Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Progress in IS
…
265 pages
1 file
The purpose of this chapter is to provide insight into the internal audit challenges that a large Dutch bank was confronted with as the consequence of the IT transformation that was focused on leveraging the opportunities offered in the public cloud. Our work contributes to the body of literature by providing a conceptual framework that can help institutions navigate their assurance requirements in the public cloud. Furthermore, we provide practical attention points from the field for IT auditors. Finally, discussion points are shared with respect to the IT auditing of the traditional on-premise and the public cloud environment.
International Journal of Communications, Network and System Sciences, 2016
The user control over the life cycle of data is of an extreme importance in clouds in order to determine whether the service provider adheres to the client's pre-specified needs in the contract between them or not, significant clients concerns raise on some aspects like social, location and the laws to which the data are subject to. The problem is even magnified more with the lack of transparency by Cloud Service Providers (CSPs). Auditing and compliance enforcement introduce different set of challenges in cloud computing that are not yet resolved. In this paper, a conducted questionnaire showed that the data owners have real concerns about not just the secrecy and integrity of their data in cloud environment, but also for spatial, temporal, and legal issues related to their data especially for sensitive or personal data. The questionnaire results show the importance for the data owners to address mainly three major issues: Their ability to continue the work, the secrecy and integrity of their data, and the spatial, legal, temporal constraints related to their data. Although a good volume of work was dedicated for auditing in the literature, only little work was dedicated to the fulfillment of the contractual obligations of the CSPs. The paper contributes to knowledge by proposing an extension to the auditing models to include the fulfillment of contractual obligations aspects beside the important aspects of secrecy and integrity of client's data.
Cloud computing has gained mass popularity in the business environment. However, this technology also imposes some risk concerns, such as weak protection to security and privacy. Since its nature of distant and remote connectivity, the auditing process to this technology becomes challengeable. This paper focuses on issues related to cloud computing risk and audit tasks.
2016
Many people assume that cloud audit is no more difficult than IT audit in general. We provide an outline of the evolution of cloud, providing an explanation of how it differs from conventional IT. We then discuss some of the benefits and drawbacks of cloud, particularly in connection to audit challenges, highlighting the dangers and shortcomings of many approaches. Keywords—security; privacy; standards; compliance; audit.
2015
The Cloud Computing paradigm is getting popular deliberately and is being adopted in modern organizations because of its lower cost, scalability and high availability. This moves control of data from the owner to the cloud service provider and thus security and data privacy of customer or owner becomes a challenge. Cloud is a new concept and as a result of which the experience of providers in this field might not be enough to complement security. Security, being inconsistent and not robust, will have low credibility on the benefit that features of cloud computing has to offer. This research is done using exploratory method and presents an exploratory review on Information System (IS) Audit on cloud computing and security issues and prescribes a framework that can be used for Cloud Computing and Security. This research proposes an audit model for cloud computing.
2017
Ahead of the introduction of the EU General Data Privacy Regulation (GDPR), we consider some important unresolved issues with cloud computing, namely, the insecure cloud audit trail problem and the challenge of retaining cloud forensic evidence. Developing and enforcing good cloud security controls is an essential requirement for this is to succeed. The nature of cloud computing architecture can add additional problem layers for achieving cloud security to an already complex problem area. Historically, many corporates have struggled to identify when their systems have been breached, let alone understand which records have been accessed, modified, deleted or ex-filtrated from their systems. Often, there is no understanding as to who has perpetrated the breach, meaning it is difficult to quantify the risk to which they have been exposed. The GDPR seeks to improve this situation by requiring all breaches to be reported within 72 hours of an occurrence, including full identification of ...
Modern Applied Science, 2020
The objective of this study is identifying the impact of cyber governance on reducing the risk of cloud accounting in the Jordanian commercial banks. To achieve the objectives of this study, the descriptive and analytical approach was used; the study community is composed of external legal accountants who practices auditing in Jordan, (477) of them are practicing external auditing at the end of (2018) according to the statistics of the Jordanian association of certified public accountants (JACPA). Due to the difficulty and cost of the comprehensive survey, a simple random sample was taken. The sample included (213) auditors. The questionnaire was distributed to the sample of the study by the researchers personally and through e-mails, (182) questionnaires were recovered, after excluding (7) for the incompetence, of which (175) were valid for the statistical analysis. Thus, the percentage of retrieved and analyzed questionnaires was (82.2%), which is statistically acceptable. and In ...
2016
Information security in the cloud presents a serious challenge. We have identified fundamental weaknesses when undertaking cloud audit, namely the misconceptions surrounding the purpose of audit, what comprises a proper audit trail, what should be included, and how it should be achieved and maintained. A properly specified audit trail can provide a powerful tool in the armoury against cyber-crime, yet it is all too easy to throw away the benefits offered by this simple tool through lack of understanding, incompetence, mis-configuration or sheer laziness. Of course, merely having an effective audit trail is not enough — we actually have to examine it regularly to realise the potential benefits it offers. Keywords—security; privacy; audit; audit trail.
2017
The cloud computing in its various form allow users to store information at remote location and reduce load at local system. Even though it is an advantage still drawback exists such as remote storage. The major security issues in cloud computing such as lack of data control, lack of trust and multi-tenancy are reviewed. The cloud computing and its service and deployment models are discussed by ways which the present security issues in cloud computing are prevented. Ensuring cloud data integrity and privacy seems to be the major issue. To overcome unauthorized access of data by cloud service providers and data users, verification is performed through trusted third party auditor. The cloud auditing needs to be performed and data security also needs to be ensured without the knowledge of the actual data stores at cloud. Researcher shows keen interest to provide a cloud framework, which preserves the privacy and ensures the integrity of cloud data. The paper reviews privacy preserving ...
International Journal of Database Theory and Application, 2016
Cloud computing in its various forms allows users to store their information at remote location and reduce the burden at their local systems. Even though this is an advantage for users but there are also many drawbacks because of this remote storage. The main drawback which needs to be dealt with is security. Recently, security is the major concern which most of the cloud service providers are facing. The users store their information in remote location with the hope of maintaining the privacy and integrity of data. In order, to maintain the privacy and integrity of users' data auditing has to be done by the Cloud Service Providers (CSP). CSP uses the Third Party Auditor (TPA) for performing the auditing. The TPA performs auditing on behalf of the data owner using different auditing mechanisms. Many auditing mechanisms have been introduced in literature. Each mechanism varies from one another in one or more characteristics. In this paper we have provided a study on the different auditing mechanisms required to preserve the privacy and integrity of data in cloud. We have presented the advantages and flaws in each mechanism compared to another. Many auditing mechanisms are arising in literature with the aim to maintain the integrity of users' data and preserve the privacy. This paper remains as the basis for different auditing mechanisms that are arising in literature. With the help of auditing mechanisms the TPA can best satisfy the needs of the users.
Springer International Publishing eBooks, 2022
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Euromed Journal of Business, 2020
2014 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
International Journal of Information Management, 2014
Information Management & Computer Security, 2004
ACM Computing Surveys
International Journal Of Engineering And Computer Science, 2017
ACM Computing Surveys, 2015
International Journal of Scientific Research in Science and Technology
International Journal of Computer Applications, 2016
International Journal of Advanced Computer Science and Applications, 2014
International Journal of Engineering & Technology, 2018
Proceedings of the 6th Global Conference on Business, Management, and Entrepreneurship (GCBME 2021)
International Journal of Computer Applications, 2016
Proposal for a Conceptual Model on the Role of Digitalization in Improving External Audit Quality, 2024