ICIEMS 2015

International Conference on Information Engineering, Management and Security 2015

 


ICIEMS 2015 Kokula Krishna Hari K
Publication Meta Value
Short Title ICIEMS 2015
Publisher ASDF, India
ISBN 13 978-81-929742-7-9
ISBN 10 81-929742-7-8
Language English
Type Hard Bound - Printed Book
Copyrights ICIEMS Organizers / DCRC, London, UK
Editor-in-Chief Kokula Krishna Hari K
Conference Dates 13 - 14, August 2015
Venue Country IITM-RP, Chennai, India
Submitted Papers 410
Acceptance Rate 4.11%
Website www.iciems.in

Paper 002


Security of sensitive data in xml or file system by using Encoding through URL

Security of sensitive data in xml or file system by using Encoding through URL

Kajal Shukla1, S. K. Singh1

1Department of CSE VIET, DADRI (G. B. NAGAR) UP- INDIA

Abstract

Database services have the web applications which are interactive targeted by an SQL Injection. User gives some data as a input and at last that coded input data is being used as to form SQL statement at runtime in these applications. A person who is a n attacker can be able to input a malicious or harmful query segment when user inputs any SQL statement during SQL Injection attacks, that is the result which could be used in many more different database request. Sensitive/Confidential information can be added or modified by an attacker to form attacks of SQL Injection. SQL Injection vulnerability could be used by an attacker as an IP scanner rudimentary. There are several paper published in literature having discussed that how to secure sensitive data in xml or file system , by checking SQL dynamic query commands.SQL Injection attacks However, for secure stored procedures in the database higher level layer / application layer a very less attention is given, which surely can be too suffered from attacks of SQL Injection.

Author's Profile

Kajal Shukla : Profile

S. K. Singh : Profile

Cite this Article as Follows

Kajal Shukla, S. K. Singh. "Security of sensitive data in xml or file system by using Encoding through URL." International Conference on Information Engineering, Management and Security (2015): 07-11. Print.