Home / Regular Issue / JST Vol. 27 (1) Jan. 2019 / JST-0704-2016

 

SQL-Injection Vulnerabilities Resolving using Valid Security Tool in Cloud

Niharika Singh and Ashutosh Kumar Singh

Pertanika Journal of Science & Technology, Volume 27, Issue 1, January 2019

Keywords: Cloud security, malicious nodes, SQL injection attack

Published on: 24 Jan 2019

The cloud is storing a huge amount of the data, including personal and confidential details. It involves the third party over the internet and proposes many unreliable strings which can be proven as loopholes. Thus, securing the data in the cloud tends to be a major point of concern. SQL Injection Attacks (SQLIAs) are being acknowledged as one of the foremost web applications security threats. It initiates a vulnerable query to destroy the connected server systems and help attackers with unauthorized access to the databases resulting in identity theft and security violations. The paper proposes a hybrid solution whose information utility is higher than the solutions that are being proposed earlier. As the methodology is concerned over static, dynamic and runtime detection and prevention mechanism. It also classifies the malicious queries and inspires the system to be well prepared for the secure working environment by implementing a demonstration design. Through the experimental implementation, the query associativity makes success probability of 0.775 using the associativity formula that in fraction, results in a durable comparative solution proposed till date.

ISSN 0128-7680

e-ISSN 2231-8526

Article ID

JST-0704-2016

Download Full Article PDF

Share this article

Recent Articles