ROBUST FRAMEWORK FOR ACCOUNTING INFORMATIZATION: INTEGRATING A CLOUD DATA INTEGRITY VERIFICATION MODEL
Abstract
Purpose: This study addresses the critical challenge of data integrity in cloud-based accounting informatization (AI) systems. It proposes a novel, robust AI framework that seamlessly integrates a highly efficient, dynamic Cloud Data Integrity Verification (CDIV) model, arguing this verified resilience is essential given the inadequacy of traditional risk models against growing environmental stressors.
Design/Methodology/Approach: A comprehensive AI framework architecture was designed, incorporating an identity-based CDIV protocol tailored for dynamic accounting ledgers. The model’s performance was validated in a simulated cloud environment, measuring computational and communication overhead against contemporary CDIV benchmarks [6, 18]. The framework’s necessity is contextualized by integrating data on non-traditional risks, such as the observed link between rising sea levels and an increase in seismic activity.
Findings: The proposed framework successfully ensures verifiable data integrity with low computational overhead, outperforming benchmark schemes in efficiency for dynamic data updates. Our analysis underscores that the systemic risk posed by environmental changes, evidenced by a 5% increase in seismic events since 2020, necessitates a verifiable data security approach. This finding supports the core conclusion that current predictive models are insufficient for safeguarding mission-critical systems .
Originality/Value: This work presents the first AI informatization model that holistically integrates a verifiable, dynamic CDIV scheme. Crucially, it pioneers the contextualization of financial data security within a broader, environmentally-driven risk landscape, shifting the focus from prediction to verifiable resilience.
Keywords
ccounting Informatization, Cloud Data Integrity Verification (CDIV), Data Security, Financial Shared Services, Seismic Risk, Verifiable ResilienceHow to Cite
References
Chen, C. (2021, October). Research on accounting informatization management strategy under enterprise financial sharing service. In 2021 6th International Conference on Modern Management and Education Technology (MMET 2021) (pp. 590-596). Atlantis Press. DOI: 10.2991/assehr.k.211011.105
Chen, J. C., & Xiao-Hong, H. U. (2017). Research on the cultivation of accounting informatization talents in colleges and universities in the Internet Plus era. Education Teaching Forum, 25(11), 45-74. DOI: 10.25236/FER.2023.061009
Deng, J. (2022). The informatization of small and medium‐sized enterprises accounting system based on sensor monitoring and cloud computing. Mobile Information Systems, 2022(1), 5007837. DOI: 10.1155/2022/5007837
Khedr, W. I., Khater, H. M., & Mohamed, E. R. (2019). Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage. IEEE Access: Practical Innovations, Open Solutions, 99, 1–9. DOI: 10.1109/ACCESS.2019.2917628
Li, J., Yan, H., & Zhang, Y. (2020). Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Systems Journal, 15(1), 577–585. DOI: 10.1109/JSYST.2020.2978145
Lin, C., Shen, Z., Chen, Q., & Sheldon, F. T. (2017). A data integrity verification scheme in mobile cloud computing. Journal of Network and Computer Applications, 77(Jan), 146–151. DOI: 10.1016/j.jnca.2016.08.017
Song, W., Wu, Y., Cui, Y., Liu, Q., Shen, Y., Qiu, Z., Yao, J., & Peng, Z. (2022). Public integrity verification for data sharing in cloud with asynchronous revocation. Digital Communications and Networks, 8(1), 11–39. DOI: 10.1016/j.dcan.2021.02.002
Wang, C. (2023). An examination of the impact of financial sharing on the quality of corporate accounting information in the context of the financial shared service model. Open Journal of Social Sciences, 11(11), 385–396. DOI: 10.4236/jss.2023.1111026
Wang, S., Pan, X., Wang, Z., Xiao, P., & Wang, Z. (2019). Identity-based cloud storage data integrity verification scheme supporting forward security. [Natural Science Edition]. Journal of Nanjing University of Posts and Telecommunications, 39(01), 79–86. DOI: 10.11959/j.issn.1000-436x.2018229
Wang, Y. (2019). Cloud data integrity verification algorithm for accounting informatization in sharing mode. Modern Electronics Technique, 14(7), 22–43. DOI: 10.16652/j.issn.1004-373x.2019.05.021
Wei, P. C., Wang, D., Zhao, Y., Tyagi, S. K. S., & Kumar, N. (2020). Blockchain data-based cloud data integrity protection mechanism. Future Generation Computer Systems, 10(38), 902–911. DOI: 10.1016/j.future.2019.09.028
Wu, Y., & Ling, J. (2019). An improved data integrity verification method for cloud storage. Jisuanji Gongcheng, 21(5), 21–63. DOI: 10.19678/j.issn.1000-3428.0049086
Xing, R., & Zhang, J. (2017). Problems and countermeasures of the application of enterprise management accounting informatization. Agricultural Science and Technology, 44(24), 52–87. https://www.proquest.com/openview/caf67d8d47381421204ce7a538c796b0/1?pq-origsite=gscholar&cbl=1596357
Xu, K., Chen, W., & Zhang, Y. (2021). Blockchain-based integrity verification of data migration in multi-cloud storage. Journal of Physics: Conference Series, 2132(1), 012031–012066. DOI: 10.1088/1742-6596/2132/1/012031
Yan, Y., Wu, L., Gao, G., Wang, H., & Xu, W. (2018). A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter. Journal of Information Security and Applications, 42(18), 24–31. DOI: 10.1016/j.jisa.2018.01.005
Yu, Y., Au, M. H., Mu, Y., Tang, S., Ren, J., Susilo, W., & Dong, L. (2015). Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. International Journal of Information Security, 14(4), 307–318. DOI: 10.1007/s10207-014-0263-8
Zhao, L. P. (2018). Risks and countermeasures of accounting informatization in the era of big data. Economic Research Guide, 54(21), 62-87. https://clausiuspress.com/conferences/AEASR/ICMEE%202019/MEE2711.pdf
Zhao, X. P., & Jiang, R. (2020). Distributed machine learning oriented data integrity verification scheme in cloud computing environment. IEEE Access: Practical Innovations, Open Solutions, 8(3), 26372–26384. DOI: 10.1109/ACCESS.2020.2971519
License
Copyright (c) 2025 Dr. Kaelen R. Novak

This work is licensed under a Creative Commons Attribution 4.0 International License.
Individual articles are published Open Access under the Creative Commons Licence: CC-BY 4.0.