SlideShare a Scribd company logo
1 of 4
Download to read offline
A study on Impact of Big Data analytics in Business
Economics
Pakalapati Venkatapathi Raju
3rd
year B.Tech, Department of Information Technology,
Hindustan Institute of Technology and Science,
#1,IT Expressway, Bay Range Campus, Padur, Chennai–
603103, Tamil Nadu, India.
18132005@student.hindustanuniv.ac.in
Dr. C.V. Suresh Babu
Professor, Department of Information Technology,
Hindustan Institute of Technology and Science,
#1,IT Expressway, Bay Range Campus, Padur, Chennai–
603103, Tamil Nadu, India.
pt.cvsuresh@hindustanuniv.ac.in
Abstract— The proposed study focuses mainly of improving
the security threat in the domain of business economics by using
big data analytics. Its is an survey paper which intensively give
review many published research papers in this domain and
identified the gap which is there in the previous method and try
to design a system to fill the gap.
Keywords— Bigdata, Economics, Security, Technology
I. INTRODUCTION
Economics in simple words is a study of relation between
production, consumption, and transfer of wealth. In
economics there is huge usage of raw data sets and huge
theoretical information about the productions, estimations and
the analyzation. In order to organize and interpret that data, we
need big data analytics to get a perfect approach. In business
economics there will be a huge scope for interpretation of data.
Hence for analyzing that data we need big data analytics in
business economics.
II. RATIONALE BACKGROUND:
The basic need for this study is:
 Unstructured nature of big data available in raw form
 Privacy and security violations
III. OBJECTIVES
Primary objective: To bring a culture of sorted big data to
avoid confusion which leads to miss interpretation of data. To
reduce the risk of data breaches and cyber-attacks that leads to
the breaching of sensible data
Secondary Objectives: Keep on improving and updating our
research on privacy and data sorting for the better
understanding of the big data economics even by the normal
individual with minimal knowledge on big data
IV. REVIEW OF LITERATURE
 Big data from “Man, machine, and material” three
elements’ interaction and fusion in cyberspace has brought
tremendous opportunities and brought many scientific
problems and challenges to the prevail in IT infrastructure,
machine processing, and computing power. (Rivera & van
der Meulen, 2014).
 The present development of massive data is additionally
facing many problems, but security and privacy issues are
one of the key issues by people recognized in recent years.
Among them, privacy issues have existed an extended
time.(Rivera & van der Meulen, 2014).
 In computational sciences, Big Data is a critical issue that
requires serious attention.
 Thus far, the essential landscapes of Big Data have not
been unified. Furthermore, Big Data cannot be processed
using existing technologies and methods. (Rivera & van
der Meulen, 2014).
 Therefore, the generation of incalculable data by the fields
of science, business, and society is a global problem. With
respect to data analytics, for instance, procedures and
standard tools have not been designed to search and
analyze large datasets. (Rivera & van der Meulen, 2014).
 As a result, organizations encounter early challenges in
creating, managing, and manipulating large datasets.
 Systems of data replication have also displayed some
security weaknesses with respect to the generation of
multiple copies, data governance, and policy.
 These policies define the data that are stored, analyzed,
and accessed. They also determine the relevance of these
data. To process unstructured data sources in Big Data
projects, concerns regarding the scalability, low latency,
and performance of data infrastructures and their data
centers must be addressed (Rivera & van der Meulen,
2014).
 Researchers, agencies, and organizations integrate the
collected raw data and increase their value through input
from individual program offices and scientific research
projects.
 The data are transformed from their initial state and are
stored in a value-added state, including web services.
 Neither a benchmark nor a globally accepted standard has
been set with respect to storing raw data and minimizing
data. The code generates the data along with selected
parameters. (Rivera & van der Meulen, 2014).
 Organizations in the European Union (EU) can process
individual data even without the permission of the owner
based on the legitimate interests of the organizations as
weighed against individual rights to privacy. In such
situations, individuals have the right to refuse treatment
according to compelling grounds of legitimacy.
 Similarly, the doctrine analyzed by the Federal Trade
Commission (FTC) is unjust because it considers
organizational benefits.
 A major risk in Big Data is data leakage, which threatens
privacy. Recent controversies regarding leaked documents
reveal the scope of large data collected and analyzed over
a wide range by the National Security Agency (NSA), as
well as other national security agencies.
 This situation publicly exposed the problematic balance
between privacy and the risk of opportunistic data
exploitation [92, 93]. In consideration of privacy, the
evolution of ecosystem data may be affected. (Rivera &
van der Meulen, 2014).
 Moreover, the balance of power held by the government,
businesses, and individuals has been disturbed, thus
resulting in racial profiling and other forms of inequity,
criminalization, and limited freedom. (Rivera & van der
Meulen, 2014).
 Therefore, perfectly balancing compensation risks and the
maintenance of privacy in data is presently the greatest
challenge of public policy. (Rivera & van der Meulen,
2014).
 In decision-making regarding major policies, avoiding this
process induces progressive legal crises. (Rivera & van der
Meulen, 2014).
 Each cohort addresses concerns regarding privacy
differently. For example, civil liberties represent the
pursuit of absolute power by the government. (Rivera &
van der Meulen, 2014).
 These liberties blame privacy for pornography and plane
accidents. According to Hawks privacy, no advantage is
compelling enough to offset the cost of great privacy.
However, lovers of data no longer consider the risk of
privacy as they search comprehensively for information.
Existing studies on privacy [92, 93] explore the risks posed
by large-scale data and group them into private, corporate,
and governmental concerns; nonetheless, they fail to
identify the benefits. (Rivera & van der Merlen, 2014).
 Rubinstein [95] proposed many frameworks to clarify the
risks of privacy to decision makers and induce action. As
a result, commercial enterprises and the government are
increasingly influenced by feedback regarding privacy
[96]. (Rivera & van der Meulen, 2014).
 The privacy perspective on Big Data has been significantly
advantageous as per cost-benefit analysis with adequate
tools. These benefits have been quantified by privacy
experts. (Rivera & van der Meulen, 2014).
 However, the social values of the described benefits may
be uncertain given the nature of the data. Nonetheless, the
mainstream benefits in privacy analysis remain in line with
the existing privacy doctrine authorized by the FTC to
prohibit unfair trade practices in the United States and to
protect the legitimate interests of the responsible party as
per the clause in the EU directive on data protection.
(Rivera & van der Meulen, 2014).
 To concentrate on shoddy trade practice, the FTC has
cautiously delineated its Section 5 powers.
Confidentiality: Confidentiality refers to distorted data
from theft. Insurance can usually be claimed by encryption
technology [104]. If the databases contain Big Data, the
encryption can then be classified into table, disk, and data
encryption. (Rivera & van der Meulen, 2014).
 Data encryption is conducted to minimize the granularity
of encryption, as well as for high security, flexibility, and
applicability/relevance. (Rivera & van der Meulen, 2014).
 Therefore, it is applicable for existing data. However, this
technology is limited by the high number of keys and the
complexity of key management. (Rivera & van der
Meulen, 2014).
 Thus far, satisfactory results have been obtained in this
field in terms of two broad categories: discussion of the
security model and of the encryption and calculation
methods and the mechanism of distributed keys. (Rivera
& van der Meulen, 2014).
 A particular aspect of Big Data security and privacy must
be related with the rise of the Internet of Things (IoT).
‘IoT, defined by Oxford1 as “a proposed development of
the Internet in which everyday objects have network
connectivity, allowing them to send and receive data”, is
already a reality – Gartner estimates that 26 billions (about
824 years) of IoT devices will be installed by 2020,
generating an incremental revenue of $300 billion (about
$920 per person in the US) (Rivera & van der Meulen,
2014).
 The immense increase in the number of connected devices
(cars, lighting systems, refrigerators, telephones, glasses,
traffic control systems, health monitoring devices,
SCADA systems, TVs, home security systems, home
automation systems, and many more) has led to
manufacturers to push to the market, in a brief period, a
large set of devices, cloud systems and mobile applications
to exploit this opportunity.
 While it presents tremendous benefits and opportunities
for end-users it also is responsible for security challenges.
Summary of Review of Literature
From the review of literature, we want to show the related
works which were done previously and taking that as
reference we proceeded the research on the points what we
have selected.
V. PROPOSED METHODOLGY
 There is no single magical solution to solve the identified
Big Data security and privacy challenges and traditional
security solutions, which are dedicated to protect lesser
amounts of static data, are not ad equated to the novel
requisites imposed by Big Data services (Cloud Security
Alliance, 2013).
 There is the need to understand how the collection of
substantial amounts of complex structured and
unstructured data can be protected. Non-authorized
access to that data to create new relations, combine
different data sources and make it available to malicious
users is a serious risk for Big Data.
 The basic and more common solution for this includes
encrypting everything to make data secure regardless
where the data resides (data center, computer, mobile
device, or any other).
 As Big Data grows and it’s processing gets faster, then
encryption, masking and tokenization are critical
elements for protecting sensitive data.
 Due to its characteristics, Big Data projects need to take a
holistic vision at security (Tankard, 2012).
 Big Data projects need to take into consideration the
identification of the different data sources, the origin, and
creators of data, as well as who can access the data.
 It is also necessary to conduct a correct classification to
identify critical data, and align with the organization
information security policy in terms of enforcing access
control and data handling policies. (RA Popa & Redfield,
2012).
 As a recommendation, different security mechanisms
should be closer to the data sources and data itself, to
provide security right at the origin of data, and
mechanisms of control and prevention on archiving, data
leakage prevention and access control should work
together (Kindervag, Balaouras, Hill, & Mak, 2012).
 The new Big Data security solutions should extend the
secure perimeter from the enterprise to the public cloud
(Juels & Oprea, 2013). ❖In addition, similar mechanisms
to the ones used in (Luo, Lin, Zhang, & Zukerman, 2013)
can be used to mitigate distributed denial-of service
(DDoS) attacks launched against Big Data infrastructures.
 Also, a Big Data security and privacy is necessary to
ensure data trustworthiness throughout the entire data
lifecycle – from data collection to usage.
 The personalization feature of some Big Data services and
its impact on the user privacy is discussed in (Hasan,
Habegger, Brunie, Bennani, & Damiani, 2013).
 They discuss these issues in the backdrop of EEXCESS,
a concrete project aimed to both provide elevated level
recommendations and to respect user privacy. A recent
work describes proposed privacy extensions to UML to
help software engineers to quickly visualize privacy
requirements, and design them into Big Data applications
(Jutla, Bodorik, & Ali, 2013).
 While trying to take the most of Big Data, in terms of
security and privacy, it becomes mandatory that
mechanisms that address legal requirements about data
handling, need to be met.
 Secure encryption technology must be employed to
protect all the confidential data (Personally Identifiable
Information (PII), Protected Health Information (PHI)
and Intellectual Property (IP) and careful cryptographic
material (keys) access management policies, need to be
put in place, to ensure the correct locking and unlocking
of data – this is particularly important for data stored.
 In order to be successful these mechanisms need to be
transparent to the end-user and have minimal impact of
the performance and scalability of data (software and
hardware-based encryptions mechanisms are to be
considered) (Advantech, 2013).
 As previously referred, traditional encryption and
anonymization of data are not adequate to solve Big Data
problems. They are adequate to protect static information,
but are not adequate when data computation is involved
(MIT, 2014).
 Therefore, other techniques, allowing specific and
targeted data computation while keeping the data secret,
need to be used. Secure Function Evaluation (SFE)
(Lindell & Pinkas, 2002), Fully Homomorphic
Encryption (FHE) (Gentry, 2009) and Functional
Encryption (FE) (Goldwasser et al., 2014), and partition
of data on non-communicating data centers, can help
solving the limitations of traditional security techniques.
 Homomorphic encryption is a form of encryption which
allows specific types of computations (e.g. RSA public
key encryption algorithm) to be carried out on ciphertext
and generate an encrypted result which, when decrypted,
matches the result of operations performed on the
plaintext (Gentry, 2010).
 Fully homomorphic encryption has numerous
applications, as referred in (Van Dijk, Gentry, Halevi, &
Vaikuntanathan, 2010).
 The homomorphic encryption also enables searching on
encrypted data - a user stores encrypted files on a remote
file server and can later have the server retrieve only files
that (when decrypted) satisfy some Boolean constraint,
even though the server cannot decrypt the files on its own.
More broadly, the fully homomorphic encryption
improves the efficiency of secure multiparty computation.
 An important security and privacy challenge for Big Data
is related with the storage and processing of encrypted
data. Running queries against an encrypted database is a
basic security requirement for secure Big Data however it
is a challenging one.
 This raises questions such as a) is the database encrypted
with a single or multiple key; b) does the database needs
to be decrypted prior to running the query; c) do the
queries need to be also encrypted; d) who as the
permissions to decrypt the database; and many more.
 Recently a system that was developed at MIT, provides
answers to some of these questions. Crypt DB (Double
Bubble) allows researchers to run database queries over
encrypted data (Ra Popa & Redfield, 2011)
 Trustworthy applications that intent to query encrypted
data will pass those queries to a Crypt DB proxy (that sits
between the application and the database) that rewrites
those queries in a specific way so that they can be run
against the encrypted database.
 The database returns the encrypted results back to the
proxy, which holds a passkey and will decrypt the results,
sending the definitive answer back to the application.
Crypt DB supports numerous forms of encryption
schemes that allow diverse types of operations on the data
(RA Popa & Redfield, 2012).
 Based on Crypt DB, Google has developed the Encrypted
Big Query Client that will allow encrypted big queries
against their Big Query service that enables super, SQL-
like queries against append-only tables, using the
processing power of Google's infrastructure (Google,
2014).
 Apart from more specific security recommendations, it is
also important to consider the security of the IT
infrastructure itself. One of the common security practices
is to place security controls at the edge of the networks
however, if an attacker violates this security perimeter it
will have access to all the data within it. (RA Popa &
Redfield, 2012).
 Therefore, an innovative approach is necessary to move
those security controls about the data (or add additional
ones).
 Monitoring, analyzing, and learning from data usage and
access is also an important aspect to continuously
improve security of the data holding infrastructure and
leverage the already existing security solutions
(Kindervag et al., 2012; Kindervag, Wang, Balaouras, &
Coit, 2011).
VI. FUTURE SCOPE OF THE STUDY
In future we want to make this as reference for someone
who wants to find a better solution for the above problems
what we have mentioned.
VII. CONCLUSION
Big data can yield extremely useful information, it also
presents new challenges. especially, big data present a crucial
opportunity to extend value and performance for us. one
among the new challenges within the big data era is personal
privacy preserving. Big data privacy has become a crucial
issue since it's directly associated with customers. This paper
has described the concept of massive data, privacy preserving,
specific challenges issues, and a few big data privacy-
preserving techniques, also emphasized laws and regulations’
importance to unravel big data privacy-preserving problem.
ACKNOWLEDGMENT
We thank all our Faculty members of our Department and
our classmates and other anonymous reviewers for their
valuable comments on our draft paper.
DISCLOSURE STATEMENT
No potential conflict of interest was reported by the
authors.
REFERENCES
[1] Thomas.H. davenport, How big data is important fall 2012,
https://www.hbs.edu/ris/Publication%20Files/SMR-How-Big-Data-
Is-Different_782ad61f-8e5f-4b1e-b79f-83f33c903455.pdf
[2] Challenges and opportunities with big data,
https://dl.acm.org/doi/abs/10.14778/2367502.2367572, Alexandros
Labrinidis, University of Pittsburgh, Pittsburgh, PA, HV V Jagadish,
University of Michigan, Ann Arbor, MI 2012
[3] Big Data. Nature,
http://www.nature.com/news/specials/bigdata/index.html, Sep 2008.
[4] Data, data everywhere. The Economist
http://www.economist.com/node/15557443, Feb 2010.
[5] D. Agrawal, P. Bernstein, E. Bertino, S. Davidson, U. Dayal, M.
Franklin, J. Gehrke, L. Haas, A. Halevy, J. Han, H. V. Jagadish, A.
Labroids, S. Madden, Y. Papakonstantinou, J. M. Patel, R.
Ramakrishnan, K. Ross, C. Shahabi, D. Suciu, S. Vaithyanathan, and
J. Widom. Challenges and Opportunities with Big Data -- A
community white paper developed by leading researchers across the
United States. http://cra.org/ccc/docs/init/bigdatawhitepaper pdf, Mar
2012.
[6] Trends in big data analytics journal,
https://www.sciencedirect.com/science/article/pii/S074373151400005
7 , July 2014

More Related Content

What's hot

IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET Journal
 
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata PrivacyTwo-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacydbpublications
 
IRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in IndustriesIRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in IndustriesIRJET Journal
 
Data Mining in the World of BIG Data-A Survey
Data Mining in the World of BIG Data-A SurveyData Mining in the World of BIG Data-A Survey
Data Mining in the World of BIG Data-A SurveyEditor IJCATR
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
 
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...IJERDJOURNAL
 
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...ijcseit
 
RESEARCH IN BIG DATA – AN OVERVIEW
RESEARCH IN BIG DATA – AN OVERVIEWRESEARCH IN BIG DATA – AN OVERVIEW
RESEARCH IN BIG DATA – AN OVERVIEWieijjournal
 
Data Science For Social Good: Tackling the Challenge of Homelessness
Data Science For Social Good: Tackling the Challenge of HomelessnessData Science For Social Good: Tackling the Challenge of Homelessness
Data Science For Social Good: Tackling the Challenge of HomelessnessAnita Luthra
 
hariri2019.pdf
hariri2019.pdfhariri2019.pdf
hariri2019.pdfAkuhuruf
 
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...IJNSA Journal
 
Issues, challenges, and solutions
Issues, challenges, and solutionsIssues, challenges, and solutions
Issues, challenges, and solutionscsandit
 
A Survey on Big Data Mining Challenges
A Survey on Big Data Mining ChallengesA Survey on Big Data Mining Challenges
A Survey on Big Data Mining ChallengesEditor IJMTER
 
DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...
DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...
DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...csandit
 
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...IJECEIAES
 
IABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspectiveIABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspectiveMateusz Maj
 
Impact of big data congestion in IT: An adaptive knowledgebased Bayesian network
Impact of big data congestion in IT: An adaptive knowledgebased Bayesian networkImpact of big data congestion in IT: An adaptive knowledgebased Bayesian network
Impact of big data congestion in IT: An adaptive knowledgebased Bayesian networkIJECEIAES
 

What's hot (17)

IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
 
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata PrivacyTwo-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
 
IRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in IndustriesIRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in Industries
 
Data Mining in the World of BIG Data-A Survey
Data Mining in the World of BIG Data-A SurveyData Mining in the World of BIG Data-A Survey
Data Mining in the World of BIG Data-A Survey
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
 
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
 
RESEARCH IN BIG DATA – AN OVERVIEW
RESEARCH IN BIG DATA – AN OVERVIEWRESEARCH IN BIG DATA – AN OVERVIEW
RESEARCH IN BIG DATA – AN OVERVIEW
 
Data Science For Social Good: Tackling the Challenge of Homelessness
Data Science For Social Good: Tackling the Challenge of HomelessnessData Science For Social Good: Tackling the Challenge of Homelessness
Data Science For Social Good: Tackling the Challenge of Homelessness
 
hariri2019.pdf
hariri2019.pdfhariri2019.pdf
hariri2019.pdf
 
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...
 
Issues, challenges, and solutions
Issues, challenges, and solutionsIssues, challenges, and solutions
Issues, challenges, and solutions
 
A Survey on Big Data Mining Challenges
A Survey on Big Data Mining ChallengesA Survey on Big Data Mining Challenges
A Survey on Big Data Mining Challenges
 
DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...
DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...
DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...
 
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
Misusability Measure Based Sanitization of Big Data for Privacy Preserving Ma...
 
IABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspectiveIABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspective
 
Impact of big data congestion in IT: An adaptive knowledgebased Bayesian network
Impact of big data congestion in IT: An adaptive knowledgebased Bayesian networkImpact of big data congestion in IT: An adaptive knowledgebased Bayesian network
Impact of big data congestion in IT: An adaptive knowledgebased Bayesian network
 

Similar to Impact of big data analytics in business economics

A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...ijcseit
 
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...ijcseit
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsIRJET Journal
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020Jessica Graf
 
Privacy Issues in Data-Driven Health Care
Privacy Issues in Data-Driven Health CarePrivacy Issues in Data-Driven Health Care
Privacy Issues in Data-Driven Health CareDr. Mustafa Değerli
 
Semantic Web Investigation within Big Data Context
Semantic Web Investigation within Big Data ContextSemantic Web Investigation within Big Data Context
Semantic Web Investigation within Big Data ContextMurad Daryousse
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxRunning head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxcowinhelen
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Securityijceronline
 
Security and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile DevicesSecurity and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile DevicesIOSRjournaljce
 
The literature and write report on information system security part 1 of 5 p...
The literature and write report on information system security  part 1 of 5 p...The literature and write report on information system security  part 1 of 5 p...
The literature and write report on information system security part 1 of 5 p...raufik tajuddin
 

Similar to Impact of big data analytics in business economics (20)

A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
 
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
Privacy Issues in Data-Driven Health Care
Privacy Issues in Data-Driven Health CarePrivacy Issues in Data-Driven Health Care
Privacy Issues in Data-Driven Health Care
 
Big Data Ethics
Big Data EthicsBig Data Ethics
Big Data Ethics
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
Semantic Web Investigation within Big Data Context
Semantic Web Investigation within Big Data ContextSemantic Web Investigation within Big Data Context
Semantic Web Investigation within Big Data Context
 
Big data survey
Big data surveyBig data survey
Big data survey
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxRunning head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Security
 
WPCCS 16 Presentation
WPCCS 16 PresentationWPCCS 16 Presentation
WPCCS 16 Presentation
 
Security and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile DevicesSecurity and Privacy of Big Data in Mobile Devices
Security and Privacy of Big Data in Mobile Devices
 
The literature and write report on information system security part 1 of 5 p...
The literature and write report on information system security  part 1 of 5 p...The literature and write report on information system security  part 1 of 5 p...
The literature and write report on information system security part 1 of 5 p...
 

More from Dr. C.V. Suresh Babu (20)

Data analytics with R
Data analytics with RData analytics with R
Data analytics with R
 
Association rules
Association rulesAssociation rules
Association rules
 
Clustering
ClusteringClustering
Clustering
 
Classification
ClassificationClassification
Classification
 
Blue property assumptions.
Blue property assumptions.Blue property assumptions.
Blue property assumptions.
 
Introduction to regression
Introduction to regressionIntroduction to regression
Introduction to regression
 
DART
DARTDART
DART
 
Mycin
MycinMycin
Mycin
 
Expert systems
Expert systemsExpert systems
Expert systems
 
Dempster shafer theory
Dempster shafer theoryDempster shafer theory
Dempster shafer theory
 
Bayes network
Bayes networkBayes network
Bayes network
 
Bayes' theorem
Bayes' theoremBayes' theorem
Bayes' theorem
 
Knowledge based agents
Knowledge based agentsKnowledge based agents
Knowledge based agents
 
Rule based system
Rule based systemRule based system
Rule based system
 
Formal Logic in AI
Formal Logic in AIFormal Logic in AI
Formal Logic in AI
 
Production based system
Production based systemProduction based system
Production based system
 
Game playing in AI
Game playing in AIGame playing in AI
Game playing in AI
 
Diagnosis test of diabetics and hypertension by AI
Diagnosis test of diabetics and hypertension by AIDiagnosis test of diabetics and hypertension by AI
Diagnosis test of diabetics and hypertension by AI
 
A study on “impact of artificial intelligence in covid19 diagnosis”
A study on “impact of artificial intelligence in covid19 diagnosis”A study on “impact of artificial intelligence in covid19 diagnosis”
A study on “impact of artificial intelligence in covid19 diagnosis”
 
A study on “impact of artificial intelligence in covid19 diagnosis”
A study on “impact of artificial intelligence in covid19 diagnosis”A study on “impact of artificial intelligence in covid19 diagnosis”
A study on “impact of artificial intelligence in covid19 diagnosis”
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Impact of big data analytics in business economics

  • 1. A study on Impact of Big Data analytics in Business Economics Pakalapati Venkatapathi Raju 3rd year B.Tech, Department of Information Technology, Hindustan Institute of Technology and Science, #1,IT Expressway, Bay Range Campus, Padur, Chennai– 603103, Tamil Nadu, India. 18132005@student.hindustanuniv.ac.in Dr. C.V. Suresh Babu Professor, Department of Information Technology, Hindustan Institute of Technology and Science, #1,IT Expressway, Bay Range Campus, Padur, Chennai– 603103, Tamil Nadu, India. pt.cvsuresh@hindustanuniv.ac.in Abstract— The proposed study focuses mainly of improving the security threat in the domain of business economics by using big data analytics. Its is an survey paper which intensively give review many published research papers in this domain and identified the gap which is there in the previous method and try to design a system to fill the gap. Keywords— Bigdata, Economics, Security, Technology I. INTRODUCTION Economics in simple words is a study of relation between production, consumption, and transfer of wealth. In economics there is huge usage of raw data sets and huge theoretical information about the productions, estimations and the analyzation. In order to organize and interpret that data, we need big data analytics to get a perfect approach. In business economics there will be a huge scope for interpretation of data. Hence for analyzing that data we need big data analytics in business economics. II. RATIONALE BACKGROUND: The basic need for this study is:  Unstructured nature of big data available in raw form  Privacy and security violations III. OBJECTIVES Primary objective: To bring a culture of sorted big data to avoid confusion which leads to miss interpretation of data. To reduce the risk of data breaches and cyber-attacks that leads to the breaching of sensible data Secondary Objectives: Keep on improving and updating our research on privacy and data sorting for the better understanding of the big data economics even by the normal individual with minimal knowledge on big data IV. REVIEW OF LITERATURE  Big data from “Man, machine, and material” three elements’ interaction and fusion in cyberspace has brought tremendous opportunities and brought many scientific problems and challenges to the prevail in IT infrastructure, machine processing, and computing power. (Rivera & van der Meulen, 2014).  The present development of massive data is additionally facing many problems, but security and privacy issues are one of the key issues by people recognized in recent years. Among them, privacy issues have existed an extended time.(Rivera & van der Meulen, 2014).  In computational sciences, Big Data is a critical issue that requires serious attention.  Thus far, the essential landscapes of Big Data have not been unified. Furthermore, Big Data cannot be processed using existing technologies and methods. (Rivera & van der Meulen, 2014).  Therefore, the generation of incalculable data by the fields of science, business, and society is a global problem. With respect to data analytics, for instance, procedures and standard tools have not been designed to search and analyze large datasets. (Rivera & van der Meulen, 2014).  As a result, organizations encounter early challenges in creating, managing, and manipulating large datasets.  Systems of data replication have also displayed some security weaknesses with respect to the generation of multiple copies, data governance, and policy.  These policies define the data that are stored, analyzed, and accessed. They also determine the relevance of these data. To process unstructured data sources in Big Data projects, concerns regarding the scalability, low latency, and performance of data infrastructures and their data centers must be addressed (Rivera & van der Meulen, 2014).  Researchers, agencies, and organizations integrate the collected raw data and increase their value through input from individual program offices and scientific research projects.  The data are transformed from their initial state and are stored in a value-added state, including web services.  Neither a benchmark nor a globally accepted standard has been set with respect to storing raw data and minimizing data. The code generates the data along with selected parameters. (Rivera & van der Meulen, 2014).  Organizations in the European Union (EU) can process individual data even without the permission of the owner based on the legitimate interests of the organizations as weighed against individual rights to privacy. In such situations, individuals have the right to refuse treatment according to compelling grounds of legitimacy.  Similarly, the doctrine analyzed by the Federal Trade Commission (FTC) is unjust because it considers organizational benefits.  A major risk in Big Data is data leakage, which threatens privacy. Recent controversies regarding leaked documents reveal the scope of large data collected and analyzed over a wide range by the National Security Agency (NSA), as well as other national security agencies.  This situation publicly exposed the problematic balance between privacy and the risk of opportunistic data exploitation [92, 93]. In consideration of privacy, the evolution of ecosystem data may be affected. (Rivera & van der Meulen, 2014).
  • 2.  Moreover, the balance of power held by the government, businesses, and individuals has been disturbed, thus resulting in racial profiling and other forms of inequity, criminalization, and limited freedom. (Rivera & van der Meulen, 2014).  Therefore, perfectly balancing compensation risks and the maintenance of privacy in data is presently the greatest challenge of public policy. (Rivera & van der Meulen, 2014).  In decision-making regarding major policies, avoiding this process induces progressive legal crises. (Rivera & van der Meulen, 2014).  Each cohort addresses concerns regarding privacy differently. For example, civil liberties represent the pursuit of absolute power by the government. (Rivera & van der Meulen, 2014).  These liberties blame privacy for pornography and plane accidents. According to Hawks privacy, no advantage is compelling enough to offset the cost of great privacy. However, lovers of data no longer consider the risk of privacy as they search comprehensively for information. Existing studies on privacy [92, 93] explore the risks posed by large-scale data and group them into private, corporate, and governmental concerns; nonetheless, they fail to identify the benefits. (Rivera & van der Merlen, 2014).  Rubinstein [95] proposed many frameworks to clarify the risks of privacy to decision makers and induce action. As a result, commercial enterprises and the government are increasingly influenced by feedback regarding privacy [96]. (Rivera & van der Meulen, 2014).  The privacy perspective on Big Data has been significantly advantageous as per cost-benefit analysis with adequate tools. These benefits have been quantified by privacy experts. (Rivera & van der Meulen, 2014).  However, the social values of the described benefits may be uncertain given the nature of the data. Nonetheless, the mainstream benefits in privacy analysis remain in line with the existing privacy doctrine authorized by the FTC to prohibit unfair trade practices in the United States and to protect the legitimate interests of the responsible party as per the clause in the EU directive on data protection. (Rivera & van der Meulen, 2014).  To concentrate on shoddy trade practice, the FTC has cautiously delineated its Section 5 powers. Confidentiality: Confidentiality refers to distorted data from theft. Insurance can usually be claimed by encryption technology [104]. If the databases contain Big Data, the encryption can then be classified into table, disk, and data encryption. (Rivera & van der Meulen, 2014).  Data encryption is conducted to minimize the granularity of encryption, as well as for high security, flexibility, and applicability/relevance. (Rivera & van der Meulen, 2014).  Therefore, it is applicable for existing data. However, this technology is limited by the high number of keys and the complexity of key management. (Rivera & van der Meulen, 2014).  Thus far, satisfactory results have been obtained in this field in terms of two broad categories: discussion of the security model and of the encryption and calculation methods and the mechanism of distributed keys. (Rivera & van der Meulen, 2014).  A particular aspect of Big Data security and privacy must be related with the rise of the Internet of Things (IoT). ‘IoT, defined by Oxford1 as “a proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data”, is already a reality – Gartner estimates that 26 billions (about 824 years) of IoT devices will be installed by 2020, generating an incremental revenue of $300 billion (about $920 per person in the US) (Rivera & van der Meulen, 2014).  The immense increase in the number of connected devices (cars, lighting systems, refrigerators, telephones, glasses, traffic control systems, health monitoring devices, SCADA systems, TVs, home security systems, home automation systems, and many more) has led to manufacturers to push to the market, in a brief period, a large set of devices, cloud systems and mobile applications to exploit this opportunity.  While it presents tremendous benefits and opportunities for end-users it also is responsible for security challenges. Summary of Review of Literature From the review of literature, we want to show the related works which were done previously and taking that as reference we proceeded the research on the points what we have selected. V. PROPOSED METHODOLGY  There is no single magical solution to solve the identified Big Data security and privacy challenges and traditional security solutions, which are dedicated to protect lesser amounts of static data, are not ad equated to the novel requisites imposed by Big Data services (Cloud Security Alliance, 2013).  There is the need to understand how the collection of substantial amounts of complex structured and unstructured data can be protected. Non-authorized access to that data to create new relations, combine different data sources and make it available to malicious users is a serious risk for Big Data.  The basic and more common solution for this includes encrypting everything to make data secure regardless where the data resides (data center, computer, mobile device, or any other).  As Big Data grows and it’s processing gets faster, then encryption, masking and tokenization are critical elements for protecting sensitive data.  Due to its characteristics, Big Data projects need to take a holistic vision at security (Tankard, 2012).  Big Data projects need to take into consideration the identification of the different data sources, the origin, and creators of data, as well as who can access the data.  It is also necessary to conduct a correct classification to identify critical data, and align with the organization information security policy in terms of enforcing access control and data handling policies. (RA Popa & Redfield, 2012).  As a recommendation, different security mechanisms
  • 3. should be closer to the data sources and data itself, to provide security right at the origin of data, and mechanisms of control and prevention on archiving, data leakage prevention and access control should work together (Kindervag, Balaouras, Hill, & Mak, 2012).  The new Big Data security solutions should extend the secure perimeter from the enterprise to the public cloud (Juels & Oprea, 2013). ❖In addition, similar mechanisms to the ones used in (Luo, Lin, Zhang, & Zukerman, 2013) can be used to mitigate distributed denial-of service (DDoS) attacks launched against Big Data infrastructures.  Also, a Big Data security and privacy is necessary to ensure data trustworthiness throughout the entire data lifecycle – from data collection to usage.  The personalization feature of some Big Data services and its impact on the user privacy is discussed in (Hasan, Habegger, Brunie, Bennani, & Damiani, 2013).  They discuss these issues in the backdrop of EEXCESS, a concrete project aimed to both provide elevated level recommendations and to respect user privacy. A recent work describes proposed privacy extensions to UML to help software engineers to quickly visualize privacy requirements, and design them into Big Data applications (Jutla, Bodorik, & Ali, 2013).  While trying to take the most of Big Data, in terms of security and privacy, it becomes mandatory that mechanisms that address legal requirements about data handling, need to be met.  Secure encryption technology must be employed to protect all the confidential data (Personally Identifiable Information (PII), Protected Health Information (PHI) and Intellectual Property (IP) and careful cryptographic material (keys) access management policies, need to be put in place, to ensure the correct locking and unlocking of data – this is particularly important for data stored.  In order to be successful these mechanisms need to be transparent to the end-user and have minimal impact of the performance and scalability of data (software and hardware-based encryptions mechanisms are to be considered) (Advantech, 2013).  As previously referred, traditional encryption and anonymization of data are not adequate to solve Big Data problems. They are adequate to protect static information, but are not adequate when data computation is involved (MIT, 2014).  Therefore, other techniques, allowing specific and targeted data computation while keeping the data secret, need to be used. Secure Function Evaluation (SFE) (Lindell & Pinkas, 2002), Fully Homomorphic Encryption (FHE) (Gentry, 2009) and Functional Encryption (FE) (Goldwasser et al., 2014), and partition of data on non-communicating data centers, can help solving the limitations of traditional security techniques.  Homomorphic encryption is a form of encryption which allows specific types of computations (e.g. RSA public key encryption algorithm) to be carried out on ciphertext and generate an encrypted result which, when decrypted, matches the result of operations performed on the plaintext (Gentry, 2010).  Fully homomorphic encryption has numerous applications, as referred in (Van Dijk, Gentry, Halevi, & Vaikuntanathan, 2010).  The homomorphic encryption also enables searching on encrypted data - a user stores encrypted files on a remote file server and can later have the server retrieve only files that (when decrypted) satisfy some Boolean constraint, even though the server cannot decrypt the files on its own. More broadly, the fully homomorphic encryption improves the efficiency of secure multiparty computation.  An important security and privacy challenge for Big Data is related with the storage and processing of encrypted data. Running queries against an encrypted database is a basic security requirement for secure Big Data however it is a challenging one.  This raises questions such as a) is the database encrypted with a single or multiple key; b) does the database needs to be decrypted prior to running the query; c) do the queries need to be also encrypted; d) who as the permissions to decrypt the database; and many more.  Recently a system that was developed at MIT, provides answers to some of these questions. Crypt DB (Double Bubble) allows researchers to run database queries over encrypted data (Ra Popa & Redfield, 2011)  Trustworthy applications that intent to query encrypted data will pass those queries to a Crypt DB proxy (that sits between the application and the database) that rewrites those queries in a specific way so that they can be run against the encrypted database.  The database returns the encrypted results back to the proxy, which holds a passkey and will decrypt the results, sending the definitive answer back to the application. Crypt DB supports numerous forms of encryption schemes that allow diverse types of operations on the data (RA Popa & Redfield, 2012).  Based on Crypt DB, Google has developed the Encrypted Big Query Client that will allow encrypted big queries against their Big Query service that enables super, SQL- like queries against append-only tables, using the processing power of Google's infrastructure (Google, 2014).  Apart from more specific security recommendations, it is also important to consider the security of the IT infrastructure itself. One of the common security practices is to place security controls at the edge of the networks however, if an attacker violates this security perimeter it will have access to all the data within it. (RA Popa & Redfield, 2012).  Therefore, an innovative approach is necessary to move those security controls about the data (or add additional ones).  Monitoring, analyzing, and learning from data usage and access is also an important aspect to continuously improve security of the data holding infrastructure and leverage the already existing security solutions (Kindervag et al., 2012; Kindervag, Wang, Balaouras, & Coit, 2011).
  • 4. VI. FUTURE SCOPE OF THE STUDY In future we want to make this as reference for someone who wants to find a better solution for the above problems what we have mentioned. VII. CONCLUSION Big data can yield extremely useful information, it also presents new challenges. especially, big data present a crucial opportunity to extend value and performance for us. one among the new challenges within the big data era is personal privacy preserving. Big data privacy has become a crucial issue since it's directly associated with customers. This paper has described the concept of massive data, privacy preserving, specific challenges issues, and a few big data privacy- preserving techniques, also emphasized laws and regulations’ importance to unravel big data privacy-preserving problem. ACKNOWLEDGMENT We thank all our Faculty members of our Department and our classmates and other anonymous reviewers for their valuable comments on our draft paper. DISCLOSURE STATEMENT No potential conflict of interest was reported by the authors. REFERENCES [1] Thomas.H. davenport, How big data is important fall 2012, https://www.hbs.edu/ris/Publication%20Files/SMR-How-Big-Data- Is-Different_782ad61f-8e5f-4b1e-b79f-83f33c903455.pdf [2] Challenges and opportunities with big data, https://dl.acm.org/doi/abs/10.14778/2367502.2367572, Alexandros Labrinidis, University of Pittsburgh, Pittsburgh, PA, HV V Jagadish, University of Michigan, Ann Arbor, MI 2012 [3] Big Data. Nature, http://www.nature.com/news/specials/bigdata/index.html, Sep 2008. [4] Data, data everywhere. The Economist http://www.economist.com/node/15557443, Feb 2010. [5] D. Agrawal, P. Bernstein, E. Bertino, S. Davidson, U. Dayal, M. Franklin, J. Gehrke, L. Haas, A. Halevy, J. Han, H. V. Jagadish, A. Labroids, S. Madden, Y. Papakonstantinou, J. M. Patel, R. Ramakrishnan, K. Ross, C. Shahabi, D. Suciu, S. Vaithyanathan, and J. Widom. Challenges and Opportunities with Big Data -- A community white paper developed by leading researchers across the United States. http://cra.org/ccc/docs/init/bigdatawhitepaper pdf, Mar 2012. [6] Trends in big data analytics journal, https://www.sciencedirect.com/science/article/pii/S074373151400005 7 , July 2014