SlideShare une entreprise Scribd logo
1  sur  24
Big Data
Issues and Challenges

Presented by:
Harsh Kishore Mishra
M.Tech. Cyber Security I Sem.
Central University of Punjab
Contents
• Introduction

• Problem of Data Explosion
• Big Data Characteristics

• Issues and Challenges in Big Data
• Advantages of Big Data
• Projects using Big Data
• Conclusion
2
Introduction
• Big Data is large volume of Data in structured or

unstructured form.
• The rate of data generation has increased exponentially
by increasing use of data intensive technologies.

• Processing or analyzing the huge amount of data is a
challenging task.
• It requires new infrastructure and a new way of thinking
about the way business and IT industry works
3
Problem Of Data Explosion

4
Problem of Data Explosion (..contd.)
• The International Data Corporation (IDC) study predicts

that overall data will grow by 50 times by 2020.
• The digital universe is 1.8 trillion gigabytes (109) in size
and stored in 500 quadrillion (1015) files.
• Information Bits in the digital universe as stars in our
physical universe.
• 90% Data is in unstructured form.

5
Big Data Characteristics
• Volume
• Velocity
• Variety
• Worth
• Complexity

6
Issues in Big Data
• Issues related to the Characteristics
• Storage and Transfer Issues
• Data Management Issues

• Processing Issues
7
Issues in Characteristics
• Data Volume Issues
• Data Velocity Issues
• Data Variety Issues
• Worth of Data Issues
• Data Complexity Issues

8
Storage and Transfer Issues
• Current Storage Techniques and Storage Medium are not

appropriate for effectively handling Big Data.
• Current Technology limits 4 Terabytes (1012) per disk, so
1 Exabyte (1018) size data will take 25,000 Disks.
• Accessing that data will also overwhelm network.
• Assuming a sustained transfer of 1 Exabyte will take

2,800 hours with a 1 Gbps capable network with 80%
effective transfer rate and 100Mbps sustainable speed.
9
Data Management Issues
• Resolving issues of

access, utilization, updating, governance, and reference (in
publications) have proven to be major stumbling blocks.
• In such volume, it is impractical to validate every data item.

• New approaches and research to data qualification and
validation are needed.
• The richness of digital data representation prohibits a
personalized methodology for data collection.
10
Processing Issues
• The Processing Issues are critical to handle.
• Example:
1 Exabyte = 1000 Petabytes (1015).
Assuming a processor expends 100 instructions on one
block at 5 gigahertz, the time required for end to-end
processing would be 20 nanoseconds.
To process 1K petabytes would require a total end-to-end
processing time of roughly 635 years.
• Effective processing of Exabyte of data will require
extensive parallel processing and new analytics
algorithms
11
Challenges in Big Data
• Privacy and Security
• Data Access and Sharing of Information

• Analytical Challenges
• Human Resources and Manpower

• Technical Challenges
12
Privacy and Security
• Privacy and Security are sensitive and includes

conceptual, Technical as well as legal significance.
• Most Peoples are vulnerable to Information Theft.
• Privacy can be compromised in the large data sets.
• The Security is also critical to handle in such large
data.
• Social stratification would be important arising
consequence.

13
Data Access and Sharing of Information
• Data should be available in accurate, complete

and timely manner.
• The data management and governance process bit
complex adding the necessity to make data open
and make it available to government agencies.
• Expecting sharing of data between companies is

awkward.
14
Analytical Challenges
• Big data brings along with it some huge analytical

challenges.
• Analysis on such huge data, requires a large number
of advance skills.
• The type of analysis which is needed to be done on
the data depends highly on the results to be

obtained.
15
Human Resources and Manpower
• Big Data needs to attract organizations and youth

with diverse new skill sets.
• The skills includes technical as well as research,
analytical, interpretive and creative ones.
• It requires training programs to be held by the
organizations.

• Universities need to introduce curriculum on Big
data.

16
Technical Challenges
• Fault Tolerance: If the failure occurs the damage done
should be within acceptable threshold rather than
beginning the whole task from the scratch.
• Scalability: Requires a high level of sharing of resources
which is expensive and dealing with the system failures in
an efficient manner.
• Quality of Data: Big data focuses on quality data
storage rather than having very large irrelevant data.
• Heterogeneous Data: Structured and Unstructured Data.
17
Advantages of Big Data
• Understanding and Targeting Customers

• Understanding and Optimizing Business Process
• Improving Science and Research
• Improving Healthcare and Public Health
• Optimizing Machine and Device Performance
• Financial Trading

• Improving Sports Performance
• Improving Security and Law Enforcement
18
Some Projects using Big Data
• Amazon.com handles millions of back-end operations and

have 7.8 TB, 18.5 TB, and 24.7 TB Databases.
• Walmart is estimated to store more than 2.5 PB Data for
handling 1 million transactions per hour.
• The Large Hadron Collider (LHC) generates 25 PB data
before replication and 200 PB Data after replication.
• Sloan Digital Sky Survey ,continuing at a rate of about 200
GB per night and has more than 140 TB of information.
• Utah Data Center for Cyber Security stores Yottabytes (1024).
19
Conclusions
• The commercial impacts of the Big data have the
potential to generate significant productivity growth for
a number of vertical sectors.
• Big Data presents opportunity to create unprecedented
business advantages and better service delivery.

• All the challenges and issues are needed to be handle
effectively and in a efficient manner.
• Growing talent and building teams to make analyticbased decisions is the key to realize the value of Big
Data.
20
21
REFERENCES
• Aveksa Inc. (2013). Ensuring “Big Data” Security with Identity and
Access Management. Waltham, MA: Aveksa.
• Hewlett-Packard Development Company. (2012). Big Security for Big
Data. L.P.: Hewlett-Packard Development Company.
• Kaisler, S., Armour, F., Espinosa, J. A., & Money, W. (2013). Big Data:

Issues and Challenges Moving Forward. International Confrence on
System Sciences (pp. 995-1004). Hawaii: IEEE Computer Soceity.
• Marr, B. (2013, November 13). The Awesome Ways Big Data is used
Today to Change Our World.Retrieved November 14, 2013, from
LinkedIn: https://www.linkedin.com/today /post/article/2013111306515764875646-the-awesome-ways-big-data-is-used-today-tochange-our-worl
22
REFERENCES
• Patel, A. B., Birla, M., & Nair, U. (2013). Addressing Big Data Problem Using
Hadoop and. Nirma University, Gujrat: Nirma University.
• Singh, S., & Singh, N. (2012). Big Data Analytics. International Conference on
Communication, Information & Computing Technology (ICCICT) (pp. 1-4).
Mumbai: IEEE.
• The 2011 Digital Universe Study: Extracting Value from Chaos. (2011, November
30). Retrieved from EMC: http://www.emc.com/collateral/demos/microsites/emcdigital-universe-2011/index.htm
• World's data will grow by 50X in next decade, IDC study predicts . (2011, June
28). Retrieved from Computer World:
http://www.computerworld.com/s/article/9217988/World_s_data_will_grow_by_50
X_in_next_decade_IDC_study_predicts
23
REFERENCES
• Katal, A., Wazid, M., & Goudar, R. H. (2013). Big Data: Issues, Challenges,
Tools and Good Practices. IEEE, 404-409

24

Contenu connexe

Tendances

Introduction to Data Analytics
Introduction to Data AnalyticsIntroduction to Data Analytics
Introduction to Data AnalyticsUtkarsh Sharma
 
Applications of Big Data Analytics in Businesses
Applications of Big Data Analytics in BusinessesApplications of Big Data Analytics in Businesses
Applications of Big Data Analytics in BusinessesT.S. Lim
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data ScienceSrishti44
 
Big Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesBig Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesAshraf Uddin
 
BIG DATA & DATA ANALYTICS
BIG  DATA & DATA  ANALYTICSBIG  DATA & DATA  ANALYTICS
BIG DATA & DATA ANALYTICSNAGARAJAGIDDE
 
Big Data Evolution
Big Data EvolutionBig Data Evolution
Big Data Evolutionitnewsafrica
 
The Evolution of Data Science
The Evolution of Data ScienceThe Evolution of Data Science
The Evolution of Data ScienceKenny Daniel
 
Data science presentation
Data science presentationData science presentation
Data science presentationMSDEVMTL
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for YouDATAVERSITY
 

Tendances (20)

Presentation on Big Data
Presentation on Big DataPresentation on Big Data
Presentation on Big Data
 
Introduction to Data Analytics
Introduction to Data AnalyticsIntroduction to Data Analytics
Introduction to Data Analytics
 
Presentation on Big Data
Presentation on Big DataPresentation on Big Data
Presentation on Big Data
 
Big data
Big dataBig data
Big data
 
Applications of Big Data Analytics in Businesses
Applications of Big Data Analytics in BusinessesApplications of Big Data Analytics in Businesses
Applications of Big Data Analytics in Businesses
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Big data
Big dataBig data
Big data
 
Big data
Big dataBig data
Big data
 
Big data ppt
Big data pptBig data ppt
Big data ppt
 
Big Data ppt
Big Data pptBig Data ppt
Big Data ppt
 
Big Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesBig Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture Capabilities
 
BIG DATA & DATA ANALYTICS
BIG  DATA & DATA  ANALYTICSBIG  DATA & DATA  ANALYTICS
BIG DATA & DATA ANALYTICS
 
Big Data Evolution
Big Data EvolutionBig Data Evolution
Big Data Evolution
 
Big Data
Big DataBig Data
Big Data
 
Big Data
Big DataBig Data
Big Data
 
Big data Ppt
Big data PptBig data Ppt
Big data Ppt
 
The Evolution of Data Science
The Evolution of Data ScienceThe Evolution of Data Science
The Evolution of Data Science
 
Data science presentation
Data science presentationData science presentation
Data science presentation
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for You
 
Introduction to Data Engineering
Introduction to Data EngineeringIntroduction to Data Engineering
Introduction to Data Engineering
 

En vedette

Big Data
Big DataBig Data
Big DataNGDATA
 
Big-data analytics: challenges and opportunities
Big-data analytics: challenges and opportunitiesBig-data analytics: challenges and opportunities
Big-data analytics: challenges and opportunities台灣資料科學年會
 
走出IT人才荒 研討會
走出IT人才荒 研討會走出IT人才荒 研討會
走出IT人才荒 研討會Charles Mok
 
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCybera Inc.
 
Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Jason Haislmaier
 
Big Data Final Presentation
Big Data Final PresentationBig Data Final Presentation
Big Data Final Presentation17aroumougamh
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM Analytics
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposureredpel dot com
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full reportdeepakmarndi
 
Manager à l'ère digitale
Manager à l'ère digitale Manager à l'ère digitale
Manager à l'ère digitale Nathalie Enriquez
 
Come risparmiare tempo a lavoro
Come risparmiare tempo a lavoroCome risparmiare tempo a lavoro
Come risparmiare tempo a lavoroPLS Coaching
 

En vedette (20)

Big data ppt
Big  data pptBig  data ppt
Big data ppt
 
Big Data
Big DataBig Data
Big Data
 
Big data ppt
Big data pptBig data ppt
Big data ppt
 
Big Data: Issues and Challenges
Big Data: Issues and ChallengesBig Data: Issues and Challenges
Big Data: Issues and Challenges
 
Big data ppt
Big data pptBig data ppt
Big data ppt
 
Big-data analytics: challenges and opportunities
Big-data analytics: challenges and opportunitiesBig-data analytics: challenges and opportunities
Big-data analytics: challenges and opportunities
 
Computer networks
Computer networksComputer networks
Computer networks
 
Big Data
Big DataBig Data
Big Data
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
走出IT人才荒 研討會
走出IT人才荒 研討會走出IT人才荒 研討會
走出IT人才荒 研討會
 
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
 
Data Privacy & Security Update 2012
Data Privacy & Security Update 2012Data Privacy & Security Update 2012
Data Privacy & Security Update 2012
 
Big Data Final Presentation
Big Data Final PresentationBig Data Final Presentation
Big Data Final Presentation
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big data
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
 
Manager à l'ère digitale
Manager à l'ère digitale Manager à l'ère digitale
Manager à l'ère digitale
 
Come risparmiare tempo a lavoro
Come risparmiare tempo a lavoroCome risparmiare tempo a lavoro
Come risparmiare tempo a lavoro
 
Big data Analytics Hadoop
Big data Analytics HadoopBig data Analytics Hadoop
Big data Analytics Hadoop
 
Coaching & PNL
Coaching & PNLCoaching & PNL
Coaching & PNL
 

Similaire à Big data

Big data ppt
Big data pptBig data ppt
Big data pptYash Raj
 
Big Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data ManagementBig Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data ManagementTony Bain
 
Presentation1 (1).pptx
Presentation1 (1).pptxPresentation1 (1).pptx
Presentation1 (1).pptxDat Trinh
 
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced AnalyticsADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced AnalyticsDATAVERSITY
 
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...European Data Forum
 
TOPIC.pptx
TOPIC.pptxTOPIC.pptx
TOPIC.pptxinfinix8
 
Puja(801),sanghamitra(819),surabhi(844)
Puja(801),sanghamitra(819),surabhi(844)Puja(801),sanghamitra(819),surabhi(844)
Puja(801),sanghamitra(819),surabhi(844)puja singh
 
Bigdatappt 140225061440-phpapp01
Bigdatappt 140225061440-phpapp01Bigdatappt 140225061440-phpapp01
Bigdatappt 140225061440-phpapp01nayanbhatia2
 
Big data
Big dataBig data
Big dataRiya
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?Denodo
 
State of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteState of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteNeo4j
 
final oracle presentation
final oracle presentationfinal oracle presentation
final oracle presentationPriyesh Patel
 
Keynote: Graphs in Government_Lance Walter, CMO
Keynote:  Graphs in Government_Lance Walter, CMOKeynote:  Graphs in Government_Lance Walter, CMO
Keynote: Graphs in Government_Lance Walter, CMONeo4j
 
Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big DataSpringPeople
 
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Denodo
 

Similaire à Big data (20)

Big data ppt
Big data pptBig data ppt
Big data ppt
 
Big data
Big dataBig data
Big data
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
 
Big Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data ManagementBig Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data Management
 
Presentation1 (1).pptx
Presentation1 (1).pptxPresentation1 (1).pptx
Presentation1 (1).pptx
 
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced AnalyticsADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
 
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
EDF2014: BIG - NESSI Networking Session: Edward Curry, National University of...
 
TOPIC.pptx
TOPIC.pptxTOPIC.pptx
TOPIC.pptx
 
Big data
Big dataBig data
Big data
 
Puja(801),sanghamitra(819),surabhi(844)
Puja(801),sanghamitra(819),surabhi(844)Puja(801),sanghamitra(819),surabhi(844)
Puja(801),sanghamitra(819),surabhi(844)
 
Bigdatappt 140225061440-phpapp01
Bigdatappt 140225061440-phpapp01Bigdatappt 140225061440-phpapp01
Bigdatappt 140225061440-phpapp01
 
Big data
Big dataBig data
Big data
 
Kartikey tripathi
Kartikey tripathiKartikey tripathi
Kartikey tripathi
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
 
State of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteState of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - Keynote
 
final oracle presentation
final oracle presentationfinal oracle presentation
final oracle presentation
 
Big data
Big dataBig data
Big data
 
Keynote: Graphs in Government_Lance Walter, CMO
Keynote:  Graphs in Government_Lance Walter, CMOKeynote:  Graphs in Government_Lance Walter, CMO
Keynote: Graphs in Government_Lance Walter, CMO
 
Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big Data
 
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
 

Plus de Harsh Kishore Mishra

Plus de Harsh Kishore Mishra (11)

Intellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian PerspectiveIntellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian Perspective
 
IEEE 802.11ac Standard
IEEE 802.11ac StandardIEEE 802.11ac Standard
IEEE 802.11ac Standard
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Role of MicroRNA in Phosphorus Defficiency
Role of MicroRNA in Phosphorus DefficiencyRole of MicroRNA in Phosphorus Defficiency
Role of MicroRNA in Phosphorus Defficiency
 
Windows 8: inside what and how
Windows 8: inside what and howWindows 8: inside what and how
Windows 8: inside what and how
 
Windows 7 Versions Features
Windows 7 Versions FeaturesWindows 7 Versions Features
Windows 7 Versions Features
 
Software Testing and UML Lab
Software Testing and UML LabSoftware Testing and UML Lab
Software Testing and UML Lab
 
Network security
Network securityNetwork security
Network security
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
Windows 8 CP
Windows 8 CPWindows 8 CP
Windows 8 CP
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Big data

  • 1. Big Data Issues and Challenges Presented by: Harsh Kishore Mishra M.Tech. Cyber Security I Sem. Central University of Punjab
  • 2. Contents • Introduction • Problem of Data Explosion • Big Data Characteristics • Issues and Challenges in Big Data • Advantages of Big Data • Projects using Big Data • Conclusion 2
  • 3. Introduction • Big Data is large volume of Data in structured or unstructured form. • The rate of data generation has increased exponentially by increasing use of data intensive technologies. • Processing or analyzing the huge amount of data is a challenging task. • It requires new infrastructure and a new way of thinking about the way business and IT industry works 3
  • 4. Problem Of Data Explosion 4
  • 5. Problem of Data Explosion (..contd.) • The International Data Corporation (IDC) study predicts that overall data will grow by 50 times by 2020. • The digital universe is 1.8 trillion gigabytes (109) in size and stored in 500 quadrillion (1015) files. • Information Bits in the digital universe as stars in our physical universe. • 90% Data is in unstructured form. 5
  • 6. Big Data Characteristics • Volume • Velocity • Variety • Worth • Complexity 6
  • 7. Issues in Big Data • Issues related to the Characteristics • Storage and Transfer Issues • Data Management Issues • Processing Issues 7
  • 8. Issues in Characteristics • Data Volume Issues • Data Velocity Issues • Data Variety Issues • Worth of Data Issues • Data Complexity Issues 8
  • 9. Storage and Transfer Issues • Current Storage Techniques and Storage Medium are not appropriate for effectively handling Big Data. • Current Technology limits 4 Terabytes (1012) per disk, so 1 Exabyte (1018) size data will take 25,000 Disks. • Accessing that data will also overwhelm network. • Assuming a sustained transfer of 1 Exabyte will take 2,800 hours with a 1 Gbps capable network with 80% effective transfer rate and 100Mbps sustainable speed. 9
  • 10. Data Management Issues • Resolving issues of access, utilization, updating, governance, and reference (in publications) have proven to be major stumbling blocks. • In such volume, it is impractical to validate every data item. • New approaches and research to data qualification and validation are needed. • The richness of digital data representation prohibits a personalized methodology for data collection. 10
  • 11. Processing Issues • The Processing Issues are critical to handle. • Example: 1 Exabyte = 1000 Petabytes (1015). Assuming a processor expends 100 instructions on one block at 5 gigahertz, the time required for end to-end processing would be 20 nanoseconds. To process 1K petabytes would require a total end-to-end processing time of roughly 635 years. • Effective processing of Exabyte of data will require extensive parallel processing and new analytics algorithms 11
  • 12. Challenges in Big Data • Privacy and Security • Data Access and Sharing of Information • Analytical Challenges • Human Resources and Manpower • Technical Challenges 12
  • 13. Privacy and Security • Privacy and Security are sensitive and includes conceptual, Technical as well as legal significance. • Most Peoples are vulnerable to Information Theft. • Privacy can be compromised in the large data sets. • The Security is also critical to handle in such large data. • Social stratification would be important arising consequence. 13
  • 14. Data Access and Sharing of Information • Data should be available in accurate, complete and timely manner. • The data management and governance process bit complex adding the necessity to make data open and make it available to government agencies. • Expecting sharing of data between companies is awkward. 14
  • 15. Analytical Challenges • Big data brings along with it some huge analytical challenges. • Analysis on such huge data, requires a large number of advance skills. • The type of analysis which is needed to be done on the data depends highly on the results to be obtained. 15
  • 16. Human Resources and Manpower • Big Data needs to attract organizations and youth with diverse new skill sets. • The skills includes technical as well as research, analytical, interpretive and creative ones. • It requires training programs to be held by the organizations. • Universities need to introduce curriculum on Big data. 16
  • 17. Technical Challenges • Fault Tolerance: If the failure occurs the damage done should be within acceptable threshold rather than beginning the whole task from the scratch. • Scalability: Requires a high level of sharing of resources which is expensive and dealing with the system failures in an efficient manner. • Quality of Data: Big data focuses on quality data storage rather than having very large irrelevant data. • Heterogeneous Data: Structured and Unstructured Data. 17
  • 18. Advantages of Big Data • Understanding and Targeting Customers • Understanding and Optimizing Business Process • Improving Science and Research • Improving Healthcare and Public Health • Optimizing Machine and Device Performance • Financial Trading • Improving Sports Performance • Improving Security and Law Enforcement 18
  • 19. Some Projects using Big Data • Amazon.com handles millions of back-end operations and have 7.8 TB, 18.5 TB, and 24.7 TB Databases. • Walmart is estimated to store more than 2.5 PB Data for handling 1 million transactions per hour. • The Large Hadron Collider (LHC) generates 25 PB data before replication and 200 PB Data after replication. • Sloan Digital Sky Survey ,continuing at a rate of about 200 GB per night and has more than 140 TB of information. • Utah Data Center for Cyber Security stores Yottabytes (1024). 19
  • 20. Conclusions • The commercial impacts of the Big data have the potential to generate significant productivity growth for a number of vertical sectors. • Big Data presents opportunity to create unprecedented business advantages and better service delivery. • All the challenges and issues are needed to be handle effectively and in a efficient manner. • Growing talent and building teams to make analyticbased decisions is the key to realize the value of Big Data. 20
  • 21. 21
  • 22. REFERENCES • Aveksa Inc. (2013). Ensuring “Big Data” Security with Identity and Access Management. Waltham, MA: Aveksa. • Hewlett-Packard Development Company. (2012). Big Security for Big Data. L.P.: Hewlett-Packard Development Company. • Kaisler, S., Armour, F., Espinosa, J. A., & Money, W. (2013). Big Data: Issues and Challenges Moving Forward. International Confrence on System Sciences (pp. 995-1004). Hawaii: IEEE Computer Soceity. • Marr, B. (2013, November 13). The Awesome Ways Big Data is used Today to Change Our World.Retrieved November 14, 2013, from LinkedIn: https://www.linkedin.com/today /post/article/2013111306515764875646-the-awesome-ways-big-data-is-used-today-tochange-our-worl 22
  • 23. REFERENCES • Patel, A. B., Birla, M., & Nair, U. (2013). Addressing Big Data Problem Using Hadoop and. Nirma University, Gujrat: Nirma University. • Singh, S., & Singh, N. (2012). Big Data Analytics. International Conference on Communication, Information & Computing Technology (ICCICT) (pp. 1-4). Mumbai: IEEE. • The 2011 Digital Universe Study: Extracting Value from Chaos. (2011, November 30). Retrieved from EMC: http://www.emc.com/collateral/demos/microsites/emcdigital-universe-2011/index.htm • World's data will grow by 50X in next decade, IDC study predicts . (2011, June 28). Retrieved from Computer World: http://www.computerworld.com/s/article/9217988/World_s_data_will_grow_by_50 X_in_next_decade_IDC_study_predicts 23
  • 24. REFERENCES • Katal, A., Wazid, M., & Goudar, R. H. (2013). Big Data: Issues, Challenges, Tools and Good Practices. IEEE, 404-409 24