy and Scott Bisker, 2002.Guidelines of mail security NIST (National Institute of Standards and Technology), US.
  12. Serge Egdman, A.J.Bernheim & Sturt Schechter, It’s no Secret measuring the security and reliability of authentication via secret questions.
  13. Marti Hearst,J.D Tygar & Rachna Dhamya, April 2006.Why phishing works ,Conferences on human factors in computing systems.
  14. Traushi Sharma, January 2014. E-Mail Security using clustering algorithm ,International Journal of Computer Science and information security.
  15. Shufen Liu,Dongmei Han and Hui Wang, August 2010. Research on security architecture MSIS for defending insider threat, Proceedings of the third International Symposium on computer science and computational technology, China.
  16. Joan Feigenbaum, Nick Fermster, Loori Cranor and Jean Camp, 2009. Data for Cyber Security Research: Process and Wish List.
  17. Kimberly Marteen, 2015. Colloquium on Problems in International politics: International Security, Springer.
  18. endpointprotection.sftwareinsider.com/1/113/Symantec-E-Mail-Security-Cloud.
  19. E-Mail Attacks: This Time it’s Personnel, CISCO Security White Paper.
  20. Yinglian Xie,Benjamin Livshits, Ulfar Erlingsson, End-to-End web application Security ,Microsoft Research.
  21. T.C Panda,Yerra Shankar Rao & Hemraj Saini, April 2012.Cyber-Crimes and Their impacts:- A Review ,International journal of engineering research and applications.
  22. Durgesh Pant and Sushell Chandra Bhatt, 2011.Study of Indian Banks websites for cybercrime safety mechanism ,International Journal of Advanced computer science and applications.
  23. Mark Ryan, Vincent Cheval & Ji Angshan Yu, Challenges With End-To-End Email Encryption, University of Birmingham, UK.
  24. Omer Reingold, Moni Naor and Cynthia Dwork, Immunizing Encryption Schemes from Decryption Errors, Microsoft Research.
  25. https://en.wikipedia.org/wiki/email-privacy.
  26. https://books.google.co.in/books?id=RQV7GCE7-PUC&rg=PA17 & lpg=PA17&dg=encryption without decryption & F= False.
  27. https://support.google.com/webmasters/answer/6033066!hl=en.
  28. www.quora.com/Is-it-Possible-to-decrypt-encryption-without-the-key.
  29. www.codeproject.com/Articles/796587/using-encrypted-files-without-decrypting-to-Disk.
  30. www.howtogeek.Com/135638/the-best-free-ways-to-sne-encrypted-email-and-secure-messages.
  31. en.citizendium.org/wiki/E-Mail-Processes-and-Protocols.
  32. www.cyberoam.Com/emailsecurity.html.
  33. https://www.barracuda.com/Products/emailsecurityservice
  34. https://www.fireeye.com/products/ex-mail-security-products.html.
  35. techcrunch.com/2014/12/12/the-founders-guide-to-email-security/.
  36. www.trendmicro.com/us/small-business/hosted-email-security/.
  37. www.fortinet.com/products/fortimail/.
  38. www.threattracksecurity.com/business-antivirus/vipre-email-security-for-exchange.aspx.
  39. www.net-security.org/article.php?id=816.
  40. https://lastpass.com/suppose.php?cmd=showfaq&Id=2465
  41. www.trendmicro.fr/media/as/hosted-email-security-datasheet-en.pdf.
  42. www.theemaillaundry.com/email-security-policy/.
  43. https://uxsci.com/blog/the-case-for-email-security.html.

Keywords

Cybercrime, phishing, attacks, attackers, email, encryption algorithm, Content based encryption.