Security and Privacy Issues for Business Intelligence in IoT

  • Mohan Krishna KagitaEmail author
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 70)


IoT is a revolution in the business sector and adoption of IoT devices in the business organization leads to the success management of business data along with the success of the organization. Implementation of IoT in the business organization helps in building an Enterprise Competitive advantages and increases the efficiency of operational activities. Big data and cloud computing has provided a significant impact on improving the business intelligence by analyzing, identifying and discovering the business-related data. Data is biggest asset of every business organization and proper data maintenance is the major concern for every organization. Internet of Things (IoT) is using in every sector of business for efficient utilization of data and the organization expected to have enriched data from the use of IoT devices. The security issues of IoT are a biggest concern in managing and maintaining business data. Business intelligence is maintained dependent on the historical and present data in order to estimate and perform calculation on future data. Due to security issues of IoT the organizational data can be in danger due to potential threats, loss of data and data manipulation. Business intelligence mainly depends on the plugins which needs internet connectivity. Attacker can perform on the browser of the system and destroy the plugins associated with it, if browser is not protected from antivirus and firewalls. Lack in security features of the device will allows attackers to trace the details of the system and perform attack by manipulating or stealing the data. These types of attacks are intentionally performed to exploit the business data of the organization by hampering the business intelligence.


IoT Big data Cloud computing 


  1. 1.
    Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRefGoogle Scholar
  2. 2.
    Kelly, S.D.T., Suryadevara, N.K., Mukhopadhyay, S.C.: Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sens. J. 13(10), 3846–3853 (2013)CrossRefGoogle Scholar
  3. 3.
    Lazarescu, M.T.: Design of a WSN platform for long-term environmental monitoring for IoT applications. IEEE J. Emerg. Sel. Top. Circuits Syst. 3(1), 45–54 (2013)CrossRefGoogle Scholar
  4. 4.
    Datta, S.K., Bonnet, C., Nikaein, N.: An IoT gateway centric architecture to provide novel M2M services. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 514–519, Mar 2014. IEEE (2014)Google Scholar
  5. 5.
    Leminen, S., Westerlund, M., Rajahonka, M., Siuruainen, R.: Towards IoT ecosystems and business models. In: Internet of Things, Smart Spaces, and Next Generation Networking, pp. 15–26. Springer, Berlin, Heidelberg (2012)CrossRefGoogle Scholar
  6. 6.
    Larson, D., Chang, V.: A review and future direction of agile, business intelligence, analytics and data science. Int. J. Inf. Manage. 36(5), 700–710 (2016)CrossRefGoogle Scholar
  7. 7.
    Bertino, E., Islam, N.: Botnets and internet of things security. Computer 50(2), 76–79 (2017)CrossRefGoogle Scholar
  8. 8.
    Vidalis, S., Angelopoulou, O.: Assessing identity theft in the Internet of Things. J. IT Gov. Pract. (2014)Google Scholar
  9. 9.
    Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046–2206 (2013)CrossRefGoogle Scholar
  10. 10.
    Zhao, K., Ge, L.: A survey on the internet of things security. In: 2013 9th International Conference on Computational Intelligence and Security (CIS), pp. 663–667, Dec 2013. IEEE (2013)Google Scholar
  11. 11.
    Davenport, T.H.: Business intelligence and organizational decisions. In: Organizational Applications of Business Intelligence Management: Emerging Trends (2012)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Charles Sturt UniversityMelbourneAustralia

Personalised recommendations