Investigation of IT Auditing and Checklist Generation Approach to Assure A Secure Cloud Computing Framework

Authors

  • Rajni Maheshwari Department of Computer Science and Engineering, Bharati Vidyapeeth, Pune – 411030, India
  • Suhas H. Patil Department of Computer Science and Engineering, Bharati Vidyapeeth, Pune – 411030, India
  • S. S. Dhotre Department of Computer Science and Engineering, Bharati Vidyapeeth, Pune – 411030, India

DOI:

https://doi.org/10.51983/ajcst-2012.1.2.1705

Keywords:

IT Auditing, Cloud Framework, ERP, CRM, Checklists, Cryptography, E-Campus, E-Learning

Abstract

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. In this project we are conducting the investigation studies over the IT auditing for assuring the security for cloud computing. During this investigation, we are implementing working of ID auditing mechanism over the cloud computing framework in order to assure the desired level of security. In the IT auditing mechanism, the concept of checklists are prepared for the cloud computing application and their lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications for large enterprise applications like CRM/ERP and achieving the desired level of security with design and implementation of IT auditing technique. As results from practical investigation of IT auditing over the cloud computing framework, we claim that IT auditing assuring the desired level of security, regulations, compliance for the enterprise applications like CRM, ERP, E-campus, E-learning etc.

References

NIST, Definition of Cloud Computing , Vol. 15, accessed on 4/15/2010, http://csrc.nist.gov/groups/SNS/cloudcomputing/cloud-def-Vol.15. doc.

Will Forrest, Clearing the Air on Cloud Computing, Discussion Document from McKinsey and Company, March 2009.

Luis M Vaquero, et al, “A Breaks in the Clouds: Toward the Definitions”, ACM SIGCOMM Computer Communication Review, Vol. 39, No.1, January 2009, pp 50-55.

Open crowd cloud computing taxonomy, http://www.opencrowd.com/ views.

Gramm-Leach-Bliley Act (GLBA, the Financial Services Modernization Act), http://www.gpo.gov/fdsys/pkg/ PLAW106publ102/contentdetail. html.

HIPAA U.S. Department of Health & Human Services, Office of Civil Rights, HIPAA, http://www.hhs.gov/ocr/hipaa/ privacy.html

IDE Enterprise Panel, August 2008, n = 244

Cloud Computing, the role of internal auditing, Ernst and Young, PPT presentation, October 8, 2009

Sarbanes-Oxley Act 2002, U.S. Securities and Exchange Commission (effective July 30, 2002), http://www.sec.gov/ about/laws/soa2002.pdf

Payment Card Industry Data Security Standard, https://www. pcisecuritystandards.org/security_standards/pci_ dss.shtml

SAS 70 Audit: http://www.aicpa.org/download/members/div/auditstd/ AU-00324.PDF

Security Guidance for Critical Areas of Focus in Cloud Computing, Vol. 2, by Cloud Security Alliance, December 2009.

Open Security Architecture Group http://www.opensecurityarchitecture. org/cms/library/patternlandscape/251-pattern-cloud-computing

Gerard Briscoe, AlexandrosMarinos: “Digital Ecosystems in the Clouds: Towards Community Cloud Computing”, IEEE Digital Ecosystems and Technologies DEST (2009), online access at http:// arxiv.org/PS_cache/arxiv/pdf/0903/0903.0694v3.pdf

Data is cited from several IBM presentations. For Example the IEEE Services I (2009) keynote.

Downloads

Published

05-11-2012

How to Cite

Maheshwari, R., Patil, S. H., & Dhotre, S. S. (2012). Investigation of IT Auditing and Checklist Generation Approach to Assure A Secure Cloud Computing Framework. Asian Journal of Computer Science and Technology, 1(2), 28–35. https://doi.org/10.51983/ajcst-2012.1.2.1705