Anomaly Detection for Soft Security in Cloud Based Auditing of Accounting Systems

Mats Neovius, Bob Duncan

Research output: Chapter in Book/Conference proceedingConference contributionScientificpeer-review

4 Citations (Scopus)


Achieving information security in the cloud is not a trivial exercise. When the systems involved are accounting software systems, this becomes much more challenging in the cloud, due both to the systems architecture in use, the challenges of proper configuration, and to the multiplicity of attacks that can be made against such systems. A particular issue for accounting systems concerns maintaining a proper audit trail in order that an adequate level of audit may be carried out on the accounting records contained in the system. In this paper we discuss the implications of the traditional approach to such systems and propose a complementary soft security solution relying on detecting behavioural anomalies by evidence theory. The contribution is in conceptualising the anomalies and providing a somewhat theoretical solution for a difficult and challenging problem. The proposed solution is applicable within any domain consisting of rigorous processes and risk of tampering or data exfiltrat ion, such as the cloud based accounting systems.

Original languageUndefined/Unknown
Title of host publicationProceedings of the 7th International Conference on Cloud Computing and Services Science
EditorsDonald Ferguson, Víctor Méndez Muñoz, Jorge Cardoso, Markus Helfert, Claus Pahl
PublisherSCITEPRESS Science And Technology Publications
ISBN (Print)978-989-758-243-1
Publication statusPublished - 2017
MoE publication typeA4 Article in a conference publication
EventInternational Conference on Cloud Computing and Services Science (CLOSER) - Proceedings of the 7th International Conference on Cloud Computing and Services Science (CLOSER 2017)
Duration: 24 Apr 201726 Apr 2017


ConferenceInternational Conference on Cloud Computing and Services Science (CLOSER)


  • Accounting systems audit
  • Anomaly detection
  • Cloud Security

Cite this