Study on New Architecture for Enhancing the Security and Performance of E-Mail Security Protocols

Alagappa Institute of Skill Development & Computer Centre,Alagappa University, Karaikudi, India.15 -16 February 2017. IT Skills Show & International Conference on Advancements In Computing Resources (SSICACR-2017)

Format: Volume 5, Issue 1, No 24, 2017

Copyright: All Rights Reserved ©2017

Year of Publication: 2017

Author: Dr.C.Balakrishnan,Ms.M.Rekha

Reference:IJCS-275

View PDF Format

Abstract

E-mail communication still has to cope with certain security problems. The most visible result is the mass of unsolicited messages outnumbering the regular e-mails in magnitudes. The technical reasons for this unfavourable situation are manifold e.g., unreliable sender authentication, Loose and ad-hoc coupling between the involved servers, and only few ways to complain about misbehaviour of users of foreign systems. To make e-mail communication secure and private, e-mail servers incorporate one or more security features using add-on security protocols. The add-on Security protocols provide a reasonable security. We present and discuss a number of improvements to the practicability of e-mail encryption. These enable efficient searching in encrypted e-mails as well as subject encryption and the use of cryptographic functions in calendar applications. We propose bridge-type e-mail proxy architecture to release the bottlenecks of the two popular mail security architectures: software mail filter and e-mail gateway.

References

[1] Jay Chaudhry. “The e-mail battlefield: build a defense,” May, 2002 . [2] Hal Beghel, Email-The Good, “The Bad, and the Ugly,” Communication of ACM, Vol.40, No.4, April 1997. [3] Lorrie Faith Cranor and Brian A LaMacchia, “SPAM!,” Communication of ACM, Vol. 41. No.8, August 1998 [4] Klensin, (2001) „Simple Mail Transfer Protocol‟ IETF RFC 2821. [5] Mir, F.A., Banday, M.T. (2010). “Control of Spam: A Comparative Approach with special reference to India”,. [6] Banday, M.T., Qadri, J.A. (2010). “A Study of E-mail Security Protocols,” [7] Banday, M.T., Mir, F.A., Qadri, J.A., Shah, N.A. (2011). “Analyzing Internet E-mail Date Spoofing”, [8] C. E. Landwegr, C. L. Heitmeyer, and J. D. McLean, (2001) “A security model for military message systems: Retrospective,” Naval Research Laboratory, Wasgington, DC, 2001 [9] R. Oppliger, (2004 ) “Certified Mail: the next challenge for secure messaging”, Communications of ACM, Vol. 47, No. 8, pp. 75-79. [10] Tahir Elgamel, and Kipp E. B. Hipman, (1997) “Secure Socket Layer Application Program Apparatus and Method” U.S. Patent No:5657390. [11] P. Hoffman, (2002) “SMTP Service Extension for Secure SMTP over Transport Layer Security”, IETF RFC 3207. [12] S. Suzuki and M. Nakamura, (2005) “Domain Name System—Past, Present and Future”, IEICE Transactions of Communication, E88b (3), pp. 857-864.

Keywords

Communication, Security protocols, encryption, cryptographic, proxy architecture, efficient, bridge-type

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog