An Integrated Scalable Cloud Native Architecture for AI Driven Enterprise Decision Systems and Secure Mobile Applications

Authors

  • Huda Binti Karim Shalini Devi Data Engineer, Kuala Lumpur, Malaysia Author

DOI:

https://doi.org/10.15662/IJEETR.2024.0604012

Keywords:

Cloud computing, machine learning, enterprise automation, financial web applications, secure frameworks, anomaly detection, predictive analytics, scalable architecture

Abstract

Cloud computing and machine learning (ML) have revolutionized enterprise operations, enabling automation, scalability, and intelligent decision-making in financial web applications. Ensuring security in such frameworks is critical, given the sensitivity of financial data and the regulatory requirements governing transactions. This research presents a secure cloud-based architecture integrated with machine learning capabilities to automate customer interactions, financial forecasting, fraud detection, and personalized services in enterprise web applications. The framework leverages cloud infrastructure for elastic resource provisioning, secure storage, and distributed computation, while ML models analyze customer behavior, detect anomalies, and optimize workflows. Key security mechanisms, including end-to-end encryption, identity and access management, and anomaly-based intrusion detection, are incorporated to safeguard data integrity, confidentiality, and availability. The study evaluates performance metrics such as response time, prediction accuracy, scalability, and security effectiveness through simulation and prototype deployment. By combining secure cloud infrastructure with ML-driven automation, the framework aims to enhance operational efficiency, improve customer experience, and mitigate financial risks. The findings provide a roadmap for enterprises seeking to implement intelligent, secure, and scalable web applications while adhering to compliance standards and minimizing exposure to cyber threats.

References

1. Gopinathan, V. R. (2024). AI-Driven Customer Support Automation: A Hybrid Human–Machine Collaboration Model for Real-Time Service Delivery. International Journal of Technology, Management and Humanities, 10(01), 67-83.

2. Prasanna, D., & Santhosh, R. (2018). Time Orient Trust Based Hook Selection Algorithm for Efficient Location Protection in Wireless Sensor Networks Using Frequency Measures. International Journal of Engineering & Technology, 7(3.27), 331-335.

3. Ponugoti, M. (2022). Integrating API-first architecture with experience-centric design for seamless insurance platform modernization. International Journal of Humanities and Information Technology (IJHIT), 4(1–3), 117–136.

4. Mohan, B., Siddhan, S., & Chinnadurai, N. (2023). Alleviation of Power Quality Issues in MVF-DEANF-PLL Based Solar PV Systems under Polluted Grid Conditions. Sustainability, 15(21), 15487.

5. Kunju, S. S., & Ponnoju, S. C. (2023). Enhancing User Journey Consistency via Cross-Application Integration Using MX Bridge Algorithm in Angular Applications. American Journal of Data Science and Artificial Intelligence Innovations, 3, 120-156.

6. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian journal of science and technology, 8(35), 1-5.

7. Ananth, S., Radha, K., & Raju, S. (2024). Animal Detection In Farms Using OpenCV In Deep Learning. Advances in Science and Technology Research Journal, 18(1), 1.

8. Mudunuri, P. R. (2023). Automation-driven reliability engineering for public-sector biomedical systems. International Journal of Humanities and Information Technology (IJHIT), 5(1), 68–86.

9. Adari, V. K. (2024). APIs and open banking: Driving interoperability in the financial sector. International Journal of Research in Computer Applications and Information Technology (IJRCAIT), 7(2), 2015–2024.

10. Harish, M., & Selvaraj, S. K. (2023, August). Designing efficient streaming-data processing for intrusion avoidance and detection engines using entity selection and entity attribute approach. In AIP Conference Proceedings (Vol. 2790, No. 1, p. 020021). AIP Publishing LLC.

11. Sriramoju, S. (2023). Optimizing customer and order automation in enterprise systems using event-driven design. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(4), 9006–9016.

12. Vimal Raja, G. (2022). Leveraging Machine Learning for Real-Time Short-Term Snowfall Forecasting Using MultiSource Atmospheric and Terrain Data Integration. International Journal of Multidisciplinary Research in Science, Engineering and Technology, 5(8), 1336-1339.

13. Genne, S. (2022). Designing accessibility-first enterprise web platforms at scale. International Journal of Research and Applied Innovations (IJRAI), 5(5), 7679–7690.

14. Chennamsetty, C. S. (2023). Standardizing Software Delivery: Unified Data Models and Scalable Infrastructure for Subscription Ecosystems. International Journal of Computer Technology and Electronics Communication, 6(2), 6658-6665.

15. Hasan, S., Zerine, I., Islam, M. M., Hossain, A., Rahman, K. A., & Doha, Z. (2023). Predictive Modeling of US Stock Market Trends Using Hybrid Deep Learning and Economic Indicators to Strengthen National Financial Resilience. Journal of Economics, Finance and Accounting Studies, 5(3), 223-235.

16. Surampudi, Y., Kondaveeti, D., & Pichaimani, T. (2023). A Comparative Study of Time Complexity in Big Data Engineering: Evaluating Efficiency of Sorting and Searching Algorithms in Large-Scale Data Systems. Journal of Science & Technology, 4(4), 127-165.

17. Kamadi, S. (2021). Risk Exception Management in Multi-Regulatory Environments: A Framework for Financial Services Utilizing Multi-Cloud Technologies.Archana, R., & Anand, L. (2023, September). Ensemble Deep Learning Approaches for Liver Tumor Detection and Prediction. In 2023 Third International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS) (pp. 325-330). IEEE.

18. Sudhan, S. K. H. H., & Kumar, S. S. (2016). Gallant Use of Cloud by a Novel Framework of Encrypted Biometric Authentication and Multi Level Data Protection. Indian Journal of Science and Technology, 9, 44.

19. Sumathi, R., & Umasankar, P. (2023). A hybrid approach for power flow management in smart grid connected system. IETE Journal of Research, 69(8), 5204-5218.

20. Devarajan, R., Prabakaran, N., Vinod Kumar, D., Umasankar, P., Venkatesh, R., & Shyamalagowri, M. (2023, August). IoT Based Under Ground Cable Fault Detection with Cloud Storage. In 2023 Second International Conference on Augmented Intelligence and Sustainable Systems (ICAISS) (pp. 1580-1583). IEEE.

21. Keezhadath, A. A., Gahlot, S., & Sethuraman, S. (2022). The Role of Low-Code Platforms in Digital Transformation: A Case Study on Financial Services and Wealth Management. American Journal of Data Science and Artificial Intelligence Innovations, 2, 77-114.

22. Gangina, P. (2022). Unified payment orchestration platform: Eliminating PCI compliance burden for SMBs through multi-provider aggregation. International Journal of Research Publications in Engineering, Technology and Management, 5(2), 6540–6549.

23. Paul, D., Namperumal, G., & Surampudi, Y. (2023). Optimizing llm training for financial services: best practices for model accuracy, risk management, and compliance in ai-powered financial applications. Journal of Artificial Intelligence Research and Applications, 3(2), 550-588.

24. Chinthalapelly, P. R., & Mohammed, A. S. (2021). Legal Standards Extraction Using LLMs with CRF-based Sequence Labeling. American Journal of Data Science and Artificial Intelligence Innovations, 1, 801-836.

25. Anumula, S. R. (2023). Resilience engineering for intelligent enterprise platforms. International Journal of Engineering & Extended Technologies Research (IJEETR), 5(1), 5954–5965.

26. Raju, S., & Sindhuja, D. (2024). Transparent encryption for external storage media with mobile-compatible key management by Crypto Ciphershield. PatternIQ Mining, 1(3), 12-24.

27. Yashwanth, K., Adithya, N., Sivaraman, R., Janakiraman, S., & Rengarajan, A. (2021, July). Design and Development of Pipelined Computational Unit for High-Speed Processors. In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT) (pp. 1-5). IEEE.

28. Ramidi, M. (2022). Building secure biometric systems for digital identity verification in aviation mobile apps. International Journal of Engineering & Extended Technologies Research, 4(4), 5036–5047.

29. Inbavalli, M., & Arasu, T. (2015). Efficient Analysis of Frequent Item Set Association Rule Mining Methods. International Journal of Scientific & Engineering Research, 6(4).

30. Surisetty, L. S. (2022). Modernizing Legacy Systems with AI Orchestration: From Monoliths to Autonomous Micro services. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 5(6), 7299-7306.

31. Gaddapuri, N. S. (2022). APPLICATION OF QUANTUM COMPUTING IN DIGITAL EDUCATION SYSTEMS. Power System Protection and Control, 50(2), 12-24.

32. Ponnoju, S. C., Muthusamy, P., & Devi, C. (2022). Differentially Private Streaming Metrics with Laplace Noise in Apache Flink. American Journal of Autonomous Systems and Robotics Engineering, 2, 417-451.

33. Genne, S. (2022). Designing accessibility-first enterprise web platforms at scale. International Journal of Research and Applied Innovations (IJRAI), 5(5), 7679–7690.

34. Jaikrishna, G., & Rajendran, S. (2020). Cost-effective privacy preserving of intermediate data using group search optimisation algorithm. International Journal of Business Information Systems, 35(2), 132-151.

Downloads

Published

2024-08-28

How to Cite

An Integrated Scalable Cloud Native Architecture for AI Driven Enterprise Decision Systems and Secure Mobile Applications. (2024). International Journal of Engineering & Extended Technologies Research (IJEETR), 6(4), 8131-8140. https://doi.org/10.15662/IJEETR.2024.0604012