Secure Cloud Native Financial Systems with Machine Learning Fraud Detection and Intelligent API-Driven Decision Frameworks
DOI:
https://doi.org/10.15662/IJEETR.2026.0801011Keywords:
Cloud-native, Financial systems, Machine learning, Fraud detection, API-driven frameworks, Real-time decision-making, Security, Data analyticsAbstract
The rapid adoption of cloud-native technologies in financial systems has transformed how institutions manage, analyze, and secure data. However, this shift introduces new risks related to fraud, cyber threats, and operational inefficiencies. Leveraging machine learning (ML) for fraud detection provides an intelligent, adaptive approach capable of identifying anomalous transactions in real-time, mitigating financial losses, and enhancing trust. Simultaneously, API-driven decision frameworks enable seamless integration, orchestrating data flow between cloud-native components while facilitating automated, data-driven decision-making processes. This paper explores the convergence of secure cloud-native financial architectures with advanced ML fraud detection models and intelligent APIs, highlighting architectural best practices, risk mitigation strategies, and performance optimization techniques. We discuss the methodologies employed in developing predictive models, the role of continuous monitoring, and the implementation of resilient API frameworks that support real-time decision-making. By analyzing current literature and case studies, this research presents a holistic framework for financial organizations to achieve secure, scalable, and intelligent operational capabilities. The proposed approach demonstrates significant potential to improve fraud detection accuracy, system reliability, and operational efficiency in modern cloud-native financial ecosystems.
References
1. Chennamsetty, C. S. (2025). Building modular web platforms with micro-frontends and data layer abstraction: A case study in enterprise modernization. International Journal of Research Publications in Engineering, Technology and Management, 8(1), 11804–11811.
2. Anand, L., & Neelanarayanan, V. (2019). Feature selection for liver disease using particle swarm optimization algorithm. International Journal of Recent Technology and Engineering, 8(3), 6434–6439.
3. Sriramoju, S. (2024). Secure data flow patterns in financial integration architecture. International Journal of Computer Technology and Electronics Communication (IJCTEC), 7(4), 9144–9151.
4. Thakran, V. (2025, July). Utilization of Machine Learning Algorithms in Optimizing Finite Element Modeling and Analysis. In 2025 International Conference on Smart & Sustainable Technology (INCSST) (pp. 1-6). IEEE.
5. Ananth, S., Kalpana, A. M., & Vijayarajeswari, R. (2020). A dynamic technique to enhance quality of service in software-defined network-based wireless sensor network using machine learning. International Journal of Wavelets, Multiresolution and Information Processing, 18(1), 1941020.
6. Anumula, S. R. (2022). Transparent and auditable decision-making in enterprise platforms. International Journal of Research and Applied Innovations, 5(5), 7691–7702.
7. Gangina, P. (2022). Resilience engineering principles for distributed cloud-native applications under chaos. International Journal of Computer Technology and Electronics Communication, 5(5), 5760–5770.
8. Devi, C., Siripuram, N. K., & Selvaraj, A. (2025). Serverless ETL Orchestration with Apache Airflow and AWS Step Functions: A Comparative Study. European Journal of Quantum Computing and Intelligent Agents, 9, 15-52
9. Genne, S. (2022). Designing accessibility-first enterprise web platforms at scale. International Journal of Research and Applied Innovations, 5(5), 7679–7690.
10. Hebbar, K. S. (2022). Machine learning-assisted service boundary detection for modularizing legacy systems. International Journal of Applied Engineering & Technology, 4(2), 401–414.
11. Natta, P. K. (2025). Architecting autonomous enterprise platforms for scalable, self-regulating digital systems. International Journal of Advanced Engineering Science and Information Technology (IJAESIT), 8(5), 17292–17302. https://doi.org/10.15662/IJAESIT.2025.0805002
12. Gurajapu, A., Anumolu, S., Garimella, V., Chundi, V. M. S. R., & Gubbala, V. S. A. P. (2025). Dual-edged intelligence: AI-driven risk management for hybrid-cloud compute environments. International Journal of Advanced Engineering Science and Information Technology, 8(2), 16088–16092.
13. Inampudi, R. K., Pichaimani, T., & Surampudi, Y. (2022). AI-enhanced fraud detection in real-time payment systems: Leveraging machine learning and anomaly detection to secure digital transactions. Australian Journal of Machine Learning Research & Applications, 2(1), 483–523.
14. Inbavalli, M., & Arasu, T. (2015). Efficient analysis of frequent item set association rule mining methods. International Journal of Scientific & Engineering Research, 6(4).
15. Keezhadath, A. A., Kota, R. K., & Selvaraj, A. (2021). Dynamic pricing optimization for global hospitality: Real-time data integration and decision making. American Journal of Autonomous Systems and Robotics Engineering, 1, 131–165.
16. Mudunuri, P. R. (2022). Engineering audit-ready CI/CD pipelines for federally regulated scientific computing. International Journal of Engineering & Extended Technologies Research, 4(5), 5342–5351.
17. Kamadi, S. (2023). Cloud-Native Analytics Platform for Governed Real-Time Streaming and FeatureEngineering.
18. Meshram, A. K. (2025). Secure and scalable financial intelligence systems using big data analytics in hybrid cloud environments. International Journal of Research and Applied Innovations (IJRAI), 8(6), 13083–13095.
19. Sikarwar, V. (2025). AI-Powered Process Mining for Intelligent, Personalized Customer Experience in the Insurance Sector. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 8(4), 12418-12428.
20. Murugamani, C., Saravanakumar, S., Prabakaran, S., & Kalaiselvan, S. A. (2015). Needle insertion on soft tissue using set of dedicated complementarily constraints. Advances in Environmental Biology, 9(22 S3), 144–149.
21. Mangukiya, M., & Miyani, H. (2025, December). Ai-Driven Process Optimization in Electronic Manufacturing: From Pcb Assembly to System Integration. In 2025 IEEE 5th International Conference on ICT in Business Industry & Government (ICTBIG) (pp. 1-6). IEEE.
22. Kamisetty, A. (2025). Autonomous cyber defense using RL in distributed networks. International Journal of Engineering & Extended Technologies Research (IJEETR), 7(6), 11141–11151.
23. Nagarajan, C., Neelakrishnan, G., Akila, P., Fathima, U., & Sneha, S. (2022). Performance analysis and implementation of 89C51 controller based solar tracking system with boost converter. Journal of VLSI Design Tools & Technology, 12(2), 34–41.
24. Panda, M. R., & Kondisetty, K. (2022). Predictive fraud detection in digital payments using ensemble learning. American Journal of Data Science and Artificial Intelligence Innovations, 2, 673–707.
25. Ponlatha, S., Umasankar, P., Balashanmuga Vadivu, P., & Chitra, D. (2021). An IoT-based efficient energy management in smart grid using SMACA technique. International Transactions on Electrical Energy Systems, 31(12), e12995.
26. Ponugoti, M. (2022). Integrating API-first architecture with experience-centric design for seamless insurance platform modernization. International Journal of Humanities and Information Technology, 4(1–3), 117–136.
27. Paul, D., Namperumal, G., & Surampudi, Y. (2023). Optimizing llm training for financial services: best practices for model accuracy, risk management, and compliance in ai-powered financial applications. Journal of Artificial Intelligence Research and Applications, 3(2), 550-588.
28. Prasanna, D., & Santhosh, R. (2018). Time orient trust based hook selection algorithm for efficient location protection in wireless sensor networks using frequency measures. International Journal of Engineering & Technology, 7(3.27), 331–335.
29. Mulla, F. A. (2024). Building Scalable Mobile Applications: A Comprehensive Guide to Shared Component Architecture. International Journal of Computer Engineering and Technology (IJCET) Volume, 15, 1337-1348.
30. Ganji, M. (2025). Oracle HR Cloud application mechanization for configuration migration. International Journal of Engineering Development and Research, 13(2), 701–706. https://rjwave.org/ijedr/papers/IJEDR2502091.pdf
31. Ananthakrishnan, V., Kondaveeti, D., & Mohammed, A. S. (2025). GenAI-Driven Semantic ETL:: Synthesizing Self-Optimizing SQL & PL/SQL. Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online), 4(2), 29-43.
32. Sardana, A., Kalyanasundaram, P. D., & Ponnoju, S. C. (2025). AI-Optimized Distributed Caching for Ultra-Low-Latency Authorization Networks. Newark Journal of Human-Centric AI and Robotics Interaction, 5, 42-79.
33. Sreekala, K., Rajkumar, N., Sugumar, R., Sagar, K. D., Shobarani, R., Krishnamoorthy, K. P., & Yeshitla, A. (2022). Skin diseases classification using hybrid AI based localization approach. Computational Intelligence and Neuroscience, 2022(1), 6138490.
34. Vaidya, S., Shah, N., Shah, N., & Shankarmani, R. (2020, May). Real-time object detection for visually challenged people. In Proceedings of the International Conference on Intelligent Computing and Control Systems (pp. 311–316). IEEE.
35. Vimal Raja, G. (2021). Mining customer sentiments from financial feedback and reviews using data mining algorithms. International Journal of Innovative Research in Computer and Communication Engineering, 9(12), 14705–14710.
36. Gaddapuri, N. S. (2021). Big data storage observation system. Power System Protection and Control, 49(2), 7–19.





