Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Smart Mailing System for Secure Transmissions

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 96 - Number 22
Year of Publication: 2014
Authors:
Shreenath Acharya
Aureen Gomes
Deepthi Suvarna
Tania Paulson
Vishrutha
10.5120/16928-7033

Shreenath Acharya, Aureen Gomes, Deepthi Suvarna, Tania Paulson and Vishrutha. Article: Smart Mailing System for Secure Transmissions. International Journal of Computer Applications 96(22):28-33, June 2014. Full text available. BibTeX

@article{key:article,
	author = {Shreenath Acharya and Aureen Gomes and Deepthi Suvarna and Tania Paulson and Vishrutha},
	title = {Article: Smart Mailing System for Secure Transmissions},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {96},
	number = {22},
	pages = {28-33},
	month = {June},
	note = {Full text available}
}

Abstract

Email system has become the widely preferred means of information transfer in the modern business. Conventional email system is secured by a password system leading to a single layer of protection which is insufficient for guaranteed security. Modern businesses are more relying on electronic mail for communication with their clients and colleagues revealing the need for more privacy of sensitive information. The email is connected through many routers and mail servers on its way to the recipient by becoming vulnerable to both physical as well as virtual eavesdropping. The current industry standards do not place much emphasis on security as the information is transferred in plain text and the mail servers will be regularly performing the backups of the emails passing through. This leaves a digital paper trail that can be easily inspected months or years later which can be read by any cracker who gains access to an unprotected router. The proposed system helps to secure the sensitive information sent through email by providing a three layer authentication mechanism.

References

  • Email Security - What Are The Issues? http://www. net- security. org/article. php?id=816
  • Email: the forgotten security problem http://nakedsecurity. sophos. com/2012/11/07/email-systems-are-fundamentally-insecure/
  • Security Issues and Solutions in Internet E-mail http://www. cuhk. edu. hk/itsc/network/app/email/security/securityissues. htm
  • The Radicati Group, INC, A Technology Market Research Firm, Email Statistics Report 2013-2017, Available:http://www. radicati. com/wp/wpcontent/uploads/2013/04/Email - Statistics - Report - 2013 - 2017-Executive-Summary. pdf, Visited: 28 March 2013
  • Giampaolo Bella, Cristiano Longo and Lawrence C Paulson,"Verifying Second-Level Security Protocols", Lecture Notes in Computer Science", Volume 2758, pp 352-366, Springer Berlin Heidelberg, 2003
  • Dan Zhou, Joncheng C. Kuo, Susan Older and Shiu-Kai Chin, "Formal Development of Secure Email", HICSS-32. Proceedings of the 32nd IEEE Annual Hawaii International Conference on System Sciences, 1999, Maui, HI, USA
  • M. Abadi and B. Blanchet, "Computer-Assisted Verification of a Protocol for Certified Email", Static Analysis, 10th International Symposium (SAS'03), Volume 2694, pp. 316-335, Lecture Notes in Computer Science (LNCS),San Diego, California, June 2003. Springer Verlag.
  • L. C. Paulson, "The inductive approach to verifying cryptographic protocols", Journal of Computer Security, Vol. 6, 85 - 128, 1998.
  • Martin Abadi, Neal Glew, Bill Horne and Benny Pinkas, "Certified email with a light on-line trusted third party: Design and implementation", 11th international conference on world wide web, pp. 387- 395, ACM, New York, ISBN:1-58113-449-5, 2002.
  • Brian Donadi, A Guide E-Mail Systems and Security, Available: http://www. infosecwriters. com/text_resources /pdf/BDona dio_Email. pdf.
  • L. C. Paulson, "Inductive analysis of the internet protocol TLS", ACM Transactions on Information and System Security, 2(3): 332 - 351, 1999.