SEED: Searching Encrypted Email Dependably. A design specification for secured webmail
نویسندگان
چکیده
Webmail services are a convenient, internet-based access point for email management. A webmail user must trust the service provider to honor the user’s individual privacy while accomodating their email contents. Webmail users are increasingly conscious of the risk to their privacy as many webmail services have fallen victim to cyberattacks where unwanted observers have exploited server vulnerabilities to steal user private data. The relationship of trust between webmail provider and webmail user has been further called into question with the reveal of NSA snooping of user email, often with the tacit approval of the webmail provider. We augment a modern webmail service with end-to-end encryption of user email data. Our system, SEED, is designed to respect the original functionality of the webmail service. Most notably, we enable search of encrypted message bodies using the webmail service’s built-in search engine. With an ancillary web browser extension called SEED add-on, the user is able to manage email in the webmail client while decrypting sensitive email information in a separate local process. The browser extension manages the user’s encryption keys and decrypts email ciphertext automatically such that the user remains ignorant of the underlying cryptographic implementation as they browse their email. Built upon Gmail, SEED stores a user’s email data on Google’s remote servers and guarantees that Google is unable to interpret it. When managing their email, the user still enjoys the full capabilities of the Gmail web client, including composing, reading, and robustly searching email by message metadata. The user is able to do all of this without revealing their usage habits to Google. The user is able to do all of this without revealing their emails to Google. Using SEED, the user benefits from the conveniences of webmail and preserves the integrity of their private information stored online.
منابع مشابه
SSL based Webmail Forensic Engine
In this era of information technology, email applications are the foremost and extensively used electronic communication technology. Emails are profusely used to exchange data and information using several frontend applications from various service providers by its users. Currently most of the email clients and service providers now moved to secured data communications using SSL or TLS security...
متن کاملHelping Johnny Understand and Avoid Mistakes: A Comparison of Automatic and Manual Encryption in Email
Private Webmail 2.0 (Pwm 2.0) improves upon the current state of the art by increasing the usability and practical security of secure email for ordinary users. More users are able to send and receive encrypted emails without mistakenly revealing sensitive information. In this paper we describe user interface traits that positively affect the usability and security of Pwm 2.0: (1) an artificial ...
متن کاملThe Design and Performance of a bare PC Webmail Server
We describe a Webmail server that runs on a bare PC without an operating system (OS) or kernel, and give details of its architecture, design, and implementation. We also present the results of experiments conducted in a test LAN environment to compare performance of the bare PC Webmail server with conventional Webmail servers Atmail and Mailtraq running on Linux and Windows respectively. Perfor...
متن کاملPractical Security in E-Mail Applications
This paper deals with practicability issues of encrypted e-mails. A quick survey on the status quo indicates that popular e-mail clients lack substantial practicability qualities, for example searching in encrypted e-mails. Other approaches such as De-Mail provide solutions, but offer transport encryption only. We present and discuss a number of improvements to the practicability of e-mail encr...
متن کاملkaPoW Webmail: Effective Disincentives Against Spam
Webmail spam poses a significant threat to major webmail providers such as Google GMail, Yahoo! Mail, and Microsoft Live Mail, as well as to individual companies and universities that provide web-based interfaces to their email. Whether spammers create new accounts or hijack existing accounts to send spam, the transmission of spam drives up server operating costs as well as the human costs requ...
متن کامل