AI-Driven Cloud Intelligence for Credit Card Fraud Detection: Azure DevOps CI/CD with GRA Models, Cybersecurity, Healthcare ERP, and Flash Storage Integration

Main Article Content

Christian Leopold Eisenhauer

Abstract

This study presents an AI-driven cloud intelligence framework for credit card fraud detection that integrates Azure DevOps–enabled CI/CD pipelines with Grey Relational Analysis (GRA) models, enterprise cybersecurity controls, healthcare ERP data flows, and Flash Storage optimization. The architecture leverages automated MLOps processes—version control, continuous training, containerized deployment, and real-time monitoring—to ensure rapid, reliable delivery of fraud-detection models across distributed cloud environments. GRA is employed to identify subtle relational patterns among transactional, behavioral, and contextual variables, improving early detection of anomalous financial activities. Embedded cybersecurity mechanisms, including identity governance, encrypted data pipelines, zero-trust access policies, and adaptive threat detection, safeguard sensitive financial and healthcare ERP data. Flash Storage integration accelerates high-volume data ingestion and model inference, reducing latency and enhancing system responsiveness under peak workloads. Experimental results demonstrate improved fraud-detection accuracy, lower false-positive rates, and greater operational efficiency, supporting secure, scalable, and intelligent fraud-analytics deployment in regulated healthcare and financial ecosystems.

Article Details

Section

Articles

How to Cite

AI-Driven Cloud Intelligence for Credit Card Fraud Detection: Azure DevOps CI/CD with GRA Models, Cybersecurity, Healthcare ERP, and Flash Storage Integration. (2024). International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(4), 10837-10843. https://doi.org/10.15662/IJRPETM.2024.0704003

References

1. Deng, J. (1989). Introduction to Grey System Theory. Journal of Grey System, 1(1), 1–24.

2. Adari, V. K., Chunduru, V. K., Gonepally, S., Amuda, K. K., & Kumbum, P. K. (2020). Explain ability and interpretability in machine learning models. Journal of Computer Science Applications and Information Technology, 5(1), 1-7.

3. Anand, L., & Neelanarayanan, V. (2019). Feature Selection for Liver Disease using Particle Swarm Optimization Algorithm. International Journal of Recent Technology and Engineering (IJRTE), 8(3), 6434-6439.

4. HV, M. S., & Kumar, S. S. (2024). Fusion Based Depression Detection through Artificial Intelligence using Electroencephalogram (EEG). Fusion: Practice & Applications, 14(2).

5. Jayaraman, S., Rajendran, S., & P, S. P. (2019). Fuzzy c-means clustering and elliptic curve cryptography using privacy preserving in cloud. International Journal of Business Intelligence and Data Mining, 15(3), 273-287.

6. Suchitra, R. (2023). Cloud-Native AI model for real-time project risk prediction using transaction analysis and caching strategies. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(1), 8006–8013. https://doi.org/10.15662/IJRPETM.2023.0601002

7. Chen, Y., Wang, P., & Liu, J. (2018). Cloud-based multi tenant architectures for enterprise data analytics. International Journal of Cloud Computing, 7(2), 115–130.

8. Md Al Rafi. (2024). AI-Driven Fraud Detection Using Self-Supervised Deep Learning for Enhanced Customer Identity Modeling. International Journal of Humanities and Information Technology (IJHIT), 6(1), 8–18.

9. Nagarajan, G. (2022). An integrated cloud and network-aware AI architecture for optimizing project prioritization in healthcare strategic portfolios. International Journal of Research and Applied Innovations, 5(1), 6444–6450. https://doi.org/10.15662/IJRAI.2022.0501004

10. Muthusamy, M. (2022). AI-Enhanced DevSecOps architecture for cloud-native banking secure distributed systems with deep neural networks and automated risk analytics. International Journal of Research Publication and Engineering Technology Management, 6(1), 7807–7813. https://doi.org/10.15662/IJRPETM.2022.0506014

11. Zhai, Y., Hu, Q., & Pan, Y. (2015). Fault diagnosis for industrial systems using grey relational analysis and support vector machines. Expert Systems with Applications, 42(8), 3894–3903.

12. Uddandarao, D. P., & Vadlamani, R. K. (2025). Counterfactual Forecasting of Human Behavior using Generative AI and Causal Graphs. arXiv preprint arXiv:2511.07484.

13. Navandar, P. (2021). Fortifying cybersecurity in Healthcare ERP systems: unveiling challenges, proposing solutions, and envisioning future perspectives. Int J Sci Res, 10(5), 1322-1325.

14. Sivaraju, P. S. (2021). 10x Faster Real-World Results from Flash Storage Implementation (Or) Accelerating IO Performance A Comprehensive Guide to Migrating From HDD to Flash Storage. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 4(5), 5575-5587.

15. Mani, K., Paul, D., & Vijayaboopathy, V. (2022). Quantum-Inspired Sparse Attention Transformers for Accelerated Large Language Model Training. American Journal of Autonomous Systems and Robotics Engineering, 2, 313-351.

16. Anuj Arora, “Transforming Cybersecurity Threat Detection and Prevention Systems using Artificial Intelligence”, International Journal of Management, Technology And Engineering, Volume XI, Issue XI, NOVEMBER 2021.

17. Gao, L., & Zhu, Q. (2016). A cloud-based data ingestion framework for real-time analytics in multi-tenant systems. ACM SIGMOD Record, 45(2), 28–35.

18. Brown, R., & Choudhary, A. (2019). Fraud detection in financial transactions using ensemble machine learning on cloud. Financial Innovation, 5(1), 22–38.

19. Nguyen, T., & Pham, H. (2018). Scalable anomaly detection in cloud logs with machine learning. Proceedings of the 2018 IEEE Cloud Computing Conference, 312–319.

20. Smith, J., & Garcia, M. (2022). Real-time risk analytics at scale: A cloud-native MLOps approach. In Proceedings of the IEEE Big Data Conference (pp. 102–110).

21. Brown, C., & Wilson, D. (2020). MLOps: Continuous delivery and automation pipelines for machine learning. Journal of Systems and Software, 164, 110562.

22. Singh, H. (2020). Evaluating AI-enabled fraud detection systems for protecting businesses from financial losses and scams. The Research Journal (TRJ), 6(4).

23. Burila, R. K., Pichaimani, T., & Ramesh, S. (2023). Large Language Models for Test Data Fabrication in Healthcare: Ensuring Data Security and Reducing Testing Costs. Cybersecurity and Network Defense Research, 3(2), 237-279.

24. Zubair, K. M., Akash, T. R., & Chowdhury, S. A. (2023). Autonomous Threat Intelligence Aggregation and Decision Infrastructure for National Cyber Defense. Frontiers in Computer Science and Artificial Intelligence, 2(2), 26-51.

25. Kumar, R. K. (2023). Cloud-integrated AI framework for transaction-aware decision optimization in agile healthcare project management. International Journal of Computer Technology and Electronics Communication (IJCTEC), 6(1), 6347–6355. https://doi.org/10.15680/IJCTECE.2023.0601004 Systems.

26. Ramakrishna, S. (2022). AI-augmented cloud performance metrics with integrated caching and transaction analytics for superior project monitoring and quality assurance. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(6), 5647–5655. https://doi.org/10.15662/IJEETR.2022.0406005

27. Kumar, V., & Singh, A. (2020). Real-time fraud detection in payment systems using streaming analytics and ML. International Journal of Data Science, 5(4), 67–85.

28. Thangavelu, K., Kota, R. K., & Mohammed, A. S. (2022). Self-Serve Analytics: Enabling Business Users with AI-Driven Insights. Los Angeles Journal of Intelligent Systems and Pattern Recognition, 2, 73-112.

29. Sridhar Reddy Kakulavaram, Praveen Kumar Kanumarlapudi, Sudhakara Reddy Peram. (2024). Performance Metrics and Defect Rate Prediction Using Gaussian Process Regression and Multilayer Perceptron. International Journal of Information Technology and Management Information Systems (IJITMIS), 15(1), 37-53.

30. Kumbum, P. K., Adari, V. K., Chunduru, V. K., Gonepally, S., & Amuda, K. K. (2023). Navigating digital privacy and security effects on student financial behavior, academic performance, and well-being. Data Analytics and Artificial Intelligence, 3(2), 235–246.

31. Kandula, N. Evolution and Impact of Data Warehousing in Modern Business and Decision Support Systems https://d1wqtxts1xzle7.cloudfront.net/123658519/247_Manuscript_1546_1_10_20250321-libre.pdf?1751969022=&response-content-disposition=inline%3B+filename%3DEvolution_and_Impact_of_Data_Warehousing.pdf&Expires=1764704272&Signature=TGeDakLEBdcmLogPnWDY6uFEnGOtzD4QFKby~FKDxzZpjWY9Cic5GkpUSOtuC1vozCvwfw~Z1hZQc6FVKi7IzEAyjdt-YWbgRAh2-zQfwWLpF7oFQroP7hEyRlSMbqq13Q8Hv2fxYgHOiV7W7C1QI4jcxdzyFTYIwaPIlV94iQFZCKEUj5VFlTM92gsbqBtu9nGvhlWa~xhxUmNGspUxEJSy-7ByN79FlLyRwCJw77EYFU8kZNzU2xM~T6lqmGGGpbyfKPQ~rKAHidZ48oUcmDQzuq-NNLTGtBf-hf7fupIgYrPz3AEUI87M2hAhvKz2mAMDXL88GG7sX65VaJmRBw__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA

32. Kumar, R., Al-Turjman, F., Anand, L., Kumar, A., Magesh, S., Vengatesan, K., ... & Rajesh, M. (2021). Genomic sequence analysis of lung infections using artificial intelligence technique. Interdisciplinary Sciences: Computational Life Sciences, 13(2), 192-200.

33. S. Roy and S. Saravana Kumar, “Feature Construction Through Inductive Transfer Learning in Computer Vision,” in Cybernetics, Cognition and Machine Learning Applications: Proceedings of ICCCMLA 2020, Springer, 2021, pp. 95–107.

34. Udayakumar, S. Y. P. D. (2023). Real-time migration risk analysis model for improved immigrant development using psychological factors.