AI-Driven Privacy and Zero-Trust Architectures in ERP: Real-Time Cybersecurity Automation for Oracle-Based Enterprises

Authors

  • André Luiz Barbosa Independent Researcher, Canada Author

DOI:

https://doi.org/10.15662/IJARCST.2024.0703004

Keywords:

AI-driven cybersecurity, zero-trust architecture, ERP security, real-time threat detection, privacy-preserving mechanisms, Oracle ERP, automated access control, behavioral analytics, enterprise resilience, adaptive security

Abstract

Enterprise Resource Planning (ERP) systems are critical to modern business operations, yet their centralized nature makes them prime targets for cyber threats. This paper proposes an AI-driven framework that integrates privacy-preserving mechanisms with zero-trust architectures to enable real-time cybersecurity automation in Oracle-based ERP environments. Leveraging machine learning and behavioral analytics, the framework continuously monitors system activity, detects anomalies, and enforces adaptive access controls without disrupting operational workflows. By combining AI capabilities with zero-trust principles, the approach ensures granular authorization, data confidentiality, and resilience against advanced cyber threats. A case-based evaluation highlights improved threat detection accuracy, rapid response times, and strengthened privacy compliance, demonstrating the framework’s potential for safeguarding enterprise ERP systems while maintaining business continuity in dynamic digital environments.

References

1. Grabski, S. V., Leech, S. A., & Schmidt, P. J. (2011). A review of ERP research: A future agenda for accounting information systems. Journal of Information Systems, 25(1), 37–78.

2. Lanka, S. (2023). Built for the Future How Citrix Reinvented Security Monitoring with Analytics. International Journal of Humanities and Information Technology, 5(02), 26-33.

3. Kindervag, J. (2010). No more chewy centers: Introducing the zero trust model of information security. Forrester Research.

4. Gandhi, S. T. (2023). RAG-Driven Cybersecurity Intelligence: Leveraging Semantic Search for Improved Threat Detection. International Journal of Research and Applied Innovations, 6(3), 8889-8897.

5. Kumbum, P. K., Adari, V. K., Chunduru, V. K., Gonepally, S., & Amuda, K. K. (2023). Navigating digital privacy and security effects on student financial behavior, academic performance, and well-being. Data Analytics and Artificial Intelligence, 3(2), 235–246.

6. Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture (NIST Special Publication 800-207). National Institute of Standards and Technology.

7. Oracle Corporation. (2019). Secure critical data with Oracle Data Safe (white paper / technical report).

8. Gonepally, S., Amuda, K. K., Kumbum, P. K., Adari, V. K., & Chunduru, V. K. (2023). Addressing supply chain administration challenges in the construction industry: A TOPSIS-based evaluation approach. Data Analytics and Artificial Intelligence, 3(1), 152–164.

9. Oracle Corporation. (2023). Cybersecurity guidance and best practices for Oracle Cloud (Oracle white paper).

10. Yu, J., Kim, M., Oh, H., & Yang, J. (2021). Real-time abnormal insider event detection on enterprise resource planning systems via predictive auto-regression model. IEEE Access, 9, 62276–62284.

11. ISACA. (2021). ERP security and controls (ISACA Professional Practices Paper).

12. Adari, V. K., Chunduru, V. K., Gonepally, S., Amuda, K. K., & Kumbum, P. K. (2023). Ethical analysis and decision-making framework for marketing communications: A weighted product model approach. Data Analytics and Artificial Intelligence, 3(5), 44–53. https://doi.org/10.46632/daai/3/5/7

13. SANS Institute. (2019). ERP security: Understanding and mitigating risks (white paper).

14. Zwilling, M., Lesjak, D., & Kovačič, A. (2020). Cyber security threats and vulnerabilities in ERP systems. Procedia Computer Science, 176, 2242–2250.

15. Bakumenko, A., & Aivazian, V. (2022). Detecting anomalies in financial data using machine learning. Systems, 10(5), 130.

16. Badmus, A., & Adebayo, M. (2020). Compliance-Aware Devops for Generative AI: Integrating Legal Risk Management, Data Controls, and Model Governance to Mitigate Deepfake and Data Privacy Risks in Synthetic Media Deployment.

17. Subramanian, G. H. (2017). Cloud ERP implementation and the impact of cloud computing on ERP. International Journal of Enterprise Information Systems, 13(4), 21–34.

18. Forrester Research. (2021). The state of zero trust adoption. Forrester Research.

19. Peng, G., Xiao, X., Li, D., et al. (2018). SAQL: A stream-based query system for real-time abnormal system behavior detection. arXiv preprint.

20. Layer Seven Security. (2019). 64% of ERP systems have experienced security breaches; ERP exposure report. Layer Seven Security.

21. Manda, P. (2023). Migrating Oracle Databases to the Cloud: Best Practices for Performance, Uptime, and Risk Mitigation. International Journal of Humanities and Information Technology, 5(02), 1-7.

22. SEI / Carnegie Mellon. (2022). Deploying a Zero Trust Architecture: Practical guidance and implementation considerations (technical report).

Downloads

Published

2024-05-07

How to Cite

AI-Driven Privacy and Zero-Trust Architectures in ERP: Real-Time Cybersecurity Automation for Oracle-Based Enterprises. (2024). International Journal of Advanced Research in Computer Science & Technology(IJARCST), 7(3), 10313-10317. https://doi.org/10.15662/IJARCST.2024.0703004