DocumentCode
2188343
Title
Cloud based emails boundaries and vulnerabilities
Author
Ayodele, Taiwo ; Adeegbe, Dennis
Author_Institution
Inf. Intell., Infonetmedia, Portsmouth, UK
fYear
2013
fDate
7-9 Oct. 2013
Firstpage
912
Lastpage
914
Abstract
Since there is significant increase in adoption of cloud computing, securing users emails is also a growing concern. This paper reviews the boundaries, privacy, vulnerabilities, varying legislations of cloud based emails, and how to mitigate such to provide reliable and secure cloud based email services for users and organizations. We propose a new framework to improve security of cloud based email messages: Intelligent Cloud Based Email Encryption and Decryption System (ICLEEDS). The goal is to encrypt content of email mail messages from users´ mail box before being sent. The intelligent machine learning encryption system helps to protect users against email interception, re-construction, phishing attacks, relaying of previous messages, spoofing, eavesdropping and provide high level of privacy.
Keywords
cloud computing; cryptography; data privacy; electronic mail; learning (artificial intelligence); ICLEEDS framework; cloud based email messages; cloud based email services; cloud computing; electronic mail; email boundaries; email interception; email legislations; email re-construction; email vulnerabilities; intelligent cloud based email encryption and decryption system; intelligent machine learning encryption system; phishing attacks; privacy level; Cloud computing; Electronic mail; Encryption; Google; Postal services; Privacy; Cloud based email; Email messages; Intelligent cloud based email encryption and decryption; cloud computing; eavedropping; email Vulnerabilities; email privacy; email security and privacy; email services; secured cloud based email messages;
fLanguage
English
Publisher
ieee
Conference_Titel
Science and Information Conference (SAI), 2013
Conference_Location
London
Type
conf
Filename
6661850
Link To Document