Cloud-Native Customer Data Platforms (CDP): Optimizing Personalization Across Brands

Authors

  • Prabhu Muthusamy Cognizant Technology Solutions, Canada Author
  • Abdul Samad Mohammed Dominos, USA Author
  • Srinivasan Ramalingam Highbrow Technology Inc, USA Author

Keywords:

cloud-native CDP, data governance, GDPR compliance, CCPA compliance

Abstract

Cloud-native Customer Data Platforms (CDPs) have emerged as a crucial technology for unifying customer data across multiple brands. It enables enterprises to achieve seamless data integration, compliance adherence, and AI-driven personalization at large scale. This research paper examines the architectural and functional component of global CDPs which emphasises data governance framework that ensures regulatory compliance with GDPR, CCPA, and other data protection mandates.

Downloads

Download data is not yet available.

References

A. Anshari, M. N. Almunawar, and S. Masri, "Customer data mining and analytics in e-commerce: The value of customer experience in big data," Journal of Computer Information Systems, vol. 61, no. 2, pp. 144–152, 2021.

T. Erl, R. Puttini, and Z. Mahmood, Cloud Computing: Concepts, Technology & Architecture, 1st ed. Upper Saddle River, NJ, USA: Prentice Hall, 2013.

K. Chard, B. Bubendorfer, S. Caton, and O. F. Rana, "Social cloud computing: A vision for socially motivated resource sharing," IEEE Transactions on Services Computing, vol. 5, no. 4, pp. 551–563, 2012.

Sivaraman, Hariprasad. (2020). Integrating Large Language Models for Automated Test Case Generation in Complex Systems.

S. Kumari, "Kanban and Agile for AI-Powered Product Management in Cloud-Native Platforms: Improving Workflow Efficiency Through Machine Learning-Driven Decision Support Systems", Distrib Learn Broad Appl Sci Res, vol. 5, pp. 867-885, Aug. 2019

Singu, Santosh Kumar. "Real-Time Data Integration: Tools, Techniques, and Best Practices." ESP Journal of Engineering & Technology Advancements 1.1 (2021): 158-172.

S. Kumari, "AI-Powered Cloud Security for Agile Transformation: Leveraging Machine Learning for Threat Detection and Automated Incident Response ", Distrib Learn Broad Appl Sci Res, vol. 6, pp. 467-488, Oct. 2020

S. Kumari, "AI-Powered Cybersecurity in Agile Workflows: Enhancing DevSecOps in Cloud-Native Environments through Automated Threat Intelligence ", J. Sci. Tech., vol. 1, no. 1, pp. 809-828, Dec. 2020.

Sivaraman, Hariprasad. (2020). Intelligent Deployment Orchestration Using ML for Multi-Environment CI/CD Pipelines.

S. Kumari, "Cloud Transformation and Cybersecurity: Using AI for Securing Data Migration and Optimizing Cloud Operations in Agile Environments", J. Sci. Tech., vol. 1, no. 1, pp. 791-808, Oct. 2020.

Singu, Santosh Kumar. "Designing scalable data engineering pipelines using Azure and Databricks." ESP Journal of Engineering & Technology Advancements 1.2 (2021): 176-187.

A. T. Sadiq and M. Abawajy, "Privacy-preserving customer data processing in cloud environments: A survey," Journal of Cloud Computing: Advances, Systems and Applications, vol. 9, no. 1, pp. 1–15, 2020.

J. Leskovec, A. Rajaraman, and J. D. Ullman, Mining of Massive Datasets, 2nd ed. New York, NY, USA: Cambridge University Press, 2014.

R. C. Staudemeyer, "Applying long short-term memory recurrent neural networks to intrusion detection," South African Computer Journal, vol. 56, pp. 136–154, 2015.

S. Ji, W. Pan, M. Cambria, P. Marttinen, and P. S. Yu, "Machine learning and deep learning in customer intelligence," IEEE Transactions on Knowledge and Data Engineering, vol. 33, no. 4, pp. 1328–1350, 2021.

Y. Bengio, "Deep learning of representations for unsupervised and transfer learning," in Proc. ICML Workshop Unsupervised Transfer Learn., Bellevue, WA, USA, 2012, pp. 17–36.

P. Voigt and A. von dem Bussche, The EU General Data Protection Regulation (GDPR): A Practical Guide, Cham, Switzerland: Springer, 2017.

N. Z. Gong et al., "You are who you know and how you behave: Attribute inference attacks via users’ social friends and behaviors," in Proc. 23rd USENIX Security Symp., San Diego, CA, USA, 2014, pp. 979–995.

P. Samarati and L. Sweeney, "Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression," Technical Report SRI-CSL-98-04, SRI International, 1998.

J. S. He, "Privacy-enhancing technologies for personalized marketing," in Proc. IEEE Int. Conf. Security and Privacy (ICSP), Beijing, China, 2021, pp. 112–119.

K. Peffers, T. Tuunanen, M. A. Rothenberger, and S. Chatterjee, "A design science research methodology for information systems research," Journal of Management Information Systems, vol. 24, no. 3, pp. 45–77, 2007.

M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Transactions on Computer Systems (TOCS), vol. 8, no. 1, pp. 18–36, 1990.

Downloads

Published

19-08-2021

How to Cite

[1]
Prabhu Muthusamy, Abdul Samad Mohammed, and Srinivasan Ramalingam, “Cloud-Native Customer Data Platforms (CDP): Optimizing Personalization Across Brands ”, American J Auton Syst Robot Eng, vol. 1, pp. 200–233, Aug. 2021, Accessed: Jan. 08, 2026. [Online]. Available: https://ajasre.org/index.php/publication/article/view/18