Research Article
An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks
Algorithm 2
Big data security analysis and processing based on velocity and variety.
Step 1: Receive (Labeled Big Data Traffic_, Gateway_number, Factor_Vel_Var, | DSD_prob); | Function for getting Big Data traffic by Name_node | Where: | Labeled Big Data Traffic_ traffic label (TL), Data (D), | Gateway_number Value of Gateway sending labeled Big Data traffic (GN) | Factor_Value Factor type ( Var || Vel): | Assumptions: | (i) Data Source and Destination (DSD) information are used and | integrated in Labeled traffic. | (ii) Data source indicates the type of data (e.g., streaming data, | structured nor not, ect.). | (iii) DSD_prob is the probability of the Velocity or Variety data | type. | Step 2: Forward (Data_node_, Security_Service) | Function for distributing the labeled traffic for the designated data node(s) with | security service assignment: | Based on the DSD probability value(s), decision is made on the security service? | True then go to data_node(s) assigned to analyze and process security services. | Step 3: Go to step 1 |
|