{"title":"Design and Implementation of Peer-to-Peer E-Mail System","authors":"K. Ramesh, K. Venkateswarlu, R.C. Sekharam","doi":"10.1109/ADCOM.2006.4289855","DOIUrl":null,"url":null,"abstract":"E-mail has become the most widely used communication facility for all institutions and individuals in the present era. Existing E-mail systems employ a server-centric design in which the user is critically dependent on the mail server. Insecurity due to mail sever failures is a major problem faced by many users. Design and implementation of a secure Peer-to-Peer E-mail facility is addressed in this work. Locating the specific computer that stores the emails of a specific user is the critical design requirement for which a solution is offered through the implementation of Chord protocol, which maps an E-mail entity onto a specific node. The architectural design and implementation also provides for better confidentiality. The prototype implementation has been observed to provide a good scope for improved anonymity. We present our prototype implementation and discuss the scope of future extensions.","PeriodicalId":296627,"journal":{"name":"2006 International Conference on Advanced Computing and Communications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Conference on Advanced Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ADCOM.2006.4289855","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
E-mail has become the most widely used communication facility for all institutions and individuals in the present era. Existing E-mail systems employ a server-centric design in which the user is critically dependent on the mail server. Insecurity due to mail sever failures is a major problem faced by many users. Design and implementation of a secure Peer-to-Peer E-mail facility is addressed in this work. Locating the specific computer that stores the emails of a specific user is the critical design requirement for which a solution is offered through the implementation of Chord protocol, which maps an E-mail entity onto a specific node. The architectural design and implementation also provides for better confidentiality. The prototype implementation has been observed to provide a good scope for improved anonymity. We present our prototype implementation and discuss the scope of future extensions.