SlideShare uma empresa Scribd logo
1 de 24
Big Data
Issues and Challenges

Presented by:
Harsh Kishore Mishra
M.Tech. Cyber Security I Sem.
Central University of Punjab
Contents
• Introduction

• Problem of Data Explosion
• Big Data Characteristics

• Issues and Challenges in Big Data
• Advantages of Big Data
• Projects using Big Data
• Conclusion
2
Introduction
• Big Data is large volume of Data in structured or

unstructured form.
• The rate of data generation has increased exponentially
by increasing use of data intensive technologies.

• Processing or analyzing the huge amount of data is a
challenging task.
• It requires new infrastructure and a new way of thinking
about the way business and IT industry works
3
Problem Of Data Explosion

4
Problem of Data Explosion (..contd.)
• The International Data Corporation (IDC) study predicts

that overall data will grow by 50 times by 2020.
• The digital universe is 1.8 trillion gigabytes (109) in size
and stored in 500 quadrillion (1015) files.
• Information Bits in the digital universe as stars in our
physical universe.
• 90% Data is in unstructured form.

5
Big Data Characteristics
• Volume
• Velocity
• Variety
• Worth
• Complexity

6
Issues in Big Data
• Issues related to the Characteristics
• Storage and Transfer Issues
• Data Management Issues

• Processing Issues
7
Issues in Characteristics
• Data Volume Issues
• Data Velocity Issues
• Data Variety Issues
• Worth of Data Issues
• Data Complexity Issues

8
Storage and Transfer Issues
• Current Storage Techniques and Storage Medium are not

appropriate for effectively handling Big Data.
• Current Technology limits 4 Terabytes (1012) per disk, so
1 Exabyte (1018) size data will take 25,000 Disks.
• Accessing that data will also overwhelm network.
• Assuming a sustained transfer of 1 Exabyte will take

2,800 hours with a 1 Gbps capable network with 80%
effective transfer rate and 100Mbps sustainable speed.
9
Data Management Issues
• Resolving issues of

access, utilization, updating, governance, and reference (in
publications) have proven to be major stumbling blocks.
• In such volume, it is impractical to validate every data item.

• New approaches and research to data qualification and
validation are needed.
• The richness of digital data representation prohibits a
personalized methodology for data collection.
10
Processing Issues
• The Processing Issues are critical to handle.
• Example:
1 Exabyte = 1000 Petabytes (1015).
Assuming a processor expends 100 instructions on one
block at 5 gigahertz, the time required for end to-end
processing would be 20 nanoseconds.
To process 1K petabytes would require a total end-to-end
processing time of roughly 635 years.
• Effective processing of Exabyte of data will require
extensive parallel processing and new analytics
algorithms
11
Challenges in Big Data
• Privacy and Security
• Data Access and Sharing of Information

• Analytical Challenges
• Human Resources and Manpower

• Technical Challenges
12
Privacy and Security
• Privacy and Security are sensitive and includes

conceptual, Technical as well as legal significance.
• Most Peoples are vulnerable to Information Theft.
• Privacy can be compromised in the large data sets.
• The Security is also critical to handle in such large
data.
• Social stratification would be important arising
consequence.

13
Data Access and Sharing of Information
• Data should be available in accurate, complete

and timely manner.
• The data management and governance process bit
complex adding the necessity to make data open
and make it available to government agencies.
• Expecting sharing of data between companies is

awkward.
14
Analytical Challenges
• Big data brings along with it some huge analytical

challenges.
• Analysis on such huge data, requires a large number
of advance skills.
• The type of analysis which is needed to be done on
the data depends highly on the results to be

obtained.
15
Human Resources and Manpower
• Big Data needs to attract organizations and youth

with diverse new skill sets.
• The skills includes technical as well as research,
analytical, interpretive and creative ones.
• It requires training programs to be held by the
organizations.

• Universities need to introduce curriculum on Big
data.

16
Technical Challenges
• Fault Tolerance: If the failure occurs the damage done
should be within acceptable threshold rather than
beginning the whole task from the scratch.
• Scalability: Requires a high level of sharing of resources
which is expensive and dealing with the system failures in
an efficient manner.
• Quality of Data: Big data focuses on quality data
storage rather than having very large irrelevant data.
• Heterogeneous Data: Structured and Unstructured Data.
17
Advantages of Big Data
• Understanding and Targeting Customers

• Understanding and Optimizing Business Process
• Improving Science and Research
• Improving Healthcare and Public Health
• Optimizing Machine and Device Performance
• Financial Trading

• Improving Sports Performance
• Improving Security and Law Enforcement
18
Some Projects using Big Data
• Amazon.com handles millions of back-end operations and

have 7.8 TB, 18.5 TB, and 24.7 TB Databases.
• Walmart is estimated to store more than 2.5 PB Data for
handling 1 million transactions per hour.
• The Large Hadron Collider (LHC) generates 25 PB data
before replication and 200 PB Data after replication.
• Sloan Digital Sky Survey ,continuing at a rate of about 200
GB per night and has more than 140 TB of information.
• Utah Data Center for Cyber Security stores Yottabytes (1024).
19
Conclusions
• The commercial impacts of the Big data have the
potential to generate significant productivity growth for
a number of vertical sectors.
• Big Data presents opportunity to create unprecedented
business advantages and better service delivery.

• All the challenges and issues are needed to be handle
effectively and in a efficient manner.
• Growing talent and building teams to make analyticbased decisions is the key to realize the value of Big
Data.
20
21
REFERENCES
• Aveksa Inc. (2013). Ensuring “Big Data” Security with Identity and
Access Management. Waltham, MA: Aveksa.
• Hewlett-Packard Development Company. (2012). Big Security for Big
Data. L.P.: Hewlett-Packard Development Company.
• Kaisler, S., Armour, F., Espinosa, J. A., & Money, W. (2013). Big Data:

Issues and Challenges Moving Forward. International Confrence on
System Sciences (pp. 995-1004). Hawaii: IEEE Computer Soceity.
• Marr, B. (2013, November 13). The Awesome Ways Big Data is used
Today to Change Our World.Retrieved November 14, 2013, from
LinkedIn: https://www.linkedin.com/today /post/article/2013111306515764875646-the-awesome-ways-big-data-is-used-today-tochange-our-worl
22
REFERENCES
• Patel, A. B., Birla, M., & Nair, U. (2013). Addressing Big Data Problem Using
Hadoop and. Nirma University, Gujrat: Nirma University.
• Singh, S., & Singh, N. (2012). Big Data Analytics. International Conference on
Communication, Information & Computing Technology (ICCICT) (pp. 1-4).
Mumbai: IEEE.
• The 2011 Digital Universe Study: Extracting Value from Chaos. (2011, November
30). Retrieved from EMC: http://www.emc.com/collateral/demos/microsites/emcdigital-universe-2011/index.htm
• World's data will grow by 50X in next decade, IDC study predicts . (2011, June
28). Retrieved from Computer World:
http://www.computerworld.com/s/article/9217988/World_s_data_will_grow_by_50
X_in_next_decade_IDC_study_predicts
23
REFERENCES
• Katal, A., Wazid, M., & Goudar, R. H. (2013). Big Data: Issues, Challenges,
Tools and Good Practices. IEEE, 404-409

24

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Big data Presentation
Big data PresentationBig data Presentation
Big data Presentation
 
Big data by Mithlesh sadh
Big data by Mithlesh sadhBig data by Mithlesh sadh
Big data by Mithlesh sadh
 
The Advantages and Disadvantages of Big Data
The Advantages and Disadvantages of Big DataThe Advantages and Disadvantages of Big Data
The Advantages and Disadvantages of Big Data
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
 
Big data
Big dataBig data
Big data
 
Presentation on Big Data
Presentation on Big DataPresentation on Big Data
Presentation on Big Data
 
Big data
Big dataBig data
Big data
 
Big Data ppt
Big Data pptBig Data ppt
Big Data ppt
 
Chapter 1 big data
Chapter 1 big dataChapter 1 big data
Chapter 1 big data
 
Big_data_ppt
Big_data_ppt Big_data_ppt
Big_data_ppt
 
Big data
Big dataBig data
Big data
 
Big Data Analytics Powerpoint Presentation Slide
Big Data Analytics Powerpoint Presentation SlideBig Data Analytics Powerpoint Presentation Slide
Big Data Analytics Powerpoint Presentation Slide
 
Big data ppt
Big data pptBig data ppt
Big data ppt
 
Big data PPT prepared by Hritika Raj (Shivalik college of engg.)
Big data PPT prepared by Hritika Raj (Shivalik college of engg.)Big data PPT prepared by Hritika Raj (Shivalik college of engg.)
Big data PPT prepared by Hritika Raj (Shivalik college of engg.)
 
Big Data
Big DataBig Data
Big Data
 
Big Data - Applications and Technologies Overview
Big Data - Applications and Technologies OverviewBig Data - Applications and Technologies Overview
Big Data - Applications and Technologies Overview
 
Big Data
Big DataBig Data
Big Data
 
Big Data & Hadoop Introduction
Big Data & Hadoop IntroductionBig Data & Hadoop Introduction
Big Data & Hadoop Introduction
 
Big Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesBig Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture Capabilities
 
Overview of Big data(ppt)
Overview of Big data(ppt)Overview of Big data(ppt)
Overview of Big data(ppt)
 

Destaque

Big Data
Big DataBig Data
Big DataNGDATA
 
Big-data analytics: challenges and opportunities
Big-data analytics: challenges and opportunitiesBig-data analytics: challenges and opportunities
Big-data analytics: challenges and opportunities台灣資料科學年會
 
走出IT人才荒 研討會
走出IT人才荒 研討會走出IT人才荒 研討會
走出IT人才荒 研討會Charles Mok
 
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCybera Inc.
 
Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Jason Haislmaier
 
Big Data Final Presentation
Big Data Final PresentationBig Data Final Presentation
Big Data Final Presentation17aroumougamh
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM Analytics
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposureredpel dot com
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full reportdeepakmarndi
 
Manager à l'ère digitale
Manager à l'ère digitale Manager à l'ère digitale
Manager à l'ère digitale Nathalie Enriquez
 
Come risparmiare tempo a lavoro
Come risparmiare tempo a lavoroCome risparmiare tempo a lavoro
Come risparmiare tempo a lavoroPLS Coaching
 

Destaque (20)

Big data ppt
Big  data pptBig  data ppt
Big data ppt
 
What is Big Data?
What is Big Data?What is Big Data?
What is Big Data?
 
Big Data
Big DataBig Data
Big Data
 
Big Data: Issues and Challenges
Big Data: Issues and ChallengesBig Data: Issues and Challenges
Big Data: Issues and Challenges
 
Big data ppt
Big data pptBig data ppt
Big data ppt
 
Big-data analytics: challenges and opportunities
Big-data analytics: challenges and opportunitiesBig-data analytics: challenges and opportunities
Big-data analytics: challenges and opportunities
 
Computer networks
Computer networksComputer networks
Computer networks
 
Big Data
Big DataBig Data
Big Data
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
走出IT人才荒 研討會
走出IT人才荒 研討會走出IT人才荒 研討會
走出IT人才荒 研討會
 
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
 
Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Data Privacy & Security Update 2012
Data Privacy & Security Update 2012
 
Big Data Final Presentation
Big Data Final PresentationBig Data Final Presentation
Big Data Final Presentation
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big data
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
 
Manager à l'ère digitale
Manager à l'ère digitale Manager à l'ère digitale
Manager à l'ère digitale
 
Come risparmiare tempo a lavoro
Come risparmiare tempo a lavoroCome risparmiare tempo a lavoro
Come risparmiare tempo a lavoro
 
Big data Analytics Hadoop
Big data Analytics HadoopBig data Analytics Hadoop
Big data Analytics Hadoop
 
Big Data
Big DataBig Data
Big Data
 

Semelhante a Big data

Big data ppt
Big data pptBig data ppt
Big data pptYash Raj
 
Big Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data ManagementBig Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data ManagementTony Bain
 
Presentation1 (1).pptx
Presentation1 (1).pptxPresentation1 (1).pptx
Presentation1 (1).pptxDat Trinh
 
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced AnalyticsADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced AnalyticsDATAVERSITY
 
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...European Data Forum
 
TOPIC.pptx
TOPIC.pptxTOPIC.pptx
TOPIC.pptxinfinix8
 
Puja(801),sanghamitra(819),surabhi(844)
Puja(801),sanghamitra(819),surabhi(844)Puja(801),sanghamitra(819),surabhi(844)
Puja(801),sanghamitra(819),surabhi(844)puja singh
 
Bigdatappt 140225061440-phpapp01
Bigdatappt 140225061440-phpapp01Bigdatappt 140225061440-phpapp01
Bigdatappt 140225061440-phpapp01nayanbhatia2
 
Big data
Big dataBig data
Big dataRiya
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?Denodo
 
State of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteState of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteNeo4j
 
final oracle presentation
final oracle presentationfinal oracle presentation
final oracle presentationPriyesh Patel
 
Keynote: Graphs in Government_Lance Walter, CMO
Keynote:  Graphs in Government_Lance Walter, CMOKeynote:  Graphs in Government_Lance Walter, CMO
Keynote: Graphs in Government_Lance Walter, CMONeo4j
 
Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big DataSpringPeople
 

Semelhante a Big data (20)

Big data ppt
Big data pptBig data ppt
Big data ppt
 
Big data
Big dataBig data
Big data
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
 
Big Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data ManagementBig Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data Management
 
Presentation1 (1).pptx
Presentation1 (1).pptxPresentation1 (1).pptx
Presentation1 (1).pptx
 
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced AnalyticsADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
 
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
 
TOPIC.pptx
TOPIC.pptxTOPIC.pptx
TOPIC.pptx
 
Big data
Big dataBig data
Big data
 
Puja(801),sanghamitra(819),surabhi(844)
Puja(801),sanghamitra(819),surabhi(844)Puja(801),sanghamitra(819),surabhi(844)
Puja(801),sanghamitra(819),surabhi(844)
 
Bigdatappt 140225061440-phpapp01
Bigdatappt 140225061440-phpapp01Bigdatappt 140225061440-phpapp01
Bigdatappt 140225061440-phpapp01
 
Big data
Big dataBig data
Big data
 
Kartikey tripathi
Kartikey tripathiKartikey tripathi
Kartikey tripathi
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
 
Big data ppt
Big data pptBig data ppt
Big data ppt
 
State of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteState of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - Keynote
 
final oracle presentation
final oracle presentationfinal oracle presentation
final oracle presentation
 
Big data
Big dataBig data
Big data
 
Keynote: Graphs in Government_Lance Walter, CMO
Keynote:  Graphs in Government_Lance Walter, CMOKeynote:  Graphs in Government_Lance Walter, CMO
Keynote: Graphs in Government_Lance Walter, CMO
 
Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big Data
 

Mais de Harsh Kishore Mishra

Mais de Harsh Kishore Mishra (11)

Intellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian PerspectiveIntellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian Perspective
 
IEEE 802.11ac Standard
IEEE 802.11ac StandardIEEE 802.11ac Standard
IEEE 802.11ac Standard
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Role of MicroRNA in Phosphorus Defficiency
Role of MicroRNA in Phosphorus DefficiencyRole of MicroRNA in Phosphorus Defficiency
Role of MicroRNA in Phosphorus Defficiency
 
Windows 8: inside what and how
Windows 8: inside what and howWindows 8: inside what and how
Windows 8: inside what and how
 
Windows 7 Versions Features
Windows 7 Versions FeaturesWindows 7 Versions Features
Windows 7 Versions Features
 
Software Testing and UML Lab
Software Testing and UML LabSoftware Testing and UML Lab
Software Testing and UML Lab
 
Network security
Network securityNetwork security
Network security
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
Windows 8 CP
Windows 8 CPWindows 8 CP
Windows 8 CP
 

Último

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Último (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Big data

  • 1. Big Data Issues and Challenges Presented by: Harsh Kishore Mishra M.Tech. Cyber Security I Sem. Central University of Punjab
  • 2. Contents • Introduction • Problem of Data Explosion • Big Data Characteristics • Issues and Challenges in Big Data • Advantages of Big Data • Projects using Big Data • Conclusion 2
  • 3. Introduction • Big Data is large volume of Data in structured or unstructured form. • The rate of data generation has increased exponentially by increasing use of data intensive technologies. • Processing or analyzing the huge amount of data is a challenging task. • It requires new infrastructure and a new way of thinking about the way business and IT industry works 3
  • 4. Problem Of Data Explosion 4
  • 5. Problem of Data Explosion (..contd.) • The International Data Corporation (IDC) study predicts that overall data will grow by 50 times by 2020. • The digital universe is 1.8 trillion gigabytes (109) in size and stored in 500 quadrillion (1015) files. • Information Bits in the digital universe as stars in our physical universe. • 90% Data is in unstructured form. 5
  • 6. Big Data Characteristics • Volume • Velocity • Variety • Worth • Complexity 6
  • 7. Issues in Big Data • Issues related to the Characteristics • Storage and Transfer Issues • Data Management Issues • Processing Issues 7
  • 8. Issues in Characteristics • Data Volume Issues • Data Velocity Issues • Data Variety Issues • Worth of Data Issues • Data Complexity Issues 8
  • 9. Storage and Transfer Issues • Current Storage Techniques and Storage Medium are not appropriate for effectively handling Big Data. • Current Technology limits 4 Terabytes (1012) per disk, so 1 Exabyte (1018) size data will take 25,000 Disks. • Accessing that data will also overwhelm network. • Assuming a sustained transfer of 1 Exabyte will take 2,800 hours with a 1 Gbps capable network with 80% effective transfer rate and 100Mbps sustainable speed. 9
  • 10. Data Management Issues • Resolving issues of access, utilization, updating, governance, and reference (in publications) have proven to be major stumbling blocks. • In such volume, it is impractical to validate every data item. • New approaches and research to data qualification and validation are needed. • The richness of digital data representation prohibits a personalized methodology for data collection. 10
  • 11. Processing Issues • The Processing Issues are critical to handle. • Example: 1 Exabyte = 1000 Petabytes (1015). Assuming a processor expends 100 instructions on one block at 5 gigahertz, the time required for end to-end processing would be 20 nanoseconds. To process 1K petabytes would require a total end-to-end processing time of roughly 635 years. • Effective processing of Exabyte of data will require extensive parallel processing and new analytics algorithms 11
  • 12. Challenges in Big Data • Privacy and Security • Data Access and Sharing of Information • Analytical Challenges • Human Resources and Manpower • Technical Challenges 12
  • 13. Privacy and Security • Privacy and Security are sensitive and includes conceptual, Technical as well as legal significance. • Most Peoples are vulnerable to Information Theft. • Privacy can be compromised in the large data sets. • The Security is also critical to handle in such large data. • Social stratification would be important arising consequence. 13
  • 14. Data Access and Sharing of Information • Data should be available in accurate, complete and timely manner. • The data management and governance process bit complex adding the necessity to make data open and make it available to government agencies. • Expecting sharing of data between companies is awkward. 14
  • 15. Analytical Challenges • Big data brings along with it some huge analytical challenges. • Analysis on such huge data, requires a large number of advance skills. • The type of analysis which is needed to be done on the data depends highly on the results to be obtained. 15
  • 16. Human Resources and Manpower • Big Data needs to attract organizations and youth with diverse new skill sets. • The skills includes technical as well as research, analytical, interpretive and creative ones. • It requires training programs to be held by the organizations. • Universities need to introduce curriculum on Big data. 16
  • 17. Technical Challenges • Fault Tolerance: If the failure occurs the damage done should be within acceptable threshold rather than beginning the whole task from the scratch. • Scalability: Requires a high level of sharing of resources which is expensive and dealing with the system failures in an efficient manner. • Quality of Data: Big data focuses on quality data storage rather than having very large irrelevant data. • Heterogeneous Data: Structured and Unstructured Data. 17
  • 18. Advantages of Big Data • Understanding and Targeting Customers • Understanding and Optimizing Business Process • Improving Science and Research • Improving Healthcare and Public Health • Optimizing Machine and Device Performance • Financial Trading • Improving Sports Performance • Improving Security and Law Enforcement 18
  • 19. Some Projects using Big Data • Amazon.com handles millions of back-end operations and have 7.8 TB, 18.5 TB, and 24.7 TB Databases. • Walmart is estimated to store more than 2.5 PB Data for handling 1 million transactions per hour. • The Large Hadron Collider (LHC) generates 25 PB data before replication and 200 PB Data after replication. • Sloan Digital Sky Survey ,continuing at a rate of about 200 GB per night and has more than 140 TB of information. • Utah Data Center for Cyber Security stores Yottabytes (1024). 19
  • 20. Conclusions • The commercial impacts of the Big data have the potential to generate significant productivity growth for a number of vertical sectors. • Big Data presents opportunity to create unprecedented business advantages and better service delivery. • All the challenges and issues are needed to be handle effectively and in a efficient manner. • Growing talent and building teams to make analyticbased decisions is the key to realize the value of Big Data. 20
  • 21. 21
  • 22. REFERENCES • Aveksa Inc. (2013). Ensuring “Big Data” Security with Identity and Access Management. Waltham, MA: Aveksa. • Hewlett-Packard Development Company. (2012). Big Security for Big Data. L.P.: Hewlett-Packard Development Company. • Kaisler, S., Armour, F., Espinosa, J. A., & Money, W. (2013). Big Data: Issues and Challenges Moving Forward. International Confrence on System Sciences (pp. 995-1004). Hawaii: IEEE Computer Soceity. • Marr, B. (2013, November 13). The Awesome Ways Big Data is used Today to Change Our World.Retrieved November 14, 2013, from LinkedIn: https://www.linkedin.com/today /post/article/2013111306515764875646-the-awesome-ways-big-data-is-used-today-tochange-our-worl 22
  • 23. REFERENCES • Patel, A. B., Birla, M., & Nair, U. (2013). Addressing Big Data Problem Using Hadoop and. Nirma University, Gujrat: Nirma University. • Singh, S., & Singh, N. (2012). Big Data Analytics. International Conference on Communication, Information & Computing Technology (ICCICT) (pp. 1-4). Mumbai: IEEE. • The 2011 Digital Universe Study: Extracting Value from Chaos. (2011, November 30). Retrieved from EMC: http://www.emc.com/collateral/demos/microsites/emcdigital-universe-2011/index.htm • World's data will grow by 50X in next decade, IDC study predicts . (2011, June 28). Retrieved from Computer World: http://www.computerworld.com/s/article/9217988/World_s_data_will_grow_by_50 X_in_next_decade_IDC_study_predicts 23
  • 24. REFERENCES • Katal, A., Wazid, M., & Goudar, R. H. (2013). Big Data: Issues, Challenges, Tools and Good Practices. IEEE, 404-409 24