Asian Journal of Computer Science and Technology (AJCST)
Investigation of IT Auditing and Checklist Generation Approach to Assure A Secure Cloud Computing FrameworkAuthor : Rajni Maheshwari, Suhas H Patil and S.S. Dhotre
Volume 1 No.2 July-December 2012 pp 28-35
Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. In this project we are conducting the investigation studies over the IT auditing for assuring the security for cloud computing. During this investigation, we are implementing working of ID auditing mechanism over the cloud computing framework in order to assure the desired level of security. In the IT auditing mechanism, the concept of checklists are prepared for the cloud computing application and their lifecycle. Those checklists are prepared on the basis of models of cloud computing such as deployment models and services models. With this project our main concern is to present the cloud computing implications for large enterprise applications like CRM/ERP and achieving the desired level of security with design and implementation of IT auditing technique. As results from practical investigation of IT auditing over the cloud computing framework, we claim that IT auditing assuring the desired level of security, regulations, compliance for the enterprise applications like CRM, ERP, E-campus, E-learning etc.
IT Auditing, Cloud Framework, ERP. CRM. Checklists, Cryptography, E-Campus, E-Learning