Abstract Views :138 |
PDF Views:0
Authors
Source
International Journal of Innovative Research and Development, Vol 3, No 2 (2014), Pagination:
Abstract
This paper aims at finding the shortest path from the multideployed nodes of the available nodes. After finding the shortest path the sender will encrypt the original message and generate the hash key for the encrypted message. The generated hash key for the encrypted message will reach the receiver through the intermediate node. During this transmission processes there may be a chance of hacking the message. If the message is hacked the transmission will dropped and the sender will get the acknowledgement of the hacked process. If it is not, the receiver will successfully get the original message.
Keywords
Virtual Machines, Infrastructure as a service, deployment, multi-path
Full Text