Policy Driven and Zero Trust AI Architectures for Secure Data Lakes and Fraud Detection and Migration and Real Time Enterprise Intelligence
Main Article Content
Abstract
The study examines architectural models, security enforcement mechanisms, AI-powered fraud detection pipelines, and secure migration strategies. It further proposes a research methodology for implementing and evaluating such systems within enterprise environments. The findings demonstrate that combining policy-driven governance with Zero Trust AI significantly enhances data protection, reduces fraud risks, supports secure cloud migration, and enables real-time decision intelligence. However, implementation complexity, operational costs, and integration challenges remain key concerns. The paper concludes by outlining advantages, disadvantages, and future research directions in secure AI-driven enterprise data ecosystems.
Article Details
Section
How to Cite
References
1. Chennamsetty, C. S. (2022). Hardware-Software Co-Design for Sparse and Long-Context AI Models: Architectural Strategies and Platforms. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 5(5), 7121-7133.
2. Harish, M., & Selvaraj, S. K. (2023, August). Designing efficient streaming-data processing for intrusion avoidance and detection engines using entity selection and entity attribute approach. In AIP Conference Proceedings (Vol. 2790, No. 1, p. 020021). AIP Publishing LLC.
3. Ramidi, M. (2023). Accessibility-centered mobile architectures for government health initiatives. International Journal of Research and Applied Innovations (IJRAI), 6(2), 8597–8610.
4. Nagarajan, C., Neelakrishnan, G., Akila, P., Fathima, U., & Sneha, S. (2022). Performance Analysis and Implementation of 89C51 Controller Based Solar Tracking System with Boost Converter. Journal of VLSI Design Tools & Technology, 12(2), 34-41p.
5. Mudunuri, P. R. (2022). Automating compliance in biomedical DevOps: A policy-as-code approach. International Journal of Research and Applied Innovations (IJRAI), 5(2), 6770–6783.
6. Surisetty, L. S. (2021). Zero-Trust Data Fabrics: A Policy-Driven Model for Secure Cross-Cloud Healthcare and Financial Data Exchanges. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 4(2), 4548-4556.
7. Singh, A. (2021). Mitigating DDoS attacks in cloud networks. International Journal of Engineering & Extended Technologies Research (IJEETR), 3(4), 3386–3392. https://doi.org/10.15662/IJEETR.2021.0304003
8. Navandar, P. (2022). SMART: Security Model Adversarial Risk-based Tool. International Journal of Research and Applied Innovations, 5(2), 6741-6752.
9. Anumula, S. R. (2022). Transparent and auditable decision-making in enterprise platforms. International Journal of Research and Applied Innovations (IJRAI), 5(5), 7691–7702. https://doi.org/10.15662/IJRAI.2022.0505007
10. Panda, M. R., & Kondisetty, K. (2022). Predictive Fraud Detection in Digital Payments Using Ensemble Learning. American Journal of Data Science and Artificial Intelligence Innovations, 2, 673-707.
11. Thangavelu, K., Keezhadath, A. A., & Selvaraj, A. (2022). AI-Powered Log Analysis for Proactive Threat Detection in Enterprise Networks. Essex Journal of AI Ethics and Responsible Innovation, 2, 33-66.
12. Chivukula, V. (2020). Use of multiparty computation for measurement of ad performance without exchange of personally identifiable information (PII). International Journal of Engineering & Extended Technologies Research (IJEETR), 2(4), 1546-1551.
13. Rittinghouse, J. W., & Ransome, J. F. (2017). Cloud computing: Implementation, management, and security (2nd ed.). CRC Press.
14. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146–164.
15. Adari, V. K., Chunduru, V. K., Gonepally, S., Amuda, K. K., & Kumbum, P. K. (2023). Ethical analysis and decision-making framework for marketing communications: A weighted product model approach. Data Analytics and Artificial Intelligence, 3 (5), 44–53.
16. Ponugoti, M. (2022). Integrating full-stack development with regulatory compliance in enterprise systems architecture. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 5(2), 6550–6563.
17. Gaddapuri, N. S. (2021). BIG DATA STORAGE OBSERVATION SYSTEM. Power System Protection and Control, 49(2), 7-19.
18. Vimal Raja, G. (2022). Leveraging Machine Learning for Real-Time Short-Term Snowfall Forecasting Using MultiSource Atmospheric and Terrain Data Integration. International Journal of Multidisciplinary Research in Science, Engineering and Technology, 5(8), 1336-1339.
19. Wang, D., Dai, L., Zhang, X., Sayyad, S., Sugumar, R., Kumar, K., & Asenso, E. (2022). Vibration signal diagnosis and conditional health monitoring of motor used in biomedical applications using Internet of Things environment. The Journal of Engineering, 2022(11), 1124-1132.
20. Gangina, P. (2022). Unified payment orchestration platform: Eliminating PCI compliance burden for SMBs through multi-provider aggregation. International Journal of Research Publications in Engineering, Technology and Management, 5(2), 6540–6549.
21. Archana, R., & Anand, L. (2023, September). Ensemble Deep Learning Approaches for Liver Tumor Detection and Prediction. In 2023 Third International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS) (pp. 325-330). IEEE.
22. Genne, S. (2022). Designing accessibility-first enterprise web platforms at scale. International Journal of Research and Applied Innovations (IJRAI), 5(5), 7679–7690.
23. Mohana, P., Muthuvinayagam, M., Umasankar, P., & Muthumanickam, T. (2022, March). Automation using Artificial intelligence based Natural Language processing. In 2022 6th International Conference on Computing Methodologies and Communication (ICCMC) (pp. 1735-1739). IEEE.
24. Sriramoju, S. (2022). Automated migration frameworks for legacy systems: A security-driven approach. International Journal of Computer Technology and Electronics Communication (IJCTEC), 5(3), 5146–5157.
25. Behl, A., Behl, K., & Malhotra, K. (2019). Cybersecurity and cyberwar: What everyone needs to know. Oxford University Press.
26. Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176.
27. Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile Networks and Applications, 19(2), 171–209.