Cloud-Native Real-Time Analytics with Embedded Cyber Defense Using AI and Secure APIs
DOI:
https://doi.org/10.15662/IJEETR.2025.0706029Keywords:
Cloud-native, real-time analytics, artificial intelligence, cyber defense, secure APIs, anomaly detection, predictive analytics, cloud securityAbstract
In the era of exponential data growth, organizations increasingly rely on cloud-native solutions to process and analyze real-time data efficiently. Integrating artificial intelligence (AI) with secure application programming interfaces (APIs) enables organizations to not only gain actionable insights but also embed robust cyber defense mechanisms within their analytics pipelines. This study explores the design and implementation of cloud-native architectures that facilitate real-time analytics while simultaneously ensuring cybersecurity. By leveraging AI-driven threat detection, anomaly detection, and predictive analytics, cloud platforms can autonomously identify and mitigate potential security threats in real time. Secure APIs serve as the backbone of these systems, providing encrypted communication channels, authentication, and authorization mechanisms to prevent unauthorized access. The paper highlights current methodologies, implementation strategies, and challenges associated with integrating AI-based cyber defense into cloud-native analytics platforms. Additionally, it examines the advantages of scalability, cost-effectiveness, and rapid deployment alongside potential limitations, such as complexity and dependency on cloud providers. The research provides a holistic perspective on combining cloud computing, AI, and secure APIs to enhance both analytical capabilities and cybersecurity resilience. Practical recommendations and frameworks are proposed to guide future development in secure, intelligent, cloud-based analytics systems.
References
1. Sudakara, B. B. (2023). Integrating Cloud-Native Testing Frameworks with DevOps Pipelines for Healthcare Applications. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(5), 9309-9316.
2. Kanikanti, V. S. N., Tiwari, S. K., Nayan, V., Suryawanshi, S., & Chauhan, R. (2025, November). Deep Q-Learning Driven Dynamic Optimal Task Scheduling for Cloud Computing Using Optimal Queuing. In 2025 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE) (pp. 217-222). IEEE.
3. Gopinathan, V. R. (2024). AI-Driven Customer Support Automation: A Hybrid Human–Machine Collaboration Model for Real-Time Service Delivery. International Journal of Technology, Management and Humanities, 10(01), 67-83.
4. Anumula, S. R. (2023). Enterprise architecture for real-time intelligence in distributed environments. International Journal of Computer Technology and Electronics Communication (IJCTEC), 6(4), 7301–7312.
5. Mudunuri, P. R. (2022). Engineering audit-ready CI/CD pipelines for federally regulated scientific computing. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(5), 5342–5351.
6. Kalabhavi, V. (2025). MIDDLEWARE RESILIENCE FRAMEWORK FOR SAP ECC-CRM INTEGRATION: DESIGN AND EVALUATION. International Journal of Applied Mathematics, 38(5s), 10-32.
7. Potdar, A., Gottipalli, D., Ashirova, A., Kodela, V., Donkina, S., & Begaliev, A. (2025, July). MFO-AIChain: An Intelligent Optimization and Blockchain-Backed Architecture for Resilient and Real-Time Healthcare IoT Communication. In 2025 International Conference on Innovations in Intelligent Systems: Advancements in Computing, Communication, and Cybersecurity (ISAC3) (pp. 1-6). IEEE.
8. Kondisetty, K., Panda, M. R., & Murthy, C. J. (2023). Customer Experience Enhancement in Omnichannel Banking Using Reinforcement Learning. Los Angeles Journal of Intelligent Systems and Pattern Recognition, 3, 565-600.
9. Navandar, P. (2022). The Evolution from Physical Protection to Cyber Defense. International Journal of Computer Technology and Electronics Communication, 5(5), 5730-5752.
10. Kusumba, S. (2025). Empowering Federal Efficiency: Building an Integrated Maintenance Management System (Imms) Data Warehouse for Holistic Financial And Operational Intelligence. Journal Of Multidisciplinary, 5(7), 377-384.
11. Chivukula, V. (2022). Improvement in Minimum Detectable Effects in Randomized Control Trials: Comparing User-Based and Geo-Based Randomization. International Journal of Computer Technology and Electronics Communication, 5(4), 5442-5446.
12. Natta, P. K. (2025). Scalable governance frameworks for AI-driven enterprise automation and decision-making. International Journal of Research Publications in Engineering, Technology and Management, 8(6), 13182–13193. https://doi.org/10.15662/IJRPETM.2025.0806022
13. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian journal of science and technology, 8(35), 1-5.
14. Vimal Raja, G. (2025). Context-Aware Demand Forecasting in Grocery Retail Using Generative AI: A Multivariate Approach Incorporating Weather, Local Events, and Consumer Behaviour. International Journal of Innovative Research in Science Engineering and Technology (Ijirset), 14(1), 743-746.
15. Surisetty, L. S. (2021). Zero-Trust Data Fabrics: A Policy-Driven Model for Secure Cross-Cloud Healthcare and Financial Data Exchanges. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 4(2), 4548-4556.
16. Ram Kumar, R. P., Raju, S., Annapoorna, E., Hajari, M., Hareesa, K., Vatin, N. I., ... & AL-Attabi, K. (2024). Enhanced heart disease prediction through hybrid CNN-TLBO-GA optimization: a comparative study with conventional CNN and optimized CNN using FPO algorithm. Cogent Engineering, 11(1), 2384657.
17. Genne, S. (2022). A secure architecture for real-time data exchange in HIPAA-compliant patient portals. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 5(1), 6202–6215.
18. Gangina, P. (2022). Resilience engineering principles for distributed cloud-native applications under chaos. International Journal of Computer Technology and Electronics Communication, 5(5), 5760–5770.
19. Singh, A. SDN and NFV: A Case Study and Role in 5G and Beyond. https://www.researchgate.net/profile/Abhishek-Singh-679/publication/393804749_SDN_and_NFV_A_Case_Study_and_Role_in_5G_and_Beyond/links/687be8a54f72461c714f67f0/SDN-and-NFV-A-Case-Study-and-Role-in-5G-and-Beyond.pdf
20. Sriramoju, S. (2022). API-driven account onboarding framework with real-time compliance automation. International Journal of Research and Applied Innovations (IJRAI), 5(6), 8132–8144.
21. Muthusamy, P., Keezhadath, A. A., & Burila, R. K. (2022). Performance Optimization in Large-Scale ETL Workloads: Advanced Techniques in Distributed Computing. Los Angeles Journal of Intelligent Systems and Pattern Recognition, 2, 113-147.
22. M. R. Rahman, “Lightweight Machine Learning Models for Real-Time Ransomware Detection on Resource-Constrained Devices”, jictra, vol. 15, no. 1, pp. 17–23, Dec. 2025, doi: 10.51239/jictra.v15i1.348.
23. Singh, A. SDN and NFV: A Case Study and Role in 5G and Beyond. https://www.researchgate.net/profile/Abhishek-Singh-679/publication/393804749_SDN_and_NFV_A_Case_Study_and_Role_in_5G_and_Beyond/links/687be8a54f72461c714f67f0/SDN-and-NFV-A-Case-Study-and-Role-in-5G-and-Beyond.pdf
24. Adari, V. K. (2020). Intelligent Care at Scale AI-Powered Operations Transforming Hospital Efficiency. International Journal of Engineering & Extended Technologies Research (IJEETR), 2(3), 1240-1249.
25. Archana, R., & Anand, L. (2025). Residual u-net with Self-Attention based deep convolutional adaptive capsule network for liver cancer segmentation and classification. Biomedical Signal Processing and Control, 105, 107665.
26. Chennamsetty, C. S. (2023). Standardizing Software Delivery: Unified Data Models and Scalable Infrastructure for Subscription Ecosystems. International Journal of Computer Technology and Electronics Communication, 6(2), 6658-6665.
27. Sudhan, S. K. H. H., & Kumar, S. S. (2016). Gallant Use of Cloud by a Novel Framework of Encrypted Biometric Authentication and Multi Level Data Protection. Indian Journal of Science and Technology, 9, 44.
28. Ramidi, M. (2023). Implementing privacy-focused data sharing frameworks for mobile healthcare communication. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(3), 8746–8757.
29. Ponugoti, M. (2022). Integrating API-first architecture with experience-centric design for seamless insurance platform modernization. International Journal of Humanities and Information Technology (IJHIT), 4(1–3), 117–136.
30. Pimpale, Siddhesh. (2021). Power Electronics Challenges and Innovations Driven by Fast- Charging EV Infrastructure. International Journal of Intelligent Systems and Applications in Engineering. 9. 144.
31. Rajan, P. K. (2025). Demystifying Adaptive Bit-Rate (ABR) Streaming on Mobile Networks. Journal Of Engineering And Computer Sciences, 4(9), 425-432.
32. Madheswaran, M., Dhanalakshmi, R., Ramasubramanian, G., Aghalya, S., Raju, S., & Thirumaraiselvan, P. (2024, April). Advancements in immunization management for personalized vaccine scheduling with IoT and machine learning. In 2024 10th International Conference on Communication and Signal Processing (ICCSP) (pp. 1566-1570). IEEE.
33. Sugumar, R. (2025). Explainable Generative ML–Driven Cloud-Native Risk Modeling with SAP HANA–Apache Integration for Data Safety. International Journal of Research and Applied Innovations, 8(6), 12955-12962.
34. Islam, M. M., Zerine, I., Rahman, M. A., Islam, M. S., & Ahmed, M. Y. (2024). AI-Driven Fraud Detection in Financial Transactions-Using Machine Learning and Deep Learning to Detect Anomalies and Fraudulent Activities in Banking and E-Commerce Transactions. Available at SSRN 5287281.





