Secure and Privacy Preserving Mail Servers using Modified Homomorphic Encryption (MHE) Scheme
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 3
Abstract
Electronic mail (Email) or the paperless mail is becoming the most acceptable, faster and cheapest way of formal and informal information sharing between users. Around 500 billion mails are sent each day and the count is expected to be increasing. Today, even the sensitive and private information are shared through emails, thus making it the primary target for attackers and hackers. Also, the companies having their own mail server, relies on cloud system for storing the mails at a lower cost and maintenance. This affected the privacy of users as the searching pattern is visible to the cloud. To rectify this, we need to have a secure architecture for storing the emails and retrieve them according to the user queries. Data as well as the queries and computations to retrieve the relevant mails should be hidden from the third party. This article proposes a modified homomorphic encryption (MHE) technique to secure the mails. Homomorphic encryption is made practical using MHE and by incorporating Map Reduce parallel programming model, the execution time is exponentially reduced. Well known techniques in information retrieval, like Vector Space model and Term Frequency – Inverse Document Frequency (TF-IDF) concepts are utilized for finding relevant mails to the query. The analysis done on the dataset proves that our method is efficient in terms of execution time and in ensuring the security of the data and the privacy of the users.
Authors and Affiliations
Lija Mohan, Sudheep Elayidon M
Human Visual System-based Unequal Error Protection for Robust Video Coding
To increase the overall visual quality of the video services without increasing data rate, a human visual system-based video coding, founded on a hierarchy of the video stream in different levels of importance, is develo...
Fuzzy Logic-Controlled 6-DOF Robotic Arm Color-based Sorter with Machine Vision Feedback
A demonstration of the application of fuzzy logic-based joint controller (FLJC) to a 6-DOF robotic arm as a color-based sorter system is presented in this study. The robotic arm with FLJC is integrated with a machine vis...
Application of GLBP Algorithm in the Prediction of Building Energy Consumption
Using BP neural network in past to predict the energy consumption of the building resulted in some shortcomings. Aiming at these shortages, a new algorithm which combined genetic algorithm with Levenberg-Marquardt algori...
A Strategy for Training Set Selection in Text Classification Problems
An issue in text classification problems involves the choice of good samples on which to train the classifier. Training sets that properly represent the characteristics of each class have a better chance of establishing...
Role of Requirements Elicitation & Prioritization to Optimize Quality in Scrum Agile Development
One of most common aspect with traditional software development is managing requirements. As requirements emerge throughout the software development process and thus are needed to be addressed through proper communicatio...