Survey of Big Data Warehousing Techniques

被引:0
|
作者
Kaur, Jaspreet [1 ]
Shedge, Rajashree [1 ]
Joshi, Bharti [1 ]
机构
[1] Ramrao Adik Inst Technol, Navi Mumbai, India
关键词
Data warehousing; Hadoop; Unstructured; MapReduce;
D O I
10.1007/978-981-15-0146-3_45
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There is a growing need in the industry toward the development of new and sophisticated tools for storing the exponentially growing volume, velocity and variety of data, which is collectively referred to as big data. There has been a paradigm shift from traditional data warehousing techniques to inclusion of NoSQL technology in order to fulfill the requirements of big data. While Hadoop has powerful features, which is not a replacement to Data Warehouse, rather it is a complement. Data Warehouse is already good at processing structured data so when used in conjunction with Hadoop, it becomes a winning combination. Hadoop can be considered as one of the back ends of Data Warehouse for handling unstructured data. Hence there is research on enhancing existing Data Warehouse with new features that have been successful at handling big data, and most popular one among them is MapReduce. We discuss the different tools and techniques used for improving Data Warehouse by adding these features and discuss the limitations associated with them.
引用
收藏
页码:471 / 481
页数:11
相关论文
共 50 条
  • [31] Big data analytics deep learning techniques and applications: A survey
    Selmy, Hend A.
    Mohamed, Hoda K.
    Medhat, Walaa
    INFORMATION SYSTEMS, 2024, 120
  • [32] A Survey of Spatio-Temporal Data Warehousing
    Gomez, Leticia
    Kuijpers, Bart
    Moelans, Bart
    Vaisman, Alejandro
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2009, 5 (03) : 28 - 55
  • [33] Data warehousing and data mining techniques for intrusion detection systems
    Singhal, Anoop
    Jajodia, Sushil
    DISTRIBUTED AND PARALLEL DATABASES, 2006, 20 (02) : 149 - 166
  • [34] Data warehousing and data mining techniques for intrusion detection systems
    Anoop Singhal
    Sushil Jajodia
    Distributed and Parallel Databases, 2006, 20 : 149 - 166
  • [35] Data-intensive applications, challenges, techniques and technologies: A survey on Big Data
    Chen, C. L. Philip
    Zhang, Chun-Yang
    INFORMATION SCIENCES, 2014, 275 : 314 - 347
  • [36] A survey on cryptographic techniques for protecting big data security: present and forthcoming
    Siqi LU
    Jianhua ZHENG
    Zhenfu CAO
    Yongjuan WANG
    Chunxiang GU
    Science China(Information Sciences), 2022, 65 (10) : 73 - 106
  • [37] A survey on cryptographic techniques for protecting big data security: present and forthcoming
    Lu, Siqi
    Zheng, Jianhua
    Cao, Zhenfu
    Wang, Yongjuan
    Gu, Chunxiang
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (10)
  • [38] A comprehensive survey of anomaly detection techniques for high dimensional big data
    Srikanth Thudumu
    Philip Branch
    Jiong Jin
    Jugdutt (Jack) Singh
    Journal of Big Data, 7
  • [39] A survey: ICT enabled energy efficiency techniques for big data applications
    Sumedha Arora
    Anju Bala
    Cluster Computing, 2020, 23 : 775 - 796
  • [40] A comprehensive survey of anomaly detection techniques for high dimensional big data
    Thudumu, Srikanth
    Branch, Philip
    Jin, Jiong
    Singh, Jugdutt
    JOURNAL OF BIG DATA, 2020, 7 (01)