Protection Against SQL Injection Attack in Cloud Computing

  • B. Shunmugapriya
  • Dr. B. Paramasivan
N/ACitations
Citations of this article
15Readers
Mendeley users who have this article in their library.

Abstract

Cloud Computing is a promising paradigm that allows customers to obtain cloud resources and services according to an on-demand, self-service, and pay-by-use business model. There is the number of web application threats in cloud computing one among them is the SQL injection attack (SQLiA). In this, the attackers produce a query of their interest to have illegal access to the database. To prevent this, we use the Twofish encryption algorithm is used to secure the client's sensitive information. In this algorithm, the file uploaded by the data owner is encrypted using the Twofish algorithm and then stored it in a database.

Cite

CITATION STYLE

APA

B. Shunmugapriya, & Dr. B. Paramasivan. (2020). Protection Against SQL Injection Attack in Cloud Computing. International Journal of Engineering Research And, V9(02). https://doi.org/10.17577/ijertv9is020273

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free