Abstract
In the website classification system, the traffic data is collected by the network traffic monitoring device deployed on the mobile Internet backbone nodes in the provinces independently developed by laboratories. The device can collect the network traffic for a long time and uninterrupted. The mobile Internet web site classification system based on Hadoop cloud computing is introduced in detail. Using this system, the distributed classification of the traffic data of the mobile Internet site can be realized, and the time of the flow classification of the mass mobile Internet sites is reduced. The mobile Internet web site classification system based on Hadoop cloud computing has high performance.

Similar content being viewed by others
Change history
13 December 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s11277-022-10137-x
References
Bojanova, I., Zhang, J., & Voas, J. (2013). Cloud computing. It Professional,15(2), 12–14.
Nist, S. P. (2015). A NIST definition of cloud computing. Communications of the ACM,53(6), 50.
Botta, A., Donato, W. D., & Persico, V. (2016). Integration of Cloud computing and Internet of Things. Future Generation Computer Systems,56(C), 684–700.
Sen, J. (2016). Security and privacy issues in cloud computing. International Journal of Grid & Distributed Computing,7(s1–6), 238–252.
Garg, S. K., Buyya, R., et al. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems,29(4), 1012–1023.
Shi, J., Li, H., & Zhou, L. (2013). The technical security issues in cloud computing. International Journal of Information and Communication Technology,5(3–4), 109–116.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., et al. (2013). An analysis of security issues for cloud computing. Journal of Internet Services & Applications,4(1), 5.
Li, J., Wang, Q., Wang, C., et al. (2014). Fuzzy Keyword Search over Encrypted Data in Cloud Computing. International Journal of Engineering Research and Applications,4(7), 1–5.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., et al. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems,47(C), 98–115.
Yang, K., & Jia, X. (2013). An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing. IEEE Transactions on Parallel and Distributed Systems,24(9), 1717–1726.
Xiao, Z., & Xiao, Y. (2013). Security and Privacy in Cloud Computing. IEEE Communications Surveys & Tutorials,15(2), 843–859.
Khan, A. N., Kiah, M. L. M., Khan, S. U., et al. (2013). Towards secure mobile cloud computing: A survey. Future Generation Computer Systems,29(5), 1278–1299.
O’Driscoll, A., Daugelaite, J., & Sleator, R. D. (2013). ‘Big data’, Hadoop and cloud computing in genomics. Journal of Biomedical Informatics,46(5), 774–781.
Gupta, P., Seetharaman, A., & Raj, J. R. (2013). The usage and adoption of cloud computing by small and medium businesses. International Journal of Information Management,33(5), 861–874.
Melorose, J., Perroy, R., & Careas, S. (2015). Hadoop definitive guide. O’reilly Media Inc Gravenstein Highway North,215(11), 1–4.
Author information
Authors and Affiliations
Corresponding author
About this article
Cite this article
Zou, Y. RETRACTED ARTICLE: Data Analysis and Processing of Massive Network Traffic Based on Cloud Computing and Research on Its Key Algorithms. Wireless Pers Commun 102, 3159–3170 (2018). https://doi.org/10.1007/s11277-018-5334-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-018-5334-0