Building the Audit Information System in Cloud Computing Environment

2014 ◽  
Vol 509 ◽  
pp. 170-174
Author(s):  
Xiang Jian Wei

The traditional audit model is the audit organ procurement respectively the application server, database server and network audit system, and then the auditor through the office LAN access audit information system. Each audit institution needs to configure the independent hardware and software resources in the audit mode, the result will generate IT costs high and professional maintenance costs are high and need a lot of professional maintenance staff. Development and utilization of cloud computing become the factors or not but with the popularity of IT applications in various industries department. Cloud computing is outside of the Internet industry, and further affect the accounting and auditing profession, bring new challenges in the development of cloud computing to audit, (Rongsheng-Qin, 2013). Today, under the rapid development of cloud computing, cloud computing concepts of how to use the Internet, how to through the cloud storage data, coordinated various audit resources in the cloud, for the auditor to provide more efficient, more scientific audit process, finally realizes the auditing organs at all levels of hardware resources, software resources, Shared services, to optimize the use of audit resources fully, is China's national audit problems to be solved in the future. This paper build a cloud computing environment audit the basic frame of information system under the research and application status of cloud computing.

Author(s):  
Junshu Wang ◽  
Guoming Zhang ◽  
Wei Wang ◽  
Ka Zhang ◽  
Yehua Sheng

AbstractWith the rapid development of hospital informatization and Internet medical service in recent years, most hospitals have launched online hospital appointment registration systems to remove patient queues and improve the efficiency of medical services. However, most of the patients lack professional medical knowledge and have no idea of how to choose department when registering. To instruct the patients to seek medical care and register effectively, we proposed CIDRS, an intelligent self-diagnosis and department recommendation framework based on Chinese medical Bidirectional Encoder Representations from Transformers (BERT) in the cloud computing environment. We also established a Chinese BERT model (CHMBERT) trained on a large-scale Chinese medical text corpus. This model was used to optimize self-diagnosis and department recommendation tasks. To solve the limited computing power of terminals, we deployed the proposed framework in a cloud computing environment based on container and micro-service technologies. Real-world medical datasets from hospitals were used in the experiments, and results showed that the proposed model was superior to the traditional deep learning models and other pre-trained language models in terms of performance.


2018 ◽  
Vol 9 (3) ◽  
pp. 23-31
Author(s):  
Narander Kumar ◽  
Surendra Kumar

The internet has become essential and is the basis of cloud computing and will continue to be in the future. Best resource allocation is a process of placing the resources at their minimum cost/time and minimizes the load to a virtual machine. In this article, the authors propose an algorithm to optimize assignment problems and get the best placements in the resources to maintain the load on the virtual machine. Further, they also make comparisons between various optimization mechanisms for assignment problems, which is formulated for the cloud in virtual machine placement.


2016 ◽  
Vol 3 (1) ◽  
pp. 42
Author(s):  
Quanhui Ren ◽  
Hui Gao

<span style="color: black; line-height: 115%; font-family: 'Calibri','sans-serif'; font-size: 12pt; mso-fareast-font-family: Calibri; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">In order to adapt to rapid development of network information technology, the application of cloud computing technology is increasingly widespread. However, the security problem in the cloud computing environment has not been effectively resolved. Currently, the research on this problem is getting more attention from the industry. In order to further investigate the information security issues of cloud computing environment, this article not only discusses the basic concept, characteristics and service model of cloud computing, but also focuses on the cloud computing security reference model and cloud cube model. In this paper, the information security problems and concrete solutions in the former cloud computing environment are discussed from different aspects.</span>


Author(s):  
Mao-Lun Chiang ◽  
Yung-Fa Huang ◽  
Hui-Ching Hsieh ◽  
Wen-Chung Tsai

Due to the rapid development and popularity of the Internet, cloud computing has become an indispensable application service. However, how to assign various tasks to the appropriate service nodes is an important issue. Based on the reason above, an efficient scheduling algorithm is necessary to enhance the performance of system. Therefore, a Three-Layer Cloud Dispatching (TLCD) architecture is proposed to enhance the performance of task scheduling. In first layer, the tasks need to be distinguished to different types by their characters. Subsequently, the Cluster Selection Algorithm is proposed to dispatch the task to appropriately service cluster in the secondly layer. Besides, a new scheduling algorithm is proposed to dispatch the task to a suitable server in a server cluster to improve the dispatching efficiency in the thirdly layer. Basically, the TLCD architecture can obtain better task completion time than previous works. Besides, our algorithm and can achieve load-balancing and reliability in cloud computing network.


2021 ◽  
Vol 12 (4) ◽  
pp. 1041-1053
Author(s):  
Ibrahim Mahmood Ibrahim, Et. al.

Cloud computing is the requirement based on clients and provides many resources that aim to share it as a service through the internet. For optimal use, Cloud computing resources such as storage, application, and other services need managing and scheduling these services. The principal idea behind the scheduling is to minimize loss time, workload, and maximize throughput. So, the scheduling task is essential to achieve accuracy and correctness on task completion. This paper gives an idea about various task scheduling algorithms in the cloud computing environment used by researchers. Finally, many authors applied different parameters like completion time, throughput, and cost to evaluate the system.


2018 ◽  
Vol 8 (8) ◽  
pp. 1385 ◽  
Author(s):  
Mao-Lun Chiang ◽  
Yung-Fa Huang ◽  
Hui-Ching Hsieh ◽  
Wen-Chung Tsai

Due to the rapid development and popularity of the Internet, cloud computing has become an indispensable application service. However, how to assign various tasks to the appropriate service nodes is an important issue. Based on the reason above, an efficient scheduling algorithm is necessary to enhance the performance of the system. Therefore, a Three-Layer Cloud Dispatching (TLCD) architecture is proposed to enhance the performance of task scheduling. In the first layer, the tasks need to be distinguished into different types by their characters. Subsequently, the Cluster Selection Algorithm is proposed to dispatch the tasks to appropriate service clusters in the second layer. Besides this, a new scheduling algorithm is proposed in the third layer to dispatch the task to a suitable server in a server cluster to enhance the scheduling efficiency. Basically, the best task completion time can be obtained in our TLCD architecture. Furthermore, load balancing and reliability can be achieved under a cloud computing network environment.


2013 ◽  
Vol 284-287 ◽  
pp. 3502-3506 ◽  
Author(s):  
Shu Ching Wang ◽  
Wen Pin Liao ◽  
Kuo Qin Yan ◽  
Shun Sheng Wang ◽  
Szu Hao Tsai

Nowadays, network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. However, cloud computing, an Internet-based development in which dynamically scalable and often virtualized resources are provided as a service over the Internet has become a significant issue. According to the characteristics of cloud computing, there are a lot of applications and data centers in the cloud-computing environment, hence, the issues of information and communication security and authentication must to be considered. However, the most of the studies on the security and authentication require large amounts of computing resource; therefore not suitable for the cloud-computing environment. In this paper, a lightweight computing protocol, Lightweight Authentication Protocol (LAP), is proposed to enhance the security of cloud computing environment and provide the authentication of service.


Author(s):  
Sushanta Meher ◽  
Sohan Kumar Pande ◽  
Sanjaya Kumar Panda

Cloud computing provides access to various services such as servers, storage and applications to the customers' as and when required. The services on the cloud can be accessed with minimum efforts through any handheld devices that are connected to the Internet. In IaaS cloud, the services to the customers are provided in the form of two leases, AR and BE. Here, a running BE lease can be preempted upon arrival of an AR lease as BE has lower priority. However, frequent preemption of the BE lease causes an overhead to the system and leads to customer dissatisfaction. In this paper, we propose a fairness algorithm called TATA to provide fairness among the leases. We evaluate the proposed algorithm on various synthetic datasets and compare the results with an existing fairness algorithm. The results of simulation show that TATA produces better response time for both the leases than the existing algorithm.


Sign in / Sign up

Export Citation Format

Share Document