Intelligent Banking Cloud Ecosystem: Gradient-Boosted Artificial Neural Networks for Cybersecurity, SQL Analytics, and Oracle–SAP Integration in Healthcare Platforms
DOI:
https://doi.org/10.15662/IJEETR.2025.0706002Keywords:
Intelligent cloud ecosystem, Gradient-Boosted Artificial Neural Networks (GB-ANN), Cybersecurity, SQL analytics, Oracle Cloud, SAP Integration, Banking systems, Healthcare informatics, Federated learning, Zero-trust architecture, Blockchain audit, Enterprise cloud computing, Predictive analytics, Intrusion detection, Regulatory complianceAbstract
The convergence of intelligent analytics, secure cloud infrastructure, and enterprise system integration has become pivotal for innovation in modern banking and healthcare ecosystems. This study introduces an Intelligent Banking Cloud Ecosystem (IBCE) that employs a Gradient-Boosted Artificial Neural Network (GB-ANN) framework to enhance cybersecurity, SQL-driven analytics, and cross-platform intelligence across Oracle and SAP environments. The proposed architecture unifies structured financial and clinical data through a secure multi-tenant cloud model, enabling real-time anomaly detection, fraud prevention, and predictive performance monitoring. A hybrid ensemble combining Gradient Boosting Machines (GBMs) with deep neural networks (DNNs) optimizes classification accuracy for intrusion and anomaly detection, while SQL-based analytical pipelines enable explainable data insights within regulatory frameworks such as HIPAA, GDPR, and PCI DSS. The system integrates federated learning, blockchain-backed audit trails, and zero-trust authentication to ensure data integrity and provenance across inter-organizational workflows. Experimental evaluations on multi-domain datasets demonstrate superior performance in detection precision, latency reduction, and scalability compared to conventional cloud security models. The results confirm that intelligent hybrid learning frameworks, combined with enterprise-grade integration through Oracle and SAP platforms, can achieve resilient, compliant, and analytically rich cloud infrastructures for mission-critical financial and healthcare operations.
References
1. Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31.
2. Kiran, A., & Kumar, S. A methodology and an empirical analysis to determine the most suitable synthetic data generator. IEEE Access 12, 12209–12228 (2024).
3. Gosangi, S. R. (2025). TRANSFORMING FINANCIAL DATA WORKFLOWS: SERVICE-ORIENTED INTEGRATION OF THIRD-PARTY PAYMENT GATEWAYS WITH ORACLE EBS IN GOVERNMENT FINANCE SYSTEMS. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 8(4), 12400-12411.
4. Al-Fedaghi, S. (2020). A conceptual framework for cybersecurity in cloud computing. Journal of Cloud Computing, 9(1), 1–15.
5. Kondra, S., Raghavan, V., & kumar Adari, V. (2025). Beyond Text: Exploring Multimodal BERT Models. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 8(1), 11764-11769.
6. Bhattacharya, S., Kaluri, R., & Srinivas, K. (2021). A hybrid machine learning model for cyber threat detection in healthcare cloud. IEEE Access, 9, 137041–137053.
7. Kumar, A., Anand, L., & Kannur, A. (2024, November). Optimized Learning Model for Brain-Computer Interface Using Electroencephalogram (EEG) for Neuroprosthetics Robotic Arm Design for Society 5.0. In 2024 International Conference on Computing, Semiconductor, Mechatronics, Intelligent Systems and Communications (COSMIC) (pp. 30-35). IEEE.
8. Chou, T. (2015). Security threats on cloud computing vulnerabilities. International Journal of Computer Science and Information Technology, 7(3), 79–90.
9. Sakhawat Hussain, T., Md Manarat Uddin, M., & Rahanuma, T. (2025). Sustaining Vital Care in Disasters: AI-Driven Solar Financing for Rural Clinics and Health Small Businesses. American Journal of Technology Advancement, 2(9), 123-153.
10. Gai, K., Qiu, M., & Zhao, H. (2018). Security-aware efficient mass distributed storage approach for cloud systems in big data. IEEE Transactions on Cloud Computing, 7(3), 707–718.
11. Khan, M. I. (2025). MANAGING THREATS IN CLOUD COMPUTING: A CYBERSECURITY RISK MITIGATION FRAMEWORK. International Journal of Advanced Research in Computer Science, 15(5). https://www.researchgate.net/profile/Md-Imran-Khan-12/publication/396737007_MANAGING_THREATS_IN_CLOUD_COMPUTING_A_CYBERSECURITY_RISK_MITIGATION_FRAMEWORK/links/68f79392220a341aa156b531/MANAGING-THREATS-IN-CLOUD-COMPUTING-A-CYBERSECURITY-RISK-MITIGATION-FRAMEWORK.pdf
12. Gupta, H., & Jain, A. (2022). Gradient-boosted neural networks for intelligent financial risk analytics. Expert Systems with Applications, 195, 116590.
13. Mani, R., & Sivaraju, P. S. (2024). Optimizing LDDR Costs with Dual-Purpose Hardware and Elastic File Systems: A New Paradigm for NFS-Like High Availability and Synchronization. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(1), 9916-9930.
14. Kaur, G., & Kaur, H. (2020). Gradient boosting and deep learning-based intrusion detection in cloud environments. Procedia Computer Science, 173, 117–126.
15. Gorle, S., Christadoss, J., & Sethuraman, S. (2025). Explainable Gradient-Boosting Classifier for SQL Query Performance Anomaly Detection. American Journal of Cognitive Computing and AI Systems, 9, 54-87.
16. Liu, X., Zhang, Y., & Chen, J. (2019). Intelligent cloud security management with artificial neural networks. Future Generation Computer Systems, 95, 667–675.
17. Raju, L. H. V., & Sugumar, R. (2025, June). Improving jaccard and dice during cancerous skin segmentation with UNet approach compared to SegNet. In AIP Conference Proceedings (Vol. 3267, No. 1, p. 020271). AIP Publishing LLC.
18. Mishra, R., & Prakash, A. (2022). Secure cloud computing in healthcare: A privacy-preserving architecture using federated learning. Health Informatics Journal, 28(4), 1–14.
19. Balaji, P. C., & Sugumar, R. (2025, June). Multi-level thresholding of RGB images using Mayfly algorithm comparison with Bat algorithm. In AIP Conference Proceedings (Vol. 3267, No. 1, p. 020180). AIP Publishing LLC.
20. SAP SE. (2020). SAP S/4HANA Cloud Security and Compliance Guide. SAP Technical Documentation.
21. Kakulavaram, S. R. (2024). “Intelligent Healthcare Decisions Leveraging WASPAS for Transparent AI Applications” Journal of Business Intelligence and DataAnalytics, vol. 1 no. 1, pp. 1–7. doi:https://dx.doi.org/10.55124/csdb.v1i1.261
22. Shukla, S., & Tripathi, A. (2023). AI-driven cyber resilience for banking and financial institutions. Computers & Security, 130, 103239.
23. Kiran, A., Rubini, P., & Kumar, S. S. (2025). Comprehensive review of privacy, utility and fairness offered by synthetic data. IEEE Access.
24. Adari, V. K., Chunduru, V. K., Gonepally, S., Amuda, K. K., & Kumbum, P. K. (2024). Artificial Neural Network in Fibre-Reinforced Polymer Composites using ARAS method. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(2), 9801-9806.
25. Subramanian, N., & Jeyaraj, A. (2018). Recent security trends in cloud computing: A comprehensive review. Journal of Information Privacy and Security, 14(1), 15–31.
26. A. K. S, L. Anand and A. Kannur, "A Novel Approach to Feature Extraction in MI - Based BCI Systems," 2024 8th International Conference on Computational System and Information Technology for Sustainable Solutions (CSITSS), Bengaluru, India, 2024, pp. 1-6, doi: 10.1109/CSITSS64042.2024.10816913.





