Governance-Aware Secure Architecture for Real-Time Enterprise Data Exchange across Financial Healthcare and Advertising Platforms Using Generative AI

Authors

  • Sebastian Luke Whitford Senior Database Administrator, Australia Author

DOI:

https://doi.org/10.15680/ekhtqc25

Keywords:

Generative AI, enterprise data exchange, governance-aware architecture, cybersecurity, healthcare data security, financial systems, digital advertising, zero-trust architecture, privacy-preserving analytics, cloud computing

Abstract

The rapid digital transformation of enterprises has intensified the need for secure, interoperable, and governance-aware data exchange across heterogeneous domains such as financial services, healthcare systems, and digital advertising platforms. These sectors manage highly sensitive information, including personal health records, financial transactions, and behavioral analytics, making them prime targets for cyber threats, data misuse, and regulatory non-compliance. Traditional data exchange frameworks often lack real-time governance enforcement, cross-domain trust mechanisms, and intelligent automation required to support modern enterprise ecosystems. This paper proposes a governance-aware secure architecture that integrates Generative AI with cloud-native microservices, zero-trust security models, and policy-driven data exchange protocols to enable real-time and compliant enterprise communication across financial, healthcare, and advertising environments.

 

The proposed architecture introduces a multi-layered framework comprising secure data ingestion pipelines, AI-driven governance engines, federated identity management, privacy-preserving computation, and intelligent monitoring systems. Generative AI models are utilized for adaptive policy enforcement, anomaly detection, automated compliance reporting, and contextual data transformation. The architecture supports interoperability across enterprise resource planning (ERP), healthcare information systems, and programmatic advertising platforms while ensuring adherence to regulatory standards such as GDPR, HIPAA-like policies, and financial compliance requirements.

 

Results indicate that integrating Generative AI within governance-aware architectures significantly enhances threat detection accuracy, reduces policy violations, and improves cross-domain data exchange efficiency. The framework also demonstrates improved scalability, reduced latency in secure data transactions, and enhanced transparency through audit-ready logs and explainable AI governance mechanisms. By combining real-time analytics, zero-trust principles, and AI-driven compliance automation, the proposed architecture provides a unified and resilient solution for secure enterprise data ecosystems.

 

This research contributes a novel cross-domain architecture that bridges governance, security, and AI-enabled automation for modern enterprise environments. The findings highlight the potential of Generative AI to transform enterprise data governance by enabling adaptive, intelligent, and secure real-time data exchange across multiple regulated sectors.

References

1. Abadi, M., et al. (2016). Deep learning with differential privacy. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 308–318.

2. Chennamsetty, C. S. (2024). Adaptive Model Training Pipelines: Real-Time Feedback Loops for Self-Evolving Systems. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 7(6), 11367-11373.

3. Joseph, J. (2024). AI-Driven Synthetic Biology and Drug Manufacturing Optimization. International Journal of Innovative Research in Computer and Communication Engineering, 12(1138), 10-15680. https://www.researchgate.net/profile/Jimmy-Joseph-9/publication/394614673_AI-Driven_Synthetic_Biology_and_Drug_Manufacturing_Optimization/links/68a49c952c7d3e0029b1ab47/AI-Driven-Synthetic-Biology-and-Drug-Manufacturing-Optimization.pdf

4. Sugumar, R. (2024). Quantum-Resilient Cryptographic Protocols for the Next-Generation Financial Cybersecurity Landscape. International Journal of Humanities and Information Technology, 6(02), 89-105.

5. Poornima, G., & Anand, L. (2024, May). Novel AI Multimodal Approach for Combating Against Pulmonary Carcinoma. In 2024 5th International Conference for Emerging Technology (INCET) (pp. 1-6). IEEE.

6. Bathina, S. (2025). Atomic Omnichannel: Reinventing Retail Personalization with Generative-AI Content Factories. ISCSITR-INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND ENGINEERING (ISCSITR-IJCSE)-ISSN: 3067-7394, 6(4), 46-62.

7. Panda, M. R., & Kumar, R. (2023). Explainable AI for Credit Risk Modeling Using SHAP and LIME. American Journal of Cognitive Computing and AI Systems, 7, 90-122.

8. Thangavelu, K., Keezhadath, A. A., & Selvaraj, A. (2022). AI-Powered Log Analysis for Proactive Threat Detection in Enterprise Networks. Essex Journal of AI Ethics and Responsible Innovation, 2, 33-66.

9. Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile Networks and Applications, 19(2), 171–209.

10. Gangina, P. (2025). Modernizing legacy applications for cloud: Strategies and lessons learned. International Journal of Computer Technology and Electronics Communication (IJCTEC), 8(5), 11495–11501.

11. Kshetri, N. (2018). Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications Policy, 42(4), 303–314.

12. Vaidya, S., Shah, N., Shah, N., & Shankarmani, R. (2020, May). Real-time object detection for visually challenged people. In 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 311-316). IEEE.

13. Sriramoju, S. (2024). An API-driven solution for enhancing employee lifecycle and cost management efficiency. International Journal of Humanities and Information Technology (IJHIT), 6(3), 50–69. https://www.ijhit.info

14. Adari, V. K. (2024). The Path to Seamless Healthcare Data Exchange: Analysis of Two Leading Interoperability Initiatives. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(6), 11472-11480.

15. M. I. Hossain, T. Akter, M. Yasin, and M. B. Rahman, "Zero‑ETL Analytics: Transforming operational data into actionable insights," 2025.

16. Chennamsetty, C. S. (2025). Bridging design and development: Building a generative AI platform for automated code generation. International Journal of Computer Technology and Electronics Communication, 8(2), 10420–10432.

17. Navandar, P. (2025). AI Based Cybersecurity for Internet of Things Networks via Self-Attention Deep Learning and Metaheuristic Algorithms. International Journal of Research and Applied Innovations, 8(3), 13053-13077.

18. Chivukula, V. (2021). Impact of Bias in Incrementality Measurement Created on Account of Competing Ads in Auction Based Digital Ad Delivery Platforms. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 4(1), 4345-4350.

19. Ponugoti, M. (2024). Engineering global resilience: A cloud-native approach to enterprise system. International Journal of Future Innovative Science and Technology (IJFIST), 7(2), 12392–12403.

20. Rajasekharan, R. (2025). Optimizing cloud data management through Oracle Database Cloud Engineering. International Journal of Future Innovative Science and Technology (IJFIST), 8(6), 15956–15964.

21. Radanliev, P., et al. (2020). Cyber risk management in the IoT era. Journal of Cyber Policy, 5(2), 1–22.

22. Sharma, R., & Chen, J. (2022). AI-driven enterprise security frameworks. Journal of Information Security, 13(3), 145–160.

23. Madathala, H., Thumala, S. R., Barmavat, B., & Prakash, K. K. S. (2024). Functional consideration in cloud migration. International Peer Reviewed/Refereed Multidisciplinary Journal (EIPRMJ), 13(2).

24. Kusumba, S. (2024). Accelerating AI and Data Strategy Transformation: Integrating Systems, Simplifying Financial Operations Integrating Company Systems to Accelerate Data Flow and Facilitate Real-Time Decision-Making. The Eastasouth Journal of Information System and Computer Science, 2(02), 189-208.

25. Gopinathan, V. R. (2024). Cyber-Resilient Digital Banking Analytics Using AI-Driven Federated Machine Learning on AWS. International Journal of Engineering & Extended Technologies Research (IJEETR), 6(4), 8419-8426.

26. Itoo, S., Khan, A. A., Ahmad, M., & Idrisi, M. J. (2023). A secure and privacy-preserving lightweight authentication and key exchange algorithm for smart agriculture monitoring system. IEEE Access, 11, 56875-56890.

27. Kasireddy, J. R. (2025). Vector databases and the long-tail query problem: A semantic approach to information retrieval. International Journal of Future Innovative Science and Technology, 8(6), 15965–15972.

28. Mudunuri, P. R. (2024). Designing high-availability automation architectures for mission-critical research systems. International Journal of Future Innovative Science and Technology (IJFIST), 7(6), 13852–13864.

29. Tamizharasi, S., Rubini, P., Saravana Kumar, S., & Arockiam, D. Adapting federated learning-based AI models to dynamic cyberthreats in pervasive IoT environments.

30. Alam, M. K., Mahmud, M. A., & Islam, M. S. (2024). The AI-Powered Treasury: A Data-Driven Approach to managing America’s Fiscal Future. Journal of Computer Science and Technology Studies, 6(2), 236-256.

31. Panchakarla, S. K. A Scalable Architecture For Intelligent Document Workflows In Healthcare Communications. International Journal of Environmental Sciences, 11(17s), 2025. Retrieved from https://theaspd.com/index.php/ijes/article/view/5667

32. Zerine, I., Islam, M. M., Islam, M. S., Ahmad, M. Y., & Rahman, M. A. (2020). CLIMATE RISK ANALYTICS FOR US AGRICULTURE SUSTAINABILITY: MODELING CLIMATE IMPACT ON CROP YIELDS AND SUPPLY CHAIN TO SUPPORT FEDERAL POLICIES FOOD SECURITY AND RENEWABLE ANERGY ADOPTION. Cuestiones de Fisioterapia, 49(3), 241-258.

33. Surisetty, L. S. (2023). Proactive Threat Mitigation in API Ecosystems through AI-Powered Anomaly Detection. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 6(1), 7633-7642.

34. Natta, P. K. (2025). Architecting autonomous enterprise platforms for scalable, self-regulating digital systems. International Journal of Advanced Engineering Science and Information Technology (IJAESIT), 8(5), 17292–17302. https://doi.org/10.15662/IJAESIT.2025.0805002

35. Zhang, Q., Chen, M., & Li, L. (2021). Cloud computing security and privacy protection. Future Generation Computer Systems, 124, 192–204.

Downloads

Published

2025-11-10