Wuhan University Journal of Natural Sciences

, Volume 23, Issue 1, pp 79–83 | Cite as

A new anti-spam model based on e-mail address concealment technique

  • Yuqiang ZhangEmail author
  • Jingsha He
  • Jing Xu
Physics and Biology


To deal with the junk e-mail problem caused by the e-mail address leakage for a majority of Internet users, this paper presents a new privacy protection model in which the e-mail address of the user is treated as a piece of privacy information concealed. Through an interaction pattern that involves three parties and uses an e-mail address code in the place of an e-mail address, the proposed model can prevent the e-mail address from being leaked, thus effectively resolving the junk e-mail problem. We compare the proposed anti-spam method with the filtering technology based on machine learning. The result shows that 100% spams can be filtered out in our scheme, indicating the effectiveness of the proposed anti-spam method.


spam e-mail address protection model e-mail address code 

CLC number

TP 393 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Ku C H, Leroy G. A decision support system: Automated crime report analysis and classification for e-government[J]. Government Information Quarterly, 2014, 31(4): 534–544.CrossRefGoogle Scholar
  2. [2]
    Lai G H, Chen C M, Laih C S, et al. A collaborative anti-spam system[J]. Expert Systems with Applications, 2009, 36(3): 6645–6653.CrossRefGoogle Scholar
  3. [3]
    Liu Y, Cen R, Zhang M, et al. Identifying web spam with user behavior analysis [C] // Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web. New York: ACM Press, 2008: 9–16.Google Scholar
  4. [4]
    Burghardt T, Buchmann E, Müller J, et al. Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services [M]. Heidelberg: Springer-Verlag, 2009.Google Scholar
  5. [5]
    Xu F, Chow K P, He J, et al. Privacy reference monitor — A computer model for law compliant privacy protection [C] // Parallel and Distributed Systems (ICPADS), 2009 15th International Conference. Washington D C: IEEE, 2009: 572–577.CrossRefGoogle Scholar
  6. [6]
    Marsono M N, El-Kharashi M W, Gebali F. A spam rejection scheme during SMTP sessions based on layer-3 e-mail classification[J]. Journal of Network and Computer Applications, 2009, 32(1): 236–257.CrossRefGoogle Scholar
  7. [7]
    Basavaraju M, Prabhakar D R. A novel method of spam mail detection using text based clustering approach[J]. International Journal of Computer Applications, 2010, 5(4): 15–25.CrossRefGoogle Scholar
  8. [8]
    Roul R K, Asthana S R, Shah M, et al. Detecting spam web pages using content and link-based techniques[J]. Sadhana, 2016, 41(2): 193–202.CrossRefGoogle Scholar
  9. [9]
    Junejo K N, Karim A. PSSF: A novel statistical approach for personalized service-side spam filtering [C] // Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence. Piscataway: IEEE, 2007: 228–234.CrossRefGoogle Scholar
  10. [10]
    Ali A B M, Xiang Y. Spam classification using adaptive boosting algorithm [C] // 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007). Piscataway: IEEE, 2007: 972–976.CrossRefGoogle Scholar
  11. [11]
    Li K, Zhong Z, Ramaswamy L. Privacy-aware collaborative spam filtering[J]. IEEE Transactions on Parallel and Distributed Systems. Piscataway: IEEE, 2009, 20(5): 725–739.CrossRefGoogle Scholar

Copyright information

© Wuhan University and Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Beijing Institute of Aerospace Control DevicesBeijingChina
  2. 2.College of Computer Science and TechnologyBeijing University of TechnologyBeijingChina
  3. 3.School of Software EngineeringBeijing University of TechnologyBeijingChina
  4. 4.Department of AutomationTsinghua UniversityBeijingChina

Personalised recommendations