Integrating Blockchain and AI for Data Encryption and Secure ETL Pipelines

Authors

  • Manohar Reddy Sokkula

Keywords:

Blockchain, ETL Pipeline, MLP-GRU, Anomaly Detection, Data Security, Compliane, Artificial Intelligence.

Abstract

In the era of data-driven decision-making, ensuring the security, transparency, and integrity of Extract, Transform, and Load (ETL) pipelines has become increasingly critical, especially in regulated industries such as healthcare, finance, and telecommunications. Traditional ETL systems often rely on centralized architectures with basic encryption and access control mechanisms, which, although essential, fall short of addressing sophisticated cyber threats, data tampering, and compliance verification. This research proposes a hybrid framework that integrates Blockchain technology and an MLP-GRU (Multi-Layer Perceptron – Gated Recurrent Unit) neural network to enhance the security and intelligence of ETL processes. Blockchain is employed to create a decentralized, tamper-proof ledger that logs each ETL operation, providing traceability, immutability, and auditability. In parallel, the MLP-GRU model is utilized to detect anomalies in ETL activities by analyzing both static and sequential log data. This dual approach ensures not only secure data management but also real-time monitoring and predictive threat mitigation. The experimental setup involves blockchain-based logging of ETL operations and AI-based anomaly detection, evaluated using metrics such as Accuracy (99%), Precision (98.21%), Recall (98%), and F1-Score (98.77%). Results demonstrate that the integrated system outperforms traditional ETL security mechanisms in detecting malicious activity while maintaining efficient data throughput and low latency. Furthermore, the study examines blockchain transaction performance under varying data volumes to validate the scalability of the proposed solution. The framework's ability to automate compliance verification and generate immutable audit trails presents a significant advancement in secure data pipeline design. Future work includes enhancing privacy through Zero-Knowledge Proofs, scaling to federated systems, and incorporating advanced deep-learning architectures. Overall, this research sets a strong foundation for the development of intelligent, secure, and regulation-compliant ETL infrastructures through the convergence of blockchain and AI technologies.

Downloads

Download data is not yet available.

References

H. Matsuo et al., “Diagnostic accuracy of deep-learning with anomaly detection for a small amount of imbalanced data: discriminating malignant parotid tumors in MRI,” Sci Rep, vol. 10, no. 1, p. 19388, Nov. 2020, doi: 10.1038/s41598-020-76389-4.

H. W. Oleiwi, D. N. Mhawi, and H. Al-Raweshidy, “MLTs-ADCNs: Machine Learning Techniques for Anomaly Detection in Communication Networks,” IEEE Access, vol. 10, pp. 91006–91017, Aug. 2022, doi: 10.1109/ACCESS.2022.3201869.

W. Marfo, D. K. Tosh, and S. V. Moore, “Network Anomaly Detection Using Federated Learning,” in MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM), Rockville, MD, USA: IEEE, Nov. 2022, pp. 484–489. doi: 10.1109/MILCOM55135.2022.10017793.

S. K. Vuppala, “LEVERAGING AI FOR PREDICTIVE ANALYTICS IN DATA SECURITY: IDENTIFYING AND PREVENTING ETL PIPELINE VULNERABILITIES,” IJAIRD, vol. 3, no. 1, pp. 105–130, May 2025, doi: 10.34218/IJAIRD_03_01_008.

M. Qasim and E. Verdu, “Video anomaly detection system using deep convolutional and recurrent models,” Results in Engineering, vol. 18, p. 101026, Jun. 2023, doi: 10.1016/j.rineng.2023.101026.

S. Mokhtari, A. Abbaspour, K. K. Yen, and A. Sargolzaei, “A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data,” Electronics, vol. 10, no. 4, p. 407, Feb. 2021, doi: 10.3390/electronics10040407.

K. Al Jallad, M. Aljnidi, and M. S. Desouki, “Anomaly detection optimization using big data and deep learning to reduce false-positive,” J Big Data, vol. 7, no. 1, p. 68, Dec. 2020, doi: 10.1186/s40537-020-00346-1.

S. K. Vuppala, “AI-driven ETL Optimization for Security and Performance Tuning in Big Data Architectures,” IJLRP.

M. K. Hooshmand and D. Hosahalli, “Network anomaly detection using deep learning techniques,” CAAI Trans on Intel Tech, vol. 7, no. 2, pp. 228–243, Jun. 2022, doi: 10.1049/cit2.12078.

S. Kumar Vuppala, “ETL and BI in Military-Civilian Collaboration for Disaster Preparedness,” IJSR, vol. 14, no. 5, pp. 639–649, May 2025, doi: 10.21275/SR25509004027.

S. T. Ikram et al., “Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models,” Cybernetics and Information Technologies, vol. 21, no. 3, pp. 175–188, Sep. 2021, doi: 10.2478/cait-2021-0037.

M. Said Elsayed, N.-A. Le-Khac, S. Dev, and A. D. Jurcut, “Network Anomaly Detection Using LSTM Based Autoencoder,” in Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Alicante, Spain: ACM, Nov. 2020, pp. 37–45. doi: 10.1145/3416013.3426457.

H. Son, Y. Jang, S.-E. Kim, D. Kim, and J.-W. Park, “Deep Learning-Based Anomaly Detection to Classify Inaccurate Data and Damaged Condition of a Cable-Stayed Bridge,” IEEE Access, vol. 9, pp. 124549–124559, Jan. 2021, doi: 10.1109/ACCESS.2021.3100419.

S. K. Vuppala, “SECURE AND COMPLIANT DATA MOVEMENT FOR SENSITIVE MILITARY OPERATIONS,” IJIS, vol. 4, no. 1, pp. 39–68, Apr. 2025, doi: 10.34218/IJIS_04_01_003.

P. Cichonski, T. Millar, T. Grance, and K. Scarfone, “Computer Security Incident Handling Guide : Recommendations of the National Institute of Standards and Technology,” National Institute of Standards and Technology, NIST SP 800-61r2, Aug. 2023. doi: 10.6028/NIST.SP.800-61r2.

R. Kumaran, “ETL Techniques for Structured and Unstructured Data,” SSRN Journal, Jan. 2024, doi: 10.2139/ssrn.5143370.

D. Seenivasan, “AI Driven Enhancement of ETL Workflows for Scalable and Efficient Cloud Data Engineering,” int. jour. eng. com. sci, vol. 13, no. 06, pp. 26837–26848, Jun. 2024, doi: 10.18535/ijecs.v13i06.4824.

M. F. Ansari, R. Sandilya, M. Javed, and D. Doermann, “ETLNet: An Efficient TCN-BiLSTM Network for Road Anomaly Detection Using Smartphone Sensors,” Jun. 2024, arXiv. doi: 10.48550/ARXIV.2412.04990.

N. Joshi, “Optimizing Real-Time ETL Pipelines Using Machine Learning Techniques,” Aug. 2024, SSRN. doi: 10.2139/ssrn.5054767.

Saswata Dey, Writuraj Sarma, and Sundar Tiwari, “Deep learning applications for real-time cybersecurity threat analysis in distributed cloud systems,” World J. Adv. Res. Rev., vol. 17, no. 3, pp. 1044–1058, Mar. 2023, doi: 10.30574/wjarr.2023.17.3.0288.

S. Hiremath et al., “A New Approach to Data Analysis Using Machine Learning for Cybersecurity,” BDCC, vol. 7, no. 4, p. 176, Nov. 2023, doi: 10.3390/bdcc7040176.

O. Hamza, A. Collins, A. Eweje, and G. O. Babatunde, “Advancing Data Migration and Virtualization Techniques: ETL-Driven Strategies for Oracle BI and Salesforce Integration in Agile Environments,” IJMRGE, vol. 5, no. 1, pp. 1100–1118, Jan. 2024, doi: 10.54660/.IJMRGE.2024.5.1.1100-1118.

S. S. Aljameel et al., “An Anomaly Detection Model for Oil and Gas Pipelines Using Machine Learning,” Computation, vol. 10, no. 8, p. 138, Aug. 2022, doi: 10.3390/computation10080138.

S. Akcay, D. Ameln, A. Vaidya, B. Lakshmanan, N. Ahuja, and U. Genc, “Anomalib: A Deep Learning Library for Anomaly Detection,” in 2022 IEEE International Conference on Image Processing (ICIP), Bordeaux, France: IEEE, Oct. 2022, pp. 1706–1710. doi: 10.1109/ICIP46576.2022.9897283.

Downloads

Published

19.04.2025

How to Cite

Manohar Reddy Sokkula. (2025). Integrating Blockchain and AI for Data Encryption and Secure ETL Pipelines. International Journal of Intelligent Systems and Applications in Engineering, 13(1), 395 –. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/7774

Issue

Section

Research Article