Cybersecure Cloud Computing for Banking and Healthcare: A Gradient-Boosting and ANN-Enhanced Framework Leveraging SAP and Oracle EBS Intelligence
DOI:
https://doi.org/10.15662/IJEETR.2025.0706003Keywords:
Cybersecure cloud computing, Gradient Boosting Machine (GBM), Artificial Neural Networks (ANN), SAP Intelligence, Oracle E-Business Suite (EBS), Banking security, Healthcare informatics, Federated learning, Zero-trust architecture, Regulatory compliance, Predictive analytics, Enterprise cloud integration, Data privacy, Fraud detection, Risk managementAbstract
The integration of advanced analytics and secure cloud architectures has become a critical enabler for digital transformation in data-sensitive industries such as banking and healthcare. This paper proposes a novel cybersecure cloud computing framework that synergistically combines Gradient Boosting Machine (GBM) algorithms and Artificial Neural Networks (ANNs) to enhance predictive intelligence and anomaly detection within enterprise environments powered by SAP and Oracle E-Business Suite (EBS) platforms. The proposed framework employs multi-layered encryption, federated learning, and zero-trust access controls to ensure compliance with regulatory mandates such as GDPR, HIPAA, and PCI DSS, while maintaining high scalability and interoperability across hybrid and multi-cloud infrastructures. Through real-time data pipelines and AI-driven orchestration, the system enhances fraud detection, risk management, and clinical decision support by leveraging integrated enterprise data streams. Experimental evaluations on synthetic and real-world banking and healthcare datasets demonstrate significant improvements in data confidentiality, processing latency, and predictive accuracy, outperforming traditional cloud security and analytics baselines. The results highlight the viability of combining intelligent analytics with robust cybersecurity principles for secure, efficient, and compliant cloud operations in mission-critical sectors.
References
1. Al-Fedaghi, S. (2020). A conceptual framework for cybersecurity in cloud computing. Journal of Cloud Computing, 9(1), 1–15.
2. Sivaraju, P. S. (2024). PRIVATE CLOUD DATABASE CONSOLIDATION IN FINANCIAL SERVICES: A CASE STUDY OF DEUTSCHE BANK APAC MIGRATION. ITEGAM-Journal of Engineering and Technology for Industrial Applications (ITEGAM-JETIA).
3. Reddy, B. T. K., & Sugumar, R. (2025, June). Effective forest fire detection by UAV image using Resnet 50 compared over Google Net. In AIP Conference Proceedings (Vol. 3267, No. 1, p. 020274). AIP Publishing LLC.
4. Gorle, S., Christadoss, J., & Sethuraman, S. (2025). Explainable Gradient-Boosting Classifier for SQL Query Performance Anomaly Detection. American Journal of Cognitive Computing and AI Systems, 9, 54-87.
5. Adari, V. K. (2024). How Cloud Computing is Facilitating Interoperability in Banking and Finance. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(6), 11465-11471.
6. Kakulavaram, S. R. (2024). “Intelligent Healthcare Decisions Leveraging WASPAS for Transparent AI Applications” Journal of Business Intelligence and DataAnalytics, vol. 1 no. 1, pp. 1–7. doi:https://dx.doi.org/10.55124/csdb.v1i1.261
7. Bhattacharya, S., Kaluri, R., & Srinivas, K. (2021). A hybrid machine learning model for cyber threat detection in healthcare cloud. IEEE Access, 9, 137041–137053.
8. Kiran, A., Rubini, P., & Kumar, S. S. (2025). Comprehensive review of privacy, utility and fairness offered by synthetic data. IEEE Access.
9. Shashank, P. S. R. B., Anand, L., & Pitchai, R. (2024, December). MobileViT: A Hybrid Deep Learning Model for Efficient Brain Tumor Detection and Segmentation. In 2024 International Conference on Progressive Innovations in Intelligent Systems and Data Science (ICPIDS) (pp. 157-161). IEEE.
10. Poornima, G., & Anand, L. (2024, April). Effective strategies and techniques used for pulmonary carcinoma survival analysis. In 2024 1st International Conference on Trends in Engineering Systems and Technologies (ICTEST) (pp. 1-6). IEEE.
11. Kaur, G., & Kaur, H. (2020). Gradient boosting and deep learning-based intrusion detection in cloud environments. Procedia Computer Science, 173, 117–126.
12. Liu, X., Zhang, Y., & Chen, J. (2019). Intelligent cloud security management with artificial neural networks. Future Generation Computer Systems, 95, 667–675.
13. Mishra, R., & Prakash, A. (2022). Secure cloud computing in healthcare: A privacy-preserving architecture using federated learning. Health Informatics Journal, 28(4), 1–14.
14. Nurtaz Begum, A., Samira Alam, C., & KM, Z. (2025). Enhancing Data Privacy in National Business Infrastructure: Measures that Concern the Analytics and Finance Industry. American Journal of Technology Advancement, 2(10), 46-54.
15. Kondra, S., Raghavan, V., & kumar Adari, V. (2025). Beyond Text: Exploring Multimodal BERT Models. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 8(1), 11764-11769.
16. Gosangi, S. R. (2025). TRANSFORMING FINANCIAL DATA WORKFLOWS: SERVICE-ORIENTED INTEGRATION OF THIRD-PARTY PAYMENT GATEWAYS WITH ORACLE EBS IN GOVERNMENT FINANCE SYSTEMS. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 8(4), 12400-12411.
17. Md Manarat Uddin, M., Rahanuma, T., & Sakhawat Hussain, T. (2025). Privacy-Aware Analytics for Managing Patient Data in SMB Healthcare Projects. International Journal of Informatics and Data Science Research, 2(10), 27-57.
18. Khan, M. I. (2025). MANAGING THREATS IN CLOUD COMPUTING: A CYBERSECURITY RISK MITIGATION FRAMEWORK. International Journal of Advanced Research in Computer Science, 15(5). https://www.researchgate.net/profile/Md-Imran-Khan-12/publication/396737007_MANAGING_THREATS_IN_CLOUD_COMPUTING_A_CYBERSECURITY_RISK_MITIGATION_FRAMEWORK/links/68f79392220a341aa156b531/MANAGING-THREATS-IN-CLOUD-COMPUTING-A-CYBERSECURITY-RISK-MITIGATION-FRAMEWORK.pdf
19. Shukla, S., & Tripathi, A. (2023). AI-driven cyber resilience for banking and financial institutions. Computers & Security, 130, 103239.
20. Raju, L. H. V., & Sugumar, R. (2025, June). Improving jaccard and dice during cancerous skin segmentation with UNet approach compared to SegNet. In AIP Conference Proceedings (Vol. 3267, No. 1, p. 020271). AIP Publishing LLC.
21. Binu, C. T., Kumar, S. S., Rubini, P., & Sudhakar, K. (2024). Enhancing Cloud Security through Machine Learning-Based Threat Prevention and Monitoring: The Development and Evaluation of the PBPM Framework. https://www.researchgate.net/profile/Binu-C-T/publication/383037713_Enhancing_Cloud_Security_through_Machine_Learning-Based_Threat_Prevention_and_Monitoring_The_Development_and_Evaluation_of_the_PBPM_Framework/links/66b99cfb299c327096c1774a/Enhancing-Cloud-Security-through-Machine-Learning-Based-Threat-Prevention-and-Monitoring-The-Development-and-Evaluation-of-the-PBPM-Framework.pdf
22. Subramanian, N., & Jeyaraj, A. (2018). Recent security trends in cloud computing: A comprehensive review. Journal of Information Privacy and Security, 14(1), 15–31.





