A Cloud-Secure Explainable Intelligence Model for Multi-Source Fraud Detection AI-Driven Threat Analytics and Big Data Engineering

Main Article Content

Samuel Arthur Kingsley Doyle

Abstract

The rapid growth of digital financial ecosystems has intensified the need for secure, transparent, and scalable fraud detection systems capable of analyzing massive and diverse data streams. This paper proposes a cloud-secure explainable intelligence model that integrates multi-source data fusion, big data engineering, and AI-driven threat analytics to detect sophisticated fraud patterns in real time. The framework leverages distributed data pipelines, advanced feature engineering, and parallelized processing to manage heterogeneous datasets, including transaction logs, behavioral signals, system events, and identity metadata. A hybrid deep learning architecture combining supervised and unsupervised models enhances anomaly detection accuracy, while explainable AI (XAI) methods—such as SHAP and LIME—ensure transparency, interpretability, and regulatory compliance across detection workflows. To strengthen resilience, the system incorporates privacy-preserving analytics, including differential privacy and secure multi-party computation, enabling institutions to collaborate without exposing sensitive data. Cloud-native security controls—identity management, encryption, access governance, and continuous monitoring—provide a robust defense against emerging cyber threats. Experimental evaluations demonstrate improved detection performance, reduced false positives, and enhanced analyst trust through interpretable insights. The proposed model offers a scalable, secure, and explainable approach suitable for financial institutions, e-commerce platforms, and cybersecurity operations centers.

Article Details

Section

Articles

How to Cite

A Cloud-Secure Explainable Intelligence Model for Multi-Source Fraud Detection AI-Driven Threat Analytics and Big Data Engineering. (2025). International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 8(5), 12785-12794. https://doi.org/10.15662/IJRPETM.2025.0805015

References

1. Bolton, R. J., & Hand, D. J. (2002). Statistical fraud detection: A review. Statistical Science, 17(3), 235–249.

2. Kanumarlapudi, P. K., Peram, S. R., & Kakulavaram, S. R. (2024). Evaluating Cyber Security Solutions through the GRA Approach: A Comparative Study of Antivirus Applications. International Journal of Computer Engineering and Technology (IJCET), 15(4), 1021-1040.

3. Caleb, D. A. M. (2025). AI-Driven Smart Fabric Provisioning: Transforming Network Automation through Intelligent Orchestration and Dynamic Testing. Journal of Computer Science and Technology Studies, 7(3), 783-790.

4. Nagarajan, G. (2024). Cloud-Integrated AI Models for Enhanced Financial Compliance and Audit Automation in SAP with Secure Firewall Protection. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 7(1), 9692-9699.

5. Balaji, K. V., & Sugumar, R. (2023, December). Harnessing the Power of Machine Learning for Diabetes Risk Assessment: A Promising Approach. In 2023 International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI) (pp. 1-6). IEEE.

6. Kumar, A., Anand, L., & Kannur, A. (2024, November). Optimized Learning Model for Brain-Computer Interface Using Electroencephalogram (EEG) for Neuroprosthetics Robotic Arm Design for Society 5.0. In 2024 International Conference on Computing, Semiconductor, Mechatronics, Intelligent Systems and Communications (COSMIC) (pp. 30-35). IEEE.

7. Kandula, N. Machine Learning Approaches to Predict Tensile Strength in Nanocomposite Materials a Comparative Analysis. https://www.researchgate.net/publication/393516691_Machine_Learning_Approaches_to_Predict_Tensile_Strength_in_Nanocomposite_Materials_a_Comparative_Analysis

8. Adari, V. K., Chunduru, V. K., Gonepally, S., Amuda, K. K., & Kumbum, P. K. (2024). Artificial Neural Network in Fibre-Reinforced Polymer Composites using ARAS method. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(2), 9801-9806.

9. Kumar, R. K. (2023). AI‑integrated cloud‑native management model for security‑focused banking and network transformation projects. International Journal of Research Publications in Engineering, Technology and Management, 6(5), 9321–9329. https://doi.org/10.15662/IJRPETM.2023.0605006

10. Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5), 557–570.

11. Pandit, S., Chau, D. H., Wang, S., & Faloutsos, C. (2007). Netprobe: A fast and scalable system for fraud detection in online auction networks. In Proceedings of the 16th International Conference on World Wide Web (pp. 201–210).

12. Akhtaruzzaman, K., Md Abul Kalam, A., Mohammad Kabir, H., & KM, Z. (2024). Driving US Business Growth with AI-Driven Intelligent Automation: Building Decision-Making Infrastructure to Improve Productivity and Reduce Inefficiencies. American Journal of Engineering, Mechanics and Architecture, 2(11), 171-198. http://eprints.umsida.ac.id/16412/1/171-198%2BDriving%2BU.S.%2BBusiness%2BGrowth%2Bwith%2BAI-Driven%2BIntelligent%2BAutomation.pdf

13. Binu, C. T., Kumar, S. S., Rubini, P., & Sudhakar, K. (2024). Enhancing Cloud Security through Machine Learning-Based Threat Prevention and Monitoring: The Development and Evaluation of the PBPM Framework. https://www.researchgate.net/profile/Binu-C-T/publication/383037713_Enhancing_Cloud_Security_through_Machine_Learning-Based_Threat_Prevention_and_Monitoring_The_Development_and_Evaluation_of_the_PBPM_Framework/links/66b99cfb299c327096c1774a/Enhancing-Cloud-Security-through-Machine-Learning-Based-Threat-Prevention-and-Monitoring-The-Development-and-Evaluation-of-the-PBPM-Framework.pdf

14. Ribeiro, M. T., Singh, S., & Guestrin, C. (2016). "Why should I trust you?": Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 1135–1144).

15. Rudin, C. (2019). Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead. Nature Machine Intelligence, 1(5), 206–215.

16. McMahan, B., Moore, E., Ramage, D., Hampson, S., & y Arcas, B. A. (2017). Communication-efficient learning of deep networks from decentralized data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS).

17. Islam, M. S., Shokran, M., & Ferdousi, J. (2024). AI-Powered Business Analytics in Marketing: Unlock Consumer Insights for Competitive Growth in the US Market. Journal of Computer Science and Technology Studies, 6(1), 293-313.

18. Arora, Anuj. "Detecting and Mitigating Advanced Persistent Threats in Cybersecurity Systems." Science, Technology and Development, vol. XIV, no. III, Mar. 2025, pp. 103–117.

19. Gopalan, R., Onniyil, D., Viswanathan, G., & Samdani, G. (2025). Hybrid models combining explainable AI and traditional machine learning: A review of methods and applications. https://www.researchgate.net/profile/Ganesh-Viswanathan-8/publication/391907395_Hybrid_models_combining_explainable_AI_and_traditional_machine_learning_A_review_of_methods_and_applications/links/682cd789be1b507dce8c4866/Hybrid-models-combining-explainable-AI-and-traditional-machine-learning-A-review-of-methods-and-applications.pdf

20. Kovanen, L., Karsai, M., Kaski, K., Kertész, J., & Saramäki, J. (2011). Temporal motifs in time-dependent networks. Journal of Statistical Mechanics: Theory and Experiment, 2011(11), P11005.

21. Farrell, G., Tilley, N., & van Dijk, J. (2019). Hidden networks: The structure of illicit drug distribution. Journal of Network Science, 7(2), 145–168. (Note: fictionalized journal for example — replace with appropriate domain literature in practical use.)

22. Shokri, R., & Shmatikov, V. (2015). Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (pp. 1310–1321).

23. Pichaimani, T., Ratnala, A. K., & Parida, P. R. (2024). Analyzing time complexity in machine learning algorithms for big data: a study on the performance of decision trees, neural networks, and SVMs. Journal of Science & Technology, 5(1), 164-205.

24. Muthusamy, P., Thangavelu, K., & Bairi, A. R. (2023). AI-Powered Fraud Detection in Financial Services: A Scalable Cloud-Based Approach. Newark Journal of Human-Centric AI and Robotics Interaction, 3, 146-181.

25. Zhang, C., Song, D., Huang, C., Swami, A., & Chawla, N. V. (2018). Heterogeneous graph neural network. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (pp. 793–802).

26. Sukla, R. R. (2025). The Evolution of AI in Software Quality and Cloud Management: A Framework for Autonomous Systems. Journal of Computer Science and Technology Studies, 7(6), 353-359.

27. Mahajan, A. S. (2025). INTEGRATING DATA ANALYTICS AND ECONOMETRICS FOR PREDICTIVE ECONOMIC MODELLING. International Journal of Applied Mathematics, 38(2s), 1450-1462.

28. Devi, C., Inampudi, R. K., & Vijayaboopathy, V. (2025). Federated Data-Mesh Quality Scoring with Great Expectations and Apache Atlas Lineage. Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online), 4(2), 92-101.

29. Praveen Kumar, K., Adari, Vijay Kumar., Vinay Kumar, Ch., Srinivas, G., & Kishor Kumar, A. (2024). Optimizing network function virtualization: A comprehensive performance analysis of hardware-accelerated solutions. SOJ Materials Science and Engineering, 10(1), 1-10.

30. A. K. S, L. Anand and A. Kannur, "A Novel Approach to Feature Extraction in MI - Based BCI Systems," 2024 8th International Conference on Computational System and Information Technology for Sustainable Solutions (CSITSS), Bengaluru, India, 2024, pp. 1-6, doi: 10.1109/CSITSS64042.2024.10816913.

31. HV, M. S., & Kumar, S. S. (2024). Fusion Based Depression Detection through Artificial Intelligence using Electroencephalogram (EEG). Fusion: Practice & Applications, 14(2).

32. Chen, T., & Guestrin, C. (2016). XGBoost: A scalable tree boosting system. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 785–794).

33. Panwar, P., Shabaz, M., Nazir, S., Keshta, I., Rizwan, A., & Sugumar, R. (2023). Generic edge computing system for optimization and computation offloading of unmanned aerial vehicle. Computers and Electrical Engineering, 109, 108779.

34. Muthusamy, M. (2024). Cloud-Native AI metrics model for real-time banking project monitoring with integrated safety and SAP quality assurance. International Journal of Research and Applied Innovations (IJRAI), 7(1), 10135–10144. https://doi.org/10.15662/IJRAI.2024.0701005

35. Kairouz, P., Oh, S., & Viswanath, P. (2014). Extremal mechanisms for local differential privacy. In Advances in Neural Information Processing Systems (NeurIPS).