Big static data only. Thus, a regular

BigData could not be described just in terms of its size.

Anyhow, togenerate basic understanding, Big Data are data sets which cannot beprocessed in conventional database ways to their size. This kind ofdata accumulation helps improve customer care service in many ways.Yet, such huge amounts of data can also bring forth many privacyissues, making Big Data Security a primary concern for anyorganization.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Working in the field of data security and privacy, manyorganizations are conceding these threats and making efforts toprevent them.BigData is nothing new to large organizations, but with advancements intechnology, it’s also becoming popular among smaller andmedium–sized firms due to cost reduction and provided ease tomanage data. Cloud–based storage has facilitated data mining andcollection. For all that, this Big Data and cloud storage integrationhave caused a challenge to privacy and security threats. The reasonfor such breaches may be that security applications that are designedto store certain amounts of data cannot safeguard the big volumes ofdata that the consumer data sets have. Also, these securitytechnologies are inefficient to manage dynamic data and can controlstatic data only.

Thus, a regular security check cannot detectsecurity patches for perpetual streaming data. For this purpose, werequire full-time privacy during data streaming and Big Dataanalysis. And since each firm wants to maximize their profits, theymore often than not give much attention to security requirements andfocus only on the front–end of the business, as a result neglectingconsumer data privacy and security. And this is where the potentialhackers come into play as they breach the weak security walls of thefirm’s consumer data and have them at their mercy, resulting inboth monetary loss and reputation meltdown.Hence,Governments around the world have come forward to design strong Dataprotection laws, which strengthens the rights of individuals overtheir personal data and promises hefty penalties for companies thatfail to secure it, and makes for a challenging environment for thosemanaging Big Data. These strict guidelines will mean that firms willpay an equal amount of attention to safeguarding consumer data as itdoes with making a profit–maximizing business decision–making orelse they’ll have to pay the price.

But not all countries are quickto react regarding the consumer data protection laws allowing boththe big organizations and the hackers to have merry run at the priceof a user’s integrity. Third world countries like Sweden and Indiaare such examples. They do not have strong data protection laws ascompared to first world countries like USA or UK. In2017, India took the bold decision to profile each Indian residentbased on their biometric and demographic data through a unique12-digit identity number namely Aadhaar Card. The data is collectedby the Unique Identification Authority of India (UIDAI), a statutoryauthority established in January 2009 by Govt of India, under theMinistry of Electronics and Information Technology, under theprovisions of the Aadhaar Act, 2016. Thus, Aadhaar has become theworld’s largest biometric ID system, with over 1.

19 billionenrollments as of 30thNov,2017. However, just like any other Big Data project, owing toincreasing concerns around privacy, the potential for civiliansurveillance by the Government, and the exclusion of eligiblebeneficiaries from welfare schemes from the leveraging of Aadhaar –based systems, the Aadhaar project’s validity is currently beingchallenged in the Supreme Court of India. Also, many experts do notbelieve that there are concrete rules around the safety of theindividual data from potential harm due to theenormityof the project and that it is too much for a developing country likeIndia to make it a sudden success without keeping the civilians atmajor privacy and economic risk. Despite the comparisons, India’sAadhaar project is nothing like America’s Social Security Number asit has more uses and fewer safeguards. But all this has not dentedGovt. of India’s hopes to push their project to the path ofultimate success and thus they have been quashing any reports of dataleak so far in order to not instil doubts into the minds of thecivilians about the project.


I'm Simon!

Would you like to get a custom essay? How about receiving a customized one?

Check it out