Welcome To WUJNS
武汉大学学报 英文版 | Wuhan University Journal of Natural Sciences
Wan Fang
Wuhan University
Latest Article
A New Anti-Spam Model Based on E-mail Address Concealment Technique
ZHANG Yuqiang1,2, HE Jingsha3, XU Jing4
1. Beijing Institute of Aerospace Control Devices, Beijing 100039, China; 2. College of Computer Science and Technology, Beijing University of Technology, Beijing 100124, China; 3. School of Software Engineering, Beijing University of Technology, Beijing 100124, China; 4. Department of Automation, Tsinghua University, Beijing 100084, China
 To deal with the junk e-mail problem caused by the e-mail address leakage for a majority of Internet users, this paper presents a new privacy protection model in which the e-mail address of the user is treated as a piece of privacy information concealed. Through an interaction pattern that involves three parties and uses an e-mail address code in the place of an e-mail address, the proposed model can prevent the e-mail address from being leaked, thus effectively resolving the junk e-mail problem. We compare the proposed anti-spam method with the filtering technology based on machine learning. The result shows that 100% spams can be filtered out in our scheme, indicating the effectiveness of the proposed anti-spam method.
Key words:spam; e-mail address; protection model; e-mail address code
CLC number:TP 393
[1]	Ku C H, Leroy G. A decision support system: Automated crime report analysis and classification for e-government [J]. Government Information Quarterly, 2014, 31(4): 534-544.
[2]	Lai G H, Chen C M, Laih C S, et al. A collaborative an-ti-spam system [J]. Expert Systems with Applications, 2009, 36(3): 6645-6653.
[3]	Liu Y, Cen R, Zhang M, et al. Identifying web spam with user behavior analysis [C] // Proceedings of the 4th Inter- national Workshop on Adversarial Information Retrieval on the Web. New York: ACM Press, 2008: 9-16.
[4]	Burghardt T, Buchmann E, Müller J, et al. Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services [M]. Heidelberg: Springer-Verlag, 2009.
[5]	Xu F, Chow K P, He J, et al. Privacy reference monitor — A computer model for law compliant privacy protection [C] // Parallel and Distributed Systems (ICPADS), 2009 15th International Conference. Washington D C: IEEE, 2009: 572-577.
[6]	Marsono M N, El-Kharashi M W, Gebali F. A spam rejection scheme during SMTP sessions based on layer-3 e-mail classification [J]. Journal of Network and Computer Appli- cations, 2009, 32(1): 236-257.
[7]	Basavaraju M, Prabhakar D R. A novel method of spam mail detection using text based clustering approach[J]. Intern- ational Journal of Computer Applications, 2010, 5(4): 15- 25.
[8]	Roul R K, Asthana S R, Shah M, et al. Detecting spam web pages using content and link-based techniques[J]. Sadhana, 2016, 41(2): 193-202.
[9]	Junejo K N, Karim A. PSSF: A novel statistical approach for personalized service-side spam filtering [C] // Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence. Piscataway: IEEE, 2007: 228-234.
[10]	Ali A B M, Xiang Y. Spam classification using adaptive boosting algorithm [C] // 6th IEEE/ACIS International Con- ference on Computer and Information Science (ICIS 2007). Piscataway: IEEE, 2007: 972-976.
[11]	Li K, Zhong Z, Ramaswamy L. Privacy-aware collaborative spam filtering [J]. IEEE Transactions on Parallel and Distri- buted Systems. Piscataway: IEEE, 2009, 20(5): 725- 739.
Welcome To WUJNS

HOME | Aim and Scope | Editoral Board | Current Issue | Back Issue | Subscribe | Crosscheck | Polishing | Contact us Copyright © 1997-2018 All right reserved