Research Article

An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks

Algorithm 1

Big data security analysis and processing based on volume.
Step 1: Receive (Labeled Big Data Traffic_, Gateway_number, Factor_Vol,
Security_Servic_);
   Function for getting Big Data traffic by Name_node
   Where:
   Labeled Big Data Traffic_ traffic label (TL), Data (D),
   Gateway_number Value of Gateway sending labeled Big Data traffic (GN)
   Factor_Vol Volume factor type (V):
      Assumptions:
         (i) Real time data is assigned different label than file transfer data and
          thus the label value should indicate the Volume size
         (ii) Real time data are usually assumed less than 150 bytes per packet.
   Security_Service_ Confidentiality (C), Authentication (Auth) are examined by
the label value of each traffic.
Step 2: Forward (Data_node_, Security_Service)
   Function for distributing the labeled traffic for the designated data_node(s) with
security service assignment:
   Security_service required or applied?
   True then go to data_node(s) assigned to analyze and process security services.
Step 3: Data_node_Checking (packet_headers, labels)
   Performs header and label information checking:
    Label_checking performs label examination
    Header_checking performs header examination:
      Assumptions: secured data comes with extra header size such as ESP header
Step 4: Go to step 1