Systematic Review of the Use of Cloud-Based Auditing Systems
Keywords:
Cloud Auditing, Artificial Intelligence, Blockchain, Data Integrity, Audit Automation.Abstract
The rapid advancement of cloud technologies and their integration with auditing practices have redefined the landscape of assurance services. This systematic literature review (SLR) analyzes 15 peer-reviewed articles published between 2013 and 2025 to explore the development, implementation, and impact of cloud based auditing systems. The review identifies key dependent variables such as audit effectiveness, transparency, data integrity, and fraud detection, alongside technological enablers including artificial intelligence (AI), blockchain, in-memory analytics, and identity based verification schemes. The findings reveal that cloud auditing significantly enhances audit performance through real time access, automation, and secure data verification while also supporting wider digital transformation initiatives like ERP and IoT integration. Despite the observed benefits, challenges persist, particularly concerning data privacy, auditor readiness, and regulatory compliance. This study contributes to the scholarly discourse by mapping the technological and institutional dynamics of cloudbased audits and offers recommendations for future research focusing on sector specific adoption, legal frameworks, and long term impact assessments.
References
[1] Deniz Appelbaum, Robert A. Nehmer; Auditing Cloud-Based Blockchain Accounting Systems. Journal of Information Systems 1 June 2020; 34 (2): 5–21. https://doi.org/10.2308/isys-52660
[2] Li, X., Liu, S., Lu, R., Khan, M. K., Gu, K., & Zhang, X. (2022). An efficient privacy-preserving public auditing protocol for cloud-based medical storage system. IEEE Journal of Biomedical and Health Informatics, 26(5), 2020-2031.
[3] Abu Huson, Y., Sierra García, L., García Benau, M. A., & Mohammad Aljawarneh, N. (2025). Cloud-based artificial intelligence and audit report: the mediating role of the auditor. VINE Journal of Information and Knowledge Management Systems.
[4] Ryoo, J., Rizvi, S., Aiken, W., & Kissell, J. (2013). Cloud security auditing: challenges and emerging approaches. IEEE Security & Privacy, 12(6), 68-74.
[5] Majumdar, S., Madi, T., Jarraya, Y., Pourzandi, M., Wang, L., & Debbabi, M. (2019). Cloud security auditing: Major approaches and existing challenges. In Foundations and Practice of Security: 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13–15, 2018, Revised Selected Papers 11 (pp. 61-77). Springer International Publishing.
[6] Wang, Y., & Kogan, A. (2020). Cloud-based in-memory columnar database architecture for continuous audit analytics. Journal of Information Systems, 34(2), 87-107.
[7] Kumari, D., Kumar, P., & Prajapat, S. (2024). A blockchain assisted public auditing scheme for cloud-based digital twin healthcare services. Cluster Computing, 27(3), 2593-2609
[8] Ullah, F., Pun, C. M., Mohmand, M. I., Mahendran, R. K., Khan, A. A., Alhammad, S. M., ... & Farouk, A. (2025). Privacy-Aware Secure Data Auditing for Cloud-based Intelligence of Things Environment. IEEE Internet of Things Journal.
[9] Limba, F. B., Sapulette, S. G., & Sitanala, T. F. (2025). Auditor Perception Of Cloud Technology-Based Audits. International Journal Of Economic Literature, 3(5), 291-306.
[10] Ala’Rabie, O. A. M. A., Al-Rawashdeh, H., & Rabie, H. (2023). The impact of cloud-based enterprise resource planning system on blockchain adoption, with the presence of cloud auditing as an intermediary variable in Jordanian commercial banks. Migration Letters, 20(6), 440-452.
[11] Andreini, D., & Bettinelli, C. (2017). Systematic literature review. In Business Model Innovation: From Systematic Literature Review to Future Research Directions (pp. 1-23). Cham: Springer International Publishing.
[12] Page, M. J., McKenzie, J. E., Bossuyt, P. M., Boutron, I., Hoffmann, T. C., Mulrow, C. D., ... & Moher, D. (2021). The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. bmj, 372.
[13] Budgen, D., Kitchenham, B., Charters, S., Turner, M., Brereton, P., & Linkman, S. (2007, April). Preliminary results of a study of the completeness and clarity of structured abstracts. In 11th international conference on Evaluation and Assessment in Software Engineering (EASE). BCS Learning & Development.
[14] Xue, J., Xu, C., Zhao, J., & Ma, J. (2019). Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. Science China Information Sciences, 62, 1-16.
[15] Okoro, C. O., Nkwo, F. N., & Edeh, I. T. Innovative Approaches to Combating Fraud: A Comparative Analysis of Cloud-Based Audit Solutions of Deposit Money Banks in Nigeria.
[16] Moghadasi, M., Mousavi, S. M., & Fazekas, G. (2018). Cloud computing auditing. International Journal of Advanced Computer Science and Applications (IJACSA), 9(12).
[17] Zhang, X., Zhao, J., Mu, L., Tang, Y., & Xu, C. (2019). Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber–physical systems. Pervasive and Mobile Computing, 56, 18-28.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Riza Milianda Kasa, Rahima Br Purba (Author)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.