Disruptive AI and Machine Learning Technologies for Secure Cloud-Based Supply Chain and Manufacturing Systems
Main Article Content
Abstract
The rapid evolution of global supply chains and manufacturing ecosystems has intensified the demand for intelligent, scalable, and secure digital infrastructures. Disruptive technologies driven by Artificial Intelligence (AI) and Machine Learning (ML), when integrated with cloud computing, are reshaping traditional supply chain management and manufacturing operations. These technologies enable predictive decision-making, real-time visibility, autonomous optimization, and enhanced operational resilience. However, the increased reliance on cloud-based platforms introduces significant security challenges, including data breaches, cyberattacks, and compliance risks. This paper presents a comprehensive analysis of disruptive AI and ML technologies deployed in secure cloud-based supply chain and manufacturing systems. It examines key architectural components, security-aware AI frameworks, and cloud-enabled intelligence models that support operational efficiency while ensuring data integrity and confidentiality. The study further explores real-world applications, benefits, limitations, and emerging research challenges, highlighting the role of secure cloud infrastructures in enabling next-generation intelligent supply chain and manufacturing ecosystems.
Article Details
Section
How to Cite
References
1. Chopra, S., & Meindl, P. (2016). Supply Chain Management: Strategy, Planning, and Operation (6th ed.). Pearson.
2. Adari, Vijay Kumar, “Interoperability and Data Modernization: Building a Connected Banking Ecosystem,” International Journal of Computer Engineering and Technology (IJCET), vol. 15, no. 6, pp.653-662, Nov-Dec 2024. DOI:https://doi.org/10.5281/zenodo.14219429.
3. Kiran, A., & Kumar, S. A methodology and an empirical analysis to determine the most suitable synthetic data generator. IEEE Access 12, 12209–12228 (2024).
4. Joseph, J. (2025). The Protocol Genome A Self Supervised Learning Framework from DICOM Headers. arXiv preprint arXiv:2509.06995. https://arxiv.org/abs/2509.06995
5. Sugumar, R. (2024). Quantum-Resilient Cryptographic Protocols for the Next-Generation Financial Cybersecurity Landscape. International Journal of Humanities and Information Technology, 6(02), 89-105
6. Jeyaraman, J., Keezhadath, A. A., & Ramalingam, S. (2025). AI-Augmented Quality Inspection in Aerospace Composite Material Manufacturing. Essex Journal of AI Ethics and Responsible Innovation, 5, 1-32.
7. Christopher, M. (2016). Logistics & Supply Chain Management (5th ed.). Pearson.
8. Davenport, T. H., & Harris, J. G. (2007). Competing on Analytics: The New Science of Winning. Harvard Business School Press.
9. Poornachandar, T., Latha, A., Nisha, K., Revathi, K., & Sathishkumar, V. E. (2025, September). Cloud-Based Extreme Learning Machines for Mining Waste Detoxification Efficiency. In 2025 4th International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) (pp. 1348-1353). IEEE.
10. Navandar, P. (2022). The Evolution from Physical Protection to Cyber Defense. International Journal of Computer Technology and Electronics Communication, 5(5), 5730-5752.
11. Christadoss, J., & Panda, M. R. (2025). Harnessing Agentic AI for Sustainable Innovation and Environmental Responsibility. Futurity Proceedings, (5), 269-280.
12. Huang, G. Q., & Mak, K. L. (2016). Cyber-Physical Systems and Industry 4.0: Convergence of Automation, Data Exchange and Manufacturing.
13. Kathiresan, G. (2025). Cost-Efficient and Scalable GPU Scheduling Strategies in Multi-Tenant Cloud Environments for AI Workloads. International Journal of Computer Science and Information Technology Research, 6(4), 1-12.
14. Gangina, P. (2025). Demystifying Zero-Trust Architecture for Cloud Applications. Journal of Computer Science and Technology Studies, 7(9), 542-548.
15. Lee, J., Bagheri, B., & Kao, H.-A. (2018). A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems. Manufacturing Letters, 3, 18–23.
16. Porter, M. E., & Heppelmann, J. E. (2014). How smart, connected products are transforming competition. Harvard Business Review, 92(11), 64–88.
17. Poornima, G., & Anand, L. (2025). Medical image fusion model using CT and MRI images based on dual scale weighted fusion based residual attention network with encoder-decoder architecture. Biomedical Signal Processing and Control, 108, 107932.
18. Singh, A. (2024). Network performance in autonomous vehicle communication. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 7(1), 9712–9717. https://doi.org/10.15662/IJARCST.2024.0701006
19. Ferdousi, J., Shokran, M., & Islam, M. S. (2026). Designing Human–AI Collaborative Decision Analytics Frameworks to Enhance Managerial Judgment and Organizational Performance. Journal of Business and Management Studies, 8(1), 01-19.
20. Russell, S., & Norvig, P. (2010). Artificial Intelligence: A Modern Approach (3rd ed.). Prentice Hall.
21. Smith, R., & Rupp, W. T. (2020). Cybersecurity in cloud-based manufacturing systems: Challenges and solutions. Journal of Manufacturing Systems, 54, 123–132.
22. Chivukula, V. (2022). Improvement in Minimum Detectable Effects in Randomized Control Trials: Comparing User-Based and Geo-Based Randomization. International Journal of Computer Technology and Electronics Communication, 5(4), 5442-5446.
23. Kusumba, S. (2025). Integrated Order And Invoice Tracking: Optimizing Supply Chain Visibility And Financial Operations. Journal of International Crisis & Risk Communication Research (JICRCR), 8.
24. Kesavan, E. (2022). Driven Learning and Collaborative Automation Innovation via Trailhead and Tosca User Groups. EDTECH PUBLISHERS.
25. Natta, P. K. (2025). Scalable governance frameworks for AI-driven enterprise automation and decision-making. International Journal of Research Publications in Engineering, Technology and Management, 8(6), 13182–13193. https://doi.org/10.15662/IJRPETM.2025.0806022
26. Itoo, S., Khan, A. A., Ahmad, M., & Idrisi, M. J. (2023). A secure and privacy-preserving lightweight authentication and key exchange algorithm for smart agriculture monitoring system. IEEE Access, 11, 56875-56890.
27. Turban, E., Sharda, R., & Delen, D. (2011). Decision Support and Business Intelligence Systems (9th ed.). Pearson.
28. Zuech, R., Khoshgoftaar, T. M., & Wald, R. (2015). Intrusion detection and Big Data: A review. Journal of Big Data, 2(1), 1–41.