{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:40:13Z","timestamp":1761709213291},"publisher-location":"Cham","reference-count":67,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319215686"},{"type":"electronic","value":"9783319215693"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-21569-3_7","type":"book-chapter","created":{"date-parts":[[2016,4,4]],"date-time":"2016-04-04T01:20:33Z","timestamp":1459732833000},"page":"119-141","source":"Crossref","is-referenced-by-count":36,"title":["Big Data Storage"],"prefix":"10.1007","author":[{"given":"Martin","family":"Strohbach","sequence":"first","affiliation":[]},{"given":"J\u00f6rg","family":"Daubert","sequence":"additional","affiliation":[]},{"given":"Herman","family":"Ravkin","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Lischka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"27","key":"7_CR31","doi-asserted-by":"publisher","first-page":"10975","DOI":"10.1073\/pnas.0904891106","volume":"106","author":"A Acquisti","year":"2009","unstructured":"Acquisti, A., & Gross, R. (2009). Predicting social security numbers from public data. Proceedings of the National Academy of Sciences, 106(27), 10975\u201310980.","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Ahmadi Zeleti, F., Ojo, A., & Curry, E. (2014). Business models for the open data industry: Characterization and analysis of emerging models. In 15th Annual International Conference on Digital Government Research (dg.o 2014) (pp. 215\u2013226). ACM.","DOI":"10.1145\/2612733.2612745"},{"key":"7_CR2","unstructured":"Apache. (2014). Apache HBase Project Website. http:\/\/hbase.apache.org . Accessed Nov 21, 2014."},{"key":"7_CR3","unstructured":"Aranda, C. B., Corby, O., Das, S., Feigenbaum, L., Gearon, P., Glimm, B., et al. (2013). SPARQL 1.1 overview. In W3C Recommendation."},{"key":"7_CR4","unstructured":"Baeza-Yates, R. (2013). BIG Interview by John Dominque."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Blaze, M., Bleumer, G., & Strauss, M. (2006). Divertible protocols and atomic proxy cryptography. In Proceedings of Eurocrypt (pp. 127\u2013144).","DOI":"10.1007\/BFb0054122"},{"key":"7_CR6","unstructured":"Blueprints. (2014). Blueprints Project Homepage. https:\/\/github.com\/tinkerpop\/blueprints\/wiki . Accessed Feb 4, 2015."},{"key":"7_CR7","volume-title":"The promise and peril of big data","author":"D Bollier","year":"2010","unstructured":"Bollier, D., & Firestone, C. M. (2010). The promise and peril of big data. Washington, DC: Aspen Institute, Communications and Society Program."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Calder, B., Wang, J., Ogus, A., Nilakantan, N., Skjolvsvold, A., McKelvie, S. et al. (2011). Windows azure storage: a highly available cloud storage service with strong consistency. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (143\u2013157). New York, NY: ACM.","DOI":"10.1145\/2043556.2043571"},{"key":"7_CR9","unstructured":"CloudDrive. (2013). Advantages of cloud data storage. http:\/\/www.clouddrive.com.au\/download\/www.clouddrive.com.au-WhitePaper.pdf . Accessed Nov 20, 2013."},{"key":"7_CR10","unstructured":"Cloudera. (2012). Treato Customer Case Study. https:\/\/www.cloudera.com\/content\/dam\/cloudera\/Resources\/PDF\/casestudy\/Cloudera_Customer_Treato_Case_Study.pdf"},{"key":"7_CR11","unstructured":"Cloudera. (2013). Identifying fraud, managing risk and improving compliance in financial services."},{"key":"7_CR12","unstructured":"Cloudera. (2014a). Cloudera Company Web page. www.cloudera.com . Accessed May 6, 2015."},{"key":"7_CR13","unstructured":"Cloudera. (2014b). Rethink data. http:\/\/www.cloudera.com\/content\/cloudera\/en\/new\/ . Accessed Feb 4, 2014."},{"key":"7_CR15","unstructured":"Curry, E., Ngonga, A., Domingue, J., Freitas, A., Strohbach, M., Becker, T., et al. (2014). D2.2.2. Final version of the technical white paper. Public deliverable of the EU-Project BIG (318062; ICT-2011.4.4)."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"DeBrabant, J., Pavlo, A., Tu, S., Stonebraker, M., & Zdonik, S. (2013). Anti-caching: a new approach to database management system architecture. In Proceedings of the VLDB Endowment (pp 1942\u20131953).","DOI":"10.14778\/2556549.2556575"},{"key":"7_CR17","unstructured":"Erling, O. (2009). Virtuoso, a Hybrid RDBMS\/Graph Column Store. In: Virtuoso Open-Source Wiki. http:\/\/virtuoso.openlinksw.com\/dataspace\/doc\/dav\/wiki\/Main\/VOSArticleVirtuosoAHybridRDBMSGraphColumnStore . Accessed Feb 6, 2015."},{"key":"7_CR18","unstructured":"Franz. (2015). Allegrograph product web page. http:\/\/franz.com\/agraph\/allegrograph\/ . Accessed Feb 6, 2015."},{"key":"7_CR19","unstructured":"Gislason, H. (2013). BIG Interview by John Dominque."},{"key":"7_CR20","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-642-53974-9_7","volume-title":"Specifying big data benchmarks","author":"B Glavic","year":"2014","unstructured":"Glavic, B. (2014). Big data provenance: Challenges and implications for benchmarking. In T. Rabl, M. Poess, C. Baru, & H.-A. Jacobsen (Eds.), Specifying big data benchmarks (pp. 72\u201380). Berlin: Springer."},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security (pp. 89\u201398).","DOI":"10.1145\/1180405.1180418"},{"key":"7_CR22","unstructured":"Grady, J. (2013). Is enterprise cloud storage a good fit for your business? http:\/\/www.1cloudroad.com\/is-enterprise-cloud-storage-a-good-fit-for-your-business"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Harizopoulos, S., Abadi, D. J., Madden, S., & Stonebraker, M. (2008). OLTP through the looking glass, and what we found there. In Proceedings of the 2008 ACM SIGMOD International Conference on Management data (SIGMOD \u201908).","DOI":"10.1145\/1376616.1376713"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Hasan, O., Habegger, B., Brunie, L., Bennani, N., & Damiani, E. (2013). A discussion of privacy challenges in user profiling with big data techniques: The EEXCESS use case. IEEE International Congress on Big Data (pp. 25\u201330).","DOI":"10.1109\/BigData.Congress.2013.13"},{"key":"7_CR25","unstructured":"Hortonworks. (2014). Hortonworks Company Web Page. http:\/\/hortonworks.com\/ . Accessed Feb 6, 2015."},{"key":"7_CR26","unstructured":"Ikeda, R., Park, H., & Widom, J. (2011). Provenance for generalized map and reduce workflows. In Biennial Conference on Innovative. Data Systems Research (pp. 273\u2013283)."},{"key":"7_CR27","unstructured":"iQuartic. (2014). iQuartic pioneers use of Hadoop with Electronic Health Records (EHRs\/EMRs). In: iQuartic Blog. http:\/\/www.iquartic.com\/blog\/ . Accessed Feb 7, 2014."},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Kamara, S., & Lauter, K. (2010). Cryptographic cloud storage. In Financial Cryptography and Data Security (pp. 136\u2013149).","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"7_CR29","unstructured":"Kobielus, J. (2013) Big Data needs data virtualization. In: InfoWorld Webpage. http:\/\/www.infoworld.com\/article\/2611579\/big-data\/big-data-needs-data-virtualization.html . Accessed Nov 18, 2014."},{"key":"7_CR30","doi-asserted-by":"publisher","first-page":"034008","DOI":"10.1088\/1748-9326\/3\/3\/034008","volume":"3","author":"JG Koomey","year":"2008","unstructured":"Koomey, J. G. (2008). Worldwide electricity used in data centers. Environmental Research Letters, 3, 034008. doi: 10.1088\/1748-9326\/3\/3\/034008 .","journal-title":"Environmental Research Letters"},{"key":"7_CR32","first-page":"231","volume":"15","author":"C-C Lee","year":"2013","unstructured":"Lee, C.-C., Chung, P.-S., & Hwang, M.-S. (2013). A survey on attribute-based encryption schemes of access. International Journal of Network Security, 15, 231\u2013240.","journal-title":"International Journal of Network Security"},{"key":"7_CR33","unstructured":"Lee, K., Manning, S., Melton, J., Boyd, D., Grady, N., & Levin, O. (2014). Final SGBD report to JTC1, ISO\/IEC JTC1 SGBD document no. N0095."},{"key":"7_CR34","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W., et al. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24, 131\u2013143.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"7_CR35","unstructured":"Lobillo, F., Puente, M. A., Lippell, H., Zillner, S., Bretschneider, C., Oberkampf, H., et al. (2013). BIG deliverable D2.4.1 \u2013 First draft of sector\u2019s roadmaps."},{"key":"7_CR36","unstructured":"Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., et al. (2011). Big data: The next frontier for innovation, competition, and productivity. Sydney: McKinsey Global Institute. http:\/\/www.mckinsey.com\/insights\/business_technology\/big_data_the_next_frontier_for_innovation ."},{"key":"7_CR37","unstructured":"MapR. (2014). MapR Company Website. https:\/\/www.mapr.com\/ . Accessed Feb 6, 2014."},{"key":"7_CR38","unstructured":"Margaret Rouse. (2014a). Object Storage. http:\/\/searchstorage.techtarget.com\/definition\/object-storage . Accessed Nov 20, 2014."},{"key":"7_CR39","unstructured":"Margaret Rouse. (2014b). Block Storage. http:\/\/searchstorage.techtarget.com\/definition\/block-storage . Accessed Feb 4, 2014."},{"key":"7_CR40","volume-title":"Big Data: Principles and best practices of scalable real-time data systems","author":"N Marz","year":"2014","unstructured":"Marz, N., & Warren, J. (2014). A new paradigm for Big Data. In N. Marz & J. Warren (Eds.), Big Data: Principles and best practices of scalable real-time data systems. Shelter Island, NY: Manning Publications."},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"Melnik, S., Garcia-Molina, H., & Rahm, E. (2002). Similarity flooding: A versatile graph matching algorithm and its application to schema matching. In Proceedings of the 18th International Conference Data Engineering. IEEE Computer Society (pp. 117\u2013128).","DOI":"10.1109\/ICDE.2002.994702"},{"key":"7_CR42","unstructured":"Miller, S. P., Neuman, B. C., Schiller, J. I., & Saltzer, J. H. (1987, December 21). Section E.2.1: Kerberos authentication and authorization system. MIT Project Athena, Cambridge, MA."},{"key":"7_CR43","unstructured":"Mora, A. C., Chen, Y., Fuchs, A., Lane, A., Lu, R., Manadhata, P. et al. (2012). Top Ten Big Data Security and Privacy Challenges. Cloud Security Alliance (CSA)."},{"key":"7_CR44","unstructured":"Neo4j. (2015). Neo4j Company Website. http:\/\/neo4j.com\/ . Accessed Feb 6, 2015."},{"key":"7_CR45","doi-asserted-by":"crossref","unstructured":"Okman, L., Gal-Oz, N., Gonen, Y., et al. (2011). Security issues in nosql databases. In 2011 I.E. 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 541\u2013547).","DOI":"10.1109\/TrustCom.2011.70"},{"key":"7_CR46","unstructured":"OpenStack. (2014). OpenStack Website. http:\/\/www.openstack.org . Accessed Feb 3, 2014."},{"key":"7_CR47","unstructured":"PEC. (2014). Peer Energy Cloud Project Website. http:\/\/www.peerenergycloud.de\/ . Accessed Feb 6, 2015."},{"key":"7_CR48","unstructured":"Russel, J. (2013). Cloudera Impala. O#Reilly Media"},{"key":"7_CR49","unstructured":"Shenker, S., Stoica, I., Zaharia, M., & Xin, R. (2013). Shark: SQL and rich analytics at scale. In Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data (pp. 13\u201324)."},{"key":"7_CR50","unstructured":"Sherif, A., Sohan, R., & Hopper, A. (2013). HadoopProv: Towards provenance as a first class citizen in MapReduce. In Proceedings of the 5th USENIX Workshop on the Theory and Practice of Provenance."},{"key":"7_CR51","unstructured":"Shucheng, Y., Wang, C., Ren, K., & Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. INFOCOM (pp. 1\u20139)."},{"key":"7_CR52","doi-asserted-by":"crossref","unstructured":"Shvachko, K. H. K., Radia, S., & Chansler, R. (2010). The Hadoop distributed file system. In IEEE 26th Symposium on Mass Storage Systems and Technologies (pp. 1\u201310).","DOI":"10.1109\/MSST.2010.5496972"},{"key":"7_CR53","unstructured":"Stonebraker, M. (2012a) What Does \u201cBig Data\u201d Mean? In: BLOG@ACM. http:\/\/cacm.acm.org\/blogs\/blog-cacm\/155468-what-does-big-data-mean\/fulltext . Accessed Feb 5, 2015."},{"key":"7_CR54","unstructured":"Stonebraker, M. (2012b). What Does \u201cBig Data\u201d Mean? (Part 2). In: BLOG@ACM. http:\/\/cacm.acm.org\/blogs\/blog-cacm\/156102-what-does-big-data-mean-part-2\/fulltext . Accessed Apr 25, 2013."},{"key":"7_CR55","first-page":"257","volume-title":"Modeling and processing for next generation big data technologies with applications","author":"M Strohbach","year":"2011","unstructured":"Strohbach, M., Ziekow, H., Gazis, V., & Akiva, N. (2011). Towards a big data analytics framework for IoT and smart city applications. In F. Xhafa & P. Papajorgji (Eds.), Modeling and processing for next generation big data technologies with applications (pp. 257\u2013282). Berlin: Springer."},{"key":"7_CR56","first-page":"1626","volume":"2","author":"A Thusoo","year":"2009","unstructured":"Thusoo, A., Sarma, J., Jain, N., Shao, Z., Chakka, P., Anthony, S., et al. (2009). Hive \u2013 a warehousing solution over a map-reduce framework. Statistics and Operations Research Transactions, 2, 1626\u20131629.","journal-title":"Statistics and Operations Research Transactions"},{"key":"7_CR57","unstructured":"Turner, V., Gantz, J. F., Reinsel, D., & Minton, S. (2014). The digital universe of opportunities: Rich data and the increasing value of the internet of things. Framingham, MA: International Data Corporation (IDC). http:\/\/idcdocserv.com\/1678 . Accessed Aug 19, 2015."},{"key":"7_CR58","unstructured":"Venkatesh, P., & Nirmala, S. (2012). NewSQL \u2013 The new way to handle big data. In: Blog. http:\/\/www.opensourceforu.com\/2012\/01\/newsql-handle-big-data\/ . Accessed Nov 18, 2014."},{"key":"7_CR59","unstructured":"Vogels, W. (2013). Day 2 Keynote. AWS reInvent."},{"key":"7_CR60","unstructured":"VoltDB. (2014). VoltDB Company Website. http:\/\/www.voltdb.com . Accessed Nov 21, 2014."},{"key":"7_CR61","unstructured":"Webber, J. (2013). BIG Interview by John Dominque."},{"key":"7_CR62","unstructured":"White, T. (2012). Hadoop: The Definitive Guide. O\u2019Reilly."},{"key":"7_CR63","unstructured":"Wikipedia. (2013). Column-oriented DBMS. http:\/\/en.wikipedia.org\/wiki\/Column-oriented_DBMS . Accessed Apr 25, 2013."},{"key":"7_CR64","unstructured":"Winder, D. (2012). Securing NoSQL applications: Best practises for big data security. Computer Weekly."},{"key":"7_CR65","doi-asserted-by":"crossref","unstructured":"Wu, C., & Guo, Y. (2013). Enhanced user data privacy with pay-by-data model. In Proceeding of 2013 I.E. International Conference on Big Data (pp. 53\u201357).","DOI":"10.1109\/BigData.2013.6691688"},{"key":"7_CR66","unstructured":"Zaharia, M., Chowdhury, M., Franklin, M. J., Shenker, S., & Stoica, I. (2010). Spark\u202f: Cluster computing with working sets. In HotCloud\u201910 Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (p. 10)."},{"key":"7_CR67","doi-asserted-by":"crossref","unstructured":"Ziekow, H., Goebel, C., Struker, J., & Jacobsen, H.-A. (2013). The potential of smart home sensors in forecasting household electricity demand. In Smart Grid Communications (SmartGridComm), 2013 I.E. International Conferences (pp. 229\u2013234).","DOI":"10.1109\/SmartGridComm.2013.6687962"},{"key":"7_CR68","unstructured":"Zillner, S., Neururer, S., Munne, R., Prieto, E., Strohbach, M., van Kasteren, T., et al. (2014). D2.3.2. Final Version of the Sectorial Requisites. Public Deliverable of the EU-Project BIG (318062; ICT-2011.4.4)."}],"container-title":["New Horizons for a Data-Driven Economy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21569-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T02:49:04Z","timestamp":1567738144000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-21569-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319215686","9783319215693"],"references-count":67,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21569-3_7","relation":{},"subject":[],"published":{"date-parts":[[2016]]}}}