Automated Data Integrity Checks for Financial Software Systems
DOI:
https://doi.org/10.36676/j.sust.sol.v1.i4.52Keywords:
Cloud Storage, Ethical AI, Cloud Computing, Computing Services, AI Models, Data Integrity, Comparative Analysis, Model's Reliability, Data Management, Co-Pilot’s, Data Drift,, Security and PerformanceAbstract
The integrity and security of the data that is outsourced are often threatened by an untrusted cloud server, despite the fact that cloud storage offers simple data outsourcing options. Designing security techniques that enable users to verify data integrity with reasonable computing and communication overheads is thus of utmost importance. The goal of this study is to create AI Data Quality Co-pilots, which are advanced systems designed to automatically assess and improve data quality in real time. According to AI Data Quality Co-pilots, future concerns like data drift, privacy, and inclusion won't affect the AI model's dependability or impartiality. Additionally, it discusses how co-pilot applications increase real-time base-level decision-making content and decrease erroneous fraud signals, as well as how ethical AI may be achieved by detecting and correcting biases. Businesses may expand and enhance AI with appropriate data management and maintain effective AI models with consistent high-quality data inputs by linking these co-pilots.
References
Schultz, Pim. Using machine-learning models for operational exception handling: a case study at IBM. MS thesis. University of Twente, 2017.
Singh, Kishore, and Peter J. Best. "Design and implementation of continuous monitoring and auditing in SAP enterprise resource planning." International Journal of Auditing 19.3 (2015): 307-317. DOI: https://doi.org/10.1111/ijau.12051
Singh, Kishore, Peter Best, and Joseph Mula. "Automating vendor fraud detection in enterprise systems." Journal of Digital Forensics, Security and Law 8.2 (2013): 1. DOI: https://doi.org/10.15394/jdfsl.2013.1142
Niesen, Tim, et al. "Towards an integrative big data analysis framework for data-driven risk management in industry 4.0." 2016 49th Hawaii international conference on system sciences (HICSS). IEEE, 2016. DOI: https://doi.org/10.1109/HICSS.2016.627
Büsch, Sebastian, Volker Nissen, and Arndt Wünscher. "Automatic classification of data-warehouse-data for information lifecycle management using machine learning techniques." Information Systems Frontiers 19 (2017): 1085-1099. DOI: https://doi.org/10.1007/s10796-016-9680-8
Sinha, Akinchan Buddhodev. "Role of Information Technology in Business Risk Management." IUP Journal of Systems Management 9.4 (2011).
Emmenegger, Sandro, et al. "Towards a procedure for assessing supply chain risks using semantic technologies." Knowledge Discovery, Knowledge Engineering and Knowledge Management: 4th International Joint Conference, IC3K 2012, Barcelona, Spain, October 4-7, 2012, Revised Selected Papers 4. Springer Berlin Heidelberg, 2013.
Husebø, Ivan-Louis Miranda, and Andreas Kvist. Decreasing Manual Workload by Automating SAP Travel Expense Workflows. MS thesis. University of Stavanger, Norway, 2018.
S. K. Rachakatla, P. Ravichandran, and J. R. Machireddy, "Scalable Machine Learning Workflows in Data Warehousing: Automating Model Training and Deployment with AI," Australian Journal of Machine Learning Research & Applications, vol. 2, no. 2, pp. 262-286, 2022.
C. Bird, D. Ford, T. Zimmermann, N. Forsgren, E. Kalliamvakou, T. Lowdermilk, et al., "Taking Flight with Copilot: Early insights and opportunities of AI-powered pair-programming tools," Queue, vol. 20, no. 6, pp. 35-57, 2022. DOI: https://doi.org/10.1145/3582083
A. M. Dakhel, V. Majdinasab, A. Nikanjam, F. Khomh, M. C. Desmarais, and Z. M. Jiang, "GitHub copilot AI pair programmer: Asset or liability?" Journal of Systems and Software, vol. 203, p. 111734, 2023. DOI: https://doi.org/10.1016/j.jss.2023.111734
Nica and V. Stehel, "Internet of things sensing networks, artificial intelligence-based decision-making algorithms, and real-time process monitoring in sustainable industry 4.0," Journal of Self-Governance and Management Economics, vol. 9, no. 3, pp. 35-47, 2021. DOI: https://doi.org/10.22381/jsme9320213
Y. Bao, G. Hilary, and B. Ke, "Artificial intelligence and fraud detection," Innovative Technology at the Interface of Finance and Operations: Volume I, pp. 223-247, 2022. DOI: https://doi.org/10.1007/978-3-030-75729-8_8
R. Mohan, M. Boopathi, P. Ranjan, M. Najana, P. K. Chaudhary, and A. K. Chotrani, "AI in Fraud Detection: Evaluating the Efficacy of Artificial Intelligence in Preventing Financial Misconduct," Journal of Electrical Systems, vol. 20, no. 3s, pp. 1332-1338, 2024. DOI: https://doi.org/10.52783/jes.1508
Shen J, Liu D, He D, Huang X, Xiang Y (2017) Algebraic signatures-based data integrity auditing for efcient data dynamics in cloud computing. IEEE Trans Sustain Comput 5(2):161–173 95. DOI: https://doi.org/10.1109/TSUSC.2017.2781232
Wang B, Li H, Liu X, Li F, Li X (2014) Efcient public verifcation on the integrity of multi-owner data in the cloud. J Commun Netw 16(6):592–599. DOI: https://doi.org/10.1109/JCN.2014.000105
Yu Y, Li Y, Yang B, Susilo W, Yang G, Bai J (2017) Attribute-based cloud data integrity auditing for secure outsourced storage. IEEE Trans Emerg Top Comput 8(2):377–390 97. Zhu H, Yuan Y, Chen Y, Zha Y, Xi W, Jia B, Xin Y (2019) A secure and efcient data integrity verifcation scheme for cloud-iot based on short signature. IEEE Access 7:90036–90044 98. DOI: https://doi.org/10.1109/TETC.2017.2759329
Wang H, He D, Tang S (2016) Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans Inf Forensic Secur 11(6):1165–1176 99. DOI: https://doi.org/10.1109/TIFS.2016.2520886
Thakur AS, Gupta P (2014) Framework to improve data integrity in multi cloud environment 100.
Zhang C, Xu Y, Hu Y, Wu J, Ren J, Zhang Y (2021) A blockchain-based multi-cloud storage data auditing scheme to locate faults. IEEE Trans Cloud Comput 10(4):2252–2263. DOI: https://doi.org/10.1109/TCC.2021.3057771
Subha T, Jayashri S (2014) Data integrity verifcation in hybrid cloud using ttpa. In: Networks and communications (NetCom2013). Springer, pp 149–159. DOI: https://doi.org/10.1007/978-3-319-03692-2_12
Mao J, Zhang Y, Li P, Li T, Wu Q, Liu J (2017) A position-aware merkle tree for dynamic cloud data integrity verifcation. Soft Comput 21(8):2151–2164. DOI: https://doi.org/10.1007/s00500-015-1918-8
Han S, Liu S, Chen K, Gu D (2014) Proofs of retrievability based on mrd codes. In: International Conference on Information Security Practice and Experience. Springer, pp 330–345. DOI: https://doi.org/10.1007/978-3-319-06320-1_25
Kaaniche N, El Moustaine E, Laurent M (2014) A novel zero-knowledge scheme for proof of data possession in cloud storage applications. In: 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. IEEE, pp 522–531. DOI: https://doi.org/10.1109/CCGrid.2014.81
Khedr WI, Khater HM, Mohamed ER (2019) Cryptographic accumulatorbased scheme for critical data integrity verifcation in cloud storage. IEEE Access 7:65635–65651. DOI: https://doi.org/10.1109/ACCESS.2019.2917628
Khatri TS, Jethava G (2013) Improving dynamic data integrity verifcation in cloud computing. In: 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT). IEEE, pp 1–6. DOI: https://doi.org/10.1109/ICCCNT.2013.6726483
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Sustainable Solutions

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The license allows sharing and adapting the material as long as it is not for commercial purposes, and proper attribution is given to the authors.