{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T05:12:56Z","timestamp":1774674776756,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s00607-020-00830-9","type":"journal-article","created":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T19:02:20Z","timestamp":1594234940000},"page":"2299-2329","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["IoT streaming data integration from multiple sources"],"prefix":"10.1007","volume":"102","author":[{"given":"Doan Quang","family":"Tu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2421-2214","authenticated-orcid":false,"given":"A. S. M.","family":"Kayes","sequence":"additional","affiliation":[]},{"given":"Wenny","family":"Rahayu","sequence":"additional","affiliation":[]},{"given":"Kinh","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,8]]},"reference":[{"key":"830_CR1","doi-asserted-by":"crossref","unstructured":"Tu DQ, Kayes A, Rahayu W, Nguyen K (2019) Isdi: A new window-based framework for integrating iot streaming data from multiple sources. In: International conference on advanced information networking and applications. Springer, New York, pp 498\u2013511","DOI":"10.1007\/978-3-030-15032-7_42"},{"key":"830_CR2","volume-title":"Understanding big data: analytics for enterprise class hadoop and streaming data","author":"P Zikopoulos","year":"2011","unstructured":"Zikopoulos P, Eaton C et al (2011) Understanding big data: analytics for enterprise class hadoop and streaming data. McGraw-Hill Osborne Media, New York"},{"issue":"2","key":"830_CR3","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s11704-013-3903-7","volume":"7","author":"J Chen","year":"2013","unstructured":"Chen J, Chen Y, Du X, Li C, Lu J, Zhao S et al (2013) Big data challenge: a data management perspective. Front Comput Sci 7(2):157\u2013164","journal-title":"Front Comput Sci"},{"key":"830_CR4","unstructured":"Harris GJ, Rago SA, Williams TH (2004) Distributed storage resource management in a storage area network. US Patent 6,826,580"},{"key":"830_CR5","doi-asserted-by":"crossref","unstructured":"Chakravarthy SK, Sudhakar N, Reddy ES, Subramanian DV, Shankar P (2018) Dimension reduction and storage optimization techniques for distributed and big data cluster environment. In: Soft computing and medical bioinformatics. Springer, New York, pp 47\u201354","DOI":"10.1007\/978-981-13-0059-2_6"},{"key":"830_CR6","unstructured":"McNeill N, Kardes H, Borthwick A (2012) Dynamic record blocking: efficient linking of massive databases in mapreduce. In: Proceedings of the 10th international workshop on quality in databases (QDB), pp 1\u20137"},{"issue":"1","key":"830_CR7","doi-asserted-by":"crossref","first-page":"1282","DOI":"10.14778\/1687627.1687771","volume":"2","author":"O Hassanzadeh","year":"2009","unstructured":"Hassanzadeh O, Chiang F, Lee HC, Miller RJ (2009) Framework for evaluating clustering algorithms in duplicate detection. Proc VLDB Endow 2(1):1282\u20131293","journal-title":"Proc VLDB Endow"},{"key":"830_CR8","unstructured":"Marinier P, Anepu BM, Pelletier G, Olesen RL (2015) Maintaining time alignment with multiple uplink carriers. US Patent 8,934,459"},{"key":"830_CR9","doi-asserted-by":"crossref","unstructured":"Qian Z, He Y, Su C, Wu Z, Zhu H, Zhang T, et\u00a0al. (2013) Timestream: Reliable stream computation in the cloud. In: Proceedings of the 8th ACM European conference on computer systems. ACM, pp 1\u201314","DOI":"10.1145\/2465351.2465353"},{"issue":"3","key":"830_CR10","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/2187671.2187677","volume":"44","author":"G Cugola","year":"2012","unstructured":"Cugola G, Margara A (2012) Processing flows of information: from data stream to complex event processing. ACM Comput Surv (CSUR) 44(3):15","journal-title":"ACM Comput Surv (CSUR)"},{"key":"830_CR11","doi-asserted-by":"crossref","unstructured":"Bifet A, Gavalda R (2007) Learning from time-changing data with adaptive windowing. In: Proceedings of the 2007 SIAM international conference on data mining. SIAM, pp 443\u2013448","DOI":"10.1137\/1.9781611972771.42"},{"key":"830_CR12","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1613\/jair.487","volume":"8","author":"J F\u00fcrnkranz","year":"1998","unstructured":"F\u00fcrnkranz J (1998) Integrative windowing. J Artif Intell Res 8:129\u2013164","journal-title":"J Artif Intell Res"},{"key":"830_CR13","doi-asserted-by":"crossref","unstructured":"Sarma AD, Dong XL, Halevy AY (2011) Uncertainty in data integration and dataspace support platforms. In: Schema matching and mapping. Springer, New York, pp 75\u2013108","DOI":"10.1007\/978-3-642-16518-4_4"},{"key":"830_CR14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-16518-4","volume-title":"Schema matching and mapping","author":"Z Bellahs\u00e8ne","year":"2011","unstructured":"Bellahs\u00e8ne Z, Bonifati A, Rahm E (2011) Schema matching and mapping. Springer, New York"},{"key":"830_CR15","doi-asserted-by":"crossref","first-page":"47456","DOI":"10.1109\/ACCESS.2020.2980006","volume":"8","author":"QT Doan","year":"2020","unstructured":"Doan QT, Kayes A, Rahayu W, Nguyen K (2020) Integration of iot streaming data with efficient indexing and storage optimization. IEEE Access 8:47456\u201347467","journal-title":"IEEE Access"},{"issue":"3","key":"830_CR16","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MC.2015.62","volume":"48","author":"VN Gudivada","year":"2015","unstructured":"Gudivada VN, Baeza-Yates RA, Raghavan VV (2015) Big data: promises and problems. IEEE Comput 48(3):20\u201323","journal-title":"IEEE Comput"},{"key":"830_CR17","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.datak.2017.01.001","volume":"108","author":"VC Storey","year":"2017","unstructured":"Storey VC, Song IY (2017) Big data technologies and management: what conceptual modeling can do. Data Knowl Eng 108:50\u201367","journal-title":"Data Knowl Eng"},{"key":"830_CR18","doi-asserted-by":"crossref","unstructured":"Dong XL, Srivastava D (2013) Big data integration. In: 2013 IEEE 29th international conference on data engineering (ICDE). IEEE, pp 1245\u20131248","DOI":"10.1109\/ICDE.2013.6544914"},{"key":"830_CR19","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.is.2016.12.003","volume":"65","author":"T Sagi","year":"2017","unstructured":"Sagi T, Gal A, Barkol O, Bergman R, Avram A (2017) Multi-source uncertain entity resolution: transforming holocaust victim reports into people. Inf Syst 65:124\u2013136","journal-title":"Inf Syst"},{"key":"830_CR20","unstructured":"Doan A, Domingos PM, Levy AY (2000) Learning source description for data integration. In: WebDB (informal proceedings), pp 81\u201386"},{"key":"830_CR21","doi-asserted-by":"crossref","unstructured":"Calbimonte JP, Corcho O, Gray AJ (2010) Enabling ontology-based access to streaming data sources. In: International semantic Web conference. Springer, New York, pp 96\u2013111","DOI":"10.1007\/978-3-642-17746-0_7"},{"issue":"2","key":"830_CR22","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1007\/s11192-015-1814-0","volume":"106","author":"C Daraio","year":"2016","unstructured":"Daraio C, Lenzerini M, Leporelli C, Moed HF, Naggar P, Bonaccorsi A et al (2016a) Data integration for research and innovation policy: an ontology-based data management approach. Scientometrics 106(2):857\u2013871","journal-title":"Scientometrics"},{"issue":"1","key":"830_CR23","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1007\/s11192-016-1913-6","volume":"108","author":"C Daraio","year":"2016","unstructured":"Daraio C, Lenzerini M, Leporelli C, Naggar P, Bonaccorsi A, Bartolucci A (2016b) The advantages of an ontology-based data management approach: openness, interoperability and data quality. Scientometrics 108(1):441\u2013455","journal-title":"Scientometrics"},{"issue":"3","key":"830_CR24","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/s10994-012-5320-9","volume":"90","author":"J Gama","year":"2013","unstructured":"Gama J, Sebasti\u00e3o R, Rodrigues PP (2013) On evaluating stream learning algorithms. Mach Learn 90(3):317\u2013346","journal-title":"Mach Learn"},{"key":"830_CR25","doi-asserted-by":"crossref","unstructured":"Pareek A, Khaladkar B, Sen R, Onat B, Nadimpalli V, Agarwal M, et\u00a0al. (2017) Striim: a streaming analytics platform for real-time business decisions. In: Proceedings of the international workshop on real-time business intelligence and analytics. ACM, pp 1\u20138","DOI":"10.1145\/3129292.3129294"},{"key":"830_CR26","doi-asserted-by":"crossref","unstructured":"Pareek A, Khaladkar B, Sen R, Onat B, Nadimpalli V, Lakshminarayanan M (2018) Real-time etl in striim. In: Proceedings of the international workshop on real-time business intelligence and analytics. ACM, p\u00a03","DOI":"10.1145\/3242153.3242157"},{"key":"830_CR27","doi-asserted-by":"crossref","first-page":"1626","DOI":"10.1016\/j.procs.2018.05.128","volume":"132","author":"MA Ahad","year":"2018","unstructured":"Ahad MA, Biswas R (2018) Dynamic merging based small file storage (dm-sfs) architecture for efficiently storing small size files in hadoop. Procedia Comput Sci 132:1626\u20131635","journal-title":"Procedia Comput Sci"},{"key":"830_CR28","doi-asserted-by":"crossref","unstructured":"Kayes A, Han J, Colman A (2012) Icaf: A context-aware framework for access control. In: Australasian conference on information security and privacy. Springer, New York, pp 442\u2013449","DOI":"10.1007\/978-3-642-31448-3_34"},{"key":"830_CR29","doi-asserted-by":"crossref","unstructured":"Kayes A, Han J, Colman A, Islam MS (2014) Relboss: a relationship-aware access control framework for software services. In: OTM confederated international conferences \u201dOn the Move to Meaningful Internet Systems\u201d. Springer, New York, pp 258\u2013276","DOI":"10.1007\/978-3-662-45563-0_15"},{"key":"830_CR30","doi-asserted-by":"crossref","unstructured":"Kayes A, Rahayu W, Dillon T, Chang E, Han J (2017) Context-aware access control with imprecise context characterization through a combined fuzzy logic and ontology-based approach. In: OTM confederated international conferences \u201dOn the Move to Meaningful Internet Systems\u201d. Springer, New York, pp 132\u2013153","DOI":"10.1007\/978-3-319-69462-7_10"},{"key":"830_CR31","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxy065","author":"A Kayes","year":"2018","unstructured":"Kayes A, Han J, Rahayu W, Dillon T, Islam S, Colman A (2018a) A policy model and framework for context-aware access control to information resources. Comput J. https:\/\/doi.org\/10.1093\/comjnl\/bxy065","journal-title":"Comput J"},{"key":"830_CR32","doi-asserted-by":"crossref","unstructured":"Kayes A, Rahayu W, Dillon T, Chang E (2018b) Accessing data from multiple sources through context-aware access control. In: TrustCom. IEEE, pp 551\u2013559","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00084"},{"key":"830_CR33","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.future.2018.10.036","volume":"93","author":"A Kayes","year":"2019","unstructured":"Kayes A, Rahayu W, Dillon T, Chang E, Han J (2019) Context-aware access control with imprecise context characterization for cloud-based data resources. Future Gener Comput Syst 93:237\u2013255","journal-title":"Future Gener Comput Syst"},{"key":"830_CR34","doi-asserted-by":"crossref","unstructured":"Savaglio C, Gerace P, Di\u00a0Fatta G, Fortino G (2019) Data mining at the iot edge. In: 2019 28th international conference on computer communication and networks (ICCCN). IEEE, pp 1\u20136","DOI":"10.1109\/ICCCN.2019.8846941"},{"issue":"4","key":"830_CR35","doi-asserted-by":"crossref","first-page":"26","DOI":"10.4018\/IJSSOE.2015100102","volume":"5","author":"L Belli","year":"2015","unstructured":"Belli L, Cirani S, Davoli L, Ferrari G, Melegari L, Mont\u00f3n M et al (2015) A scalable big stream cloud architecture for the internet of things. Int J Syst Serv-Orient Eng (IJSSOE) 5(4):26\u201353","journal-title":"Int J Syst Serv-Orient Eng (IJSSOE)"},{"key":"830_CR36","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1016\/j.ins.2019.10.069","volume":"513","author":"MM Hassan","year":"2020","unstructured":"Hassan MM, Gumaei A, Alsanad A, Alrubaian M, Fortino G (2020) A hybrid deep learning model for efficient intrusion detection in big data environment. Inf Sci 513:386\u2013396","journal-title":"Inf Sci"},{"issue":"6","key":"830_CR37","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1109\/TKDE.2004.14","volume":"16","author":"Q Li","year":"2004","unstructured":"Li Q, Moon B, Lopez I (2004) Skyline index for time series data. IEEE Trans Knowl Data Eng 16(6):669\u2013684","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"830_CR38","doi-asserted-by":"crossref","unstructured":"Ma Y, Rao J, Hu W, Meng X, Han X, Zhang Y et\u00a0al (2012) An efficient index for massive iot data in cloud environment. In: Proceedings of the 21st ACM international conference on information and knowledge management. ACM, pp 2129\u20132133","DOI":"10.1145\/2396761.2398587"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-020-00830-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-020-00830-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-020-00830-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T23:23:00Z","timestamp":1625700180000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-020-00830-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,8]]},"references-count":38,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["830"],"URL":"https:\/\/doi.org\/10.1007\/s00607-020-00830-9","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,8]]},"assertion":[{"value":"31 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}