Open Access
Subscription Access
Efficient Data Transfer in Clouds Using Multideployment
This paper aims at finding the shortest path from the multideployed nodes of the available nodes. After finding the shortest path the sender will encrypt the original message and generate the hash key for the encrypted message. The generated hash key for the encrypted message will reach the receiver through the intermediate node. During this transmission processes there may be a chance of hacking the message. If the message is hacked the transmission will dropped and the sender will get the acknowledgement of the hacked process. If it is not, the receiver will successfully get the original message.
Keywords
Virtual Machines, Infrastructure as a service, deployment, multi-path
User
Font Size
Information
Abstract Views: 144
PDF Views: 0