2018
DOI: 10.1155/2018/8028960
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks

Abstract: The need for effective approaches to handle big data that is characterized by its large volume, different types, and high velocity is vital and hence has recently attracted the attention of several research groups. This is especially the case when traditional data processing techniques and capabilities proved to be insufficient in that regard. Another aspect that is equally important while processing big data is its security, as emphasized in this paper. Accordingly, we propose to process big data in two diffe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 25 publications
(25 reference statements)
0
7
0
Order By: Relevance
“…Aljawarneh et al [47] 2017 exploited the cloud security ✓ X ✓ ✓ X ✓ ✓ highlighted the various prevents on the security threats on clouds complete cloud security architecture and design consideration were not considered Alouneh et al [44] 2018 classification approach was used to avoid the complex structure of BD ✓ ✓ ✓ X ✓ X ✓ resolved the unstructured data into the classification approach problems such as unstructured characteristics types, unstructured text, video were not highlighted Yu et al [48] 2018 to protect the private key on cloud ✓ ✓ ✓ ✓ X X ✓ demonstrated significant performance improvement as compared with software implementations advance security planning 1: access control and monitoring; 2: classification approach; 3: security consideration; 4: policy compliance; 5: governance; 6: smart security practice; 7: risk and threat assessment; notations ✓, considered; X, not considered. (b) High-end device: This security involves complete devices to lift off the attacks on IoT system.…”
Section: Types Of Devicesmentioning
confidence: 99%
See 2 more Smart Citations
“…Aljawarneh et al [47] 2017 exploited the cloud security ✓ X ✓ ✓ X ✓ ✓ highlighted the various prevents on the security threats on clouds complete cloud security architecture and design consideration were not considered Alouneh et al [44] 2018 classification approach was used to avoid the complex structure of BD ✓ ✓ ✓ X ✓ X ✓ resolved the unstructured data into the classification approach problems such as unstructured characteristics types, unstructured text, video were not highlighted Yu et al [48] 2018 to protect the private key on cloud ✓ ✓ ✓ ✓ X X ✓ demonstrated significant performance improvement as compared with software implementations advance security planning 1: access control and monitoring; 2: classification approach; 3: security consideration; 4: policy compliance; 5: governance; 6: smart security practice; 7: risk and threat assessment; notations ✓, considered; X, not considered. (b) High-end device: This security involves complete devices to lift off the attacks on IoT system.…”
Section: Types Of Devicesmentioning
confidence: 99%
“…Alouneh et al . [44] proposed an effective classification approach for BD security, where security to BD is provided based on different BD classes such as structured, semi‐structured, and unstructured data. Moreover, other security factors such as an access control list and DoS protection also need security attention.…”
Section: Bd Streaming Security In Iot Environment: a Taxonomymentioning
confidence: 99%
See 1 more Smart Citation
“…Some of the investigators are mostly attentive in detecting risk concerns by determining and assimilating big data within IoT 10 . The widespread usage of big data poses many issues, which involves searching, data analysis 11 , visualization, storage, privacy, security, and treatment 12,13 . The trust model is an important metric to evaluate security 14 …”
Section: Introductionmentioning
confidence: 99%
“…This technology brings more flexibility, speed, and security compared to the Internet Protocol "IP". The MPLS technology provides advantageous applications, among them we quote virtual private network "VPN" [3][4] [5], quality of service "QoS" [6] [7], security [8], all transport on MPLS "AToM".…”
Section: Introductionmentioning
confidence: 99%