Study of the Security Enhancements in Various E-Mail Systems


E-mail security becomes critical issue to research community in the field of information security. Several solutions and standards have been fashioned according to the recent security requirements in order to enhance the e-mail security. Some of the existing enhancements focus on keeping the exchange of data via e-mail in confident and integral way. While the others focus on authenticating the sender and prove that he will not repudiate from his message. This paper will survey various e-mail security solutions. We introduce different models and techniques used to solve and enhance the security of e-mail systems and evaluate each one from the view point of security.

Share and Cite:

Babrahem, A. , Alharbi, E. , Alshiky, A. , Alqurashi, S. and Kar, J. (2015) Study of the Security Enhancements in Various E-Mail Systems. Journal of Information Security, 6, 1-11. doi: 10.4236/jis.2015.61001.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Al-taee, M.A., Al-Hassani, H.N., Bamajbour, B.S. and Al-Jumeily, D. (2009) Biometric-Based Security System for Plaintext e-Mail Messages. Second International Conference on Developments in eSystems Engineering (DESE), Abu Dhabi, 14-16 December 2009, 202-206.
[2] Ghafoor, A., Muftic, S. and Schmölzer, G. (2009) CryptoNET: Design and Implementation of the Secure Email System. Proceedings of the 1st International Workshop on Security and Communication Networks (IWSCN), Trondheim, 20-22 May 2009, 402-407.
[3] Al-Saadoon, G.M.W. (2011) Authentication and Virus Detection Enhancement for Client and Server Applications. Journal of Emerging Trends in Computing and Information Sciences, 2, 390-395.
[4] Baykara, M. and Das, R. (2013) A Steganography Application for Secure Data Communication. International Conference on Electronics, Computer and Computation (ICECCO), Ankara, 7-9 November 2013, 309-313.
[5] Cailleux, L., Bouabdallah, A. and Bonnin, J.-M. (2014) Building a Confident Advanced Email System Using a New Correspondence Model. 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Victoria, 13-16 May 2014, 85-90.
[6] Shukla, R., Prakash, H.O., Bhushan, R., Venkataraman, S. and Varadan, G. (2013) Sahastradhara Biometric and EToken Integrated Secure Email System. 15th International Conference on Advanced Computing Technologies (ICACT), Rajampet, 21-22 September 2013, 1-4.
[7] Kar, J. (2014) Provably Secure Online/Off-Line Identity-Based Signature Scheme for Wireless Sensor Network. International Journal of Network Security, Taiwan, 16, 26-36.
[8] Hameed, S., Kloht, T. and Fu, X.M. (2013) Identity Based Email Sender Authentication for Spam Mitigation. Eighth International Conference on Digital Information Management (ICDIM), Islamabad, 10-12 September 2013, 14-19.
[9] Stallings, W. (2014) Electronic Mail Security, in Cryptography and Network Security Principles and Practice. 6th Edition, Pearson Education, Upper Saddle River, 591-615.
[10] Kar, J. and Majhi, B. (2009) An Efficient Password Security of Three Party Key Exchange Protocol Based on ECDLP. 12th International Conference on Information Technology 2009 (ICIT 2009), Tata McGrow Hill Education Private Limited, Bhubaneswar, 75-78.
[11] Kar, J. and Majhi, B. (2009) An Efficient Password Security of Multiparty Key Exchange Protocol Based on ECDLP. International Journal of Computer Science and Security (IJCSS), 3, 405-413.
[12] Kar, J. and Majhi, B. (2009) A Secure Two-Party Identity Based Key Exchange Protocol based on Elliptic Curve Discrete Logarithm Problem. Journal of Information Assurance and Security, 5, 473-482.
[13] Zadgaonkar, S., Pandey, V.C. and Pradhan, P.S. (2013) Developing a Model to Enhance E-Mail Authentication against E-Mail Address Spoofing Using Application. International Journal of Science and Modern Engineering (IJISME), 1, 13-17.
[14] Mooloo, D. and Fowdur, T.P. (2013) An SSL-Based Client-Oriented Anti-Spoofing Email Application. AFRICON, Pointe-Aux-Piments, 9-12 September 2013, 1-5.
[15] Kounelis, I., Muftic, S. and Loschner, J. (2014) Secure and Privacy-Enhanced E-Mail System Based on the Concept of Proxies. 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, 26-30 May 2014, 1405-1410.
[16] Jang, J., Nepal, S. and Zic, J. (2008) Trusted Email Protocol: Dealing with Privacy Concerns from Malicious Email Intermediaries. 8th IEEE International Conference on Computer and Information Technology, Sydney, 8-11 July 2008, 402-407.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.