Internet of Things & Creation of the Fifth V of Big Data
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 1, January 2017

Internet of Things & Creation of the Fifth V of Big Data

Shaurya Shekhar

The Internet of Things (IoT) is a term widely used nowadays to refer to the development of an intrinsic network of objects and appliances with Internet connectivity, which allows them to send and receive data. All of this data can be collectively referred to as Big Data, which basically comprises of large data sets and can be analyzed computationally to reveal patterns and trends relating to human behavior and interactions. In addition to the existing 4 Vs of Big Data (namely Volume, Variety, Velocity and Veracity), we can then derive a fifth V, called Value, which will help in engineering products better suited for a wider group of customers. Thus, we create a loop by connecting IoT (for sourcing of data) to Big Data (collection of data) to creating value from it and then back to IoT (for designing products with better functionality and greater acceptance).

Keywords: Big Data, Database, Data Security, Information, Value, Veracity, Velocity

Edition: Volume 6 Issue 1, January 2017

Pages: 1363 - 1366

Share this Article

How to Cite this Article?

Shaurya Shekhar, "Internet of Things & Creation of the Fifth V of Big Data", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20164394, Volume 6 Issue 1, January 2017, 1363 - 1366

113 PDF Views | 92 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Big Data'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1345 - 1350

Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks

Kapilesh S. Swami, Dr. P Sai Kiran

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2241 - 2244

Backup Anomaly Identification with R and Hadoop

Ravindra Phule, Madhav Ingle

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1363 - 1366

Internet of Things & Creation of the Fifth V of Big Data

Shaurya Shekhar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1598 - 1602

Information Acquisition Utilizing Parallel Rough Set and MapReduce from Big Information

Sachin Jadhav, Shubhangi Suryawanshi

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1482 - 1485

Overview of Big Data

Nivedita Manohar

Share this Article

Similar Articles with Keyword 'Database'

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on Users Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Research Paper, Computer Science & Engineering, Kenya, Volume 7 Issue 5, May 2018

Pages: 1409 - 1411

Students Performance Prediction Using FP-Tree Data Mining Techniques

Eliakim Ombati Akama

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1165 - 1168

Privacy Preserving Closed Frequent Pattern Mining

Anju Vijayan

Share this Article

Similar Articles with Keyword 'Data Security'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1345 - 1350

Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks

Kapilesh S. Swami, Dr. P Sai Kiran

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1949 - 1953

A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service

Pooja Saini, Kanchan Narula

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1363 - 1366

Internet of Things & Creation of the Fifth V of Big Data

Shaurya Shekhar

Share this Article

Similar Articles with Keyword 'Information'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Similar Articles with Keyword 'Value'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Research Paper, Computer Science & Engineering, Sweden, Volume 9 Issue 12, December 2020

Pages: 1137 - 1139

Predicting Diabetes using Gradient Boosting is a Machine Learning Technique

Ali Adam Mohammad

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Birds Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'Veracity'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1363 - 1366

Internet of Things & Creation of the Fifth V of Big Data

Shaurya Shekhar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 2088 - 2094

Data Balancing Scheme for Multi-node Heterogeneous Hadoop Cluster

Indresh B. Rajwade, Er. Prateek Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2913 - 2915

Lightning Fast Distributed Machine Learning Framework

Madhu Sudhan H V

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 1, January 2014

Pages: 39 - 41

Evaluation of Similarities Measure in Document Clustering

Hemalatha Immandhi

Share this Article

Similar Articles with Keyword 'Velocity'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1888 - 1891

Lightning CEP - Joining on High Velocity Stream

Vikas Kale, Kishor Shedge

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2161 - 2168

Vision Based Fire Flame Detection System Using Optical flow Features and Artificial Neural Network

Anila R. Kurup

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1363 - 1366

Internet of Things & Creation of the Fifth V of Big Data

Shaurya Shekhar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 2111 - 2114

An Efficient Clustering for Data Aggregation with Reliable Routing in WSN

Sneha Kamble, Tanuja S. Dhope

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2027 - 2029

Speed-Constrained Multi-Objective PSO for Optimization of Problem

Prachi Gupta, Dr. Ramachandra Pujeri

Share this Article
Top