DOI:10.20894/IJWT.
Periodicity: Bi Annual.
Impact Factor:
SJIF:4.78 & GIF:0.428
Submission:Any Time
Publisher: IIR Groups
Language: English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJWT provides online manuscript tracking system.

Every issue of Journal of IJWT is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJWT special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJWT website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 5 Issue 1 Date of Publication:   June 2016

A survey on Insecure API Challenges and Resolution Mechanisms on Cloud Computing

P.Sujatha,M.J.Balachandran

Page(s):   17-21 ISSN:   2278-2397
DOI:   10.20894/IJWT.104.005.001.005 Publisher:   Integrated Intelligent Research (IIR)


  1. Panford,   "International Journal of Emerging Technology and Advanced Engineering",   Mitigation Techniques to Security Flaws in Cloud C   ,Vol.5   ,Issue 6   ,2015
    View Artical

  2. Muhammad Kazim, Shao Ying Zhu, University of Derby, UK,   "A survey on top security threats in cloud computing",   International International Journal of Advanced Co   ,Vol.6   ,2015
    View Artical

  3. Vineet Kumar Singh,   "Analyzing cryptographic algorithms for secure cloud network",   International Journal of advanced studies in Compu   ,Vol.3   ,Issue 6   ,2014
    View Artical

  4. Surbhi Aggarwal,   "A review of Comparative Study of MD5 and SHA Security Algorithm",   International Journal of Computer Applications   ,Vol.104   ,2014
    View Artical

  5. Shelveen Pandey, Mohammed Farik,   "Cloud Computing Security: Latest Issues & Countermeasures",   International Journal of Scientific & Technology R   ,Vol.4   ,Issue 11   ,2015
    View Artical

  6. Prof.Rajesh Kumar Kashyap,   "Security challenges and issues in Cloud Computing ? The way ahead",   International Journal of Innovative Research in Ad   ,Vol.2   ,Issue 9
    View Artical

  7. Shraddha More & Rajesh Bansode,   "Implementation of AES with Time Complexity Measurement for Various Input
    View Artical

  8. ,   "Global Journal of Computer Science and Technology: ENetwork, Web & Security   ,Vol.15   ,Issue 4   ,2015
    View Artical

  9. Noura Aleisa,   "A Comparison of the 3DES and AES Encryption Standards",   International Journal of Security and Its Applicat   ,2015
    View Artical

  10. Krunal Suthar, Parmalik Kumar, Hitesh Gupta & Hiren Patel,   "Analytical Comparison of Symmetric Encryption and Encoding Techniques for Cloud Environment",   International Journal of Computer Applications   ,Vol.60   ,2012
    View Artical

  11. Dr. Prerna Mahajan ? & Abhishek Sachdeva,   "A Study ofEncryption Algorithms AES, DES and RSA for Security",   Global Journal of Computer Science and Technology    ,Vol.13   ,Issue 15   ,2013
    View Artical

  12. ,   "TowardsSecuring APIs in Cloud Computing",   International Journal of Computer Engineering & Ap   ,Vol.2   ,Issue 2
    View Artical

  13. Panford,   "International Journal of Emerging Technology and Advanced Engineering",   Mitigation Techniques to Security Flaws in Cloud C   ,Vol.5   ,Issue 6   ,2015
    View Artical

  14. Muhammad Kazim, Shao Ying Zhu, University of Derby, UK,   "A survey on top security threats in cloud computing",   International International Journal of Advanced Co   ,Vol.6   ,2015
    View Artical

  15. Vineet Kumar Singh,   "Analyzing cryptographic algorithms for secure cloud network",   International Journal of advanced studies in Compu   ,Vol.3   ,Issue 6   ,2014
    View Artical

  16. Surbhi Aggarwal,   "A review of Comparative Study of MD5 and SHA Security Algorithm",   International Journal of Computer Applications   ,Vol.3   ,Issue 6   ,2014
    View Artical

  17. Shelveen Pandey, Mohammed Farik,   "Cloud Computing Security: Latest Issues & Countermeasures",   International Journal of Scientific & Technology R   ,Vol.4   ,Issue 11   ,2015
    View Artical

  18. Prof.Rajesh Kumar Kashyap,   "Security challenges and issues in Cloud Computing ? The way ahead",   International Journal of Innovative Research in Ad   ,Vol.9   ,Issue 2
    View Artical

  19. Shraddha More & Rajesh Bansode,   "Implementation of AES with Time Complexity Measurement for Various Input",   IET Digital Library   ,Issue 152   ,2005
    View Artical

  20. Noura Aleisa,   "A Comparison of the 3DES and AES Encryption Standards",   International Journal of Security and Its Applicat   ,Vol.9   ,Issue 7   ,2015
    View Artical

  21. Dr. Prerna Mahajan ? & Abhishek Sachdeva,   "A Study ofEncryption Algorithms AES, DES and RSA for Security",   Global Journal of Computer Science and Technology    ,Vol.13   ,Issue 15   ,2013
    View Artical

  22. ,   "TowardsSecuring APIs in Cloud Computing",   International Journal of Computer Engineering & Ap   ,Vol.2   ,Issue 2
    View Artical

  23. Vineet Kumar Singh,   "Analyzing cryptographic algorithms for secure cloud network",   International Journal of advanced studies in Compu   ,Vol.3   ,Issue 6   ,2014
    View Artical

  24. Prof.Rajesh Kumar Kashyap,   "Security challenges and issues in Cloud Computing ? The way ahead",   International Journal of Innovative Research in Ad   ,Vol.2   ,Issue 9
    View Artical

  25. Noura Aleisa,   "A Comparison of the 3DES and AES Encryption Standards",   International Journal of Security and Its Applicat   ,2015
    View Artical