Periodicity: Bi Annual.
Impact Factor:
SJIF:4.78 & GIF:0.428
Submission:Any Time
Publisher: IIR Groups
Language: English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJWT provides online manuscript tracking system.

Every issue of Journal of IJWT is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJWT special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJWT website. For complete procedure, contact us at

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 3 Issue 1 Date of Publication:   June 2014

Data Grid Privacy and Secure Storage Service in Cloud Computing


Page(s):   19-21 ISSN:   2278-2397
DOI:   10.20894/IJWT. Publisher:   Integrated Intelligent Research (IIR)

In cloud storage, users needs the data integrity protection in cloud computing task, especially for users with constrained computing resources. Thus, enabling public audit ability for cloud storage is of critical importance so that users can report to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free .The data owner can share the space where his data are stored with other trusted people. Thus, users set the access rights with whom he/she wants to share the cloud space and that information will be forwarded to the TPA.[1] So, TPA on authentication or receiving the file access request, checks the user whether he is the real data owner or the user who has the rights to access the data. TPA lets these users to directly view the file and denies other users who try to access the file and pass the log report to the data owner. We use cryptographic techniques to securely store the data. We further have integrated RSA and TRIPLE DES algorithms for providing more security to the data. Thus the main objective we focused in this paper is providing privacy to the users and security to the data uploaded and stored by users in the cloud.