Implementation of E-mail Security with Three Layers of Authentication

Authors

  • Kazi Kutubuddin Sayyad Liyakat

Keywords:

E-mail, security, mail security, network, internet, web browser

Abstract

E-mails are essentially based on point-to-point communication. E-mails are the most commonly used form of communication in today's business. These are now the most convenient modes of communication for most people. We will also look into adding confidentiality and integrity protection to standard email. In your daily life, how much reliance do you place on the accuracy of its contents? Consider receiving an e-mail from your mentor stating that you performed so well in your course that you were excused from doing any additional work. What if you know that message was a joke from a classmate? For sensitive information or communication, we always rely on e-confidentiality mails and integrity. The email client is a critical network application. It is significant when it is used to communicate vital information such as business data, patient medical records, and so on by business, health, and educational groups. Data and messages can be easily sent and received across internal networks or the Internet, allowing messages to be received, forwarded, saved, and broadcast to recipients. Email has become a popular choice for official communications in many businesses due to its numerous features. Electronic mail is widely used for personal purposes and is accessible via a variety of suitable software clients as well as a web browser. Email security has become a critical concern for the information security research community in order to improve email security. The developed application with three layers of authentication provides enhanced security for critical emails shared over the Internet and eliminates the risk of the message being hacked.

References

Zhu M, Ma F. Improving Security and Efficiency in Attribute Based Data Sharing. IEEE Trans Knowl Data Eng. 2013 Oct; 25(10): 2271–2282.

Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Mediated Ciphertext- Policy Attribute-Based Encryption and Its Application. Proc. Int’l Workshop Information Security Applications (WISA’09). 2009; 309–323.

Yu S, Wang C, Ren K, Lou W. Attribute Based Data Sharing with Attribute Revocation. Proc ACM Symp Information, Computer and Comm. Security (ASIACCS’10). 2010; 261–270.

Bethencourt J, Sahai A, Waters B. Ciphertext-Policy Attribute-Based Encryption. Proc IEEE Symp Security and Privacy. 2007; 321–334.

Liang X, Cao Z, Lin H, Xing D. Provably Secure and Efficient Bounded Ciphertext Policy Attribute Based Encryption. Proc Int’l Symp Information, Computer, and Comm Security (ASIACCS). 2009; 343–352.

Chase M, Chow SSM. Improving Privacy and Security in Multi-Authority Attribute Based Encryption. Proc ACM Conf Computer and Comm Security. 2009; 121–130.

Chow SSM. Removing Escrow from Identity-Based Encryption. Proc Int’l Conf Practice and Theory in Public Key Cryptography (PKC’09). 2009; 256–276.

Boldyreva, Goyal V, Kumar V. Identity-Based Encryption with Efficient Revocation. Proc ACM Conf Computer and Comm Security. 2008; 417–426.

Goyal V, Jain A, Pandey O, Sahai A. Bounded Ciphertext Policy Attribute-Based Encryption. Proc Int’l Colloquium Automata, Languages and Programming (ICALP). 2008; 579–591.

Gonzalo Alvarez, Shujun Lib, Luis Hernandez. Analysis of security problems in a medical image encryption system. Comput Biol Med. 2007 Mar; 37(3): 424–7.

Mohammad Ali Bani Younes, Arnan Jantan. Image Encryption Using Block-Based Transformation Algorithm. IAENG Int J Comput Sci. 2008; 35(1): 407–415.

Pritam Kumari, Chetna Kumar, Preeyanshi, Jaya Bhushan. Data Security Using Image Steganography and Weighing Its Techniques. Int J Sci Technol Res. 2013; 2(11): 238–241.

Kuppusamy K, Thamodaran K. PSO Based Optimized Security Scheme for Image Authentication and Tamper Proofing. Computer Science & Information Technology. 2013. pp. 143–152. doi:10.5121/csit.2013.3515.

Wale Anjali D, Rokade Dipali, et al. Smart Agriculture System using IoT. International Journal of Innovative Research in Technology. 2019; 5(10): 493–497.

Hotkar Pankaj R, Vishal Kulkarni, et al. Implementation of Low Power and area efficient carry select Adder. Int J Res Eng Sci Manag. 2019; 2(4): 183–184.

Karale Nikita, Jadhav Supriya, et al. Design of Vehicle system using CAN Protocol. Int J Res Appl Sci Eng Technol. 2020; 8(V): 1978–1983. http://doi.org/10.22214/ijraset.2020.5321.

Kutubuddin Kazi. Lassar Methodology for Network Intrusion Detection. Sch Res J Humanit Sci Engl Lang. 2017; 4(24): 6853–6861.

Salunke Nikita, et al. Announcement system in Bus. Journal of Image Processing and Intelligent remote sensing. 2022; 2(6).

Kadam Akansha, et al. Email Security. Journal of Image Processing and Intelligent remote sensing. 2022; 2(6).

Kapse Mrunal M, et al. Smart Grid Technology. International Journal of Information Technology and Computer Engineering. 2022;2(6). doi: 10.55529/ijitc.26.10.17

Satpute Pratiskha Vaijnath, Mali Prajakta, et al. Smart safety Device for Women. Int J Aquatic Sci. 2022; 13(1): 556–560.

Tadlgi Priyanka M, et al. Depression Detection. Journal of Mental Health Issues and Behavior. 2022; 2(6): 1–7. 23. Waghmare Maithili, et al. Smart watch system. International Journal of Information Technology and Computer Engineering. 2022; 2(6): 1–9.

Divya Swami, et al. Sending notification to someone missing you through smart watch. International Journal of Information Technology and Computer Engineering. 2022; 2(8): 19–24.

Shreya Kalmkar, Afrin, et al. 3D E-Commers using AR. International Journal of Information Technology and Computer Engineering. 2022; 2(6): 18–27.

Kazi Kutubuddin Sayyad Liyakat. Predict the Severity of Diabetes cases, using K-Means and Decision Tree Approach. Journal of Advances in Shell Programming. 2022; 9(2): 24–31.

Kazi Kutubuddin Sayyad Liyakat. A novel Design of IoT based ‘Love Representation and Remembrance’ System to Loved One’s. Gradiva Review Journal. 2022; 8(12): 377–383.

Hosmani Sakshi M, et al. Implementation of Electric Vehicle system. Gradiva Review Journal. 2022; 8(12): 444–449.

Kutubuddin Kazi. Smart Grid energy saving technique using Machine Learning. Journal of Instrumentation Technology and Innovations. 2022; 12(3): 1–10.

Published

2022-12-29

How to Cite

Sayyad Liyakat, K. K. . (2022). Implementation of E-mail Security with Three Layers of Authentication. JOURNAL OF OPERATING SYSTEMS DEVELOPMENT &Amp; TRENDS, 9(2), 29–35. Retrieved from https://stmcomputers.stmjournals.com/index.php/JoOSDT/article/view/400