A Federated Cloud Security Framework for Financial Networks Multi-Source Threat Correlation, Adaptive Caching, DevSecOps Automation, and ERP Strategy Planning
Main Article Content
Abstract
Our design leverages the FL paradigm to keep sensitive financial records onsite while enabling cross-institution learning (reducing centralization risks and supporting regulatory constraints). We integrate established privacy primitives — secure aggregation, per-client differential privacy and encrypted transport — to mitigate gradient and model inversion attacks and to protect participant contributions during aggregation. To unify heterogeneous CTI, we adopt standardized schemas (e.g., STIX/MAEC) and a correlation engine that supports temporal, behavioral and entity-centric linking. Adaptive caching at the edge employs workload-aware replacement policies and ML-assisted replacement selection so that the system provides sub-second enrichment for scoring while minimizing stale or over-exposed cached artifacts. DevSecOps integration shifts security “left” into build and deploy stages, embedding SAST/SCA/DAST, secrets management, model governance checks, and runtime policy enforcement into the CI/CD pipeline to ensure that model updates and configuration changes maintain compliance and security baselines.We prototype the architecture in a multi-bank testbed and evaluate (a) model convergence and utility under non-IID, heterogenous client data, (b) privacy budgets and accuracy trade-offs when applying client-level differential privacy and secure aggregation, (c) reduction in detection latency via adaptive caching compared to baseline LRU caches, and (d) the effectiveness of DevSecOps pipeline policy checks in preventing misconfiguration and insecure model deployments. Results show FL can achieve near-centralized accuracy with proper aggregation and DP tuning; adaptive caching yields significant latency and backend load reductions for common enrichment workloads; and CI/CD enforcement prevents a class of misconfigurations that could otherwise expose models or keys. We close with architectural recommendations, deployment considerations for regulated financial environments, and research directions to harden FL against poisoning and back-door attacks while preserving regulatory auditability and model explainability.
Article Details
Section
How to Cite
References
1. McMahan, H. B., Moore, E., Ramage, D., Hampson, S., &Agüera y Arcas, B. (2017). Communication-Efficient Learning of Deep Networks from Decentralized Data. Proceedings of the 20th International Conference on Artificial Intelligence and Statistics / MLR. Retrieved from https://arxiv.org/abs/1602.05629. (Proceedings of Machine Learning Research)
2. Amutha, M., &Sugumar, R. (2015). A survey on dynamic data replication system in cloud computing. International Journal of Innovative Research in Science, Engineering and Technology, 4(4), 1454-1467.
3. Sudhan, S. K. H. H., & Kumar, S. S. (2016). Gallant Use of Cloud by a Novel Framework of Encrypted Biometric Authentication and Multi Level Data Protection.Indian Journal of Science and Technology, 9, 44.
4. Nagarajan, G. (2022). Optimizing project resource allocation through a caching-enhanced cloud AI decision support system.International Journal of Computer Technology and Electronics Communication, 5(2), 4812–4820. https://doi.org/10.15680/IJCTECE.2022.0502003
5. Vijayaboopathy, V., &Ponnoju, S. C. (2021). Optimizing Client Interaction via Angular-Based A/B Testing: A Novel Approach with Adobe Target Integration. Essex Journal of AI Ethics and Responsible Innovation, 1, 151-186.
6. Konidena, B. K., Bairi, A. R., &Pichaimani, T. (2021). Reinforcement Learning-Driven Adaptive Test Case Generation in Agile Development. American Journal of Data Science and Artificial Intelligence Innovations, 1, 241-273.
7. Adari, V. K. (2021). Building trust in AI-first banking: Ethical models, explainability, and responsible governance. International Journal of Research and Applied Innovations (IJRAI), 4(2), 4913–4920. https://doi.org/10.15662/IJRAI.2021.0402004
8. Thangavelu, K., Keezhadath, A. A., &Selvaraj, A. (2022). AI-Powered Log Analysis for Proactive Threat Detection in Enterprise Networks. Essex Journal of AI Ethics and Responsible Innovation, 2, 33-66.
9. Shokri, R., &Shmatikov, V. (2015). Privacy-Preserving Deep Learning. Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS). (Cornell CS)
10. AnujArora, “Securing Multi-Cloud Architectures Using Advanced Cloud Security Management Tools”, INTERNATIONAL JOURNAL OF RESEARCH IN ELECTRONICS AND COMPUTER ENGINEERING, VOL. 7 ISSUE 2 (APRIL- JUNE 2019).
11. Anand, L., &Neelanarayanan, V. (2019). Feature Selection for Liver Disease using Particle Swarm Optimization Algorithm. International Journal of Recent Technology and Engineering (IJRTE), 8(3), 6434-6439.
12. MAEC Steering Committee / The MAEC Project. (2014). Malware Attribute Enumeration and Characterization (MAEC) Specification. MAEC Project / MITRE. Retrieved from https://maecproject.github.io. (maecproject.github.io)
13. Megiddo, N., &Modha, D. S. (2003). ARC: A Self-Tuning, Low Overhead Replacement Cache. Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST ’03). (USENIX)
14. Jaleel, A., et al. (2010). High Performance Cache Replacement Using Re-Reference Interval Prediction (RRIP). Proceedings of the 37th Annual International Symposium on Computer Architecture (ISCA). (People)
15. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian journal of science and technology, 8(35), 1-5.
16. Aledhari, M., et al. (2020). Federated Learning: Enabling Technologies, Protocols, and use cases. IEEE Access / PMC survey (2020). (PMC)
17. Abadi, M., et al. (2016). Deep Learning with Differential Privacy. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS). (DPSGD methods and analysis.) (Semantic Scholar)
18. K. Bonawitz, A. Ivanov, B. Kreuter, et al. (2017). Practical Secure Aggregation for Federated Learning on User-Held Data. Proceedings / arXiv (duplicate canonical reference of secure aggregation protocol). (ACM Digital Library)
19. Kumbum, P. K., Adari, V. K., Chunduru, V. K., Gonepally, S., &Amuda, K. K. (2020). Artificial intelligence using TOPSIS method.International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 3(6), 4305-4311.
20. Hardial Singh, “ENHANCING CLOUD SECURITY POSTURE WITH AI-DRIVEN THREAT DETECTION AND RESPONSE MECHANISMS”, INTERNATIONAL JOURNAL OF CURRENT ENGINEERING AND SCIENTIFIC RESEARCH (IJCESR), VOLUME-6, ISSUE-2, 2019.
21. Navandar, Pavan. "Enhancing Cybersecurity in Airline Operations through ERP Integration: A Comprehensive Approach." Journal of Scientific and Engineering Research 5, no. 4 (2018): 457-462.
22. Kumar, R., Al-Turjman, F., Anand, L., Kumar, A., Magesh, S., Vengatesan, K., ...& Rajesh, M. (2021). Genomic sequence analysis of lung infections using artificial intelligence technique. Interdisciplinary Sciences: Computational Life Sciences, 13(2), 192-200.
23. Priya, P. S., &Sugumar, R. (2014).Multi Keyword Searching Techniques over Encrypted Cloud Data.In IJSR.
24. Kapadia, V., Jensen, J., McBride, G., Sundaramoothy, J., Deshmukh, R., Sacheti, P., &Althati, C. (2015). U.S. Patent No. 8,965,820. Washington, DC: U.S. Patent and Trademark Office.
25. Wei, K., et al. (2020). Federated Learning with Differential Privacy: Algorithms and Performance Analysis.arXiv / proceedings analyzing DP in FL (2020). (oar.princeton.edu)