Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{152088, author = {Shreya Chowdhury and Miran Ahmad and Aakansh Nandi and Aadish Jain and Mohandas Pawar}, title = {Prevention of Data Leakage via SQL Injection}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {8}, number = {2}, pages = {405-410}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=152088}, abstract = {This project aims to prevent SQL injection while performing a query. It does so by implementing a secure and online method to store and protect all the sensitive data stored in the database. Another key component of this system is encryption of card data. This method is known as AES encryption. It works seamlessly online and can be accessed from any location. This framework uses encryption techniques to prevent unauthorized access to the database. It also secures the user data by storing it in a secure form.}, keywords = {AES, DES, SQL Injection, Database, Decryption, Ciphertext}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry