Context-Aware Access Monitoring With Tracking and Alerting for Cloud-Based Invoice Processing In Financial Automation

Authors

  • Ranadheer Reddy Charabuddi

DOI:

https://doi.org/10.22399/ijcesen.3954

Keywords:

Risk Management, SwAT Graph Toeplitz Convolutional Networks (SGTCNs), Cloud-based invoice processing, Tsallis Kahn's Directed Acyclic Graph (TK-DAG), Financial Automation, Context-aware Access Monitoring

Abstract

The proactive strategy of detecting vulnerabilities and ensuring secure processing of invoices in the cloud is termed Risk Management (RM). Yet, the existing studies didn’t automatically adjust the access privileges according to contextual risk along with tracking and alerting, affecting the model. Thus, this paper presents context-aware access monitoring with tracking and alerting for cloud-based invoice processing in financial automation using Parabolic Ramp Fuzzy (PR-Fuzzy). Primarily, for accessing the invoice, the admin creates the role and access policy. Next, by using Polyphase Lifting Discrete Wavelet Transform (PLDWT), the invoice data is watermarked. Afterward, a digital signature is created for the watermarked invoice data based on the Inverse Deterministic Salt-based Digital Signature Algorithm (IDS-DSA). The digital signature is verified at the destination side, and watermarking is removed for editing the invoice. The attributes are extracted using Optical Character Recognition (OCR) from the edited invoice. Next, by using SwAT Graph Toeplitz Convolutional Networks (SGTCNs), invoice fraud detection is performed. The access is blocked if fraud is detected; otherwise, the edited invoice is watermarked, authorised, and sent to another department. Lastly, it reaches the user. Similarly, by using PR-Fuzzy, the context-aware access monitoring is performed. The access is blocked if high risk is obtained, and an alert is sent to the admin. Similarly, by using Exponential-GINI-BLOOM based Merkle-Tree (EGB-MT), the tree is constructed with invoice accessing information and then shared with the admin for tracking and monitoring. As per the results, the proposed model took a lesser rule generation time of 1024ms.

References

[1] Ali, A., Abd Razak, S., Othman, S. H., Eisa, T. A. E., Al-Dhaqm, A., Nasser, M., Elhassan, T., Elshafie, H., & Saif, A. (2022). Financial Fraud Detection Based on Machine Learning: A Systematic Literature Review. Applied Sciences (Switzerland), 12, 1–24. https://doi.org/10.3390/app12199637 DOI: https://doi.org/10.3390/app12199637

[2] Amari, A., Makni, M., Fnaich, W., Lahmar, A., Koubaa, F., Charrad, O., Zormati, M. A., & Douss, R. Y. (2025). An Efficient Deep Learning-Based Approach to Automating Invoice Document Validation. Arxiv, 1–8. https://doi.org/10.1109/AICCSA63423.2024.10912544 DOI: https://doi.org/10.1109/AICCSA63423.2024.10912544

[3] Arslan, H. (2022). End to End Invoice Processing Application Based on Key Fields Extraction. IEEE Access, 10, 78398–78413. https://doi.org/10.1109/ACCESS.2022.3192828 DOI: https://doi.org/10.1109/ACCESS.2022.3192828

[4] Aung, T., Paw, S., & Tin, H. H. K. (2023). Automated Invoice Processing Using Image Recognition in Business Information Systems. Economics, Commerce and Trade Management : An International Journal, 3, 1–8. https://www.researchgate.net/publication/373041004

[5] Bisetty, S. S. S. S., Ayyagari, A., Joshi, A., Goel, O., Kumar, L., & Jain, A. (2024). Automating Invoice Verification through ERP Solutions. International Journal of Research in Modern Engineering and Emerging Technology (IJRMEET), 12(5), 1–26. DOI: https://doi.org/10.63345/ijrmeet.org.v12.i5.8

[6] Chen, Y., & Han, X. (2021). CatBoost for Fraud Detection in Financial Transactions. 2021 IEEE International Conference on Consumer Electronics and Computer Engineering, ICCECE 2021, 176–179. https://doi.org/10.1109/ICCECE51280.2021.9342475 DOI: https://doi.org/10.1109/ICCECE51280.2021.9342475

[7] Cheng, Y., Guo, J., Long, S., Wu, Y., Sun, M., & Zhang, R. (2024). Advanced Financial Fraud Detection Using GNN-CL Model. In 2024 International Conference on Computers, Information Processing and Advanced Education, 453–460. DOI: https://doi.org/10.1109/CIPAE64326.2024.00088

[8] Cui, Y., Han, X., Chen, J., Zhang, X., Yang, J., & Zhang, X. (2025). FraudGNN-RL: A Graph Neural Network with Reinforcement Learning for Adaptive Financial Fraud Detection. IEEE Open Journal of the Computer Society, 6, 426–437. https://doi.org/10.1109/OJCS.2025.3543450 DOI: https://doi.org/10.1109/OJCS.2025.3543450

[9] Hamdi, A., Carel, E., Joseph, A., Coustaty, M., & Doucet, A. (2021). Information Extraction from Invoices. International Conference on Document Analysis and Recognition ICDAR 2021, Sep 2021, Lausanne, Switzerland., 699–714. DOI: https://doi.org/10.1007/978-3-030-86331-9_45

[10] Hilal, W., Gadsden, S. A., & Yawney, J. (2022). Financial Fraud: A Review of Anomaly Detection Techniques and Recent Advances. Expert Systems with Applications, 193, 1–34. https://doi.org/10.1016/j.eswa.2021.116429 DOI: https://doi.org/10.1016/j.eswa.2021.116429

[11] Innan, N., Marchisio, A., Bennai, M., & Shafique, M. (2025). QFNN-FFD: Quantum Federated Neural Network for Financial Fraud Detection. Arxiv, 1–9. http://arxiv.org/abs/2404.02595 DOI: https://doi.org/10.1109/QSW67625.2025.00015

[12] Innan, N., Sawaika, A., Dhor, A., Dutta, S., Thota, S., Gokal, H., Patel, N., Khan, M. A. Z., Theodonis, I., & Bennai, M. (2023). Financial fraud detection using quantum graph neural networks. Arxiv, 1–15. https://doi.org/10.1007/s42484-024-00143-6 DOI: https://doi.org/10.1007/s42484-024-00143-6

[13] Li, J., & Yang, D. (2023). Research on Financial Fraud Detection Models Integrating Multiple Relational Graphs. Systems, 11, 1–16. https://doi.org/10.3390/systems11110539 DOI: https://doi.org/10.3390/systems11110539

[14] Li, R., Liu, Z., Ma, Y., Yang, D., & Sun, S. (2023). Internet Financial Fraud Detection Based on Graph Learning. IEEE Transactions on Computational Social Systems, 10(3), 1394–1401. https://doi.org/10.1109/TCSS.2022.3189368 DOI: https://doi.org/10.1109/TCSS.2022.3189368

[15] Ogunmokun, A. S., Balogun, E. D., & Ogunsola, K. O. (2022). A Strategic Fraud Risk Mitigation Framework for Corporate Finance Cost Optimization and Loss Prevention. International Journal of Multidisciplinary Research and Growth Evaluation, 3(1), 1--9. https://doi.org/10.54660/.IJMRGE.2022.3.1.783-790 DOI: https://doi.org/10.54660/.IJMRGE.2022.3.1.783-790

[16] Rajagopal, M., Nayak, K. M., Balasubramanian, K., Abdul Karim Shaikh, I., Adhav, S., & Gupta, M. (2023). Application of Artificial Intelligence in the Supply Chain Finance. Proceedings of 8th IEEE International Conference on Science, Technology, Engineering and Mathematics, ICONSTEM 2023, 1–7. https://doi.org/10.1109/ICONSTEM56934.2023.10142286 DOI: https://doi.org/10.1109/ICONSTEM56934.2023.10142286

[17] Rohaime, N. A., Abdul Razak, N. I., Thamrin, N. M., & Shyan, C. W. (2022). Integrated Invoicing Solution: A Robotic Process Automation with AI and OCR Approach. 2022 IEEE 20th Student Conference on Research and Development, SCOReD 2022, 1–5. https://doi.org/10.1109/SCOReD57082.2022.9973841 DOI: https://doi.org/10.1109/SCOReD57082.2022.9973841

[18] Singh, P., & Singh, H. (2025). Streamlining Approval Navigating the Invoice Approval Process in SAP OpenText VIM. SSRN, 1–7.

[19] Tang, Y., & Liu, Z. (2024). A Distributed Knowledge Distillation Framework for Financial Fraud Detection Based on Transformer. IEEE Access, 12, 62899–62911. https://doi.org/10.1109/ACCESS.2024.3387841 DOI: https://doi.org/10.1109/ACCESS.2024.3387841

[20] Uzozie, O. T., Onaghinor, O., Esan, O. J., & Osho, G. O. (2023). Transforming Procurement Practices with Automation : A Review of Blockchain and RPA Integration for Enhanced Supplier Risk Management Transforming Procurement Practices with Automation : A Review of Blockchain and RPA Integration for Enhanced Supplier Ris. International Journal of Multidisciplinary Research and Growth Evaluation, 4(1), 1–8. https://doi.org/10.54660/.IJMRGE.2023.4.1.1151-1157 DOI: https://doi.org/10.54660/.IJMRGE.2023.4.1.1151-1157

Downloads

Published

2025-09-24

How to Cite

Ranadheer Reddy Charabuddi. (2025). Context-Aware Access Monitoring With Tracking and Alerting for Cloud-Based Invoice Processing In Financial Automation. International Journal of Computational and Experimental Science and Engineering, 11(3). https://doi.org/10.22399/ijcesen.3954

Issue

Section

Research Article