A Hybrid Cloud Framework for Secure Velocity Aggregation and Persona Enrichment
Keywords:
Hybrid Cloud, Confidential Computing, AWS Nitro Enclaves, Velocity Aggregation, Persona Enrichment, Data SecurityAbstract
In modern data-driven ecosystems, especially within regulated domains like healthcare and financial technology, critical data sources are often distributed across on-premises infrastructure and public cloud environments. These divisions may arise due to compliance, system design, or operational constraints. Rather than treating such separation as a limitation, this paper explores how secure collaboration between distributed systems can be leveraged to improve machine learning models through velocity aggregation, the capture and analysis of real-time transactional or behavioral patterns, and persona enrichment, the synthesis of richer user profiles from multiple secure sources. The paper focuses on scenarios where sensitive data, such as personal health records or financial transactions, must remain confidential, even during processing. To address this, we incorporate confidential computing environments (e.g., AWS Nitro Enclaves) to ensure that data processed in the cloud remains encrypted and inaccessible to unauthorized actors, including the cloud provider itself. Further, this paper proposes a hybrid cloud architecture that enables bidirectional, privacy-preserving data aggregation and federated model enhancement without exposing raw data. The framework demonstrates how secure statistical insights and model signals can be exchanged across cloud and on-prem systems, resulting in mutually improved ML model performance, while maintaining regulatory compliance and strict data confidentiality. We validate the framework using examples from healthcare and fintech, highlighting its broad applicability across any domain that handles personally identifiable information (PII).
Downloads
References
B. Stojanović et al., “Follow the Trail: Machine Learning for Fraud Detection in Fintech Applications,” Sensors, Feb. 2021, doi: 10.3390/S21051594
S. K. UmaMaheswaran, N. K. Munagala, D. Mishra, B. Othman, S. Sinthu, and V. Tripathi, “The role of implementing Machine Learning approaches in enhancing the effectiveness of HealthCare service,” in 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Apr. 2022. doi: 10.1109/icacite53722.2022.9823656
Z. Li, V. Sharma, and S. P. Mohanty, “Preserving Data Privacy via Federated Learning: Challenges and Solutions,” IEEE Consumer Electronics Magazine, May 2020, doi: 10.1109/MCE.2019.2959108
P. K. Buchhop, “Use of velocity in fraud detection or prevention,” Oct. 27, 2011
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, “Persona: an online social network with user-defined privacy,” in ACM Special Interest Group on Data Communication, Aug. 2009. doi: 10.1145/1592568.1592585
S. Chakrabarti, T. Knauth, D. Kuvaiskii, M. Steiner, and M. Vij, “Trusted execution environment with Intel SGX,” 2020. doi: 10.1016/B978-0-12-816197-5.00008-5
Amazon Web Services, “Security Design of the AWS Nitro System,” Feb. 2024. Accessed: May 2024. [Online]. Available: https://docs.aws.amazon.com/pdfs/whitepapers/latest/security-design-of-aws-nitro-system/security-design-of-aws-nitro-system.pdf
Kaggle, “Credit Card Transactions Fraud Detection Dataset,” Accessed: May 2024. [Online]. Available: https://www.kaggle.com/datasets/kartik2112/fraud-detection
Kaggle, “Bank Account Fraud Dataset Suite (NeurIPS 2022),” Accessed: May 2024. [Online]. Available: https://www.kaggle.com/datasets/sgpjesus/bank-account-fraud-dataset-neurips-2022
W. Ellison and C. Ryan, “Computational operations in enclave computing environments,” Apr. 30, 2020
Feng, C., Yang, H. H., Wang, S., Zhao, Z., & Quek, T. Q. (2023). Hybrid learning: When centralized learning meets federated learning in mobile edge computing systems. IEEE Transactions on Communications, 71(12), 7008-7022. https://doi.org/10.1109/TCOMM.2023.3172394
F. E. Casado, D. Lema, M. F. Criado, R. Iglesias, C. V. Regueiro, and S. Barro, “Concept drift detection and adaptation for federated and continual learning,” arXiv: Learning, May 2021, doi: 10.1007/S11042-021-11219-X
R. Singh, “Legalization of Privacy and Personal Data Governance: Feasibility Assessment for a New Global Framework Development,” 2016. doi: 10.20381/RUOR-291
M. J. Sheller et al., “Federated learning in medicine: facilitating multi-institutional collaborations without sharing patient data,” Scientific Reports, Jul. 2020, doi: 10.1038/S41598-020-69250-1
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.