Next-Gen Cloud Healthcare ERP Security Framework Leveraging Multivariate Classification, BERT, and Databricks for Real-Time Staffing and Risk Analytics
Main Article Content
Abstract
In modern financial systems, fraud detection demands high scalability, near real‑time processing, and agile evolution of data storage structures. Legacy relational databases — often rigid and monolithic — impair the capability to rapidly evolve schema, integrate machine‑learning (ML) pipelines, and support continuous delivery. This paper presents a cloud‑native database upgrade architecture that embeds a GitHub‑automated CI/CD pipeline, supports generic resource abstraction (GRA) for database schema evolution, and integrates machine‑learning driven fraud detection workflows. The architecture enables safe, version-controlled schema migrations, supports ML model deployment and retraining, and ensures data integrity and minimal downtime. We describe the design, implementation, and evaluation of this architecture in the context of large-scale fraud detection pipelines. Empirical evaluation shows that schema changes, ML model updates, and data migrations can be automated through CI/CD with rollback safety, reducing deployment time by over 60%, minimizing schema‑drift incidents, and allowing near real-time fraud detection on streaming transaction data. Further, ML models trained within the pipeline achieved high detection accuracy with low false‑positive rates, and retraining cycles could be deployed with minimal operational overhead. The proposed architecture thus bridges database DevOps practices with ML operations, enabling financial institutions to respond rapidly to evolving fraud patterns while maintaining rigorous control over schema evolution and data consistency.
Article Details
Section
How to Cite
References
1. Mustyala, A. (2023). Migrating Legacy Systems to Cloud Native Architectures for Enhanced Fraud Detection in Fintech. International Journal of Science And Engineering, 9(1). ephijse.com+1
2. HV, M. S., & Kumar, S. S. (2024). Fusion Based Depression Detection through Artificial Intelligence using Electroencephalogram (EEG). Fusion: Practice & Applications, 14(2).
3. Adari, V. K. (2020). Intelligent Care at Scale AI-Powered Operations Transforming Hospital Efficiency. International Journal of Engineering & Extended Technologies Research (IJEETR), 2(3), 1240-1249.
4. Udayakumar, R., Chowdary, P. B. K., Devi, T., & Sugumar, R. (2023). Integrated SVM-FFNN for fraud detection in banking financial transactions. Journal of Internet Services and Information Security, 13(3), 12-25.
5. Ramakrishna, S. (2022). AI-augmented cloud performance metrics with integrated caching and transaction analytics for superior project monitoring and quality assurance. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(6), 5647–5655. https://doi.org/10.15662/IJEETR.2022.0406005
6. Vasugi, T. (2023). AI-empowered neural security framework for protected financial transactions in distributed cloud banking ecosystems. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 6(2), 7941-7950.
7. Poornima, G., & Anand, L. (2024, April). Effective Machine Learning Methods for the Detection of Pulmonary Carcinoma. In 2024 Ninth International Conference on Science Technology Engineering and Mathematics (ICONSTEM) (pp. 1-7). IEEE.
8. Kandula N (2023). Gray Relational Analysis of Tuberculosis Drug Interactions A Multi-Parameter Evaluation of Treatment Efficacy. J Comp Sci Appl Inform Technol. 8(2): 1-10.
9. Vunnam, N., Kalyanasundaram, P. D., & Vijayaboopathy, V. (2022). AI-Powered Safety Compliance Frameworks: Aligning Workplace Security with National Safety Goals. Essex Journal of AI Ethics and Responsible Innovation, 2, 293-328.
10. Kanumarlapudi, P. K., Peram, S. R., & Kakulavaram, S. R. (2024). Evaluating Cyber Security Solutions through the GRA Approach: A Comparative Study of Antivirus Applications. International Journal of Computer Engineering and Technology (IJCET), 15(4), 1021-1040.
11. Kumar, R. K. (2023). Cloud-integrated AI framework for transaction-aware decision optimization in agile healthcare project management. International Journal of Computer Technology and Electronics Communication (IJCTEC), 6(1), 6347–6355. https://doi.org/10.15680/IJCTECE.2023.0601004
12. Mani, R. (2022). Enhancing SAP HANA Resilience and Performance on RHEL using Pacemaker: A Strategic Approach to Migration Optimization and Dual-Function Infrastructure Design. International Journal of Computer Technology and Electronics Communication, 5(6), 6061-6074.
13. Redgate Software. (n.d.). Guardrails and Gains: How Flyway Brings Stability to Cloud Migrations. Redgate+1
14. Atlas — Modernize database schema migrations. (n.d.). atlasgo.io+1
15. Kapadia, V., Jensen, J., McBride, G., Sundaramoothy, J., Deshmukh, R., Sacheti, P., & Althati, C. (2015). U.S. Patent No. 8,965,820. Washington, DC: U.S. Patent and Trademark Office.
16. Wikipedia contributors. (n.d.). MLOps. In Wikipedia. Wikipedia
17. Uddandarao, D. P. (2024). Improving Employment Survey Estimates in Data-ScarceRegions Using Dynamic Bayesian Hierarchical Models: Addressing Measurement Challenges in Developing Countries. Panamerican Mathematical Journal, 34(4), 2024.
18. TheOmniBuzz. (n.d.). Flyway Postgres: Streamlining Database Version Control for Modern Teams. The OmniBuzz
19. Galaxy. (n.d.). Automating Schema Migrations with Flyway. Galaxy
20. SoftwarePlaza. (n.d.). How Atlas Makes Database Schema Management More Declarative and Compliant. softwareplaza.com
21. Navandar, P. (2021). Developing advanced fraud prevention techniques using data analytics and ERP systems. International Journal of Science and Research (IJSR), 10(5), 1326–1329. https://dx.doi.org/10.21275/SR24418104835 https://www.researchgate.net/profile/Pavan-Navandar/publication/386507190_Developing_Advanced_Fraud_Prevention_Techniquesusing_Data_Analytics_and_ERP_Systems/links/675a0ecc138b414414d67c3c/Developing-Advanced-Fraud-Prevention-Techniquesusing-Data-Analytics-and-ERP-Systems.pdf
22. Sivaraju, P. S. (2023). Thin client and service proxy architectures for X systems in distributed operations. International Journal of Advanced Research in Computer Science & Technology, 6(6), 9510–9515.
23. Poornima, G., & Anand, L. (2024, May). Novel AI Multimodal Approach for Combating Against Pulmonary Carcinoma. In 2024 5th International Conference for Emerging Technology (INCET) (pp. 1-6). IEEE.
24. Muthusamy, M. (2022). AI-Enhanced DevSecOps architecture for cloud-native banking secure distributed systems with deep neural networks and automated risk analytics. International Journal of Research Publication and Engineering Technology Management, 6(1), 7807–7813. https://doi.org/10.15662/IJRPETM.2022.0506014
25. Nagarajan, G. (2024). Cloud-Integrated AI Models for Enhanced Financial Compliance and Audit Automation in SAP with Secure Firewall Protection. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 7(1), 9692-9699.
26. Muthusamy, P., Thangavelu, K., & Bairi, A. R. (2023). AI-Powered Fraud Detection in Financial Services: A Scalable Cloud-Based Approach. Newark Journal of Human-Centric AI and Robotics Interaction, 3, 146-181.
27. Kurkute, M. V., Ratnala, A. K., & Pichaimani, T. (2023). AI-powered IT service management for predictive maintenance in manufacturing: leveraging machine learning to optimize service request management and minimize downtime. Journal of Artificial Intelligence Research, 3(2), 212-252.
28. Suchitra, R. (2023). Cloud-Native AI model for real-time project risk prediction using transaction analysis and caching strategies. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(1), 8006–8013. https://doi.org/10.15662/IJRPETM.2023.0601002
29. Udayakumar, R., Elankavi, R., Vimal, V. R., & Sugumar, R. (2023). IMPROVED PARTICLE SWARM OPTIMIZATION WITH DEEP LEARNING-BASED MUNICIPAL SOLID WASTE MANAGEMENT IN SMART CITIES. Environmental & Social Management Journal/Revista de Gestão Social e Ambiental, 17(4).
30. Binu, C. T., Kumar, S. S., Rubini, P., & Sudhakar, K. (2024). Enhancing Cloud Security through Machine Learning-Based Threat Prevention and Monitoring: The Development and Evaluation of the PBPM Framework. https://www.researchgate.net/profile/Binu-C-T/publication/383037713_Enhancing_Cloud_Security_through_Machine_Learning-Based_Threat_Prevention_and_Monitoring_The_Development_and_Evaluation_of_the_PBPM_Framework/links/66b99cfb299c327096c1774a/Enhancing-Cloud-Security-through-Machine-Learning-Based-Threat-Prevention-and-Monitoring-The-Development-and-Evaluation-of-the-PBPM-Framework.pdf
31. Gonepally, S., Amuda, K. K., Kumbum, P. K., Adari, V. K., & Chunduru, V. K. (2022). Teaching software engineering by means of computer game development: Challenges and opportunities using the PROMETHEE method. SOJ Materials Science & Engineering, 9(1), 1–9.