AI-Enhanced Cloud Security with ERP Integration: MFA, Multivariate Classification, and Transformer-Based Threat Detection
DOI:
https://doi.org/10.15680/IJCTECE.2021.0406012Keywords:
Cloud security, ERP integration, Artificial intelligence, Multi-factor authentication, Multivariate classification, Transformer models, Threat detection, Network security, Anomaly detection, Decision intelligence, Cybersecurity, Enterprise protection, Real-time monitoring, Machine learning, Adaptive securityAbstract
The growing adoption of cloud computing and ERP systems has increased the complexity and vulnerability of enterprise networks. This paper proposes an AI-enhanced cloud security framework with ERP integration, focusing on multi-factor authentication (MFA), multivariate classification, and transformer-based threat detection. The framework leverages machine learning models to analyze large-scale network data and detect anomalies in real time. Transformer-based architectures enhance decision intelligence by contextualizing and correlating threat patterns across multiple data sources. Integration with ERP systems ensures consistent security policies, centralized monitoring, and seamless protection of critical enterprise resources. Experimental results indicate improved detection accuracy, reduced false positives, and enhanced operational efficiency. This framework provides a scalable, adaptive, and AI-driven solution for modern enterprise cloud security.References
1. Thangavelu, K., Sethuraman, S., & Hasenkhan, F. (2021). AI-Driven Network Security in Financial Markets: Ensuring 100% Uptime for Stock Exchange Transactions. American Journal of Autonomous Systems and Robotics Engineering, 1, 100-130.
2. Popović, K., & Hocenski, Ž. (2010). Cloud computing security issues and challenges. In Proceedings of the 33rd International Convention MIPRO (pp. 344–349). IEEE.
3. Vijayaboopathy, V., Ananthakrishnan, V., & Mohammed, A. S. (2020). Transformer-Based Auto-Tuner for PL/SQL and Shell Scripts. Journal of Artificial Intelligence & Machine Learning Studies, 4, 39-70.
4. Hinton, G., & Salakhutdinov, R. R. (2006). Reducing the dimensionality of data with neural networks. Science, 313(5786), 504–507. https://doi.org/10.1126/science.1127647
5. Singh, H. (2020). Evaluating AI-enabled fraud detection systems for protecting businesses from financial losses and scams. The Research Journal (TRJ), 6(4).
6. Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Achieving secure, scalable, and fine-grained data access control in cloud computing. Proceedings of IEEE INFOCOM, 1–9. https://doi.org/10.1109/INFCOM.2010.5462174
7. Kumar, R., Al-Turjman, F., Anand, L., Kumar, A., Magesh, S., Vengatesan, K., ... & Rajesh, M. (2021). Genomic sequence analysis of lung infections using artificial intelligence technique. Interdisciplinary Sciences: Computational Life Sciences, 13(2), 192-200.
8. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing (NIST Special Publication 800-145). National Institute of Standards and Technology.
9. Kumbum, P. K., Adari, V. K., Chunduru, V. K., Gonepally, S., & Amuda, K. K. (2020). Artificial intelligence using TOPSIS method. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 3(6), 4305-4311.
10. Navandar, P. (2018). Enhancing Cybersecurity in Airline Operations through ERP Integration: A Comprehensive Approach. Journal of Scientific and Engineering Research, 5(4), 457-462.
11. Arora, A. (2020). Challenges of Integrating Artificial Intelligence in Legacy Systems and Potential Solutions for Seamless Integration. The Research Journal (TRJ), 6(6), 44–51.
12. Anand, L., & Neelanarayanan, V. (2019). Feature Selection for Liver Disease using Particle Swarm Optimization Algorithm. International Journal of Recent Technology and Engineering (IJRTE), 8(3), 6434-6439.
13. Salton, G., & McGill, M. J. (1983). Introduction to modern information retrieval. McGraw-Hill.
14. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian Journal of Science and Technology, 8(35), 1-5.
15. Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud security and privacy: An enterprise perspective on risks and compliance. O’Reilly Media.
16. Amuda, K. K., Kumbum, P. K., Adari, V. K., Chunduru, V. K., & Gonepally, S. (2020). Applying design methodology to software development using WPM method. Journal of Computer Science Applications and Information Technology, 5(1), 1-8.
17. Tang, Y., Sandhu, R., & Park, J. (2008). PKI-based security for cloud computing. In Proceedings of the 7th IEEE International Conference on Collaborative Computing (pp. 1–7). IEEE.
18. Stallings, W. (2017). Network security essentials: Applications and standards (6th ed.). Pearson.
19. Sivaraju, P. S. (2021). 10x Faster Real-World Results from Flash Storage Implementation (Or) Accelerating IO Performance A Comprehensive Guide to Migrating From HDD to Flash Storage. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 4(5), 5575-5587.
20. Jain, A. K., Ross, A., & Nandakumar, K. (2011). Introduction to biometrics. Springer.
21. Pichaimani, T., Inampudi, R. K., & Ratnala, A. K. (2021). Generative AI for Optimizing Enterprise Search: Leveraging Deep Learning Models to Automate Knowledge Discovery and Employee Onboarding Processes. Journal of Artificial Intelligence Research, 1(2), 109-148.
22. Russell, S., & Norvig, P. (2009). Artificial intelligence: A modern approach (3rd ed.). Prentice Hall.
23. Popović, K., & Hocenski, Ž. (2010). Cloud computing security issues and challenges. In Proceedings of the 33rd International Convention MIPRO (pp. 344–349). IEEE.
24. National Institute of Standards and Technology. (2017). Digital identity guidelines (NIST SP 800-63-3). U.S. Department of Commerce.
25. Girdhar, P., Virmani, D., & Saravana Kumar, S. (2019). A hybrid fuzzy framework for face detection and recognition using behavioral traits. Journal of Statistics and Management Systems, 22(2), 271-287.
26. Arora, A. (2019). Securing Multi-Cloud Architectures Using Advanced Cloud Security Management Tools. International Journal of Research in Electronics and Computer Engineering, 7(2).

