Research Article

An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks

Algorithm 2

Big data security analysis and processing based on velocity and variety.
Step 1: Receive (Labeled Big Data Traffic_, Gateway_number, Factor_Vel_Var,
DSD_prob);
   Function for getting Big Data traffic by Name_node
   Where:
   Labeled Big Data Traffic_ traffic label (TL), Data (D),
   Gateway_number Value of Gateway sending labeled Big Data traffic (GN)
   Factor_Value Factor type ( Var || Vel):
      Assumptions:
        (i) Data Source and Destination (DSD) information are used and
         integrated in Labeled traffic.
        (ii) Data source indicates the type of data (e.g., streaming data,
         structured nor not, ect.).
        (iii) DSD_prob is the probability of the Velocity or Variety data
         type.
Step 2: Forward (Data_node_, Security_Service)
   Function for distributing the labeled traffic for the designated data node(s) with
security service assignment:
   Based on the DSD probability value(s), decision is made on the security service?
   True then go to data_node(s) assigned to analyze and process security services.
Step 3: Go to step 1