We accept

Data Vault in Data Warehouse: Advantages and Disadvantages

Applications, Implementation, Merits and Limitations of Data vault in Data warehouse

Abstract- Business companies face many obstacles in exploiting and studying data performed in diverse resources. Data vault is the latest data warehouse technique which caters the business needs of flexibility, scalability, agility and large level of data storage which the preceding existing models neglect to bestow. Simple data vault structures, applications of data vault to boost technology, merits and limitations of data vault are proposed in the review. Data vault 2. 0 a latest technique which can triumph over certain limits of data vault is also suggested.

Keywords-Data vault; Data vault 2. 0; Data Warehouse

Data warehouse is a subject-oriented, included, time-varying, non-volatile collection of data that is utilized mainly in organizational decision making. It really is a specially well prepared repository of data. While Building a data warehouse, aspects such as data modelling, management of business job, risk management, end user or corporation requirements must be taken into consideration. For many years, Data warehouse structures consisted of Inmon or Kimball methodology. Each technique design has its pros and cons but are unable to meet up with the requirements of handling large level of data handling and re-engineering of data.

Inmon stated that data warehouse is a duplicate of transactional data that is specially set up with the objective and evaluation and querying. It a data influenced model where in fact the data is loaded without knowing in prior an individual information. In this particular model data warehouse and the info marts are segregated and also have their own storage, scalability and traceability in response to the user requirements. It really is time variant, non-volatile, costly rather than user-friendly.

Kimball made an innovative approach by causing the info warehouse more user friendly by the concept of dimensional modelling. It is composed of facts and dimension tables which gives user the necessary information for decision making. The Kimball data warehouse is steady of data marts making the original cost minimal. The Kimball data warehouse is constant of data marts making the initial cost smaller.

With large amount of data from multiple sources and regular business guidelines changes, Inmon and Kimball data modelling methods become less effective. Hence a better evolved model of data vault is created by Dan linstedt.

The Data Vault is a detail oriented, historical traffic monitoring and uniquely linked set of normalized dining tables that support one or more functional areas of business. It is a hybrid strategy encompassing the best of breed between 3rd normal form (3NF) and superstar schema. The look makes the model effective to store large volumes of data and changes of business rules do not require changes in the data warehouse hence it is cheap and user friendly.

The data resources are in 3rd NF and data marts work in legend schema. The info vault components are Hubs, Links and Satellites. Hubs support the unique list of business secrets and depicting core ideas of business such as customer, sales and are vital to recognize and monitor their information. Business tips should have historical uniqueness. Links are the cable connections that relates two or more business secrets and other links. The hub imposes the links granularity in relation to the hyperlink. Satellite contain the descriptive data that provides context to hubs and links business secrets and contains only one parent desk. When data changes appear in data warehouse, the descriptive changes are captured in satellites.

Two major technological works is assessed where data vault is applied to increase the system and business shows:

1. Droid vault - a trusted data vault for android device and a assured platform that provides sensitive data coverage from destructive software's for data owners. The model has two tiers of data storage area, the green layer where the secure data are refined and the red levels that steps the unsecure data. Droid vault has three components 1. DPM keeps a secure channel for secure data transfer. The very sensitive data are encrypted prior to the data is sent from the droid vault to the android data file system. The Bridae module acts an software. The I/O component secures the user input and display. A unique open public/private key is set up for authentication which is onetime registered password in the droid vault for secure data copy to the untrusted android Operating-system users. The look of DV hence provides confidentiality and integrity of very sensitive data. The limitation of the model is: a secure environment provides limited safe-keeping hence the info is migrated to the untrusted android filesystem. This drawback requires additional extra encryption process in the droid vault.

2. Data vaults - data source technology for technological data file repository.

Scientific researches is need of productive technology to explore and deal with high volumes of data storage area which is speedily increasing. Hence a data vault technology for holding large quantities of scientific data is created. Metadata handled by workflow systems or the document names let research workers search for data. DBMS can plan this issue by finalizing information at the info storage space site, providing malleable query use to investigate and reduce information to TB of data. The restrictions of this strategy are 1. it is tiresome and costly to download the express of fine art DBMS and DMS won't support specific technological domain file formats. The solution to the problem in MongoDB data vault. The info vault components are: 1. the info vault wrapper facilitates communication with metadata external record repositories and data gain access to. The exclusive data warehouse composition is maintained by the data vault cache. The info vault optimizer queries the best query execution strategies. The data vault hold the data in its original place & format and parallelly allows transparent metadata and analysis, gain access to of data using query language. The main benefits is the business rules can be employed in advance prior to the actual launching of data. Hence data vault provides expanded functionality and overall flexibility.

  • Structural information is segregated from descriptive information for reasons of overall flexibility and avoidance of re-engineering in the case of a big change.
  • The Data Vault allows parallel launching of data and ideal for processing large amount of data in comparison with the previous available techniques.
  • The data are not processed or filtered. Change of data should never be done and can process large amounts of data.
  • Flexible, scalable and involved data model and agile ready and final exploitation of data is prohibited.
  • Data Vault is merely power individual accessible. Data in the Data Vault is not "cleansed or quality checked" and the advantages of data vault are indirect but very real.
  • Data backup is necessary for the business enterprise and even more up-front is necessary for long term payoff. The info vault architecture may be versatile and scalable but will not guarantee the reviews generated are fully correct.
  • Data Vault model presents many joins and integration problems also unstructured data can't be processed. Data must be produced into information BEFORE delivering to the business enterprise.
  • Data vault 1. 0 is without snowflake data model. The majority of source data typically aren't tracked by change hence forcing a re-load.
  • Metadata must be identified in column centered level for the business for storage area paradigm to make sense. As the intricacy of business guidelines increases the possibility of parallelism and scalability decreases.
  • Scalability lower will lead to more time use for amount of information that is exceeded for processing.

Data vault 2. 0 is the latest data warehousing strategy which really is a novel and increased version to triumph over certain downside of data vault 1. 0. The advantages are: 1) The must use of hash key as surrogate key permit the flexibility of data loading in parallel due to 3rd party between satellites therefore paving way for usage of unstructured data in data vaults. 2) Data Vault 2. 0 is zero dependency type architecture. The data across different can be signed up with easily, hence allowing data vault to be built-in multiple websites and can change better to changes.


Due to demand of producing large volumes of data and continuous changes in the business guidelines, data vault model is superior to Inmon and Kimball methodologies in conditions of overall flexibility, agility and scalability and cost. The data vault 2. 0 plays a critical role in lessening certain important disadvantages. Data vault technique should be more evolved to triumph over the current limits thus providing better business and individual solution.


The data vault strategy proves to be a fantastic solution for the data warehouse for reasons of agility, flexibility, scalability etc. The info vault design make the model extremely effective for holding large quantities of data. The technology applications such as droid vault and data vault for medical repositories have been modelled with use of data vault was benefitted in terms of security and storage and more. The info vault is advantageous but also has its limitations. Some of the important constraints are get over by the latest data vault2. 0 technique. The data vault restrictions should be triumph over effectively by understanding the business and individual needs and create more alternatives in a cost-effective way consistent with requirements.


  1. Stuart Lewis, Lorraine Beard, Mary McDerby, Robin Taylor, Thomas Higgins, Clarie Knowles, "Creating a Data Vault", The International Journal of Digital Curation, Vol 11, No 1 (2016)
  2. Milena Ivanova, Yaёiz Kargin, Martin Kersten, Stefan Manegold, Ying Zhang, Mihai Datcu, Daniela Espinoza Molina, "Data vaults: a databases welcome to methodical document repositories", IEEE, Computing in Research & Engineering ( Level: 15, Concern: 3, May-June 2013 ).
  3. Lamia Yessad, Aissa Labiod, "Comparative research of data warehouses modeling methods: Inmon, Kimball and Data Vault", IEEE, System Trustworthiness and Research (ICSRS).
  4. Xiaolei Li, Hong Hu, Guangdong Bai, "DroidVault: A Trusted Data Vault for Android os Devices", IEEE, Anatomist of Complex Computer Systems (ICECCS), 4-7 Aug. 2014.
  5. V. Jovanovic, D. Subotic, S. Mrdalj, "Data modeling styles in data warehousing", IEEE, Information and Communication Technology, Consumer electronics and Microelectronics (MIPRO)
  6. William Inmon, Derek Strauss, Genia Neushloss, "DW 2. 0: The Structures for the Next Era of Data Warehousing".
More than 7 000 students trust us to do their work
90% of customers place more than 5 orders with us
Special price $5 /page
Check the price
for your assignment