SECURING OMNICHANNEL TELECOM E-COMMERCE: ADVANCED API SECURITY STRATEGIES IN CLOUD-NATIVE ARCHITECTURES

Authors

  • Srilekha Kanakadandi GITAM, Visakhapatnam, India. Author

DOI:

https://doi.org/10.34218/IJCET_16_01_204

Keywords:

API Security, Zero-Trust Architecture, Omnichannel E-commerce, Cloud-Native Security, DevSecOps Integration

Abstract

This article presents a comprehensive framework for securing REST APIs in omnichannel telecom e-commerce environments, addressing the complex challenges of distributed architectures serving multiple stakeholder channels. The article examines the implementation of zero-trust security models alongside AI-powered threat detection systems, providing a novel approach to continuous authentication and authorization. By integrating DevSecOps practices and automated security testing within CI/CD pipelines, the framework enables early vulnerability detection and rapid response to emerging threats. The article demonstrates the effective implementation of secure event-driven architectures using cloud-native security tools, particularly in Azure environments. This article contributes to the body of knowledge in API security, offering practical insights for engineering leaders implementing secure digital transformation initiatives in the telecom sector. The article reveals significant improvements in system resilience, scalability, and stakeholder trust, while providing a roadmap for future security implementations in omnichannel e-commerce platforms.

References

J. D. Joshua and M. Z. C. Candra, "Omnichannel System Development for Integration with E-commerce Platforms," IEEE International Conference on Data and Software Engineering, 2023. https://ieeexplore.ieee.org/abstract/document/10292070

F. Hussain, B. Noye, and S. Sharieh, "Current State of API Security and Machine Learning," IEEE, 01 June 2022. https://ieeexplore.ieee.org/document/9778101/metrics#metrics

D. Samociuk and A. Chydzinski, "Distributed threat removal in software-defined networks," IEEE International Convention on Information and Communication Technology, Electronics and Microelectronics, 2017. https://ieeexplore.ieee.org/document/7973469

H. Zhao and B. Silverajan, "Visual Cybersecurity Collaboration and Incident Exchange in Multi-Stakeholder IoT Environments," IEEE International Conferences on Internet of Things, 2022. https://ieeexplore.ieee.org/abstract/document/9903137

F. Al-Ayed, "Zero-Trust Model of Cybersecurity: A Significant Challenge in the Future," IEEE International Conference on Computational Science and Computational Intelligence, 2022. https://ieeexplore.ieee.org/abstract/document/9799160

Z. Shen, S. Li, X. Zhao, and J. Zou, "MMAuth: A Continuous Authentication Framework on Smartphones Using Multiple Modalities," IEEE Transactions on Information Forensics and Security, 2022. https://ieeexplore.ieee.org/abstract/document/9737094

M. A. Ferrag et al., "Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things," IEEE, 2023. https://ieeexplore.ieee.org/abstract/document/10257196

R. Abassi and S. G. El Fatmi, "An Automated Validation Method for Security Policies: The Firewall Case," IEEE, 2008. https://ieeexplore.ieee.org/abstract/document/4627101

F. Wotawa, "On the Automation of Security Testing," IEEE International Conference on Software Security and Assurance, 2016. https://ieeexplore.ieee.org/abstract/document/7861644

L. Wirz et al., "Design and Development of A Cloud-Based IDS using Apache Kafka and Spark Streaming," IEEE International Joint Conference on Computer Science and Software Engineering, 2022. https://ieeexplore.ieee.org/abstract/document/9836264

msmbaldwin and v-sidlama, "Azure Security Baseline for Event Hubs," Microsoft Learn documentation. https://learn.microsoft.com/en-us/security/benchmark/azure/baselines/event-hubs-security-baseline

Downloads

Published

2025-02-12

How to Cite

Srilekha Kanakadandi. (2025). SECURING OMNICHANNEL TELECOM E-COMMERCE: ADVANCED API SECURITY STRATEGIES IN CLOUD-NATIVE ARCHITECTURES. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY, 16(01), 2908-2921. https://doi.org/10.34218/IJCET_16_01_204