A PROPOSED MODEL FOR THE AUDIT PROCEDURES EXAMINATION FORM IN THE LIGHT OF CLOUD COMPUTING CONTROL STRATEGIES

Authors

  • Husam Hasan Hashim Mustansiriyah University
  • Kareema Abbas Gealo Uruk University

Cloud computing is a new technology that is widely used in various units today as well as in society and it is the result of revolutionary changes in the world of information and communication technology because of its benefits such as low cost, speed, and can be accessed anywhere at any time as well as Finding automatic solutions for various operations and financial transactions and Oversight procedures on cloud computing are one of those developments that  Transforming accounting software from products to services As a result of the rapid dynamic developments and changes in the business environment surrounding this profession. In the context of cloud censor ship the aim of the study Learn about cloud computing and its types and the possibility of benefiting from the benefits that they add to the economic units and their use in the field of accounting and auditing and obstacles to use This study will seek to demonstrate the integrity of cloud data, by designing a test form to show these procedures. The research reached results, including that cloud computing has characteristics, including speed and cost reduction, and immediate access without the need for prior installation of accounting programs on computers, and these characteristics are useless in the absence of control measures and audit methods.

Keywords:

Cloud Computing, Control procedures, Control Strategies, ; cloud technology.

[1] Alaa Abdul Wahid, A. (2018). Cloud Audit: The Contemporary Millennium Model for Auditing Accounting Information Systems. Tikrit Journal of Administration & Economic Sciences (Vol. 4).

[2] Shanawa & Al-Shammari, Wissam Aziz and Hussein Karim, (2019) A New Horizon for Regulating Accounting Work. Journal of City of Science University, )Vol. 1) Issue 6.

[3] Ahmed,Beh Yaman Ibrahim ,(2020).Factors Affecting the Trend of Companies to Rely on Cloud Accounting (An applied study on joint stock companies operating in the Kurdistan Region) Journal of Arts, Literature, Humanities and Sociology (Vol 54) .July.

[4] Khanom, T., (2017). Cloud Accounting: A Theoretical Overview, Journal of Business and Management, (Vol 19), Issue 6, PP 31-38. : https://www.researchgate.net/publication/317905827

[5] Attaran, M., & Woods, J. (2019). Cloud computing technology: improving small business performance using the Internet. Journal of Small Business and Entrepreneurship, 31(6), 495–519. https://doi.org/10.1080/08276331.2018.1466850

[6] Bhadauria, R., & Sanyal, S. (n.d.). Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques.

[7] Bounagui, Y., Mezrioui, A., & Hafiddi, H. (2019). Toward a unified framework for Cloud Computing governance: An approach for evaluating and integrating IT management and governance models. Computer Standards and Interfaces, 62, 98–118. https://doi.org/10.1016/j.csi.2018.09.001

[8] Doukas, N., Markovskyi, O. P., & Bardis, N. G. (2019). Hash function design for cloud storage data auditing. Theoretical Computer Science, 800, 42–51. https://doi.org/10.1016/j.tcs.2019.10.015

[9] Goyal, L. C., & Jatav, K. (2012). Cloud Computing: an Overview and its Impact on Libraries. In INTERNATIONAL JOURNAL OF NEXT GENERATION COMPUTER APPLICATIONS. www.ijngca.com

[10] Han, M. (2014). Research on e-government information resources sharing system based on cloud computing. Applied Mechanics and Materials, 687–691, 1758–1761. https://doi.org/10.4028/www.scientific.net/AMM.687-691.1758

[11] Hashim, H. E., & el Bendary, S. (2015). New exact solutions for the generalized combined fractional mKdV, KdV partial differentional equations with variable coefficients using a new fractional sub-equation method. Global Journal of Pure and Applied Mathematics, 11(6).

[12] Hou, H., Yu, J., & Hao, R. (2019). Cloud storage auditing with deduplication supporting different security levels according to data popularity. Journal of Network and Computer Applications, 134, 26–39. https://doi.org/10.1016/j.jnca.2019.02.015

[13] Kamale, A. (n.d.). International Journal on Recent and Innovation Trends in Computing and Communication A Review on Data Storage Security in Cloud Computing Environment for Mobile devices. http://www.ijritcc.org

[14] Shen, W., Yu, J., Xia, H., Zhang, H., Lu, X., & Hao, R. (2017). Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. Journal of Network and Computer Applications, 82, 56–64. https://doi.org/10.1016/J.JNCA.2017.01.015

[15] Shen, W., Yu, J., Xia, H., Zhang, H., Lu, X., & Hao, R. (2017). Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. Journal of Network and Computer Applications, 82, 56–64. https://doi.org/10.1016/j.jnca.2017.01.015

[16] Tian, H., Nan, F., Jiang, H., Chang, C. C., Ning, J., & Huang, Y. (2019). Public auditing for shared cloud data with efficient and secure group management. Information Sciences, 472, 107–125. https://doi.org/10.1016/j.ins.2018.09.009

[17] Yang, G., Yu, J., Shen, W., Su, Q., Fu, Z., & Hao, R. (2016). Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. Journal of Systems and Software, 113, 130–139. https://doi.org/10.1016/j.jss.2015.11.044

A PROPOSED MODEL FOR THE AUDIT PROCEDURES EXAMINATION FORM IN THE LIGHT OF CLOUD COMPUTING CONTROL STRATEGIES . (2022). Journal Port Science Research, 5(2), 76–87. https://doi.org/10.36371/port.2022.2.3

How to Cite

A PROPOSED MODEL FOR THE AUDIT PROCEDURES EXAMINATION FORM IN THE LIGHT OF CLOUD COMPUTING CONTROL STRATEGIES . (2022). Journal Port Science Research, 5(2), 76–87. https://doi.org/10.36371/port.2022.2.3