An Intelligent Cloud-Native GenAI Architecture for Project Risk Prediction and Secure Healthcare Fraud Analytics
DOI:
https://doi.org/10.15662/IJRAI.2025.0802801Keywords:
Cloud-native architecture, Generative AI, Gaussian Process Regression (GPR), Multilayer Perceptron (MLP), project risk forecasting, cyber fraud detection, real-time analytics, microservices, anomaly detection, vector databasesAbstract
The rapid expansion of digital ecosystems, decentralized work environments, and high-velocity project delivery pipelines has amplified the need for intelligent, real-time risk forecasting and cyber-fraud detection systems. Traditional predictive models, while effective in static contexts, struggle to adapt to dynamic, cloud-first operational landscapes that produce heterogeneous, high-frequency data. This paper proposes a cloud-native generative AI architecture integrating Gaussian Process Regression (GPR) and Multilayer Perceptron (MLP) hybrid models for real-time project risk forecasting and cyber-fraud detection. The architecture leverages containerized microservices, event-driven pipelines, and distributed vector databases to support continuous learning, scalable inference, and generative scenario synthesis. Generative AI components—implemented through transformer-based models—simulate evolving risk patterns, create synthetic training datasets, and enhance anomaly detection capabilities in cybersecurity contexts. The hybrid GPR–MLP approach improves predictive stability by combining probabilistic uncertainty quantification from GPR with the nonlinear learning capacity of deep MLP networks. Results from simulated enterprise cloud environments indicate significant improvements in detection accuracy, risk forecast reliability, and system resiliency under high-load conditions. The proposed model demonstrates superior performance in identifying subtle behavioral anomalies associated with financial fraud, access privilege abuse, and insider threat activities. For project risk forecasting, the architecture captures cross-dependent operational signals such as cost deviations, schedule drifts, and resource bottlenecks with improved lead time and interpretability.
References
1. Akoglu, L., Tong, H., & Koutra, D. (2015). Graph-based anomaly detection and description. Data Mining and Knowledge Discovery, 29(3), 626–688.
2. Bolton, R. J., & Hand, D. J. (2002). Statistical fraud detection: A review. Statistical Science, 17(3), 235–249.
3. Archana, R., & Anand, L. (2023, May). Effective Methods to Detect Liver Cancer Using CNN and Deep Learning Algorithms. In 2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (pp. 1-7). IEEE.
4. Rahman, M. R., Tohfa, N. A., Arif, M. H., Zareen, S., Alim, M. A., Hossen, M. S., ... & Bhuiyan, T. (2025). Enhancing android mobile security through machine learning-based malware detection using behavioral system features.
5. Burns, B., & Oppenheimer, D. (2016). Designing distributed systems. USENIX.
6. Calandra, R., Peters, J., Rasmussen, C. E., & Deisenroth, M. (2016). Manifold GPs for regression. NeurIPS.
7. Paul, D., Sudharsanam, S. R., & Surampudi, Y. (2021). Implementing Continuous Integration and Continuous Deployment Pipelines in Hybrid Cloud Environments: Challenges and Solutions. Journal of Science & Technology, 2(1), 275-318.
8. Peram, S. R., Kanumarlapudi, P. K., & Kakulavaram, S. R. (2023). Cypress Performance Insights: Predicting UI Test Execution Time Using Complexity Metrics. Technology (IJRCAIT), 6(1).
9. Vijayaboopathy, V., Ananthakrishnan, V., & Mohammed, A. S. (2020). Transformer-Based Auto-Tuner for PL/SQL and Shell Scripts. Journal of Artificial Intelligence & Machine Learning Studies, 4, 39-70.
10. Miriyala, N. S., Macha, K. B., Metha, S., & Dave, D. (2024). Comparative Review of AWS and Azure Confidential Computing Systems. https://www.researchgate.net/profile/Kiran-Babu-Macha-2/publication/389658299_Comparative_Review_of_AWS_and_Azure_Confidential_Computing_Systems/links/67cfbd03cc055043ce6fcd36/Comparative-Review-of-AWS-and-Azure-Confidential-Computing-Systems.pdf
11. Adari, V. K. (2024). How Cloud Computing is Facilitating Interoperability in Banking and Finance. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(6), 11465-11471.
12. Sen, S., Kurni, M., Krishnamaneni, R., & Murthy, A. (2024, December). Improved Bi-directional Long Short-Term Memory for Heart Disease Diagnosis using Statistical and Entropy Feature Set. In 2024 9th International Conference on Communication and Electronics Systems (ICCES) (pp. 1331-1337). IEEE.
13. Achari, A. P. S. K., & Sugumar, R. (2025, March). Performance analysis and determination of accuracy using machine learning techniques for decision tree and RNN. In AIP Conference Proceedings (Vol. 3252, No. 1, p. 020008). AIP Publishing LLC.
14. Sugumar, R. (2025, March). Diabetes Insights: Gene Expression Profiling with Machine Learning and NCBI Datasets. In 2025 7th International Conference on Intelligent Sustainable Systems (ICISS) (pp. 712-718). IEEE.
15. Nagarajan, G. (2023). AI-Integrated Cloud Security and Privacy Framework for Protecting Healthcare Network Information and Cross-Team Collaborative Processes. International Journal of Engineering & Extended Technologies Research (IJEETR), 5(2), 6292-6297.
16. Anand, L., Tyagi, R., Mehta, V. (2024). Food Recognition Using Deep Learning for Recipe and Restaurant Recommendation. In: Bhateja, V., Lin, H., Simic, M., Attique Khan, M., Garg, H. (eds) Cyber Security and Intelligent Systems. ISDIA 2024. Lecture Notes in Networks and Systems, vol 1056. Springer, Singapore. https://doi.org/10.1007/978-981-97-4892-1_23
17. Ratnala, A. K., Inampudi, R. K., & Pichaimani, T. (2024). Evaluating time complexity in distributed big data systems: A case study on the performance of hadoop and apache spark in large-scale data processing. J Artif Intell Res Appl, 4(1), 732-773.
18. Kumar, R. K. (2023). AI‑integrated cloud‑native management model for security‑focused banking and network transformation projects. International Journal of Research Publications in Engineering, Technology and Management, 6(5), 9321–9329. https://doi.org/10.15662/IJRPETM.2023.0605006
19. Christadoss, J., Sethuraman, S., & Kunju, S. S. (2023). Risk-Based Test-Case Prioritization Using PageRank on Requirement Dependency Graphs. Journal of Artificial Intelligence & Machine Learning Studies, 7, 116-148.
20. Rajurkar, P. (2023). Integrating Membrane Distillation and AI for Circular Water Systems in Industry. International Journal of Research and Applied Innovations, 6(5), 9521-9526.
21. Tyagi, N. (2024). Artificial Intelligence in Financial Fraud Detection: A Deep Learning Perspective. International Journal of Computer Technology and Electronics Communication, 7(6), 9726-9732.
22. Kusumba, S. (2022). Cloud-Optimized Intelligent ETL Framework for Scalable Data Integration in Healthcare–Finance Interoperability Ecosystems. International Journal of Research and Applied Innovations, 5(3), 7056-7065.
23. Kiran, A., Rubini, P., & Kumar, S. S. (2025). Comprehensive review of privacy, utility and fairness offered by synthetic data. IEEE Access.
24. Meka, S. (2023). Empowering Members: Launching Risk-Aware Overdraft Systems to Enhance Financial Resilience. International Journal of Engineering & Extended Technologies Research (IJEETR), 5(6), 7517-7525.
25. Vasugi, T. (2022). AI-Enabled Cloud Architecture for Banking ERP Systems with Intelligent Data Storage and Automation using SAP. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(1), 4319-4325.





