A Novel Approach for Prevention of SQL Injection Attacks Using Cryptography and Access Control Policies

被引:0
作者
Selvamani, K. [1 ]
Kannan, A. [2 ]
机构
[1] Anna Univ, Dept Comp Sci & Engn, Madras 600025, Tamil Nadu, India
[2] Anna Univ, Dept Informat Sci & Technol, Madras 600025, Tamil Nadu, India
来源
ADVANCES IN POWER ELECTRONICS AND INSTRUMENTATION ENGINEERING | 2011年 / 148卷
关键词
Encryption; Decryption. String Transform; Access Control;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this era of social and technological development, SQL injection attacks are one of the major securities in Web applications. They allow attackers to obtain an unrestricted and easy access to the databases to gain valuable information. Although many researchers have proposed various effective and useful methods to address the SQL injection problems, all the proposed approaches either fail to address the broader scope of the problem or have limitations that prevent their use and adoption or cannot be applied to some crucial scenarios. In this paper we propose a global solution to the SQL injection attacks by providing strong encryption techniques and policy based access control mechanism on the application information. We initially encrypt the message using an encryption engine in the server before we store the values into the database with Policy-based Access Control, data is stored in the encrypted form and while accessing it again we decrypt them and provide the data for the user in a secured manner with the control of policy based access.
引用
收藏
页码:26 / +
页数:3
相关论文
共 9 条
  • [1] ANLEY C, 2002, SQL SERVER APPL
  • [2] [Anonymous], 2005, INPROCEEDINGS 20 IEE
  • [3] Bandhakavi S, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P12
  • [4] Boyd SW, 2004, LECT NOTES COMPUT SC, V3089, P292
  • [5] Buehrer G., 2005, P 5 INT WORKSH SOFTW, P106, DOI DOI 10.1145/1108473.1108496
  • [6] Halfond A., 2006, P 14 ACM SIGSOFT INT, P175, DOI DOI 10.1145/1181775.1181797
  • [7] Kemalis K, 2008, APPLIED COMPUTING 2008, VOLS 1-3, P2153
  • [8] Mallouli W, 2007, SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P127
  • [9] Roichman A, 2007, SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P31