Volume 16 , Issue 2 , PP: 61-76, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Udita Malhotra 1 * , Ritu 2
Doi: https://doi.org/10.54216/JCIM.160205
Cloud-based Enterprise Resource Planning (ERP) systems have become essential to organizational operations in today's digital environment, acting as the cornerstone for managing sensitive corporate data. ERP system integration with third-party apps, however, poses serious security risks because businesses cannot afford data breaches or illegal access that could jeopardize financial records, operational integrity, and reputation. Because ERP systems are appealing targets for cybercriminals looking to obtain sensitive company data, ensuring secure data exchange is an urgent concern. ERP integration security is still a problem, despite the numerous security frameworks and measures that have been put forth. Current methods frequently fall short of effectively addressing new threats. To guarantee the safe and smooth integration of cloud-based ERP solutions with external systems, this study presents an extensible security framework. The framework reduces the risk of data interception and unauthorized access by utilizing functional and technical security measures to produce a strong, adaptable security model. To prevent data leaks and unauthorized changes, the implementation is divided into two phases: (1) securing outbound data flow from the ERP portal to third-party systems, and (2) securing inbound data flow from third-party systems into the ERP portal, which protects against malicious intrusions and breaches of data integrity.
ERP , Third-party system , Interception , Extensible , Security , Integration , Portal
[1] U. Malhotra, Ritu, and Amandeep, "Secure and Compatible Integration of Cloud-Based ERP Solution: A Review," International Journal of Intelligent Systems and Applications in Engineering, vol. 11, no. 9s, pp. 695–707, 2023.
[2] M. Patel and R. Kumar, "Challenges in Cloud-Based ERP Systems: A Review," International Journal of Cloud Computing and Services Science, vol. 13, no. 3, pp. 215-225, 2023.
[3] J. Doe and L. White, "Integrating ERP Systems with Cloud Technologies: A New Approach," Journal of Software Engineering and Applications, vol. 15, no. 4, pp. 300-310, 2022.
[4] P. Brown and S. Green, "E-invoicing Solutions for Cloud-Based ERP: A Case Study," International Journal of Business Information Systems, vol. 30, no. 2, pp. 120-135, 2021.
[5] U. Malhotra and R. Nagpal, "Secure and Compatible Integration of Cloud-Based ERP Solution: A Comprehensive Survey," in International Conference on Applied Technologies (ICAT 2023), M. Botto-Tobar, M. Zambrano Vizuete, S. Montes León, P. Torres-Carrión, and B. Durakovic, Eds., Communications in Computer and Information Science, vol. 2051. Cham, Switzerland: Springer, 2024. doi: 10.1007/978-3-031-58950-8_17.
[6] A. Smith and B. Johnson, "A Comprehensive Review of Cybersecurity Frameworks for IoT Devices," Journal of Information Security, vol. 12, no. 1, pp. 45-58, 2023.
[7] A. S. Chellathurai, U. Malhotra, S. Thapasimuthu Rajeswari, and S. Thachankurichy Natesan, "Healthcare security in cloud-based wireless sensor networks: Botnet attack detection via autoencoder-aided goal-based artificial intelligent agent," Concurrency Comput. Pract. Exp., vol. 36, no. 19, p. e8152, 2024, doi: 10.1002/cpe.8152.
[8] A. Faccia and P. Petratos, "Blockchain, Enterprise Resource Planning (ERP) and Accounting Information Systems (AIS): Research on e-Procurement and System Integration," Appl. Sci., vol. 11, no. 15, p. 6792, 2021.
[9] Baskar, S., Mohamed Shakeel, P., Kumar, R., Burhanuddin, M.A., & Sampath, R., "A dynamic and interoperable communication framework for controlling the operations of wearable sensors in smart healthcare applications," Computer Communications, vol. 149, pp. 17-26, 2020.
[10] F. Mahmood, A. Z. Khan, and R. H. Bokhari, "ERP Issues and Challenges: A Research Synthesis," Kybernetes, vol. 49, no. 3, pp. 629–659, 2020.
[11] Srinivasan, V., Singh, J., Pandi-Perumal, S.R., Brown, G.M., Spence, D.W., & Cardinali, D.P., "Jet lag, circadian rhythm sleep disturbances, and depression: The role of melatonin and its analogs," Advances in Therapy, vol. 27, no. 11, pp. 796-813, 2010.
[12] Shukla P.K., Roy V., Chandanan A.K., Sarathe V.K., Mishra P.K., “A Wavelet Features and Machine Learning Founded Error Analysis of Sound and Trembling Signal,” SN Computer Science, vol. 4, no. 6, art. no. 717, 2023, doi: 10.1007/s42979-023-02189-y.
[13] Selvam, C., Prabu, S.L., Jordan, B.C., Purushothaman, Y., Umamaheswari, A., Hosseini Zare, M.S. &, Thilagavathi, R., "Molecular mechanisms of curcumin and its analogs in colon cancer prevention and treatment," Life Sciences, vol. 239, 2019.
[14] R. Hrischev, "ERP Systems and Data Security," in Mater. Sci. Eng., 9th Int. Sci. Conf., 2020.
[15] Jayachitra, S., & Prasanth, A., "Multi-Feature Analysis for Automated Brain Stroke Classification Using Weighted Gaussian Naïve Bayes Classifier," Journal of Circuits, Systems and Computers, vol. 30, no. 10, 2021.
[16] T. Anderson and V. Lee, "IoT Solutions for Healthcare: Challenges and Opportunities," Journal of Health Informatics, vol. 8, no. 2, pp. 100-115, 2022.
[17] R. Kumaraswamy, S. Latif, and T. Mather, "Chapter 7: Privacy," in Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, 1st ed., O'Reilly Media, 2009, p. 145.
[18] Kalaiselvi, C., & Nasira, G.M., "A new approach for diagnosis of diabetes and prediction of cancer using ANFIS," in 2014 Proceedings, World Congress on Computing and Communication Technologies, WCCCT 2014, pp. 188-190.
[19] Jasti, V.D.P., Zamani, A.S., Arumugam, K., Naved, M., Pallathadka, H., Sammy, F., Raghuvanshi, A., & Kaliyaperumal, K., "Computational Technique Based on Machine Learning and Image Processing for Medical Image Analysis of Breast Cancer Diagnosis," Security and Communication Networks, 2022.
[20] Dey, N., Ashour, A.S., Beagum, S., Pistola, D.S., Gospodinov, M., Gospodinova, E.P., & Tavares, J.M.R., "Parameter optimization for local polynomial approximation based intersection confidence interval filter using genetic algorithm: An application for brain MRI image de-noising," Journal of Imaging, vol. 1, no. 1, pp. 60-84, 2015.
[21] Sasi, S.B., & Sivanandam, N., "A survey on cryptography using optimization algorithms in WSNs," Indian Journal of Science and Technology, vol. 8, no. 3, pp. 216-221, 2015.
[22] Sahu P., Viji A.J., Roy V., Roy L., Manogna D., Vasal S., "A Comprehensive Framework for Evaluating Cyber-Physical Threats in Energy Internet," in 2024 International Conference on Intelligent Systems and Advanced Applications, ICISAA 2024, 2024, doi: 10.1109/ICISAA62385.2024.10828794.
[23] Yacin Sikkandar, M., Alrasheadi, B.A., Prakash, N.B., Hemalakshmi, G.R., & Mohanarathinam, A., "Deep learning based an automated skin lesion segmentation and intelligent classification model," Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 3, pp. 3245-3255, 2021.
[24] S. Mandal and D. A. Khan, "A Study of Security Threats in Cloud: Passive Impact of COVID-19 Pandemic," in Proc. Int. Conf. Smart Electron. Commun. (ICOSEC), 2020, pp. 837–842.
[25] R. Smith and K. Taylor, "Real-Time Data Processing in Cloud Environments for Healthcare Applications," International Journal of Cloud Computing and Services Science, vol. 14, no. 1, pp. 75-85, 2023.
[26] R. Hrischev, "ERP Systems and Data Security," Mater. Sci. Eng., 9th Int. Sci. Conf., 2020.
[27] S. O. Kuyoro, F. Ibikunle, and O. Awodele, "Cloud Computing Security Issues and Challenges," Int. J. Comput. Netw. (IJCN), vol. 3, no. 5, pp. 247–255, 2011.