Policy Driven and Zero Trust AI Architectures for Secure Data Lakes and Fraud Detection and Migration and Real Time Enterprise Intelligence

Main Article Content

Oliver Matthias Felsenbruch

Abstract

The rapid expansion of enterprise data ecosystems has intensified the need for secure, intelligent, and resilient architectures. Traditional perimeter-based security models are insufficient in protecting modern data lakes, particularly when supporting AI-driven fraud detection, large-scale data migration, and real-time enterprise intelligence. This paper explores the integration of policy-driven governance frameworks and Zero Trust Architecture (ZTA) principles within AI-enabled data lake environments. A policy-driven approach ensures data access, processing, and analytics are governed by dynamic, automated policies aligned with compliance, security, and operational requirements. Zero Trust enhances this by enforcing continuous verification, least-privilege access, and micro-segmentation across all users, devices, and workloads.

 


The study examines architectural models, security enforcement mechanisms, AI-powered fraud detection pipelines, and secure migration strategies. It further proposes a research methodology for implementing and evaluating such systems within enterprise environments. The findings demonstrate that combining policy-driven governance with Zero Trust AI significantly enhances data protection, reduces fraud risks, supports secure cloud migration, and enables real-time decision intelligence. However, implementation complexity, operational costs, and integration challenges remain key concerns. The paper concludes by outlining advantages, disadvantages, and future research directions in secure AI-driven enterprise data ecosystems.

Article Details

Section

Articles

How to Cite

Policy Driven and Zero Trust AI Architectures for Secure Data Lakes and Fraud Detection and Migration and Real Time Enterprise Intelligence. (2024). International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(5), 11203-11210. https://doi.org/10.15662/IJRPETM.2024.0705010

References

1. Chennamsetty, C. S. (2022). Hardware-Software Co-Design for Sparse and Long-Context AI Models: Architectural Strategies and Platforms. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 5(5), 7121-7133.

2. Harish, M., & Selvaraj, S. K. (2023, August). Designing efficient streaming-data processing for intrusion avoidance and detection engines using entity selection and entity attribute approach. In AIP Conference Proceedings (Vol. 2790, No. 1, p. 020021). AIP Publishing LLC.

3. Ramidi, M. (2023). Accessibility-centered mobile architectures for government health initiatives. International Journal of Research and Applied Innovations (IJRAI), 6(2), 8597–8610.

4. Nagarajan, C., Neelakrishnan, G., Akila, P., Fathima, U., & Sneha, S. (2022). Performance Analysis and Implementation of 89C51 Controller Based Solar Tracking System with Boost Converter. Journal of VLSI Design Tools & Technology, 12(2), 34-41p.

5. Mudunuri, P. R. (2022). Automating compliance in biomedical DevOps: A policy-as-code approach. International Journal of Research and Applied Innovations (IJRAI), 5(2), 6770–6783.

6. Surisetty, L. S. (2021). Zero-Trust Data Fabrics: A Policy-Driven Model for Secure Cross-Cloud Healthcare and Financial Data Exchanges. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 4(2), 4548-4556.

7. Singh, A. (2021). Mitigating DDoS attacks in cloud networks. International Journal of Engineering & Extended Technologies Research (IJEETR), 3(4), 3386–3392. https://doi.org/10.15662/IJEETR.2021.0304003

8. Navandar, P. (2022). SMART: Security Model Adversarial Risk-based Tool. International Journal of Research and Applied Innovations, 5(2), 6741-6752.

9. Anumula, S. R. (2022). Transparent and auditable decision-making in enterprise platforms. International Journal of Research and Applied Innovations (IJRAI), 5(5), 7691–7702. https://doi.org/10.15662/IJRAI.2022.0505007

10. Panda, M. R., & Kondisetty, K. (2022). Predictive Fraud Detection in Digital Payments Using Ensemble Learning. American Journal of Data Science and Artificial Intelligence Innovations, 2, 673-707.

11. Thangavelu, K., Keezhadath, A. A., & Selvaraj, A. (2022). AI-Powered Log Analysis for Proactive Threat Detection in Enterprise Networks. Essex Journal of AI Ethics and Responsible Innovation, 2, 33-66.

12. Chivukula, V. (2020). Use of multiparty computation for measurement of ad performance without exchange of personally identifiable information (PII). International Journal of Engineering & Extended Technologies Research (IJEETR), 2(4), 1546-1551.

13. Rittinghouse, J. W., & Ransome, J. F. (2017). Cloud computing: Implementation, management, and security (2nd ed.). CRC Press.

14. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146–164.

15. Adari, V. K., Chunduru, V. K., Gonepally, S., Amuda, K. K., & Kumbum, P. K. (2023). Ethical analysis and decision-making framework for marketing communications: A weighted product model approach. Data Analytics and Artificial Intelligence, 3 (5), 44–53.

16. Ponugoti, M. (2022). Integrating full-stack development with regulatory compliance in enterprise systems architecture. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 5(2), 6550–6563.

17. Gaddapuri, N. S. (2021). BIG DATA STORAGE OBSERVATION SYSTEM. Power System Protection and Control, 49(2), 7-19.

18. Vimal Raja, G. (2022). Leveraging Machine Learning for Real-Time Short-Term Snowfall Forecasting Using MultiSource Atmospheric and Terrain Data Integration. International Journal of Multidisciplinary Research in Science, Engineering and Technology, 5(8), 1336-1339.

19. Wang, D., Dai, L., Zhang, X., Sayyad, S., Sugumar, R., Kumar, K., & Asenso, E. (2022). Vibration signal diagnosis and conditional health monitoring of motor used in biomedical applications using Internet of Things environment. The Journal of Engineering, 2022(11), 1124-1132.

20. Gangina, P. (2022). Unified payment orchestration platform: Eliminating PCI compliance burden for SMBs through multi-provider aggregation. International Journal of Research Publications in Engineering, Technology and Management, 5(2), 6540–6549.

21. Archana, R., & Anand, L. (2023, September). Ensemble Deep Learning Approaches for Liver Tumor Detection and Prediction. In 2023 Third International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS) (pp. 325-330). IEEE.

22. Genne, S. (2022). Designing accessibility-first enterprise web platforms at scale. International Journal of Research and Applied Innovations (IJRAI), 5(5), 7679–7690.

23. Mohana, P., Muthuvinayagam, M., Umasankar, P., & Muthumanickam, T. (2022, March). Automation using Artificial intelligence based Natural Language processing. In 2022 6th International Conference on Computing Methodologies and Communication (ICCMC) (pp. 1735-1739). IEEE.

24. Sriramoju, S. (2022). Automated migration frameworks for legacy systems: A security-driven approach. International Journal of Computer Technology and Electronics Communication (IJCTEC), 5(3), 5146–5157.

25. Behl, A., Behl, K., & Malhotra, K. (2019). Cybersecurity and cyberwar: What everyone needs to know. Oxford University Press.

26. Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176.

27. Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile Networks and Applications, 19(2), 171–209.