Zero Trust AI-Powered Cybersecurity Framework for Cloud-Native Banking, Healthcare, and Government Systems

Authors

  • Johan Fabry Senior Technical Team Lead, United Kingdom Author

DOI:

https://doi.org/10.15680/IJCTECE.2025.0806029

Keywords:

Zero Trust security, AI-powered cybersecurity, Cloud-native security, Banking cybersecurity, Healthcare data protection, Government cybersecurity, Machine learning security, Continuous authentication, Threat detection, Cloud infrastructure security

Abstract

The rapid digital transformation across banking, healthcare, and government sectors has significantly increased the reliance on cloud-native systems for storing, processing, and transmitting sensitive data. However, this transition has also expanded the attack surface, making these sectors prime targets for sophisticated cyber threats. Traditional perimeter-based security models are no longer sufficient to protect distributed and dynamic cloud environments. This paper proposes a Zero Trust AI-powered cybersecurity framework designed to secure cloud-native infrastructures used in critical sectors such as banking, healthcare, and government systems. The framework integrates Zero Trust principles, artificial intelligence–based threat detection, identity-centric security controls, and continuous monitoring mechanisms. By combining AI-driven analytics with strict access verification and automated threat response, the proposed framework strengthens data protection, improves real-time threat detection, and enhances resilience against advanced cyberattacks. The model ensures that every user, device, and application is continuously verified before accessing resources, thereby minimizing the risk of unauthorized access and data breaches.

References

1. Kamadi, S. (2025). Machine learning and AI architecture: A comprehensive framework for production-grade intelligent systems. World Journal of Advanced Research and Reviews, 27(1), 2789–2799.

2. Ravi Kumar Ireddy. (2023). AI Driven Predictive Vulnerability Intelligence for Cloud-Native Ecosystems. International Journal of Scientific Research in Computer Science Engineering and Information Technology, 9(2), 894-903.

3. Grandhe, K. (2025). Designing a Scalable Data Lake Architecture on AWS Using Glue and S3. International Journal of Artificial Intelligence Data Science and Machine Learning, 6(3), 60-63.

4. Gurajapu, A., Anumolu, S., Garimella, V., Chundi, V. M. S. R., & Gubbala, V. S. A. P. (2025). Ethical and Trustworthy Autonomous Agents in Network SecOps: Transparency, Auditing, and Human-in-the-Loop Overrides. Frontiers in Computer Science and Artificial Intelligence, 4(2), 63-66.

5. Adari, V. K. (2024). Interoperability and Data Modernization: Building a Connected Banking Ecosystem. International Journal of Computer Engineering and Technology, 15(6), 653-662.

6. Gopinathan, V. R. (2024). Cyber-Resilient Digital Banking Analytics Using AI-Driven Federated Machine Learning on AWS. International Journal of Engineering & Extended Technologies Research, 6(4), 8419-8426.

7. Gadige, C. D. (2025). The evolution of user interface development in Salesforce: From Visualforce to Lightning Web Components. International Journal of Research Publications in Engineering Technology and Management (IJRPETM), 8(5), 12883–12890.

8. Ambati, K. C. (2024). Enterprise-wide procurement consolidation: Ivalua-SAP-EDW integration architecture for global supply chain excellence. International Journal of Research Publications in Engineering Technology and Management (IJRPETM), 7(4), 14309–14318.

9. Parathraju, P., & Umasankar, P. (2025). Performance evaluation of ultrathin CdTe-based solar cells with dual absorbers via SCAPS-1D simulation. Scientific Reports, 15(1), 26428.

10. Vijayakumar, R., & Gireesh, G. (2013, July). Quantitative analysis and fracture detection of pelvic bone X-ray images. In 2013 Fourth International Conference on Computing Communications and Networking Technologies (ICCCNT) (pp. 1-7). IEEE.

11. Kumar, S. A., & Anand, L. (2025). A Novel EEG-Based Deep Learning Framework for Enhancing Communication in Locked-In Syndrome Using P300 Speller and Attention Mechanisms. KSII Transactions on Internet and Information Systems, 19(11), 3841-3855.

12. Vimal Raja, G. (2024). Intelligent Data Transition in Automotive Manufacturing Systems Using Machine Learning. International Journal of Multidisciplinary and Scientific Emerging Research, 12(2), 515-518.

13. Gowda, M. K. S. (2025). Driving Return on Risk-Weighted Assets Improvement via Audit, Analytics, and Advanced Modeling in Bank Portfolio Management. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 8(3), 12197-12206.

14. S. Vishwarup et al. (2020). Automatic Person Count Indication System using IoT in a Hotel Infrastructure. In 2020 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-4).

15. Inbavalli, M., & Arasu, T. (2015). Efficient Analysis of Frequent Item Set Association Rule Mining Methods. International Journal of Scientific & Engineering Research, 6(4).

16. Ramsugeerthi, A., Neela Madheswari, A., Umamaheswari, A., & Prassana, D. (2020). Location navigation assistance for educational institutions using augmented reality. Journal of Xidian University, 14(4), 1342–1347.

17. Surampudi, Y., Kondaveeti, D., & Pichaimani, T. (2023). A Comparative Study of Time Complexity in Big Data Engineering: Evaluating Efficiency of Sorting and Searching Algorithms in Large-Scale Data Systems. Journal of Science & Technology, 4(4), 127-165.

18. Viswanathan, Venkatraman. "AI-Augmented Decision Intelligence for Enterprise Systems: Integrating Cognitive Analytics for Resource and Talent Optimization." (2023).

19. Tamizharasi, S., Rubini, P., Saravana Kumar, S., & Arockiam, D. Adapting federated learning-based AI models to dynamic cyberthreats in pervasive IoT environments.

20. Sammy, F., Chettier, T., Boyina, V., Shingne, H., Saluja, K., Mali, M., ... & Shobana, A. (2025). Deep Learning-Driven Visual Analytics Framework for Next-Generation Environmental Monitoring. Journal of Applied Science and Technology Trends, 114-122.

21. Jagadeesh, S., & Sugumar, R. (2017). Optimal knowledge extraction system based on GSA and AANN. International Journal of Control Theory and Applications, 10(12), 153–162.

22. Panda, S. S. (2024). Delivering Scalable Cloud Services in China: Microsoft and 21Vianet Collaboration. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 7(6), 11325-11333.

23. Muthusamy, P., Muthirevula, G. R., & Mohammed, A. S. (2025). Zero-Touch Continuous Audit with Hybrid Symbolic-Neural Reasoning. Newark Journal of Human-Centric AI and Robotics Interaction, 5, 80-111.

24. Poornachandar, T., Latha, A., Nisha, K., Revathi, K., & Sathishkumar, V. E. (2025, September). Cloud-Based Extreme Learning Machines for Mining Waste Detoxification Efficiency. In 2025 4th International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) (pp. 1348-1353). IEEE.

25. Kalra, S., Faiz, A., Aggarwal, D., Vigenesh, M., Ramesh, P. N., & Elais, S. (2025, December). Optimizing CNNR-NNT Model for Effective Product Recommendation in E-Commerce. In 2025 International Conference on AI-Driven STEM Education and Learning Technologies (AISTEMEDU) (pp. 1-7). IEEE.

26. Konda, S. K. (2024). Carbon-native DCIM architectures for AI data centers: Autonomous infrastructure control via smart grid intelligence. World Journal of Advanced Research and Reviews, 21(1), 3008–3318.

27. Thumala, S. R., Madathala, H., & Sharma, S. (2025, March). Towards Sustainable Cloud Computing: Innovations in Energy-Efficient Resource Allocation. In 2025 International Conference on Machine Learning and Autonomous Systems (ICMLAS) (pp. 1528-1533). IEEE.

28. Suddala, V. R. A. K. (2025, November). FADL-DP and CNN-GRU Driven Cloud Framework for Secure Healthcare E-Commerce Platform. In 2025 5th International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS) (pp. 991-996). IEEE.

29. Jothilingam, P. (2025). Towards autonomous commissioning: Integrating digital twins artificial intelligence and smart sensors for next-generation process control systems. Certified Journal of International Research, 5(1), 1-8.

30. Ramidi, M. (2024). Securing Mobile App Development with Compliance Aware CI/CD Pipelines in Government. International Journal of Computer Technology and Electronics Communication, 7(3), 8824-8825.

31. Karnam, A. (2023). SAP Beyond Uptime: Engineering Intelligent AMS with High Availability & DR through Pacemaker Automation. International Journal of Research Publications in Engineering, Technology and Management, 6(5), 93519361. https://doi.org/10.15662/IJRPETM.2023.0605011

32. Jayaraman, S., Rajendran, S., & P, S. P. (2019). Fuzzy c-means clustering and elliptic curve cryptography using privacy preserving in cloud. International Journal of Business Intelligence and Data Mining, 15(3), 273-287.

33. Anumula, S. R. (2025). Real-Time Scheduling Optimization Using Machine Learning in Pilot Trading and Tracking Systems. Journal Of Multidisciplinary, 5(7), 128-133.

34. Ravi Kumar Ireddy. (2023). AI Driven Predictive Vulnerability Intelligence for Cloud-Native Ecosystems. International Journal of Scientific Research in Computer Science Engineering and Information Technology, 9(2), 894-903.

35. Uttama Reddy Sanepalli. (2022). Adaptive Intelligence Framework for Retirement Portfolio Management: Self-Optimizing Infrastructure for Dynamic Asset Allocation and Risk Mitigation. International Journal of Scientific Research in Computer Science Engineering and Information Technology, 8(6), 769-780.

36. Gaddapuri, N. S. (2025). Digital twin governance: IoT-driven real-time regulatory auditing in smart hospital architecture. International Journal of Computer Technology and Electronics Communication, 8(5), 11515–11524.

Downloads

Published

2025-11-26

How to Cite

Zero Trust AI-Powered Cybersecurity Framework for Cloud-Native Banking, Healthcare, and Government Systems. (2025). International Journal of Computer Technology and Electronics Communication, 8(6), 11841-11848. https://doi.org/10.15680/IJCTECE.2025.0806029