Database services have the web applications which are interactive targeted by an SQL Injection. User gives some data as a input and at last that coded input data is being used as to form SQL statement at runtime in these applications. A person who is a n attacker can be able to input a malicious or harmful query segment when user inputs any SQL statement during SQL Injection attacks, that is the result which could be used in many more different database request. Sensitive/Confidential information can be added or modified by an attacker to form attacks of SQL Injection. SQL Injection vulnerability could be used by an attacker as an IP scanner rudimentary. There are several paper published in literature having discussed that how to secure sensitive data in xml or file system , by checking SQL dynamic query commands. SQL Injection attacks However, for secure stored procedures in the database higher level layer / application layer a very less attention is given, which surely can be too suffered from attacks of SQL Injection.