Distributed Trust Aware Platforms Using AI and Cloud for Secure DevSecOps and Financial Healthcare Ecosystems

Authors

  • Dr.Prasad Dharnasi Professor, Department of Computer Science and Engineering, Holy Mary Institute of Technology and Science, Hyderabad, India Author

DOI:

https://doi.org/10.15680/IJCTECE.2025.0805030

Keywords:

Distributed Trust, DevSecOps, Artificial Intelligence, Cloud Computing, Blockchain, Healthcare Security, Financial Systems, Trust Scoring, Explainable AI, Cybersecurity, Secure Pipelines, Data Privacy, Zero Trust Architecture

Abstract

The increasing reliance on cloud-native architectures and DevSecOps practices in financial and healthcare ecosystems has introduced critical challenges related to trust, security, and compliance. Traditional centralized security models are inadequate in addressing modern threats such as insider attacks, supply chain vulnerabilities, and cross-domain data breaches. This paper proposes a Distributed Trust-Aware Platform (DTAP) that integrates Artificial Intelligence (AI), cloud computing, and decentralized trust mechanisms to enhance security across DevSecOps pipelines and data-driven ecosystems.

 

The architecture leverages trust scoring models, blockchain-based verification, and AI-driven anomaly detection to continuously assess the integrity of applications, users, and infrastructure components. By embedding security into every stage of the DevSecOps lifecycle, the system ensures proactive threat detection and automated response. Additionally, the platform supports secure data sharing and compliance across financial and healthcare domains, addressing regulatory requirements such as data privacy and auditability.

 

Explainable AI techniques are incorporated to provide transparency in trust evaluation and decision-making processes. The proposed framework demonstrates improved resilience, scalability, and trustworthiness compared to conventional systems. It enables organizations to build secure, adaptive, and compliant digital ecosystems capable of handling complex, distributed environments while maintaining operational efficiency and data integrity.

References

1. Tamizharasi, S., Rubini, P., Saravana Kumar, S., & Arockiam, D. Adapting federated learning-based AI models to dynamic cyberthreats in pervasive IoT environments.

2. Fazilath, M., & Umasankar, P. (2025, February). Comprehensive Analysis of Artificial Intelligence Applications for Early Detection of Ovarian Tumours: Current Trends and Future Directions. In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS) (pp. 1-9). IEEE.

3. Aashiq Banu, S., Sucharita, M. S., Soundarya, Y. L., Nithya, L., Dhivya, R., & Rengarajan, A. (2020). Robust Image Encryption in Transform Domain Using Duo Chaotic Maps—A Secure Communication. In Evolutionary Computing and Mobile Sustainable Networks: Proceedings of ICECMSN 2020 (pp. 271-281). Singapore: Springer Singapore.

4. Konda, S. K. (2025). A smart energy consumption system architecture for sustainable semiconductor manufacturing and AI workload operations. International Journal of Engineering & Extended Technologies Research (IJEETR), 7(2), 9678–9694. https://doi.org/10.15662/IJEETR.2025.070200

5. Sanepalli, Uttama Reddy. (2023). Cognitive goal-driven financial infrastructure: A cloud-native, AI-orchestrated architecture for investment trade settlement and risk management systems. World Journal of Advanced Research and Reviews, 19(1), 1659–1667. https://doi.org/10.30574/wjarr.2023.19.1.1358

6. Ireddy, R. K. (2024). Event-native financial onboarding platforms: A Kafka-centric reference architecture for sub-minute identity and compliance processing. World Journal of Advanced Research and Reviews, 21(2), 2182–2192. https://doi.org/10.30574/wjarr.2024.21.2.0448

7. Kumar, S. A., & Anand, L. (2025). A Novel EEG-Based Deep Learning Framework for Enhancing Communication in Locked-In Syndrome Using P300 Speller and Attention Mechanisms. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 19(11), 3841-3855.

8. Jagadeesh, S., & Sugumar, R. (2017). Optimal knowledge extraction system based on GSA and AANN. International Journal of Control Theory and Applications, 10(12), 153–162.

9. Sridevi, V., Azath, H., Vijayakumar, R., Anbuselvan, N., Amirthalingam, V., & Arunkumar, S. (2024, April). Augmented Reality Shopping and IoT-Enabled Virtual Try-On with Cloud Services for Interactive Product Displays. In 2024 10th International Conference on Communication and Signal Processing (ICCSP) (pp. 880-885). IEEE.

10. Gupta, M., Sowmiya, S., Parmar, Y., Menon, S. V., Banchhor, C. O., & Vigenesh, M. (2024, November). Refining Heart Disease Diagnosis with Machine Learning: Techniques for Optimal Medical Outcomes. In 2024 International Conference on Recent Advances in Science and Engineering Technology (ICRASET) (pp. 1-5). IEEE.

11. M Suganthi, N Ramesh, “Treatment of water using natural zeolite as membrane filter”, Journal of Environmental Protection and Ecology, Volume 23, Issue 2, pp: 520-530,2022

12. Niture, N. (2025). AI-Augmented Infrastructure Governance: Intelligent Risk Detection in Identity-Centric Cloud Platforms. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 8(2), 11802-11814.

13. Kothokatta, L. (2025). Security-Integrated Test Framework for FedRAMP-Ready Cloud Applications. International Journal of Engineering & Extended Technologies Research (IJEETR), 7(2), 9705-9714.

14. Gurram, S. (2023). Why Data Engineering, Not Model Scale, Became the True Bottleneck in Generative AI. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(4), 9028-9036.

15. Gopinathan, V. R. (2023). Cloud-First AI Security Architecture for Protecting Enterprise Digital Ecosystems and Financial Networks. International Journal of Research and Applied Innovations, 6(6), 10031-10039.

16. Ambalakannu, M. (2024). The emergence of AI-powered data analytics revolutionizing business intelligence. International Journal of Future Innovative Science and Technology (IJFIST), 7(6), 13947–13955. https://doi.org/10.15662/IJFIST.2024.0706014

17. Indurthy, V. S. K. (2024). The surge in AI-powered data analytics revolutionizing business intelligence. International Journal of Future Innovative Science and Technology (IJFIST), 7(6), 13956–13964. https://doi.org/10.15662/IJFIST.2024.0706015

18. Soundappan, S. J. (2024). AI-Driven Customer Intelligence in Enterprise Lakehouse Systems Sentiment Mining Governance-Aware Analytics and Real-Time Data Synchronization. International Journal of Advanced Engineering Science and Information Technology (IJAESIT), 7(5), 14905.

19. Mudunuri, P. R. (2022). Engineering audit-ready CI/CD pipelines for federally regulated scientific computing. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(5), 5342-5351.

20. Mangukiya, M. (2023). Blockchain-Enabled Traceability and Compliance in Global Electronics Production Networks. International Journal of Computer Technology and Electronics Communication, 6(6), 7999-8004.

21. Bheemisetty, N. (2024). AI-powered recommendation systems: Best practices and real-world applications. International Journal of Future Innovative Science and Technology (IJFIST), 7(6), 13928–13926. https://doi.org/10.15662/IJFIST.2024.0706011

22. Khan, M. F., Khan, W. A., Hameed, M. M., & Siddiqi, A. A. (2025). Self-Awareness Mechanism for Top-down Attention using Fuzzy Logic in Sustainable Business Intelligence. Sustainable Business and Society in Emerging Economies, 7(2), 241-250.

23. Guda, D. P. (2024). Cyber insurance for DevSecOps risks: Pricing models and coverage gaps. Journal of Information Systems Engineering and Management, 9(3).

24. Rajasekharan, R. (2017). The role of DevOps automation in improving enterprise database reliability. International Journal of Humanities and Information Technology (IJHIT), 2(1), 20–29.

25. Kumar, L. M. S. (2025). Developing protocol translation mechanisms for legacy banking systems. International Journal of Innovative Research in Science Engineering, 14(5), 13343–13350.

26. Sarabhu, V. B., & Balaji, V. (2018). Advanced memory virtualization technique for efficient access of data resources in cloud environment. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 1(3), 623–629.

27. Padala, S. (2025). AI-Powered Healthcare Contact Centers: Real-Time Patient Journey Mapping and Dynamic Call Prioritization. Journal of Computer Science and Technology Studies, 7(7), 469-478.

28. Agarwal, S. (2022). Observability in Microservices: From Traditional Monitoring to Distributed System Intelligence. International Journal of Computer Technology and Electronics Communication, 5(6), 16220-16226.

29. Alam, M. K., Mahmud, M. A., & ALAM, M. A. (2025). Adversarial Machine Learning for Robust Fraud Detection in High-Frequency Financial Transactions. Journal of Computer Science and Technology Studies, 7(8), 314-335.

30. Varma, K. K., & Anand, L. (2025, March). Deep Learning Driven Proactive Auto Scaler for High-Quality Cloud Services. In International Conference on Computing and Communication Systems for Industrial Applications (pp. 329-338). Singapore: Springer Nature Singapore.

31. Subramani, V. (2024). Dynamic scaling in e-commerce platforms: Microservices for latency, compliance, and resilience. Computer Fraud and Security, 2024(11). https://computerfraudsecurity.com/index.php/journal/article/view/879

32. Gentyala, R. (2021). The Silent Interruption: Assessing the Impact of an AI Driven Sepsis Alert on Emergency Clinician Cognitive Load and Point-of-Care Efficiency. IACSE - International Journal of Computer Technology (IACSE-IJAIA), 2(1), 7–79.

33. Mohana, P., Muthuvinayagam, M., Umasankar, P., & Muthumanickam, T. (2022, March). Automation using Artificial intelligence based Natural Language processing. In 2022 6th International Conference on Computing Methodologies and Communication (ICCMC) (pp. 1735-1739). IEEE.

34. Jayaraman, S., Rajendran, S., & P, S. P. (2019). Fuzzy c-means clustering and elliptic curve cryptography using privacy preserving in cloud. International Journal of Business Intelligence and Data Mining, 15(3), 273-287.

35. Sudhan, S. K. H. H., & Kumar, S. S. (2016). Gallant Use of Cloud by a Novel Framework of Encrypted Biometric Authentication and Multi Level Data Protection. Indian Journal of Science and Technology, 9, 44.

36. Md, S., Md Saiful, I., Mohammad, Y., Mahzabin Binte, R., & Jannatul, F. (2024). AI-Driven Business Analytics for Early Prediction and Prevention of High-Cost Healthcare Utilization. AI-Driven Business Analytics for Early Prediction and Prevention of High-Cost Healthcare Utilization, 7(12), 1830-1856.

37. Vimal Raja, G. (2022). Leveraging Machine Learning for Real-Time Short-Term Snowfall Forecasting Using MultiSource Atmospheric and Terrain Data Integration. International Journal of Multidisciplinary Research in Science, Engineering and Technology, 5(8), 1336-1339.

Downloads

Published

2025-09-24

How to Cite

Distributed Trust Aware Platforms Using AI and Cloud for Secure DevSecOps and Financial Healthcare Ecosystems. (2025). International Journal of Computer Technology and Electronics Communication, 8(5), 11525-11533. https://doi.org/10.15680/IJCTECE.2025.0805030

Most read articles by the same author(s)