You are on page 1of 12

Security and Privacy Issues for Business Intelligence In

IOT

Mohan Krishna Kagita


Charles Sturt University, Australia.
mohankrishna4k@gmail.com

Abstract. IoT is a revolution in the business sector and adoption of IoT devices in the
business organization leads to the success management of business data along with the
success of the organization. Implementation of IoT in the business organization helps in
building an Enterprise Competitive advantages and increases the efficiency of operational
activities. Big data and cloud computing has provided a significant impact on improving the
business intelligence by analyzing, identifying and discovering the business-related data.
Data is biggest asset of every business organization and proper data maintenance is the major
concern for every organization. Internet of Things (IoT) is using in every sector of business
for efficient utilization of data and the organization expected to have enriched data from the
use of IOT devices. The security issues of IoT are a biggest concern in managing and
maintaining business data. Business intelligence is maintained dependent on the historical
and present data in order to estimate and perform calculation on future data. Due to security
issues of IoT the organizational data can be in danger due to potential threats, loss of data and
data manipulation. Business intelligence mainly depends on the plugins which needs internet
connectivity. Attacker can perform on the browser of the system and destroy the plugins
associated with it, if browser is not protected from antivirus and firewalls. Lack in security
features of the device will allows attackers to trace the details of the system and perform
attack by manipulating or stealing the data. These types of attacks are intentionally
performed to exploit the business data of the organization by hampering the business
intelligence.

Keywords: IoT, Big Data, Cloud Computing

1. INTRODUCTION

Business Intelligence is an up growing technology in the business industries which


uses an approach of the technology-driven process to make any strategic planning and
decision. Business intelligence helps in analyzing the data and the information to assist the
business executives and the managers in making an effective business decision. Business
intelligence comprises uses of various tools and methods which enables and assist and
organization in the collection of relevant data and information from the internal sources
and the external sources. Internet of Thing is widely used in the Business Intelligence
process for making a strategic decision and to make an effective planning. Internet of thing
allows employees working in the organization to connect to multiple devices which are
operating on the same network. Implementation of IoT devices in the business sector
provides a huge advantage in managing and planning the business operation. Considering
the advantages of IoT in business intelligence, it has been observed that IoT is very
effective in estimating and evaluating the sales and understanding the market strategy. The
operation activity of the business can be improved with the implementation of IoT in the
business industry. In terms of business intelligence, IoT can be very much effective and
inefficient in the utilization of the data and the information to assist the top management
employees in getting the enriched data for making any business plan or strategy. Business
intelligence is basically dependent on the fact that, it uses both the present and the
historical data in order to differentiate the change and the progress. IoT is very much
effective in making the calculation and estimating the future data of the business
organization. Big data and the cloud computing is extensively used in the Business
intelligence and it has created a significant impact on improving the business intelligence.
IoT is supported by the cloud computing network therefore, it has a great impact on the
Business intelligence with the uses of big data by identifying, analyzing and discovering
the data related to the business. The IoT uses a collection of data from various sources and
it can be internal and the external.

In the background literature review, several types of attacks of IoT with respect to
business intelligence will occur. In addition to that different types of attack in the IoT
platform which can hamper on business intelligence will also be cover in this section.
Several types of issues and the challenges may occur in the in the organization when the
IoT platform is deploy for the business intelligence. Security challenges and the other
threats will be discussed in this section. The solution to various types of security
challenges, issues and the threats will also describe in the report Different types of
research methodologies will be cover in the report. The advantages and the disadvantages
related to the Business Intelligence in IoT will be cover in the section. The conclusion to
the entire assignment will be provided

2. Background Literature Review

As per the author Gubbi, 2013 the internet of things is a network of physically
connected devices which be used in the business organization, vehicle, home appliances
etc. It mainly consists of the software, sensors, connectivity and the actuators. As the
author has described that the combination of these components with the internet
connectivity helps in exchanging data and information. This can be used for the purpose of
performing specific operation or task[1]. The vision for the evolution of the internet of
things had occurred in the year 2016. Internet of things has scope for the implication of
application in every sector. It can be used for the implementation of smart homes,
consumer application, media application etc. IoT is being adopted in every sector of the
business. According to the authors it has been analyzed that in the near future, the internet
of things will become an open source network for the business. Internet of things has not
at all remained a new concept and it has become a hot topic for the business organization
and industry.
Suryadevara, Mukhopadhyay (2013), as described in their article that, internet
of things is the use of the devices which are intelligently connected. The connected
devices are embedded with the actuators and the sensors and various others physical
devices to leverage the data[2]. The author had described in their article hat that the IoT
has rapidly expanded during the recent years for unleashing and providing a new
dimension to the organization and the business industries. IoT is very much effective for
providing an effective solution to the customers for the drastic and dramatic improvement
of the energy efficiency, education, health and the security of the business process human
life and the living standard. IoT is considered as the giant network for connecting the
people and the things. It has been stated by the author that, the main objective of using the
IoT technology is to move the functionality of the device towards a smarter technology.
The author has further described that the in IoT, the objects, and the devices are connected
with the platform of the internet of things for integrating data from several devices and to
apply analytics on the integrated collected data for sharing them for the purpose of sharing
the quality information. As the author has described, IoT is very much powerful indicating
the exact information that will be required for the purpose of analyzing the data that will
be required. From the perspective of the author, IoT is very much effective for identifying
what data to be accepted and what data that needed to be ignored. As the author has stated
in their article, the pinpointed information from the is very much effective for detecting
the patterns, making any sort of recommendation and for the purpose of detecting
problems that may ochre. Further, the author has described in their article the information
that has been gathered from the IoT platform is very much effective for making any kind
of smart decision.

Lazarescu, (2013), has described the major characteristics of the IoT platform. As per
Author has described, it is possible in an IoT platform for interconnecting everything in
the global communication and the information structure [3]. The author of the article
further described that the IoT platform is capable enough further providing the services
related to tithe he things such as the association of the virtual and the physical things. In
the article, the author has highlighted with the point that to provide a service related to the
things, the information and the technologies which are related to the physical world will
get change. As per author, the devices which exist and used in the IoT platform are
apparently heterogeneous as it is dependent on different network and the hardware
platform. The author has included in the article that dynamic changes can be obtained
when a change in the state of the device will occur. In the article, the author has, described
that the safety is another characteristic of the IoT platform which is very much effective in
providing the data and the information security.

Datta, Bonnet, and Nikaein (2014), described, about the real-world application of the
IoT platform. In the article, the author has described that the application scope of IoT in
the real world is very huge. The IoT platform is used by the business organization,
industry or by the human to get dynamic outcome or result. As it is described by the
author, that IoT is making a huge revolution for making a Smart Home[4]. It has described
by the author that Smart home had become a ladder of revolution to improve and to bring
advancement in the automation of the residential spaces. As per author, the approach to
smart home will be popular and it will be common as like smartphone in the recent
upcoming years. In the article, the author has further described that wearable product
which has been developed and made from the IoT platform made a huge explosion in the
present demanding market. In the article, the author has stated that the wearable products
are integrated and embedded with the software and the sensor which is mainly used for the
collection of information and the data of the users. The data and the information which has
been collected are later on the process for extracting the insight of the user. The other
application feature which has been described by the author is the connected cars. The
automobile is extensively using the IoT technology advantage for optimizing the internal
functionality of the vehicle. The author has highlighted that more preferences has been
given by the Automobile industry for the adoption of IoT Technology to enhance the cars
experience. In the article the author, the authors have further, elaborated the concept of the
Connected car by stating that it is the vehicle which is used for the purpose of optimizing
the performance. In the article, the author has described about the other application
features and the advantages of using IoT technology. As per the article, the other
application feature of the Internet of things includes the industrial internet which is also
termed as the industrial internet of things. The author has described in the article that
industrial internet of things is encouraging the engineers with the software, big data
analysis, sensor etc. for creating and developing an advanced machine with quality
features. As per the author, the other application feature of the IoT platform includes smart
cities, IoT in agriculture, smart retailing for energy management, in healthcare etc.,

As per the article of Leminen, Westerlund, Rajahonka, Siuruainen, (2012), the


IoT is being extensively used for the business intelligence. In the article, the author has
described that business intelligence is a process which is more likely to be technology is
driven for the purpose of analyzing the data and to present the information which is
actionable to assist the managers, executives and other associated of the corporates for
making an informed business decision[10]. According to the author, the main objective of
using the business intelligence in an organization is for the analysis of data. It is being
highlighted by the author, that the implementation of the IoT platform in the business
organization has provide4d a huge advantage to the business organization for improving
the effectiveness of business intelligence. It is being described by the author, that the
effective business intelligence with the implementation of the IoT platform in the business
can be very fruitful for optimizing the internal business process and to increase the
efficiency of the business operation. The author has stated in the article that the
implementation of IoT in the business organization for the purpose of improving the
Business intelligence is effective in attaining the competitive advantage over the rivalry of
the business and to generate new revenues. As per author, the Business Intelligence with
the Internet of Thing technology assists the organization in identifying the presence and
the upcoming marketing trends of the business and it is very much efficient in evaluating
the problems of the business. According to the author, the IoT for the business intelligence
leverages the services and the software for the transformation of the data into the form of
actionable intelligence which assists the organization in making any critical and the
complex decision for the business.

As per Larson and Chang, (2015) the adoption of IoT for business intelligence helps
in creating Business Intelligence Dashboard for the business organization. The author has
stated in the article that there are several reasons for the incorporation of the business
intelligence in the organization[5]. According to the author, the adoption of IoT for the
purpose of Business intelligence assist the organization in tracking and monitoring the
real-time data and it can also be used for the purpose of sharing the real-time data to make
a better decision related to the business. In the article, the author has further described that
the implementation of IoT platform for the Business intelligence increases the
censurability of the business operation. As per author, the recent advancement in the
technology assists an organization to collect tons of data in the world of data-driven. The
collected information or data can be converted easily into a readable format with the help
of business intelligence tools. Apart from that, Business Intelligence also very efficient in
analyzing and maintaining updated information. According to the author, it is effective in
making a quick data collection and the real-time processing and the collection of the data.
According to the author, Business intelligence is related to the concept of the Big Data. In
the article, the author has described that, the big data mainly focus on the complicated
information and the data analytics. Therefore, in the article, the author has mentioned that
the business intelligence also focusses on the analyzing the set of data over the areas such
as sophisticated tools, software application, and the infrastructure. As per Author IoT is
extensively important for the organization for establishing communication between
different types of sources and the product such as a sensor, wearable technology and the
devices. In the addition to that, the author has further described that the implementation of
IoT in the business organization makes the Business Intelligence model.

3. Different types of Attacks of IoT in Business Intelligence


The attacks can be of several types. Due to the security and the privacy issue in
the IoT platform the attacks are performed. The attacks can be performed by the hacker,
intruders and the unauthorized agents

As per Larson & Chang, (2016), the attacks can be of different types, it can be
physical cyber-attacks, Network cyber-attacks, Software attacks, and the encryption
attacks. The author has described in the article that the main reason for the physical attack
is because of the sensor’s present in the IoT devices. In the context of the physical attack,
the author has further described that in this type of attack the hacker generally tries to
access the system of the user which are located near to the close proximity[5]. As per
author, tampering will assist the hackers or the intruders to extract the data which is
infused with the malicious code. In the article, the author has also mentioned about the
Cyber-attacks on the network system. In the network cyber-attack, the author has
described, the hackers or the intruder’s tries to access the network of the user in order to
identify and to check what data is exactly flowing in the network. The most common
example of Network cyber-attack is a man-in-the-middle attack. Apart from the network
cyber-attack, the other attack which has been described by the author is software attack. In
the context of software attack, the author has described that malicious files or the malware
are injected into the users to track and monitor the data of user system and also to track the
data flow. The author has further described that software attack can corrupt the data or the
files by introducing a virus. The last type of attack which has described by the author is
the encryption attack. In the context of encryption attack, the intruders or the hackers
deduce the key of the encryption for creating their own code and algorithm for unlocking
the encryption key. As per author, once the hacker able to unlock the key, they introduce
their own code into the user system for monitoring the system. As per author based on the
type of attack, it can be DDoS (Distributed Denial of services, Bonnets, Man in the Middle
attack etc.
• Botnet Attacks
Bertino & Islam, (2017) has described that botnet is the connection of one or more
device. According to the author,
in the context of Botnet attack, it is generally being practiced with the intention to disrupt
the normal operation work or it can be used for the degradation of the overall services of
the target system[6]. For its creation, a huge number of Botnets are required before
initializing the attack. As per the author Fig.1 shows, once the attack has been initialized,
the botnet6s are sent to the network in order to target the system at large scale. The request
for the attack in IoT for the business intelligence comes in the form of messages or in the
form of emails. The types of attack can create an adverse impact on the business
intelligence by slowing down the network server by making the network busy for the user
to access the network by temporality freezing the server.

Figure 1: The most common type of attacks of Botnets attack is Distributed Denial
of service attack (DDoS).

• Identity Theft
Vidalis, S., & Angelopoulou, O, (2014) has described the impact of
identity theft of the Business Intelligence. As per author, the identity theft is basically a
crime for accessing the information related to the finance or any personal data[7]. Despite
this, the author has described that the impact of identity theft on the business intelligence
is very high. In the context of Identity theft, the, by creating stealing the identity of the
user or the credential information, the data related to the business intelligence or the data
analytics. As per the author, the identity can be of two types. The author has mentioned in
the article that account takes over and the true name is the two types of identity theft. As
per the author, the attackers or the hackers use the personal information of the user in true
name identity theft to collect data regarding the business analytics. In the context of an
account take over identity theft, the personal information of the users existing account is
used which is been modified by the hackers or the attackers to access information related
to the business data analytics of the organization
• Denial of Service
Joshi, Tipper (2013), has stated that Denial of service attack is another issue of
concern in the aspect of business intelligence in the Internet of things platform. From the
article, the author has clearly stated that denial of service occurs when there is the
unavailability of the service happens during the usual work process[11]. As the author has
highlighted in the article that unavailability of service may happen due to various reasons.
In the context of distributed denial of service attack, the author has described that very
large number of computer systems which is used for the business intelligence in the may
get affected by introducing malicious files or the malware in the system of the
organization. As per author Fig.2 shows, injecting the malicious code of files in the
system of the organization will create an adverse impact where it will make the data
inaccessible to the employees or the business organization for the proper analysis and
make a strategic decision. As per the author in terms of denial of service attack, the
network, the network or the servers are unable to find the returning address of the hackers
or the attackers while sending the approval for the authentication. According to the author,
it makes the business organization for making a proper analysis of the data as because the
effect of denial of service makes the server to run slow.

Figure 2: Denial of Service


• Man in the middle attack.
Zhao and Ge,(2013) have described the man in the middle attack Fig.3 shows, the
hackers or the attackers try to the intercept the communication occurring between two
systems[8]. The author has highlighted in the article that such kind of attack has a very
adverse impact on the business intelligence of the IoT Platform.

Figure 3: The hackers or the attackers try to the intercept the communication occurring
between two systems.
According to the author, this type of attack in the business intelligence can result
into a very dangerous attacker has the complete control over the user system to manipulate
and to change the analytical data of the business organization.

4. Issues and the solution


Depending on different types of attack there may be several types of issue that may occur.
The issues with respect to the IoT in Business Intelligence are as follows.

Understanding the IoT: The concept of the internet of things is very much complex and
the issues with the understanding the concept of the internet of things may occur. The
main issue related to IoT in the sector of business intelligence is all about enhancing the
understanding capability for the changes and the implication made in the IoT platform to
improve the business intelligence a, activity and the data analytics survey [9]. Improper
understanding of the internet of things, make the business intelligence more complex for
making any proper decision and to process the actual and the real-time data.

The issue with the Data Connectivity: The internet of things is dependent on several
technologies and the internet connectivity. Problem with the data connectivity issue may
occur if the network and the internet connectivity will be unavailable or slow. In the
context of business intelligence, a huge amount of data is gathered and collected to process
the data for the analysis. In the context of business intelligence, instant updating is
required and IoT is totally dependent on the internet connectivity. Therefore, slow internet
connection and the unavailable internet connectivity will create an issue while processing
the data.

The issue with the compatibility of the hardware: The process of data capturing occurs
through different types of sensors. These sensors are connected to the gateways of the IoT
for the collection and the transmission of the data on the cloud [11]. The adoption of IoT
for the purpose of business intelligence could be a critical situation of an issue in the
business organization if the hardware of the IoT devices are too compatible enough to
support the Business Intelligence system.

Issues related to the analytics: Business intelligence is entirely based on the collection
of the data which will be processed for actionable insights. Depending on the demand for
the high-performance data analytics platform, which is capable enough to handle huge
amount data for adding the data at the later point of time? Managing a large amount of
data for the purpose of analysis can be a major problem too during the critical situation.

Data Security Issue: Data security is a major issue for the adoption of any type of
technology. Due to the occurrence of the ransomware attacks and other malware attacks,
there are several types of security issues that may arise in the IoT platform. The
security issue in the IoT platform may lead to creating data loss, monitoring or the
tracking of the organizational data which can be used for the purpose of Business
Intelligence and the other types of data and hardware related issue may occur with the data
related security issue.
Cloud Attacks: IoT uses the cloud computing and the cloud server for the storage and
the transmission of the data. In the context of cloud attack, the data saved in the server by
the organization for purpose of data analysis may get affected. The data related to the
business intelligence are saved in the in the cloud server. The attack in the cloud on the
server will lead to the change or the manipulation of the data in a cloud server. Such issue
can create an adverse effect on the data related to the Business intelligence.

Security Issues in AI Built: Artificial Intelligence is taking a new shape in the world of
business and the business organization uses the AI built-in technology to enhance the
business intelligence. The introduction to the AI feature assists the organization in better
analysis of the data. Integrating AI features into the IoT platform makes for business
intelligence makes identification and analysis of the data more appropriately with respect
to the market trend [9]. The rise in different types of cyber-attacks such as ransomware
attack, malware attack through virus Trojan etc. is creating a serious issue in the security
features of the AI built, thereby making an adverse impact on the IoT platform and the
business intelligence too.

Information leakage and the information tracks: Data and the information is one of the
main components of every business organization. In the context of business intelligence,
the growth of the organization and the future trends of the business are analyzed by
collecting data related to the business. A large amount of data is collected and process for
the purpose of data analysis. Lack in the security features of the IoT platform will allow
the attacker or the hackers to have access on the business data. It will be easy for the
hacker or the intruders to track and the monitor the data related to the business. This will
assist the unauthorized agent, or the hackers top manipulate the data related to the business
and can bring financial loss to the organization. Lack of security in IoT platform leads to
such type of issue.

Selection of the Right IoT platform: Selection of the Right IoT platform for the
business organization is very much crucial. The implementation of the IoT in business
intelligence is very much complex. Therefore, a change in technology in future leads to
change an entire business intelligence model. Selection of improper platform for the
business intelligence may also create security issue in the near future.

Data Encryption Issue: There are several types of IoT supported tools which are not
capable enough to encrypt the business. There high rate of data flow occurs in the business
intelligence approach. Even after the use of the internet, there are several IoT platforms for
the business intelligence which is unable to encrypt the data properly in terms of business
intelligence.

Solution
Due to several types of attacks, there are major types of issues that may occur in the IoT
platform which creates an adverse effect on the Business intelligence. Preventive action
and maintaining the security measures will assist in mitigating such issues.

Proper Security requirements and the verification of the function: Security is one of
the major aspects of IoT which is extremely important to make the function properly.
Implementation of security features in the IoT platform for the Business Intelligence will
make the system secure in order to prevent the system from any type of cyber-attacks and
the threats.
Secure review of good: It is mandatory for the business organization to maintain a secure
review of the code. The implementation of IoT platform for the business intelligence
requires secure review of the code in order to minimize the level of threat.

Implementation of penetration Technique: Penetration technique is crucial to identify


the vulnerabilities or the threats over the network. End to end penetration technique will
help in finding bugs and the errors in the network for the effective implementation of the
Business intelligence in the IoT platform.

Encryption of Data: As it has been discussed, Implementation of Business Intelligence


on the IoT platform is entirely dependent on the data. The data which has been gathered is
later on the process for the analysis. Encryption of data will enhance the security features
of the data during the collection or the transmission over the Network Encryption of data
will make the data more secure for the analysis of the data. It can be implemented with the
cryptographic technique by using the public key and the private key encryption.

Use of Secure Socket Layer: The IoT is entirely dependent on the network connectivity
and the web interface. In most of the business intelligence model, the exchange of
information occurs through the web interface. Therefore, the user of secure socket layer
will mitigate protect the data from malware or ransomware attacks.

Authorization and the Authentication of the Gateway: Gateway is a bridge which


exists between the application server and the LAN which is connected to the internet. In
the context of the Business Intelligence the analysis of the data occurs over the internet.
There proper authentication of the server and the gateway would be effective for the
proper implementation of the Business Intelligence in the organization.

5 Advantages and the Disadvantages


The advantages of IoT in Business Intelligence are as follows

Optimizing the performance of the asset: The implementation and the adoption of the
IoT platform for the business intelligence are very much effective for the identification of
the potential problems. The performance of the asset can be improved by enhancing the
capacity, reliability and the capacity of the asset.
Improving the operational Efficiency: the operational efficiency of the organization can
be improved with an effective interaction process by analyzing the operational data. The
adoption of the IoT platform helps in monitoring the real-time data by providing a clear
access to the historical data.
Load management and the dynamic forecasting: Successful management of the
demand and the supply operation can be established to reduce the load. The future
business and the marketing trends of the organization can be attained through business
intelligence with the implementation of IoT.
Fraud Management and Prevention on Utility loss: The anomalies in the business
activity can be determined to prevent the utility loss and the fraud management can be
achieved with the implementation IoT for the Business Intelligence in the organization.

The disadvantages of IoT in Business Intelligence are as follows

Complexity: IoT is very much complex and to integrate the IoT platform with the
business intelligence will be very complex as it is dependent on several technologies.

Security and Privacy: Security and the privacy are the major concern in the IoT as it is
totally dependent on the internet. Therefore, therefore there are high chances of data
attack.
Compatibility: Not all the components of the IoT are compatible enough to comply with
other technology.
Safety: Lack of safety features will allow hacker on the network to hack upon the data of
the organization.

6. Conclusions

As per the paper, the several issues and the challenges related to the business intelligence
in the IoT platform has been discussed. A background literature review has been provided

by emphasizing the different types of attacks on IoT platform. The paper has covered on
aspects of several issues and the solution of business intelligence in the IoT platform
followed by the future research. Lastly, the major advantage and the disadvantages of the
IoT for business intelligence has been covered in the report.

References

1. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things
(IoT): A vision, architectural elements, and future directions. Future generation
computer systems, 29(7), 1645-1660
2. Kelly, S. D. T., Suryadevara, N. K., & Mukhopadhyay, S. C. (2013). Towards the
implementation of IoT for environmental condition monitoring in homes, IEEE
Sensors Journal, 13(10), 3846-3853.
3. Lazarescu, M. T. (2013). Design of a WSN platform for long-term environmental
monitoring for IoT applications. IEEE Journal on emerging and selected topics in
circuits and systems, 3(1), 45-54.
4. Datta, S.K., Bonnet, C., and Nikaein, N., 2014, March. An IoT gateway centric
architecture to provide novel M2M services. In the Internet of Things (WF-IoT),
2014 IEEE World Forum on (pp. 514-519). IEEE.
5. Larson, D., & Chang, V. (2016). A review and future direction of agile, business
intelligence, analytics and data science. International Journal of Information
Management, 36(5), 700-710
6. Bertino, E., & Islam, N. (2017). Botnets and internet of things security. Computer,
50(2), 76-79.
7. Vidalis, S., & Angelopoulou, O. (2014). Assessing identity theft in the Internet of
Things. Journal of IT Governance Practice.
8. Zhao, K., & Ge, L. (2013, December). A survey on the internet of things security. In
Computational Intelligence and Security (CIS), 2013 9th International Conference on
(pp. 663-667). IEEE.
9. Davenport, T. H. (2012). Business intelligence and organizational decisions.
Organizational Applications of Business Intelligence Management: Emerging Trends:
Emerging Trends,.
10. Leminen, S., Westerlund, M., Rajahonka, M., & Siuruainen, R. (2012). Towards IOT
ecosystems and business models. In the Internet of Things, Smart Spaces, and Next
Generation Networking (pp. 15-26). Springer, Berlin, Heidelberg.
11. Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against
distributed denial of service (DDoS) flooding attacks. IEEE communications surveys
& tutorials, 15(4), 2046-206

You might also like