{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:16:52Z","timestamp":1762431412366,"version":"3.41.0"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319765860"},{"type":"electronic","value":"9783319765877"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76587-7_5","type":"book-chapter","created":{"date-parts":[[2018,3,2]],"date-time":"2018-03-02T09:46:15Z","timestamp":1519983975000},"page":"65-79","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Scalable Architecture for Personalized Healthcare Service Recommendation Using Big Data Lake"],"prefix":"10.1007","author":[{"given":"Sarathkumar","family":"Rangarajan","sequence":"first","affiliation":[]},{"given":"Huai","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chuan-Long","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,3]]},"reference":[{"issue":"1","key":"5_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11280-017-0490-9","volume":"21","author":"H Wang","year":"2017","unstructured":"Wang, H., Zhang, Z., Taleb, T.: Special issue on security and privacy of IoT. World Wide Web 21(1), 1\u20136 (2017)","journal-title":"World Wide Web"},{"issue":"C","key":"5_CR2","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.ins.2015.05.040","volume":"318","author":"H Wang","year":"2015","unstructured":"Wang, H., Jiang, X., Kambourakis, G.: Special issue on security, privacy and trust in network-based big data. Inf. Sci. Int. J. 318(C), 48\u201350 (2015)","journal-title":"Inf. Sci. Int. J."},{"key":"5_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0769-1","volume-title":"Textbook of Personalized Medicine","author":"KK Jain","year":"2009","unstructured":"Jain, K.K., et al.: Textbook of Personalized Medicine. Springer, New York (2009). https:\/\/doi.org\/10.1007\/978-1-4419-0769-1"},{"issue":"1","key":"5_CR4","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/JSYST.2015.2460747","volume":"11","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Qiu, M., Tsai, C.W., Hassan, M.M., Alamri, A.: Health-CPS: Healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 11(1), 88\u201395 (2017)","journal-title":"IEEE Syst. J."},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.measurement.2016.02.059","volume":"86","author":"H Wang","year":"2016","unstructured":"Wang, H., Zhang, Y., et al.: Detection of motor imagery EEG signals employing na\u00efve bayes based learning process. Measurement 86, 148\u2013158 (2016)","journal-title":"Measurement"},{"key":"5_CR6","unstructured":"Feldman, B., Martin, E.M., Skotnes, T.: Big data in healthcare hype and hope, October 2012. Dr. Bonnie 360 (2012)"},{"issue":"2","key":"5_CR7","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11036-013-0489-0","volume":"19","author":"M Chen","year":"2014","unstructured":"Chen, M., Mao, S., Liu, Y.: Big data: a survey. Mob. Netw. Appl. 19(2), 171\u2013209 (2014)","journal-title":"Mob. Netw. Appl."},{"key":"5_CR8","volume-title":"DW 2.0: The Architecture for the Next Generation of Data Warehousing","author":"WH Inmon","year":"2010","unstructured":"Inmon, W.H., Strauss, D., Neushloss, G.: DW 2.0: The Architecture for the Next Generation of Data Warehousing. Morgan Kaufmann, San Francisco (2010)"},{"key":"5_CR9","volume-title":"Data Warehouse: From Architecture to Implementation","author":"B Devlin","year":"1996","unstructured":"Devlin, B., Cote, L.D.: Data Warehouse: From Architecture to Implementation. Addison-Wesley Longman Publishing Co., Inc., Boston (1996)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Simitisis, A., Vassiliadis, P., Skiadopoulos, S., Sellis, T.: Data warehouse refreshment (2007)","DOI":"10.4018\/978-1-59904-951-9.ch195"},{"issue":"1","key":"5_CR11","doi-asserted-by":"publisher","first-page":"174","DOI":"10.11591\/ijeecs.v3.i1.pp174-181","volume":"3","author":"A Amine","year":"2016","unstructured":"Amine, A., Daoud, R.A., Bouikhalene, B.: Efficiency comparaison and evaluation between two ETL extraction tools. Indonesian J. Electr. Eng. Comput. Sci. 3(1), 174\u2013181 (2016)","journal-title":"Indonesian J. Electr. Eng. Comput. Sci."},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Simitsis, A., Vassiliadis, P., Sellis, T.K.: Extraction-transformation-loading processes (2005)","DOI":"10.4018\/978-1-59140-560-3.ch041"},{"key":"5_CR13","unstructured":"Inmon, B.: Data Lake Architecture: Designing the Data Lake and Avoiding the Garbage Dump. Technics Publications (2016)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Hai, R., Geisler, S., Quix, C.: Constance: an intelligent data lake system. In: Proceedings of the 2016 International Conference on Management of Data, SIGMOD 2016, pp. 2097\u20132100. ACM, New York (2016)","DOI":"10.1145\/2882903.2899389"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Walker, C., Alrehamy, H.: Personal data lake with data gravity pull. In: 2015 IEEE Fifth International Conference on Big Data and Cloud Computing (BDCloud), pp. 160\u2013167. IEEE (2015)","DOI":"10.1109\/BDCloud.2015.62"},{"key":"5_CR16","unstructured":"Vernon, M.M., Ulicny, B., Bennett, D.: An information provider\u2019s wish list for a next generation big data end-to-end information system. In: CIDR (2015)"},{"issue":"2","key":"5_CR17","first-page":"17","volume":"18","author":"R Henry","year":"2015","unstructured":"Henry, R., Venkatraman, S.: Big data analytics the next big learning opportunity. J. Manage. Inf. Decis. Sci. 18(2), 17 (2015)","journal-title":"J. Manage. Inf. Decis. Sci."},{"key":"5_CR18","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/978-3-319-28031-8_48","volume-title":"Innovations in Bio-Inspired Computing and Applications","author":"PS Mathew","year":"2016","unstructured":"Mathew, P.S., Pillai, A.S.: Big data challenges and solutions in healthcare: a survey. In: Sn\u00e1\u0161el, V., Abraham, A., Kr\u00f6mer, P., Pant, M., Muda, A.K. (eds.) Innovations in Bio-Inspired Computing and Applications. AISC, vol. 424, pp. 543\u2013553. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-28031-8_48"},{"issue":"6","key":"5_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11280-017-0449-x","volume":"20","author":"H Li","year":"2017","unstructured":"Li, H., Wang, Y., Wang, H., Zhou, B.: Multi-window based ensemble learning for classification of imbalanced streaming data. World Wide Web 20(6), 1\u201319 (2017)","journal-title":"World Wide Web"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Kamal, R., Shah, M.A., Hanif, A., Ahmad, J.: Real-time opinion mining of twitter data using spring XD and hadoop. In: 2017 23rd International Conference on Automation and Computing (ICAC), pp. 1\u20134. IEEE (2017)","DOI":"10.23919\/IConAC.2017.8082091"},{"key":"5_CR21","unstructured":"Begum, N., Shankara, A.A.: Rectify and envision the server log data using apache flume. Int. J. Technol. Res. Eng. 3(9) (2016)"},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.pmcj.2015.10.014","volume":"28","author":"A Abbas","year":"2016","unstructured":"Abbas, A., Ali, M., Khan, M.U.S., Khan, S.U.: Personalized healthcare cloud services for disease risk assessment and wellness management using social media. Pervasive Mobile Comput. 28, 81\u201399 (2016)","journal-title":"Pervasive Mobile Comput."},{"key":"5_CR23","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.procs.2015.04.021","volume":"50","author":"J Archenaa","year":"2015","unstructured":"Archenaa, J., Anita, E.M.: A survey of big data analytics in healthcare and government. Procedia Comput. Sci. 50, 408\u2013413 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"5_CR24","unstructured":"Shaikh, S., Vora, D.: YARN versus MapReduce-a comparative study. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 1294\u20131297. IEEE (2016)"},{"key":"5_CR25","unstructured":"Patel, V., Adhil, M., Bhardwaj, T., Talukder, A.K.: Big data analytics of genomic and clinical data for diagnosis and prognosis of cancer. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 611\u2013615. IEEE (2015)"},{"issue":"11","key":"5_CR26","doi-asserted-by":"publisher","first-page":"2443","DOI":"10.4304\/jsw.7.11.2443-2449","volume":"7","author":"L Sun","year":"2012","unstructured":"Sun, L., Wang, H., Soar, J., Rong, C.: Purpose based access control for privacy protection in e-healthcare services. J. Softw. 7(11), 2443\u20132449 (2012)","journal-title":"J. Softw."},{"issue":"1","key":"5_CR27","first-page":"6","volume":"3","author":"J Li","year":"2008","unstructured":"Li, J., Wang, H., Jin, H., Yong, J.: Current developments of k-anonymous data releasing. Electron. J. Health Inform. 3(1), 6 (2008)","journal-title":"Electron. J. Health Inform."},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Sun, L., Wang, H., Yong, J., Wu, G.: Semantic access control for cloud computing based on e-healthcare. In: 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 512\u2013518. IEEE (2012)","DOI":"10.1109\/CSCWD.2012.6221866"},{"issue":"3","key":"5_CR29","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TKDE.2005.35","volume":"17","author":"H Wang","year":"2005","unstructured":"Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17(3), 425\u2013436 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"5_CR30","series-title":"Smart Innovation, Systems and Technologies","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-81-322-2538-6_16","volume-title":"Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics","author":"V Valliyappan","year":"2016","unstructured":"Valliyappan, V., Singh, P.: Hap: protecting the apache hadoop clusters with hadoop authentication process using kerberos. In: Nagar, A., Mohapatra, D.P., Chaki, N. (eds.) Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics. SIST, vol. 43, pp. 151\u2013161. Springer, New Delhi (2016). https:\/\/doi.org\/10.1007\/978-81-322-2538-6_16"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Shaw, S., Vermeulen, A.F., Gupta, A., Kjerrumgaard, D.: Hive security. In: Practical Hive, pp. 233\u2013243. Springer, New York (2016)","DOI":"10.1007\/978-1-4842-0271-5_10"},{"key":"5_CR32","unstructured":"Weston, J.: Support vector machine. Tutorial http:\/\/www.cs.columbia.edu\/~kathy\/cs4701\/documents\/jason_svm_tutorial.pdf . Accessed 01 Aug 2017"},{"issue":"4","key":"5_CR33","first-page":"35","volume":"4","author":"S Ghosh","year":"2013","unstructured":"Ghosh, S., Dubey, S.K.: Comparative analysis of K-means and fuzzy C-means algorithms. Int. J. Adv. Comput. Sci. Appl. 4(4), 35\u201339 (2013)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"4","key":"5_CR34","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1093\/comjnl\/bxr028","volume":"55","author":"X Sun","year":"2012","unstructured":"Sun, X., Wang, H., Li, J., Zhang, Y.: Satisfying privacy requirements before data anonymization. Comput. J. 55(4), 422\u2013437 (2012)","journal-title":"Comput. J."},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Strack, B., DeShazo, J.P., Gennings, C., Olmo, J.L., Ventura, S., Cios, K.J., Clore, J.N.: Impact of HbA1c measurement on hospital readmission rates: analysis of 70,000 clinical database patient records. BioMed Res. Int. 2014, 11 (2014)","DOI":"10.1155\/2014\/781670"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Katehakis, D.G., Tsiknakis, M.: Electronic health record. In: Wiley Encyclopedia of Biomedical Engineering (2006)","DOI":"10.1002\/9780471740360.ebs1440"},{"issue":"4","key":"5_CR37","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/JBHI.2016.2574857","volume":"21","author":"J Yoon","year":"2017","unstructured":"Yoon, J., Davtyan, C., van der Schaar, M.: Discovery and clinical decision support for personalized healthcare. IEEE J. Biomed. Health Inform. 21(4), 1133\u20131145 (2017)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Davis, D.A., Chawla, N.V., Blumm, N., Christakis, N., Barab\u00e1si, A.L.: Predicting individual disease risk based on medical history. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, pp. 769\u2013778. ACM (2008)","DOI":"10.1145\/1458082.1458185"},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Dentino, B., Davis, D., Chawla, N.V.: HealthcareND: leveraging EHR and care for prospective healthcare. In: Proceedings of the 1st ACM International Health Informatics Symposium, pp. 841\u2013844. ACM (2010)","DOI":"10.1145\/1882992.1883121"},{"key":"5_CR40","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.pmcj.2015.09.004","volume":"28","author":"P Calyam","year":"2016","unstructured":"Calyam, P., Mishra, A., Antequera, R.B., Chemodanov, D., Berryman, A., Zhu, K., Abbott, C., Skubic, M.: Synchronous big data analytics for personalized and remote physical therapy. Pervasive Mobile Comput. 28, 3\u201320 (2016)","journal-title":"Pervasive Mobile Comput."},{"key":"5_CR41","unstructured":"Barlow, S.: Comparing the three major approaches to healthcare data warehousing (2017)"},{"key":"5_CR42","unstructured":"Linn, L.A., Koo, M.B.: Blockchain for health data and its potential use in health it and health care related research. In: ONC\/NIST Use of Blockchain for Healthcare and Research Workshop, Gaithersburg, Maryland, United States: ONC\/NIST (2016)"}],"container-title":["Lecture Notes in Business Information Processing","Service Research and Innovation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76587-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T07:35:13Z","timestamp":1751441713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76587-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319765860","9783319765877"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76587-7_5","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2018]]}}}