Big Data and Data Security 2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Page |1

Big data and data security


Page |2

Table of Content
Content Page No.
INTRODUCTION 3
BIG DATA INCLUDE BIG PRIVACY CONCERNS 3
GRAPPLING WITH CONCERNS OVER UAE SURVEILLANCE STATE 4
PREDICTIONS FOR BIG DATA PRIVACY IN UAE 4
 Data privacy mandates will become more common. 4
 Enterprises will profit from new large-scale data 5
DEVOLPING BIG DATA PRIVACY AND PROTECTION STRATEGIES 5
CONCLUSION AND FUTURE RESEARCH 6
REFERENCES 6

INTRODUCTION

Businesses must comprehend not only what happened but also what is happening now and in the
future. The collection of knowledge has accelerated since the advent of the Internet and the
information age (Padberg, 2015). Data is an important resource that can be organized or
unstructured. Data must be thoroughly examined before use. This knowledge is only valuable if
Page |3

developed. Consider data as crude oil that must be refined before it can be useful and used in
many ways. The ability to manage massive amounts of data from several sources has created
both new opportunities and challenges for business intelligence (Ram, et al., 2016). Structured
and unstructured data are two different types of data. In other words, it's easy to understand or
not. In an hour, Walmart deals in goods and services worth more than a hundred billion dollars
(Economist, 2010). Every day, new data in both structured and unstructured forms totals 2.5
quintillion bytes. Tien predicted in 2015 that data usage would reach 35 Zettabytes by 2025. See
also: (Arunachalam and colleagues, 2017). Internal process and decision-making changes can
help firms grasp current business trends and capitalize on new opportunities. It's easy to find
unstructured content on social media.

Social media usage by businesses can provide valuable customer insight (Nair & Narayanan,
2013). Facebook had 1.9 billion active users in March 2017 and 3 million posts every minute.
This is a 22% rise over last year. 42 percent of firms rely on social media (Zephoria, 2017). 500
million tweets per day from Twitter's 500 million active users (SMITH, 2016). In the UAE, 50%
of the population uses social media. Over 90% of today's data comes from social media sites like
YouTube, Twitter, and Facebook. Due to these massive and complex data sets, the BIG DATA
hypothesis was born. Big data has recently shown to be a priceless asset. Insights can be gained
from organized and unstructured data, as well as from publicly available online data.

BIG DATA INCLUDE BIG PRIVACY CONCERNS

To be successful in today's multi-cloud computing world, data owners must keep up with both
the increase of their data and the proliferation of policies. A privacy violation can result in large
fines and loss of market share for a company with more data spread across more regions. When it
comes to big data privacy, customers lack trust. More user data is required to "connect the dots."
Developing thorough personality profiles of people helps us understand them better as
individuals. Constantly updating and updating privacy and data protection policies is crucial to
maintaining consumer trust and compliance. Legacy systems and e-commerce continue to
generate massive amounts of data. Such as social media and IoT device streams provide new
(and expanding) data sources. Your massive data privacy approach must evolve to stay current.
As a result, consider the following:

 What are your plans for the data you collect from customers and users?
 To what extent and with what ramifications can you trust the data?
 Data breaches and insider threats are becoming increasingly common. How are you going
to keep up with the rapid growth in data security?
 When it comes to extracting value from your data, where do you draw the line between
keeping it secure and exposing it safely?
 When doing business in several nations and regions, how do you stay compliant with
differing data privacy legislation, and how does that change depending on the kind or
origin of the data?
Page |4

 In order to maintain your competitive edge, how can you leverage big data in a
transparent manner without disclosing your analytical "secret sauce?"

GRAPPLING WITH CONCERNS OVER UAE SURVEILLANCE STATE

While the UAE is pushing for privacy laws, it's difficult to assess privacy in the UAE objectively
without taking into account how the government has failed to protect individuals' privacy within
its borders." In January 2019, Reuters reported on the UAE government's secret spy program,
Project Raven. Journalists, activists, and other UAE dissidents were targeted by the campaign.
Former NSA employees oversaw this project, which included cutting-edge cyberwarfare
technology known as Karma. Agents can use Karma to gain remote access to iPhones and their
contents, such as photos, SMS, and location data. According to the publication, Project Raven
spied on foreigners such as Americans and Emiratis. Increased control of how foreign
intelligence operatives use specialist cyberwarfare equipment has been recommended as a result.

A popular messaging app in the United Arab Emirates (where Skype and WhatsApp are banned),
was revealed by the New York Times in December 2019 to be a spy tool designed "to attempt to
track every conversation, movement, appointment, sound, and image of individuals who install it
on their phone." Additionally, executives from the app's parent company boasted on LinkedIn
about their algorithms' ability to detect individual faces in billions of video feeds, according to
the Times. ToTok was removed from Apple's app store due to public outcry, but it was
eventually reinstalled by Google, but millions of users had already downloaded it.

PREDICTIONS FOR BIG DATA PRIVACY IN UAE

1. Data privacy mandates will become more common.


More sensitive types of data will be stored for longer periods of time, increasing the
pressure on companies to be more transparent. Review their data collection techniques
and purposes to see what information they're collecting. For instance, the European
Union's General Data Protection Regulation (GDPR) (GDPR). Governments and
regulatory bodies are increasingly turning to the new regulatory oversight technique.
Individuals must be able to analyses, update, de-anonymize or even remove their personal
data completely from solutions for large-scale data privacy.
2. Enterprises will profit from new large-scale data analytics technologies that enable
them to do more in-depth analyses of historical data, discover new uses for
previously untapped data, and combine it with new data sources.
There are new historical associations that were previously unknown due to the
availability of previously unavailable big data analytics techniques and solutions. You
must have a complete picture of your data from every perspective available for customer
360 and analytics. Existing data must be authenticated and consent from entities for new
uses obtained, which causes problems. To keep your data private and maximize its worth,
you must constantly reevaluate four key data management tasks Collecting data; It's all
Page |5

about storing and preserving data, as well as establishing and revising disclosure policies
and procedures.
Good data governance programs give firms the advantage of quickly identifying data-
related risks and rewards and acting decisively based on that information. These firms
will have a leg up on the competition.

DEVOLPING BIG DATA PRIVACY AND PROTECTION STRATEGIES

As a result, traditional approaches of network and system-centric data security are no longer
adequate in the age of cloud computing. The impact of cloud computing on society has been
enormous (Casanovas et al., 2017). Protecting the privacy of large volumes of data should not be
delayed. You must incorporate it into your cloud integration and data management plan.

 Organizations must first identify what sorts of data are needed and why, as well as who
owns the data and how it will be used, before putting data governance principles into
practice.
 Automatic controls necessitate a massive amount of sensitive data on all big data
platforms, which artificial intelligence and machine learning can't handle. It is possible to
design and apply appropriate big data management guidelines as a result of these
findings.
 Access rights and notifications are only possible if you have indexed, catalogued and
linked individual and entity data.
 Data security resources and investments must be prioritized as your big data grows, as
well as methods for data protection and remediation must be established in order to
regularly assess your risk exposure for sensitive data.
 Using automated, centralized big data privacy systems that integrate with native big data
tools like Cloudera Sentry, Amazon Macie, and Hortonworks Ranger will make
governing access to data faster and easier.
 Scalable data protection capabilities are required to safeguard significant amounts of
large-scale data in non-production contexts such as development, analysis and production
environments, such as dynamic masking for large-scale data in these environments.
 Identifying and communicating big data privacy risk indicators is a critical part of
monitoring and promoting audit readiness while also protecting sensitive information.

CONCLUSION AND FUTURE SCOPE

Big Data is influencing us. A tremendous impact on our lives has been and will be big data. By
2020, daily data collection should double. These sensors generate data that we utilize daily. So
on. The "Internet of Things" could collect data. Everything now generates data. A grid of various
devices and sensors collects environmental data. Today's Smart Home connects devices via a
vast internet network. Ambient light and proximity sensors offer intuitive dimming, allowing for
easy traffic maneuvering. These are just two examples of sensor evolution. BIG DATA IS ALSO
Page |6

CHANGING Big data research helps businesses target their marketing. Focus groups are
obsolete since Big Data allows organizations like McKinsey to analyses massive sample bases.
Consumers may save $700 billion by using personal location data, while businesses could save
half by adopting it. Big Data grows with time. Such a square-kilometer array telescope may
detect things like an elderly person's heart rate and poisons in the air we breathe. Research and
simulation now create petabytes of data. This information can be filtered and compacted because
to its boredom. It holds great promise for basic and practical research.

REFERENCES

[1] Padberg, M., 2015. Big Data and Business Intelligence: a data-driven strategy for e-
commerce organizations in the hotel industry, Netherlands: s.n.

[2] Economist, T., 2010. Data, data everywhere. [Online] Available at:
http://www.economist.com/node/15557443 [Accessed 2017 March 2017].

[3] Ram, J., Changyu.Zhang & Koronios, A., 2016. The implications of Big Data analytics
on Business Intelligence. Chennai, ICRTCSE, pp. 221-226.

[4] Arunachalam, D., Kumar, N. & Kawalek, J. P., 2017. Understanding big data analytics
capabilities in supply chain management: Unravelling the issues, challenges and implications for
practice Transportation Research.

[5] Casanovas, P., De Koker, L., Mendelson, D., & Watts, D. (2017). Regulation of Big Data:
Perspectives on strategy, policy, law and privacy. Health and Technology, 7(4), 335-349.

[6] Taylor, L. (2017). Safety in numbers? Group privacy and big data analytics in the developing
world. In Group privacy (pp. 13-36). Springer, Cham.

[7] Mawed, M., & Al-Hajj, A. (2019). Using big data to improve the performance management:
a case study from the UAE FM industry. Fac

You might also like