Big Data and Data Security 2
Big Data and Data Security 2
Big Data and Data Security 2
Table of Content
Content Page No.
INTRODUCTION 3
BIG DATA INCLUDE BIG PRIVACY CONCERNS 3
GRAPPLING WITH CONCERNS OVER UAE SURVEILLANCE STATE 4
PREDICTIONS FOR BIG DATA PRIVACY IN UAE 4
Data privacy mandates will become more common. 4
Enterprises will profit from new large-scale data 5
DEVOLPING BIG DATA PRIVACY AND PROTECTION STRATEGIES 5
CONCLUSION AND FUTURE RESEARCH 6
REFERENCES 6
INTRODUCTION
Businesses must comprehend not only what happened but also what is happening now and in the
future. The collection of knowledge has accelerated since the advent of the Internet and the
information age (Padberg, 2015). Data is an important resource that can be organized or
unstructured. Data must be thoroughly examined before use. This knowledge is only valuable if
Page |3
developed. Consider data as crude oil that must be refined before it can be useful and used in
many ways. The ability to manage massive amounts of data from several sources has created
both new opportunities and challenges for business intelligence (Ram, et al., 2016). Structured
and unstructured data are two different types of data. In other words, it's easy to understand or
not. In an hour, Walmart deals in goods and services worth more than a hundred billion dollars
(Economist, 2010). Every day, new data in both structured and unstructured forms totals 2.5
quintillion bytes. Tien predicted in 2015 that data usage would reach 35 Zettabytes by 2025. See
also: (Arunachalam and colleagues, 2017). Internal process and decision-making changes can
help firms grasp current business trends and capitalize on new opportunities. It's easy to find
unstructured content on social media.
Social media usage by businesses can provide valuable customer insight (Nair & Narayanan,
2013). Facebook had 1.9 billion active users in March 2017 and 3 million posts every minute.
This is a 22% rise over last year. 42 percent of firms rely on social media (Zephoria, 2017). 500
million tweets per day from Twitter's 500 million active users (SMITH, 2016). In the UAE, 50%
of the population uses social media. Over 90% of today's data comes from social media sites like
YouTube, Twitter, and Facebook. Due to these massive and complex data sets, the BIG DATA
hypothesis was born. Big data has recently shown to be a priceless asset. Insights can be gained
from organized and unstructured data, as well as from publicly available online data.
To be successful in today's multi-cloud computing world, data owners must keep up with both
the increase of their data and the proliferation of policies. A privacy violation can result in large
fines and loss of market share for a company with more data spread across more regions. When it
comes to big data privacy, customers lack trust. More user data is required to "connect the dots."
Developing thorough personality profiles of people helps us understand them better as
individuals. Constantly updating and updating privacy and data protection policies is crucial to
maintaining consumer trust and compliance. Legacy systems and e-commerce continue to
generate massive amounts of data. Such as social media and IoT device streams provide new
(and expanding) data sources. Your massive data privacy approach must evolve to stay current.
As a result, consider the following:
What are your plans for the data you collect from customers and users?
To what extent and with what ramifications can you trust the data?
Data breaches and insider threats are becoming increasingly common. How are you going
to keep up with the rapid growth in data security?
When it comes to extracting value from your data, where do you draw the line between
keeping it secure and exposing it safely?
When doing business in several nations and regions, how do you stay compliant with
differing data privacy legislation, and how does that change depending on the kind or
origin of the data?
Page |4
In order to maintain your competitive edge, how can you leverage big data in a
transparent manner without disclosing your analytical "secret sauce?"
While the UAE is pushing for privacy laws, it's difficult to assess privacy in the UAE objectively
without taking into account how the government has failed to protect individuals' privacy within
its borders." In January 2019, Reuters reported on the UAE government's secret spy program,
Project Raven. Journalists, activists, and other UAE dissidents were targeted by the campaign.
Former NSA employees oversaw this project, which included cutting-edge cyberwarfare
technology known as Karma. Agents can use Karma to gain remote access to iPhones and their
contents, such as photos, SMS, and location data. According to the publication, Project Raven
spied on foreigners such as Americans and Emiratis. Increased control of how foreign
intelligence operatives use specialist cyberwarfare equipment has been recommended as a result.
A popular messaging app in the United Arab Emirates (where Skype and WhatsApp are banned),
was revealed by the New York Times in December 2019 to be a spy tool designed "to attempt to
track every conversation, movement, appointment, sound, and image of individuals who install it
on their phone." Additionally, executives from the app's parent company boasted on LinkedIn
about their algorithms' ability to detect individual faces in billions of video feeds, according to
the Times. ToTok was removed from Apple's app store due to public outcry, but it was
eventually reinstalled by Google, but millions of users had already downloaded it.
about storing and preserving data, as well as establishing and revising disclosure policies
and procedures.
Good data governance programs give firms the advantage of quickly identifying data-
related risks and rewards and acting decisively based on that information. These firms
will have a leg up on the competition.
As a result, traditional approaches of network and system-centric data security are no longer
adequate in the age of cloud computing. The impact of cloud computing on society has been
enormous (Casanovas et al., 2017). Protecting the privacy of large volumes of data should not be
delayed. You must incorporate it into your cloud integration and data management plan.
Organizations must first identify what sorts of data are needed and why, as well as who
owns the data and how it will be used, before putting data governance principles into
practice.
Automatic controls necessitate a massive amount of sensitive data on all big data
platforms, which artificial intelligence and machine learning can't handle. It is possible to
design and apply appropriate big data management guidelines as a result of these
findings.
Access rights and notifications are only possible if you have indexed, catalogued and
linked individual and entity data.
Data security resources and investments must be prioritized as your big data grows, as
well as methods for data protection and remediation must be established in order to
regularly assess your risk exposure for sensitive data.
Using automated, centralized big data privacy systems that integrate with native big data
tools like Cloudera Sentry, Amazon Macie, and Hortonworks Ranger will make
governing access to data faster and easier.
Scalable data protection capabilities are required to safeguard significant amounts of
large-scale data in non-production contexts such as development, analysis and production
environments, such as dynamic masking for large-scale data in these environments.
Identifying and communicating big data privacy risk indicators is a critical part of
monitoring and promoting audit readiness while also protecting sensitive information.
Big Data is influencing us. A tremendous impact on our lives has been and will be big data. By
2020, daily data collection should double. These sensors generate data that we utilize daily. So
on. The "Internet of Things" could collect data. Everything now generates data. A grid of various
devices and sensors collects environmental data. Today's Smart Home connects devices via a
vast internet network. Ambient light and proximity sensors offer intuitive dimming, allowing for
easy traffic maneuvering. These are just two examples of sensor evolution. BIG DATA IS ALSO
Page |6
CHANGING Big data research helps businesses target their marketing. Focus groups are
obsolete since Big Data allows organizations like McKinsey to analyses massive sample bases.
Consumers may save $700 billion by using personal location data, while businesses could save
half by adopting it. Big Data grows with time. Such a square-kilometer array telescope may
detect things like an elderly person's heart rate and poisons in the air we breathe. Research and
simulation now create petabytes of data. This information can be filtered and compacted because
to its boredom. It holds great promise for basic and practical research.
REFERENCES
[1] Padberg, M., 2015. Big Data and Business Intelligence: a data-driven strategy for e-
commerce organizations in the hotel industry, Netherlands: s.n.
[2] Economist, T., 2010. Data, data everywhere. [Online] Available at:
http://www.economist.com/node/15557443 [Accessed 2017 March 2017].
[3] Ram, J., Changyu.Zhang & Koronios, A., 2016. The implications of Big Data analytics
on Business Intelligence. Chennai, ICRTCSE, pp. 221-226.
[4] Arunachalam, D., Kumar, N. & Kawalek, J. P., 2017. Understanding big data analytics
capabilities in supply chain management: Unravelling the issues, challenges and implications for
practice Transportation Research.
[5] Casanovas, P., De Koker, L., Mendelson, D., & Watts, D. (2017). Regulation of Big Data:
Perspectives on strategy, policy, law and privacy. Health and Technology, 7(4), 335-349.
[6] Taylor, L. (2017). Safety in numbers? Group privacy and big data analytics in the developing
world. In Group privacy (pp. 13-36). Springer, Cham.
[7] Mawed, M., & Al-Hajj, A. (2019). Using big data to improve the performance management:
a case study from the UAE FM industry. Fac