{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T06:07:03Z","timestamp":1749794823214},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053444"},{"type":"electronic","value":"9783030053451"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_23","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:07:56Z","timestamp":1544173676000},"page":"272-281","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Enhancing Dependability in Big Data Analytics Enterprise Pipelines"],"prefix":"10.1007","author":[{"given":"Hira","family":"Zahid","sequence":"first","affiliation":[]},{"given":"Tariq","family":"Mahmood","sequence":"additional","affiliation":[]},{"given":"Nassar","family":"Ikram","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"23_CR1","unstructured":"Dimov, A., Davidovic, N., Stoimenov, L., Baylov, K.: Software dependability management in Big Data distributed stream computing systems (2017)"},{"key":"23_CR2","volume-title":"Mastering AWS Security: Create and Maintain a Secure Cloud Ecosystem","author":"A Anthony","year":"2017","unstructured":"Anthony, A.: Mastering AWS Security: Create and Maintain a Secure Cloud Ecosystem, 1st edn. Packt Publishing - eBooks Account, Birmingham (2017)","edition":"1"},{"key":"23_CR3","unstructured":"Asay, M.: 85% of big data projects fail, but your developers can help yours succeed (2017). \nhttps:\/\/www.techrepublic.com\/article\/85-of-big-data-projects-fail-but-your-developers-can-help-yours-succeed\/"},{"key":"23_CR4","unstructured":"Bahga, A., Madisetti, V.: Big Data Science & Analytics: A Hands-On Approach"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Celebi, O.F., et al.: On use of big data for enhancing network coverage analysis. In: ICT 2013. IEEE, May 2013","DOI":"10.1109\/ICTEL.2013.6632155"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Chang, B.R., Tsai, H.F., Lin, Z.Y., Chen, C.M.: Access-controlled video\/voice over IP in hadoop system with BPNN intelligent adaptation. In: 2012 International Conference on Information Security and Intelligence Control (ISIC), pp. 325\u2013328. IEEE (2012)","DOI":"10.1109\/ISIC.2012.6449772"},{"issue":"2","key":"23_CR7","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11036-013-0489-0","volume":"19","author":"M Chen","year":"2014","unstructured":"Chen, M., Mao, S., Liu, Y.: Big data: a survey. Mob. Netw. Appl. 19(2), 171\u2013209 (2014)","journal-title":"Mob. Netw. Appl."},{"key":"23_CR8","unstructured":"cloudera: apache-flume@ONLINE (2017). \nhttps:\/\/www.cloudera.com\/products\/open-source\/apache-hadoop\/apache-flume.html"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Daki, H., El Hannani, A., Aqqal, A., Haidine, A., Dahbi, A., Ouahmane, H.: Towards adopting big data technologies by mobile networks operators: A moroccan case study. In: 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech), pp. 154\u2013161. IEEE (2016)","DOI":"10.1109\/CloudTech.2016.7847693"},{"key":"23_CR10","unstructured":"Datafloq: Top reasons of Hadoop - big data project failures (2017). \nhttps:\/\/datafloq.com\/read\/top-reasons-of-hadoop-big-data-project-failures\/2185"},{"key":"23_CR11","unstructured":"Demirkan, H., Dal, B.: The data economy: Why do so many analytics projects fail? (2014). \nhttp:\/\/analytics-magazine.org\/the-data-economy-why-do-so-many-analytics-projects-fail\/"},{"key":"23_CR12","unstructured":"George, J., Chen, C.A., Stoleru, R., Xie, G.: Hadoop MapReduce for mobile clouds. IEEE Trans. Cloud Comput., 1 (2016)"},{"key":"23_CR13","unstructured":"Haber, I.: Why redis beats memcached for caching (2017). \nhttps:\/\/www.infoworld.com\/article\/3063161\/nosql\/why-redis-beats-memcached-for-caching.html"},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.1109\/ACCESS.2016.2540520","volume":"4","author":"Y He","year":"2016","unstructured":"He, Y., Yu, F.R., Zhao, N., Yin, H., Yao, H., Qiu, R.C.: Big data analytics in mobile cellular networks. IEEE Access 4, 1985\u20131996 (2016)","journal-title":"IEEE Access"},{"key":"23_CR15","first-page":"1","volume":"2014","author":"N Khan","year":"2014","unstructured":"Khan, N., et al.: Big data: survey, technologies, opportunities, and challenges. Sci. World J. 2014, 1\u201318 (2014)","journal-title":"Sci. World J."},{"issue":"1","key":"23_CR16","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/MCOM.2016.7378435","volume":"54","author":"EJ Khatib","year":"2016","unstructured":"Khatib, E.J., Barco, R., Mu\u00f1oz, P., De La Bandera, I., Serrano, I.: Self-healing in mobile networks with big data. IEEE Commun. Mag. 54(1), 114\u2013120 (2016)","journal-title":"IEEE Commun. Mag."},{"key":"23_CR17","doi-asserted-by":"publisher","DOI":"10.1201\/b14700","volume-title":"Big Data and Business Analytics","author":"J Liebowitz","year":"2013","unstructured":"Liebowitz, J.: Big Data and Business Analytics, 1st edn. CRC Press, Boca Raton (2013)","edition":"1"},{"issue":"4","key":"23_CR18","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MNET.2014.6863129","volume":"28","author":"J Liu","year":"2014","unstructured":"Liu, J., Liu, F., Ansari, N.: Monitoring and analyzing big traffic data of a large-scale cellular network with hadoop. IEEE Network 28(4), 32\u201339 (2014)","journal-title":"IEEE Network"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Magnusson, J., Kvernvik, T.: Subscriber classification within telecom networks utilizing big data technologies and machine learning. In: Proceedings of the 1st International Workshop on Big Data, Streams and Heterogeneous Source Mining Algorithms, Systems, Programming Models and Applications-BigMine 2012. ACM Press (2012)","DOI":"10.1145\/2351316.2351327"},{"key":"23_CR20","unstructured":"Manyika, J., et al.: Big Data: The Next Frontier for Innovation, Competition and Productivity (2011)"},{"key":"23_CR21","volume-title":"Big Data: Principles and Best Practices of Scalable Realtime Data Systems","author":"N Marz","year":"2015","unstructured":"Marz, N., Warren, J.: Big Data: Principles and Best Practices of Scalable Realtime Data Systems. Manning Publications Co., Shelter Island (2015)"},{"key":"23_CR22","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.jnca.2017.08.011","volume":"97","author":"R Nachiappan","year":"2017","unstructured":"Nachiappan, R., Javadi, B., Calheiros, R.N., Matawie, K.M.: Cloud storage reliability for big data applications: a state of the art survey. J. Netw. Comput. Appl. 97, 35\u201347 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"23_CR23","doi-asserted-by":"publisher","DOI":"10.1002\/9781119205005","volume-title":"Big Data Analytics: Turning Big Data into Big Money","author":"FJ Ohlhorst","year":"2012","unstructured":"Ohlhorst, F.J.: Big Data Analytics: Turning Big Data into Big Money, 1st edn. Wiley, Hoboken (2012)","edition":"1"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Rathore, M., Paul, A., Ahmad, A., Imran, M., Guizani, M.: High-speed network traffic analysis: detecting VoIP calls in secure big data streaming. In: 2016 IEEE 41st Conference on Local Computer Networks (LCN). IEEE, November 2016","DOI":"10.1109\/LCN.2016.128"},{"key":"23_CR25","unstructured":"Redis: Using redis as an lru cache (2018). \nhttps:\/\/redis.io\/topics\/lru-cache"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Senbalci, C., Altuntas, S., Bozkus, Z., Arsan, T.: Big data platform development with a domain specific language for telecom industries. In: 2013 High Capacity Optical Networks and Emerging\/Enabling Technologies. IEEE, December 2013","DOI":"10.1109\/HONET.2013.6729768"},{"key":"23_CR27","unstructured":"Singh, P.: 10 reasons why big data and analytics projects fail (2017). \nhttps:\/\/analyticsindiamag.com\/10-reasons-big-data-analytics-projects-fail\/"},{"key":"23_CR28","unstructured":"Tseng, J.C., et al.: A successful application of big data storage techniques implemented to criminal investigation for telecom. In: Network Operations and Management Symposium, pp. 1\u20133. IEEE (2013)"},{"key":"23_CR29","unstructured":"Turck, M.: Firing on all cylinders: the 2017 big data landscape (2017). \nhttp:\/\/mattturck.com\/bigdata2017\/"},{"key":"23_CR30","unstructured":"Violino, B.: How to avoid big data analytics failures (2017). \nhttps:\/\/www.infoworld.com\/article\/3212945\/big-data\/how-to-avoid-big-data-analytics-failures.html"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Weiss, G.: Data mining in the telecommunications industry. GI Global (2009)","DOI":"10.4018\/978-1-60566-010-3.ch076"},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"Wu, D., Zhu, L., Xu, X., Sakr, S., Lu, Q., Sun, D.: A pipeline framework for heterogeneous execution environment of big data processing. IEEE Softw. 1 (2016)","DOI":"10.1109\/MS.2016.62"},{"key":"23_CR33","doi-asserted-by":"crossref","unstructured":"Yang, R., Xu, J.: Computing at massive scale: scalability and dependability challenges. In: 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE). IEEE, March 2016","DOI":"10.1109\/SOSE.2016.73"},{"key":"23_CR34","volume-title":"Microsoft Azure Security Infrastructure (IT Best Practices - Microsoft Press)","author":"Y Diogenes","year":"2016","unstructured":"Diogenes, Y., Shinder, T., Shinder, D.: Microsoft Azure Security Infrastructure (IT Best Practices - Microsoft Press), 1st edn. Microsoft Press, Redmond (2016)","edition":"1"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:19:36Z","timestamp":1544174376000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}