SlideShare a Scribd company logo
What is Big Data?

Any data which is humungous in size and incomparable to the data getting stored in traditional data
bases. Big data spans three dimensions -

    1. Volume - Enterprises are awash with ever-growing data of all types, easily amassing
       terabytes—even petabytes—of information.
    2. Velocity - Sometimes 2 minutes is too late. For time-sensitive processes such as catching
       fraud, big data must be used as it streams into your enterprise in order to maximize its value.
    3. Variety- Big data is any type of data - structured and unstructured data such as text, sensor
       data, audio, video, click streams, log files and more.

For our country, India, one of the major question pertaining to the Big data is - Why is India’s UID
Aadhaar a Big Data challenge and opportunity?

What is Aadhaar UID ?

Aadhaar is a 12 digit individual identification number issued by the Unique Identification Authority of
India on behalf of the Government of India. This number will serve as a proof of identity and address,
anywhere in India. Any individual, irrespective of age and gender, who is a resident in India and
satisfies the verification process laid down by the UIDAI can enrol for Aadhaar.

Linking a population of 1.2B, across 640,000 villages is vision and that is UID-Aadhaar. It gives
Unique identity to all the people. The scale of the project is incomparable to any other project taken by
any agency state or private anywhere in the world. Nandan Nilekani summed it up immaculately ”The
goal, says Mr Nilekani, is to help India cope with the past decade's expansion of welfare provision, the
fastest in its history: “it is essentially about better public services”.

How Aadhaar UID is essentially the Big Data ?

The scope of UID is to capture 12B finger print, 1.2B photograps,1.2 B eye scan. The file size for
each individual would be 5Mb and when this data is collated for 1.2B people it would require
petabytes for storage capability only.

Another challenging part of implementing UID is that the Aadhaar team wants to ensure non-
duplication of identity, thus the data has to be compared with the old records every time a new UID is
created. Till date, UID of India (UIDAI) has issued approximately 25 crore UIDs. Also, on a daily basis,
the UIDAI issues over 1 million Aadhar cards. This means that each day, 1 million records have to be
checked against the existing database of 25 crore IDs. This is only going to get larger every day. Also,
imagine in future as more and more of Government department start using the platform to
authenticate the stake holders, the number of queries on the UID data would go up exponentially. The
queries would demand faster response time. Hence data categorization in storage and analytical
retrieval becomes important. The search would not filter through the data bank but would look at
categories to get the result which would make the system leaner, meaner and faster.

Aadhaar has all the 3Vs of the Big data: Volume, Variability and Velocity. The size of the data is
huge and it is estimated that this database will be ten times larger than the largest existing biometric
database, which is created by FBI from the US. And hence Aadhaar's UID qualifies to be a big
data.

Opportunities for India

Big data analytics is the process of examining large amounts of data of a variety of types to uncover
hidden patterns and other useful information. Such information can provide competitive advantages
over rival organizations and result in business benefits, such as more effective marketing and
increased revenue.

In a country where 60% lives under $2 a day, 75% literacy, <3% pays income tax, < 20% banking,
800 million telecom subscribers, 200-300 million migrant workers UID could be the giant leap towards
better public life. As suggested in the 12th 5 year plan Aadhaar would play a significant role in
achieving a faster, sustainable and more inclusive growth. Benefits of UID seem countless, few
mentioned below -

    1.   Public Distribution System
    2.   MGNREGA
    3.   Education
    4.   Health Sector
    5.   Women Empowerment

India’s GDP for F11-12 was approx 1900 billion dollars. We spend 2% of the GDP on direct subsidies
which is suppose to dwindle to 1.75% in the next 3 years. 35-40 billion dollars are spent through PDS
to aid various communities in India. Subsidies are in the form of food distribution, fertilizer distribution,
loan waiver etc. It is anticipated that the system efficiency is 60-70% and the balance is eroding away
through leak in the system. If the PDS is linked though Aadhaar to a bank account then the size of the
distribution system would shrink to a level where we would accountability in the system. A quick
calculation indicates that we were planning to save 12.5% in the next 3 years and with the
implementation of Aadhaar in the PDS we save almost 30-40% of the subsidies. This is what
reformation is about. Similarly, in Mahatma Gandhi National Rural Employment Guarantee Scheme
the loss of payment/leakages amount to around 12% on the account of ghost workers can be plugged
through wage disbursement using Aadhaar-enabled bank accounts.

 In India, men often manage financial resources that belong to women. By requiring the woman's
presence, Aadhaar helps her exercise her right and empowers women. UID could help build a GIS-
compatible health information system, and establish nationwide surveillance and diagnosis facilities
for service and research on infectious diseases.

Going forward, as more government-based systems access this platform (UID's big database) to
authenticate their customers, the number of authentication-based queries will also shoot up
exponentially. The possibilities are limitless given that the platform’s usage is limited to the
imagination of government agencies who can develop innovative applications on top of the platform.
From providing insurance to the poor, ensuring healthcare to the bottom of the pyramid and providing
banking facilities to the unbanked population, UID can be the game changer that a country like India
wants today.

More Related Content

What's hot

Uid management-system
Uid management-systemUid management-system
Uid management-system
majorravi
 
Aadhar card
Aadhar cardAadhar card
Aadhar card
Megha Gaur
 
AADHAR Card- Database Creation
AADHAR Card- Database CreationAADHAR Card- Database Creation
AADHAR Card- Database Creation
Basil John
 
Rise of Applied Artificial Intelligence in India
Rise of Applied Artificial Intelligence in IndiaRise of Applied Artificial Intelligence in India
Rise of Applied Artificial Intelligence in India
Manish Singhal
 
Aadhar card
Aadhar cardAadhar card
Aadhar card
TRIPLE S PORTFOLIO
 
Big data
Big dataBig data
Big data
Astha Jagetiya
 
iSPIRT’s Official Response to the Draft Drone Rules 2021
iSPIRT’s Official Response to the Draft Drone Rules 2021iSPIRT’s Official Response to the Draft Drone Rules 2021
iSPIRT’s Official Response to the Draft Drone Rules 2021
ProductNation/iSPIRT
 
Unique ID Authority of India, Design and Cloud Connection
Unique ID Authority of India, Design and Cloud ConnectionUnique ID Authority of India, Design and Cloud Connection
Unique ID Authority of India, Design and Cloud Connection
Suhas Kelkar
 
Aadhar
AadharAadhar
Aadhar
nikhar29
 
Digital Chhattisgarh
Digital ChhattisgarhDigital Chhattisgarh
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
Singhania2015
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
LATHA H C
 
Aadhaar (Identity) Innovation ideas
Aadhaar (Identity) Innovation ideasAadhaar (Identity) Innovation ideas
Aadhaar (Identity) Innovation ideas
Shrikant Karwa
 
BBS-248 Artificial Intelligence (AI) for Financial Services
BBS-248 Artificial Intelligence (AI) for Financial ServicesBBS-248 Artificial Intelligence (AI) for Financial Services
BBS-248 Artificial Intelligence (AI) for Financial Services
Ozgur Karakaya
 
Aadhaar- complete guide to get your card
Aadhaar- complete guide to get your cardAadhaar- complete guide to get your card
Aadhaar- complete guide to get your card
Faydabook
 
Hashtag Banking
Hashtag BankingHashtag Banking
Hashtag Banking
IRJET Journal
 
Applied Artificial Intelligence Digest 2017 Review
Applied Artificial Intelligence Digest 2017 ReviewApplied Artificial Intelligence Digest 2017 Review
Applied Artificial Intelligence Digest 2017 Review
BootstrapLabs
 

What's hot (20)

Uid management-system
Uid management-systemUid management-system
Uid management-system
 
Aadhar card
Aadhar cardAadhar card
Aadhar card
 
AADHAR Card- Database Creation
AADHAR Card- Database CreationAADHAR Card- Database Creation
AADHAR Card- Database Creation
 
Uid
UidUid
Uid
 
Rise of Applied Artificial Intelligence in India
Rise of Applied Artificial Intelligence in IndiaRise of Applied Artificial Intelligence in India
Rise of Applied Artificial Intelligence in India
 
Shrov Infoystem
Shrov InfoystemShrov Infoystem
Shrov Infoystem
 
Aadhar card
Aadhar cardAadhar card
Aadhar card
 
Big data
Big dataBig data
Big data
 
iSPIRT’s Official Response to the Draft Drone Rules 2021
iSPIRT’s Official Response to the Draft Drone Rules 2021iSPIRT’s Official Response to the Draft Drone Rules 2021
iSPIRT’s Official Response to the Draft Drone Rules 2021
 
Aadhaar ppt
Aadhaar ppt Aadhaar ppt
Aadhaar ppt
 
Unique ID Authority of India, Design and Cloud Connection
Unique ID Authority of India, Design and Cloud ConnectionUnique ID Authority of India, Design and Cloud Connection
Unique ID Authority of India, Design and Cloud Connection
 
Aadhar
AadharAadhar
Aadhar
 
Digital Chhattisgarh
Digital ChhattisgarhDigital Chhattisgarh
Digital Chhattisgarh
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
Aadhaar (Identity) Innovation ideas
Aadhaar (Identity) Innovation ideasAadhaar (Identity) Innovation ideas
Aadhaar (Identity) Innovation ideas
 
BBS-248 Artificial Intelligence (AI) for Financial Services
BBS-248 Artificial Intelligence (AI) for Financial ServicesBBS-248 Artificial Intelligence (AI) for Financial Services
BBS-248 Artificial Intelligence (AI) for Financial Services
 
Aadhaar- complete guide to get your card
Aadhaar- complete guide to get your cardAadhaar- complete guide to get your card
Aadhaar- complete guide to get your card
 
Hashtag Banking
Hashtag BankingHashtag Banking
Hashtag Banking
 
Applied Artificial Intelligence Digest 2017 Review
Applied Artificial Intelligence Digest 2017 ReviewApplied Artificial Intelligence Digest 2017 Review
Applied Artificial Intelligence Digest 2017 Review
 

Similar to Big data and UID

Big data in India
Big data in IndiaBig data in India
Big data in India
Sanjay Abraham
 
Aadhaar
AadhaarAadhaar
Aadhaar- National Identity proof
Aadhaar- National Identity proofAadhaar- National Identity proof
Aadhaar- National Identity proof
National Management Olympiad
 
Igniting Hundreds of Experiments: How India’s digital infrastructure will ush...
Igniting Hundreds of Experiments: How India’s digital infrastructure will ush...Igniting Hundreds of Experiments: How India’s digital infrastructure will ush...
Igniting Hundreds of Experiments: How India’s digital infrastructure will ush...
ProductNation/iSPIRT
 
How Data and IT are Changing the Face of Digital India
How Data and IT are Changing the Face of Digital IndiaHow Data and IT are Changing the Face of Digital India
How Data and IT are Changing the Face of Digital India
eGov magazine
 
Redseer_GZ_DPI REPORT.pdf
Redseer_GZ_DPI REPORT.pdfRedseer_GZ_DPI REPORT.pdf
Redseer_GZ_DPI REPORT.pdf
RedSeer
 
Use of Big Data in Government Sector
Use of Big Data in Government SectorUse of Big Data in Government Sector
Use of Big Data in Government Sector
ijtsrd
 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment (SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
Priyanka Aash
 
Nandan Nilekani: Identity, Payments, Data empowerment 2019
Nandan Nilekani: Identity, Payments, Data empowerment 2019Nandan Nilekani: Identity, Payments, Data empowerment 2019
Nandan Nilekani: Identity, Payments, Data empowerment 2019
ProductNation/iSPIRT
 
Digital Lending in India
Digital Lending in IndiaDigital Lending in India
Digital Lending in India
Sam Ghosh
 
Aadhar project
Aadhar project Aadhar project
Aadhar project
Abhilash Chandra Pradhan
 
The Digital Universe in 2020 - India
The Digital Universe in 2020 - IndiaThe Digital Universe in 2020 - India
The Digital Universe in 2020 - India
EMC
 
Business Analytics In India
Business Analytics In IndiaBusiness Analytics In India
Business Analytics In Indiatushar kumar
 
Building For A Billion
Building For A BillionBuilding For A Billion
Building For A Billion
ProductNation/iSPIRT
 
ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)
ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)
ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)
IJCSEA Journal
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
IJCSEA Journal
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
IJCSEA Journal
 
ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)
ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)
ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)
IJCSEA Journal
 
Digitization of healthcare industry
Digitization of healthcare industryDigitization of healthcare industry
Digitization of healthcare industry
Aayush Rastogi
 

Similar to Big data and UID (20)

Big data in India
Big data in IndiaBig data in India
Big data in India
 
uid
uiduid
uid
 
Aadhaar
AadhaarAadhaar
Aadhaar
 
Aadhaar- National Identity proof
Aadhaar- National Identity proofAadhaar- National Identity proof
Aadhaar- National Identity proof
 
Igniting Hundreds of Experiments: How India’s digital infrastructure will ush...
Igniting Hundreds of Experiments: How India’s digital infrastructure will ush...Igniting Hundreds of Experiments: How India’s digital infrastructure will ush...
Igniting Hundreds of Experiments: How India’s digital infrastructure will ush...
 
How Data and IT are Changing the Face of Digital India
How Data and IT are Changing the Face of Digital IndiaHow Data and IT are Changing the Face of Digital India
How Data and IT are Changing the Face of Digital India
 
Redseer_GZ_DPI REPORT.pdf
Redseer_GZ_DPI REPORT.pdfRedseer_GZ_DPI REPORT.pdf
Redseer_GZ_DPI REPORT.pdf
 
Use of Big Data in Government Sector
Use of Big Data in Government SectorUse of Big Data in Government Sector
Use of Big Data in Government Sector
 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment (SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
 
Nandan Nilekani: Identity, Payments, Data empowerment 2019
Nandan Nilekani: Identity, Payments, Data empowerment 2019Nandan Nilekani: Identity, Payments, Data empowerment 2019
Nandan Nilekani: Identity, Payments, Data empowerment 2019
 
Digital Lending in India
Digital Lending in IndiaDigital Lending in India
Digital Lending in India
 
Aadhar project
Aadhar project Aadhar project
Aadhar project
 
The Digital Universe in 2020 - India
The Digital Universe in 2020 - IndiaThe Digital Universe in 2020 - India
The Digital Universe in 2020 - India
 
Business Analytics In India
Business Analytics In IndiaBusiness Analytics In India
Business Analytics In India
 
Building For A Billion
Building For A BillionBuilding For A Billion
Building For A Billion
 
ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)
ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)
ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
 
ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)
ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)
ORGAN DONATION MANAGEMENT SYSTEM (PROJECT: ODMS)
 
Digitization of healthcare industry
Digitization of healthcare industryDigitization of healthcare industry
Digitization of healthcare industry
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Big data and UID

  • 1. What is Big Data? Any data which is humungous in size and incomparable to the data getting stored in traditional data bases. Big data spans three dimensions - 1. Volume - Enterprises are awash with ever-growing data of all types, easily amassing terabytes—even petabytes—of information. 2. Velocity - Sometimes 2 minutes is too late. For time-sensitive processes such as catching fraud, big data must be used as it streams into your enterprise in order to maximize its value. 3. Variety- Big data is any type of data - structured and unstructured data such as text, sensor data, audio, video, click streams, log files and more. For our country, India, one of the major question pertaining to the Big data is - Why is India’s UID Aadhaar a Big Data challenge and opportunity? What is Aadhaar UID ? Aadhaar is a 12 digit individual identification number issued by the Unique Identification Authority of India on behalf of the Government of India. This number will serve as a proof of identity and address, anywhere in India. Any individual, irrespective of age and gender, who is a resident in India and satisfies the verification process laid down by the UIDAI can enrol for Aadhaar. Linking a population of 1.2B, across 640,000 villages is vision and that is UID-Aadhaar. It gives Unique identity to all the people. The scale of the project is incomparable to any other project taken by any agency state or private anywhere in the world. Nandan Nilekani summed it up immaculately ”The goal, says Mr Nilekani, is to help India cope with the past decade's expansion of welfare provision, the fastest in its history: “it is essentially about better public services”. How Aadhaar UID is essentially the Big Data ? The scope of UID is to capture 12B finger print, 1.2B photograps,1.2 B eye scan. The file size for each individual would be 5Mb and when this data is collated for 1.2B people it would require petabytes for storage capability only. Another challenging part of implementing UID is that the Aadhaar team wants to ensure non- duplication of identity, thus the data has to be compared with the old records every time a new UID is created. Till date, UID of India (UIDAI) has issued approximately 25 crore UIDs. Also, on a daily basis, the UIDAI issues over 1 million Aadhar cards. This means that each day, 1 million records have to be checked against the existing database of 25 crore IDs. This is only going to get larger every day. Also, imagine in future as more and more of Government department start using the platform to authenticate the stake holders, the number of queries on the UID data would go up exponentially. The queries would demand faster response time. Hence data categorization in storage and analytical retrieval becomes important. The search would not filter through the data bank but would look at categories to get the result which would make the system leaner, meaner and faster. Aadhaar has all the 3Vs of the Big data: Volume, Variability and Velocity. The size of the data is huge and it is estimated that this database will be ten times larger than the largest existing biometric database, which is created by FBI from the US. And hence Aadhaar's UID qualifies to be a big data. Opportunities for India Big data analytics is the process of examining large amounts of data of a variety of types to uncover hidden patterns and other useful information. Such information can provide competitive advantages
  • 2. over rival organizations and result in business benefits, such as more effective marketing and increased revenue. In a country where 60% lives under $2 a day, 75% literacy, <3% pays income tax, < 20% banking, 800 million telecom subscribers, 200-300 million migrant workers UID could be the giant leap towards better public life. As suggested in the 12th 5 year plan Aadhaar would play a significant role in achieving a faster, sustainable and more inclusive growth. Benefits of UID seem countless, few mentioned below - 1. Public Distribution System 2. MGNREGA 3. Education 4. Health Sector 5. Women Empowerment India’s GDP for F11-12 was approx 1900 billion dollars. We spend 2% of the GDP on direct subsidies which is suppose to dwindle to 1.75% in the next 3 years. 35-40 billion dollars are spent through PDS to aid various communities in India. Subsidies are in the form of food distribution, fertilizer distribution, loan waiver etc. It is anticipated that the system efficiency is 60-70% and the balance is eroding away through leak in the system. If the PDS is linked though Aadhaar to a bank account then the size of the distribution system would shrink to a level where we would accountability in the system. A quick calculation indicates that we were planning to save 12.5% in the next 3 years and with the implementation of Aadhaar in the PDS we save almost 30-40% of the subsidies. This is what reformation is about. Similarly, in Mahatma Gandhi National Rural Employment Guarantee Scheme the loss of payment/leakages amount to around 12% on the account of ghost workers can be plugged through wage disbursement using Aadhaar-enabled bank accounts. In India, men often manage financial resources that belong to women. By requiring the woman's presence, Aadhaar helps her exercise her right and empowers women. UID could help build a GIS- compatible health information system, and establish nationwide surveillance and diagnosis facilities for service and research on infectious diseases. Going forward, as more government-based systems access this platform (UID's big database) to authenticate their customers, the number of authentication-based queries will also shoot up exponentially. The possibilities are limitless given that the platform’s usage is limited to the imagination of government agencies who can develop innovative applications on top of the platform. From providing insurance to the poor, ensuring healthcare to the bottom of the pyramid and providing banking facilities to the unbanked population, UID can be the game changer that a country like India wants today.