Automated Data Integrity Checks for Financial Software Systems

Authors

  • Chinmay Mukeshbhai Gangani Independent Researcher, USA

DOI:

https://doi.org/10.36676/j.sust.sol.v1.i4.52

Keywords:

Cloud Storage, Ethical AI, Cloud Computing, Computing Services, AI Models, Data Integrity, Comparative Analysis, Model's Reliability, Data Management, Co-Pilot’s, Data Drift,, Security and Performance

Abstract

The integrity and security of the data that is outsourced are often threatened by an untrusted cloud server, despite the fact that cloud storage offers simple data outsourcing options. Designing security techniques that enable users to verify data integrity with reasonable computing and communication overheads is thus of utmost importance. The goal of this study is to create AI Data Quality Co-pilots, which are advanced systems designed to automatically assess and improve data quality in real time. According to AI Data Quality Co-pilots, future concerns like data drift, privacy, and inclusion won't affect the AI model's dependability or impartiality. Additionally, it discusses how co-pilot applications increase real-time base-level decision-making content and decrease erroneous fraud signals, as well as how ethical AI may be achieved by detecting and correcting biases. Businesses may expand and enhance AI with appropriate data management and maintain effective AI models with consistent high-quality data inputs by linking these co-pilots.

References

Schultz, Pim. Using machine-learning models for operational exception handling: a case study at IBM. MS thesis. University of Twente, 2017.

Singh, Kishore, and Peter J. Best. "Design and implementation of continuous monitoring and auditing in SAP enterprise resource planning." International Journal of Auditing 19.3 (2015): 307-317. DOI: https://doi.org/10.1111/ijau.12051

Singh, Kishore, Peter Best, and Joseph Mula. "Automating vendor fraud detection in enterprise systems." Journal of Digital Forensics, Security and Law 8.2 (2013): 1. DOI: https://doi.org/10.15394/jdfsl.2013.1142

Niesen, Tim, et al. "Towards an integrative big data analysis framework for data-driven risk management in industry 4.0." 2016 49th Hawaii international conference on system sciences (HICSS). IEEE, 2016. DOI: https://doi.org/10.1109/HICSS.2016.627

Büsch, Sebastian, Volker Nissen, and Arndt Wünscher. "Automatic classification of data-warehouse-data for information lifecycle management using machine learning techniques." Information Systems Frontiers 19 (2017): 1085-1099. DOI: https://doi.org/10.1007/s10796-016-9680-8

Sinha, Akinchan Buddhodev. "Role of Information Technology in Business Risk Management." IUP Journal of Systems Management 9.4 (2011).

Emmenegger, Sandro, et al. "Towards a procedure for assessing supply chain risks using semantic technologies." Knowledge Discovery, Knowledge Engineering and Knowledge Management: 4th International Joint Conference, IC3K 2012, Barcelona, Spain, October 4-7, 2012, Revised Selected Papers 4. Springer Berlin Heidelberg, 2013.

Husebø, Ivan-Louis Miranda, and Andreas Kvist. Decreasing Manual Workload by Automating SAP Travel Expense Workflows. MS thesis. University of Stavanger, Norway, 2018.

S. K. Rachakatla, P. Ravichandran, and J. R. Machireddy, "Scalable Machine Learning Workflows in Data Warehousing: Automating Model Training and Deployment with AI," Australian Journal of Machine Learning Research & Applications, vol. 2, no. 2, pp. 262-286, 2022.

C. Bird, D. Ford, T. Zimmermann, N. Forsgren, E. Kalliamvakou, T. Lowdermilk, et al., "Taking Flight with Copilot: Early insights and opportunities of AI-powered pair-programming tools," Queue, vol. 20, no. 6, pp. 35-57, 2022. DOI: https://doi.org/10.1145/3582083

A. M. Dakhel, V. Majdinasab, A. Nikanjam, F. Khomh, M. C. Desmarais, and Z. M. Jiang, "GitHub copilot AI pair programmer: Asset or liability?" Journal of Systems and Software, vol. 203, p. 111734, 2023. DOI: https://doi.org/10.1016/j.jss.2023.111734

Nica and V. Stehel, "Internet of things sensing networks, artificial intelligence-based decision-making algorithms, and real-time process monitoring in sustainable industry 4.0," Journal of Self-Governance and Management Economics, vol. 9, no. 3, pp. 35-47, 2021. DOI: https://doi.org/10.22381/jsme9320213

Y. Bao, G. Hilary, and B. Ke, "Artificial intelligence and fraud detection," Innovative Technology at the Interface of Finance and Operations: Volume I, pp. 223-247, 2022. DOI: https://doi.org/10.1007/978-3-030-75729-8_8

R. Mohan, M. Boopathi, P. Ranjan, M. Najana, P. K. Chaudhary, and A. K. Chotrani, "AI in Fraud Detection: Evaluating the Efficacy of Artificial Intelligence in Preventing Financial Misconduct," Journal of Electrical Systems, vol. 20, no. 3s, pp. 1332-1338, 2024. DOI: https://doi.org/10.52783/jes.1508

Shen J, Liu D, He D, Huang X, Xiang Y (2017) Algebraic signatures-based data integrity auditing for efcient data dynamics in cloud computing. IEEE Trans Sustain Comput 5(2):161–173 95. DOI: https://doi.org/10.1109/TSUSC.2017.2781232

Wang B, Li H, Liu X, Li F, Li X (2014) Efcient public verifcation on the integrity of multi-owner data in the cloud. J Commun Netw 16(6):592–599. DOI: https://doi.org/10.1109/JCN.2014.000105

Yu Y, Li Y, Yang B, Susilo W, Yang G, Bai J (2017) Attribute-based cloud data integrity auditing for secure outsourced storage. IEEE Trans Emerg Top Comput 8(2):377–390 97. Zhu H, Yuan Y, Chen Y, Zha Y, Xi W, Jia B, Xin Y (2019) A secure and efcient data integrity verifcation scheme for cloud-iot based on short signature. IEEE Access 7:90036–90044 98. DOI: https://doi.org/10.1109/TETC.2017.2759329

Wang H, He D, Tang S (2016) Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans Inf Forensic Secur 11(6):1165–1176 99. DOI: https://doi.org/10.1109/TIFS.2016.2520886

Thakur AS, Gupta P (2014) Framework to improve data integrity in multi cloud environment 100.

Zhang C, Xu Y, Hu Y, Wu J, Ren J, Zhang Y (2021) A blockchain-based multi-cloud storage data auditing scheme to locate faults. IEEE Trans Cloud Comput 10(4):2252–2263. DOI: https://doi.org/10.1109/TCC.2021.3057771

Subha T, Jayashri S (2014) Data integrity verifcation in hybrid cloud using ttpa. In: Networks and communications (NetCom2013). Springer, pp 149–159. DOI: https://doi.org/10.1007/978-3-319-03692-2_12

Mao J, Zhang Y, Li P, Li T, Wu Q, Liu J (2017) A position-aware merkle tree for dynamic cloud data integrity verifcation. Soft Comput 21(8):2151–2164. DOI: https://doi.org/10.1007/s00500-015-1918-8

Han S, Liu S, Chen K, Gu D (2014) Proofs of retrievability based on mrd codes. In: International Conference on Information Security Practice and Experience. Springer, pp 330–345. DOI: https://doi.org/10.1007/978-3-319-06320-1_25

Kaaniche N, El Moustaine E, Laurent M (2014) A novel zero-knowledge scheme for proof of data possession in cloud storage applications. In: 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. IEEE, pp 522–531. DOI: https://doi.org/10.1109/CCGrid.2014.81

Khedr WI, Khater HM, Mohamed ER (2019) Cryptographic accumulatorbased scheme for critical data integrity verifcation in cloud storage. IEEE Access 7:65635–65651. DOI: https://doi.org/10.1109/ACCESS.2019.2917628

Khatri TS, Jethava G (2013) Improving dynamic data integrity verifcation in cloud computing. In: 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT). IEEE, pp 1–6. DOI: https://doi.org/10.1109/ICCCNT.2013.6726483

Downloads

Published

02-11-2024

How to Cite

Chinmay Mukeshbhai Gangani. (2024). Automated Data Integrity Checks for Financial Software Systems. Journal of Sustainable Solutions, 1(4), 197–207. https://doi.org/10.36676/j.sust.sol.v1.i4.52

Issue

Section

Original Research Articles

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.