Secure Next-Gen SAP HANA Cloud: GenAI, Real-Time Staffing Automation, Healthcare Data Integrity, and ML-Powered Fraud Detection with MFA

Authors

  • William Henry Langford Pierce Machine Learning Engineer, Northern Ireland, UK Author

DOI:

https://doi.org/10.15662/IJEETR.2025.0706018

Keywords:

SAP HANA Cloud, Generative AI, GenAI, Real-time staffing automation, Workforce optimization, Healthcare data integrity, Healthcare data quality, Data governance, Machine learning, ML fraud detection, Fraud prevention, Multi-factor authentication, MFA, Cybersecurity, Identity and access management, IAM, Intelligent automation, Cloud security, In-memory computing, Secure enterprise architecture

Abstract

The evolution of enterprise cloud platforms is accelerating through the integration of generative AI, machine learning, and advanced cybersecurity frameworks. Secure Next-Gen SAP HANA Cloud presents a unified architecture that combines GenAI-driven insights, real-time staffing automation, and healthcare-grade data integrity controls to enhance operational efficiency and regulatory compliance. Leveraging SAP HANA’s in-memory performance, the solution embeds ML-powered fraud detection strengthened with multi-factor authentication (MFA) to counter identity-centric attacks and ensure secure, trusted access.

 

By automating workforce optimization, improving clinical and operational data quality, and delivering continuous intelligence at scale, this next-generation platform empowers organizations to modernize securely. The result is a resilient, intelligent, and cyber-hardened cloud ecosystem capable of supporting high-stakes workloads across industries.

References

1. Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., & Bengio, Y. (2014). Generative adversarial nets. In Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, & K. Q. Weinberger (Eds.), Proceedings of the 27th International Conference on Neural Information Processing Systems (NeurIPS 2014) (pp. 2672–2680). https://papers.nips.cc/paper/5423-generative-adversarial-nets. NeurIPS Papers

2. Dhinakaran, D., Prabaharan, G., Valarmathi, K., Sankar, S. U., & Sugumar, R. (2025). Safeguarding privacy by utilizing SC-DℓDA algorithm in cloud-enabled multi party computation. KSII Transactions on Internet and Information Systems (TIIS), 19(2), 635-656.

3. HV, M. S., & Kumar, S. S. (2024). Fusion Based Depression Detection through Artificial Intelligence using Electroencephalogram (EEG). Fusion: Practice & Applications, 14(2).

4. Adari, V. K., Chunduru, V. K., Gonepally, S., Amuda, K. K., & Kumbum, P. K. (2024). Artificial Neural Network in Fibre-Reinforced Polymer Composites using ARAS method. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(2), 9801-9806.

5. Suchitra, R. (2023). Cloud-Native AI model for real-time project risk prediction using transaction analysis and caching strategies. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(1), 8006–8013. https://doi.org/10.15662/IJRPETM.2023.0601002

6. Islam, M. S., Shokran, M., & Ferdousi, J. (2024). AI-Powered Business Analytics in Marketing: Unlock Consumer Insights for Competitive Growth in the US Market. Journal of Computer Science and Technology Studies, 6(1), 293-313.

7. Anand, L., Tyagi, R., Mehta, V. (2024). Food Recognition Using Deep Learning for Recipe and Restaurant Recommendation. In: Bhateja, V., Lin, H., Simic, M., Attique Khan, M., Garg, H. (eds) Cyber Security and Intelligent Systems. ISDIA 2024. Lecture Notes in Networks and Systems, vol 1056. Springer, Singapore. https://doi.org/10.1007/978-981-97-4892-1_23

8. Kandula, N. (2024). Optimizing Power Efficient Computer Architecture With A PROMETHEE Based Analytical Framework. J Comp Sci Appl Inform Technol, 9(2), 1-9.

9. Burila, R. K., Pichaimani, T., & Ramesh, S. (2023). Large Language Models for Test Data Fabrication in Healthcare: Ensuring Data Security and Reducing Testing Costs. Cybersecurity and Network Defense Research, 3(2), 237-279.

10. Kumar, Sanjay Nakharu Prasad. "Navigating the AI Horizon: Transformations, Ethical Imperatives, and Pathways to Responsible Innovation." Journal Of Applied Sciences 5.10 (2025): 34-43.

11. Kumar, R. K. (2024). Real-time GenAI neural LDDR optimization on secure Apache–SAP HANA cloud for clinical and risk intelligence. IJEETR, 8737–8743. https://doi.org/10.15662/IJEETR.2024.0605006

12. Nagarajan, G. (2022). An integrated cloud and network-aware AI architecture for optimizing project prioritization in healthcare strategic portfolios. International Journal of Research and Applied Innovations, 5(1), 6444–6450. https://doi.org/10.15662/IJRAI.2022.0501004

13. Dal Pozzolo, A., Boracchi, G., Caelen, O., Alippi, C., & Bontempi, G. (2017). Credit card fraud detection: A realistic modeling and a novel learning strategy (Technical report / preprint). Politecnico di Milano / IEEE-related repository. https://re.public.polimi.it/bitstream/11311/1044896/1/08038008.pdf. RePublic

14. Akhtaruzzaman, K., Md Abul Kalam, A., Mohammad Kabir, H., & KM, Z. (2024). Driving US Business Growth with AI-Driven Intelligent Automation: Building Decision-Making Infrastructure to Improve Productivity and Reduce Inefficiencies. American Journal of Engineering, Mechanics and Architecture, 2(11), 171-198. http://eprints.umsida.ac.id/16412/1/171-198%2BDriving%2BU.S.%2BBusiness%2BGrowth%2Bwith%2BAI-Driven%2BIntelligent%2BAutomation.pdf

15. Sukla, R. R. (2025). The Evolution of AI in Software Quality and Cloud Management: A Framework for Autonomous Systems. Journal of Computer Science and Technology Studies, 7(6), 353-359.

16. Kumar, R., Al-Turjman, F., Anand, L., Kumar, A., Magesh, S., Vengatesan, K., ... & Rajesh, M. (2021). Genomic sequence analysis of lung infections using artificial intelligence technique. Interdisciplinary Sciences: Computational Life Sciences, 13(2), 192-200.

17. Hardial Singh, “Strengthening Endpoint Security to Reduce Attack Vectors in Distributed Work Environments”, International Journal of Management, Technology And Engineering, Volume XIV, Issue VII, JULY 2024. Muthusamy, M. (2022). AI-Enhanced DevSecOps architecture for cloud-native banking secure distributed systems with deep neural networks and automated risk analytics. International Journal of Research Publication and Engineering Technology Management, 6(1), 7807–7813. https://doi.org/10.15662/IJRPETM.2022.0506014

18. Mani, R. (2024). Smart Resource Management in SAP HANA: A Comprehensive Guide to Workload Classes, Admission Control, and System Optimization through Memory, CPU, and Request Handling Limits. International Journal of Research and Applied Innovations, 7(5), 11388-11398.

19. Kanumarlapudi, P. K., Peram, S. R., & Kakulavaram, S. R. (2024). Evaluating Cyber Security Solutions through the GRA Approach: A Comparative Study of Antivirus Applications. International Journal of Computer Engineering and Technology (IJCET), 15(4), 1021-1040.

20. Caleb, D. A. M. (2025). AI-Driven Smart Fabric Provisioning: Transforming Network Automation through Intelligent Orchestration and Dynamic Testing. Journal of Computer Science and Technology Studies, 7(3), 783-790.

21. Sivaraju, P. S. (2023). Thin client and service proxy architectures for real-time staffing systems in distributed operations. International Journal of Advanced Research in Computer Science & Technology, 6(6), 9510–9515.

22. Vasugi, T. (2023). AI-empowered neural security framework for protected financial transactions in distributed cloud banking ecosystems. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 6(2), 7941-7950.

23. Vijayaboopathy, V., Yakkanti, B., & Surampudi, Y. (2023). Agile-driven Quality Assurance Framework using ScalaTest and JUnit for Scalable Big Data Applications. Los Angeles Journal of Intelligent Systems and Pattern Recognition, 3, 245-285.

24. Adari, V. K. (2024). The Path to Seamless Healthcare Data Exchange: Analysis of Two Leading Interoperability Initiatives. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(6), 11472-11480.

25. Balaji, K. V., Sugumar, R., Mahendran, R., & Subramanian, P. (2025). Weather forecasting model using attentive residual gated recurrent unit for urban flood prediction. GLOBAL NEST JOURNAL, 27(5).

26. Girdhar, P., Virmani, D., & Saravana Kumar, S. (2019). A hybrid fuzzy framework for face detection and recognition using behavioral traits. Journal of Statistics and Management Systems, 22(2), 271-287.

27. Ramakrishna, S. (2022). AI-augmented cloud performance metrics with integrated caching and transaction analytics for superior project monitoring and quality assurance. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(6), 5647–5655. https://doi.org/10.15662/IJEETR.2022.0406005

28. Gahlot, S., Thangavelu, K., & Bhattacharyya, S. (2024). Digital Transformation in Federal Financial Aid: A Case Study of CARES Act Implementation through Low-Code Technologies. Newark Journal of Human-Centric AI and Robotics Interaction, 4, 15-45.

29. Zirar, A., et al. (2023). Worker and workplace artificial intelligence coexistence: A review of themes and research agenda. Journal / review (2023).

Downloads

Published

2025-11-13

How to Cite

Secure Next-Gen SAP HANA Cloud: GenAI, Real-Time Staffing Automation, Healthcare Data Integrity, and ML-Powered Fraud Detection with MFA. (2025). International Journal of Engineering & Extended Technologies Research (IJEETR), 7(6), 11003-11010. https://doi.org/10.15662/IJEETR.2025.0706018