Integrating AI and Encryption to Safeguard Digital Assets Globally


Authors : Elizabeth A. Adeola; Adeyinka G. Ologun; Victoria M. Jegede; Olabisi D, Salau; Kemi K. Oladapo; Bolanle B Olatunji; Rukayat Abisola Olawale

Volume/Issue : Volume 10 - 2025, Issue 9 - September


Google Scholar : https://tinyurl.com/3zzsa5uw

Scribd : https://tinyurl.com/ywuhjk5j

DOI : https://doi.org/10.38124/ijisrt/25sep1242

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 30 to 40 days to display the article.


Abstract : This research examines the role of artificial intelligence (AI) in enhancing cybersecurity, with a specific focus on its integration into encryption, cloud security, digital identity management, and financial asset protection. The primary objective is to evaluate how AI techniques, including machine learning, deep learning, natural language processing, and blockchain-assisted models, enhance real-time threat detection and secure data processing, while also addressing governance and ethical challenges. A systematic literature review methodology was employed, screening 1,248 records from five major databases, of which 64 studies met the inclusion criteria. Results indicate that deep learning models achieved detection accuracies exceeding 90%, while anomaly detection in cloud environments reduced false positives by nearly 25% compared with rule-based methods. Nonetheless, adversarial AI models exposed vulnerabilities, and homomorphic encryption integration faced scalability issues, with error rates in computational performance ranging from 8% to 12% across test environments. The study concludes that although AI offers transformative benefits for digital safeguarding, significant challenges remain, including those related to ethics, bias, resource intensity, and regulatory harmonisation, underscoring the need for scalable and inclusive frameworks.

Keywords : Artificial Intelligence (AI); Cybersecurity; Homomorphic Encryption; Cloud Security; Digital Identity Protection; Adversarial AI.

References :

  1. R. Wang, “AI Use in Enhancing Cybersecurity for Safeguarding Digital Information,” Proc. Int. Conf. Adv. Parallel Comput., Dec. 2023.
  2. R. V. Reddy and E. C. Reddy, “Intelligent Cyber Defense: Exploring the Role of AI in Safeguarding Digital Assets,” Int. J. Sci. Technol. Eng., Nov. 2024.
  3. B. Manale, A. Srhir, and T. Mazri, “Enhancing Image Security through AI-Based Fingerprint, Watermarking Approach,” Proc. IEEE Int. Conf. CIST, Dec. 2023.
  4. H. Rehan, “AI-Driven Cloud Security: The Future of Safeguarding Sensitive Data in the Digital Age,” J. Artif. Intell. Glob. Secur., Jan. 2024.
  5. M. Gao, “Obstacles and Impacts of Artificial Intelligence in Digital Security,” Adv. Econ. Manage. Polit. Sci., vol. 93, pp. 1092–1104, Jun. 2024.
  6. M. Ababneh and A. Al-Jarrah, “Role of Artificial Intelligence in Data Protection for Digital Asset Systems: A Review of Recent Development,” TEM J., vol. 13, no. 4, pp. 1421–1433, Nov. 2024.
  7. R.A. Olawale, B.I. Oladapo, Impact of community-driven biogas initiatives on waste vegetable reduction for energy sustainability in developing countries, Waste Manag Bull, 2 (2024), pp. 101-108, 10.1016/j.wmb.2024.07.001
  8. B.I. Oladapo, O.K. Bowoto, V.A. Adebiyi, O.M. Ikumapayi, Net zero on 3D printing filament recycling: a sustainable analysis, Sci. Total Environ., 894 (2023), 10.1016/j.scitotenv.2023.165046
  9. MA Olawumi, BI Oladapo, TO Olugbade, Evaluating the impact of recycling on polymer of 3D printing for energy and material sustainability, Resour Conserv Recycl, 209 (2024), Article 107769, 10.1016/j.resconrec.2024.107769
  10. M. Binhammad, S. Alqaydi, A. Othman, and R. Ali, “The Role of AI in Cyber Security: Safeguarding Digital Identity,” J. Inf. Secur., vol. 15, no. 2, pp. 145–159, Jan. 2024.
  11. C. Dwork and A. Roth, “The Algorithmic Foundations of Differential Privacy,” Found. Trends Theor. Comput. Sci., vol. 9, no. 3–4, pp. 211–407, 2014.
  12. K. Bonawitz et al., “Practical Secure Aggregation for Privacy-Preserving Machine Learning,” Proc. ACM CCS, pp. 1175–1191, 2017.
  13. A. Gaurav and M. Singh, “Adversarial Attacks on AI Systems: Emerging Challenges for Cybersecurity,” IEEE Access, vol. 10, pp. 20134–20147, 2022.
  14. B.I. Oladapo, M.A. Olawumi, F.T. Omigbodun, Renewable Energy Credits Transforming Market Dynamics. Sustainability, 16 (2024), Article 8602, 10.3390/su16198602
  15. A.R. Olawale, N.F. Orimabuyaku, B.I. Oladapo, A.R. Olawale, N.F. Orimabuyaku, B.I. Oladapo, Empowering agriculture: A holistic approach to combat food insecurity in Africa, International Journal of Science and Research Archive, 9 (2023), pp. 041-046, 10.30574/IJSRA.2023.9.1.0313
  16. Yohanna K Jimah, Rolland O. Okojie, Simon O Akinlabi, Abisola R. Olawaled, Joseph F Kayode, Bankole I Oladapo, 2023. Aligning humanitarian outreach with united nations sustainable development goals: World Journal of Advanced Research, and Reviews 18 (2), 051-056. https://doi.org/10.30574/wjarr.2023.18.2.0642
  17. J. Kaur and A. K. Sood, “AI for Cloud Security: Anomaly Detection Frameworks,” Future Gen. Comput. Syst., vol. 129, pp. 242–252, 2022.
  18. A. Shokri et al., “Membership Inference Attacks Against Machine Learning Models,” Proc. IEEE Symp. Secur. Privacy, pp. 3–18, 2017.
  19. A. Madry et al., “Towards Deep Learning Models Resistant to Adversarial Attacks,” Proc. Int. Conf. Learn. Representations (ICLR), 2018.
  20. B.I. Oladapo, Review of flexible energy harvesting for bioengineering in alignment with SDG, Mater. Sci. Eng. R Rep., 157 (2024), Article 100763, 10.1016/J.MSER.2023.100763
  21. Oladapo, B.I.; Olawumi, M.A.; Omigbodun, F.T. Revolutionizing Battery Longevity by Optimising Magnesium Alloy Anodes Performance. Batteries 2024, 10, 383. https://doi.org/10.3390/batteries10110383
  22. Oladapo, B.I.; Olawumi, M.A.; Omigbodun, F.T. Machine Learning for Optimising Renewable Energy and Grid Efficiency. Atmosphere 2024, 15, 1250. https://doi.org/10.3390/atmos15101250
  23. A. Kendall and Y. Gal, “What Uncertainties Do We Need in Bayesian Deep Learning for Computer Vision?,” Proc. NeurIPS, pp. 5574–5584, 2017.
  24. B. Biggio and F. Roli, “Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning,” Pattern Recognit., vol. 84, pp. 317–331, 2018.
  25. J. Zhang and H. Chen, “Federated Learning for Cybersecurity: Opportunities and Challenges,” IEEE Internet Things J., vol. 8, no. 6, pp. 4373–4385, 2021.
  26. M. Rigaki and S. Garcia, “Bringing a GAN to a Knife-Fight: Adapting Malware Communication to Avoid Detection,” Proc. IEEE S&P Workshops, pp. 70–79, 2018.
  27. J. Manyika et al., “Ethics and Governance of Artificial Intelligence for Cybersecurity,” McKinsey Global Institute Report, 2021.
  28. Olawade, D.B.; Wada, O.Z.; Popoola, T.T.; Egbon, E.; Ijiwade, J.O.; Oladapo, B.I. AI-Driven Waste Management in Innovating Space Exploration. Sustainability 2025, 17, 4088. https://doi.org/10.3390/su17094088
  29. Malachi, I.O.; Olawumi, A.O.; Afolabi, S.O.; Oladapo, B.I. Looking Beyond Lithium for Breakthroughs in Magnesium-Ion Batteries as Sustainable Solutions. Sustainability 2025, 17, 3782. https://doi.org/10.3390/su17093782
  30. Adeyinka G. Ologun Ifeoluwa Elemure Rukayat A. Olawale, Owoade O. Odesanya, Peter T. Oluwasola, Olanrewaju O. Akinola, Elizabeth A. Adeola, AI-Driven Regenerative Agriculture of Socioecological Framework for Biodiversity, Climate Resilience, and Soil Health, 2319-7668. Volume 27, Issue 8. Ser. 8 (August. 2025), PP 39-48 www.iosrjournals.org,  https://www.iosrjournals.org/iosr-jbm/papers/Vol27-issue8/Ser-8/F2708083948.pdf
  31. J. Silverman, “AI and the Future of Cyber Risk Management,” Harv. Bus. Rev., vol. 99, no. 3, pp. 65–74, 2021.
  32. T. Oswald and R. Richards, “Cross-Border Data Flows and AI Security: Regulatory Challenges,” Int. Data Privacy Law, vol. 12, no. 2, pp. 95–106, 2022.
  33. S. Goyal, A. Sharma, and M. Gupta, “Lightweight AI Models for SME Cybersecurity,” Comput. Secur., vol. 124, p. 102989, 2023.
  34. Elizabeth A. Adeola, Adeyinka G. Ologun, Ifeoluwa Elemure, Owoade O. Odesanya, Peter T. Oluwasola, & Rukayat Abisola Olawale. (2025). Integrating IoT and Digital Twins to Transform Urban Governance. International Journal of Progressive Research in Science and Engineering6(08), 1–7. Retrieved from https://journal.ijprse.com/index.php/ijprse/article/view/1228
  35. Ifeoluwa Elemure, Elizabeth A. Adeola, Adeyinka G. Ologun, Owoade O. Odesanya, Peter T. Oluwasola and Rukayat Abisola Olawale. Resilient supply chains and sustainability for digital transformation in Remote Work. International Journal of Science and Research Archive, 2025, 16(02), 1294-1309. Article DOI: https://doi.org/10.30574/ijsra.2025.16.2.2470.
  36. O. O. Akinola, “Balancing AI Efficiency and Ethics for Long-Term Business Sustainability”, IJRESM, vol. 8, no. 8, pp. 61–69, Aug. 2025, Accessed: Sep. 19, 2025: https://journal.ijresm.com/index.php/ijresm/article/view/3340
  37. M. Crawford and S. A. Rahman, “AI for Phishing Detection Using NLP,” J. Cybersecurity, vol. 9, no. 1, pp. 33–44, 2023.
  38. P. Zhou and H. Li, “Cloud Security Enhancement Using Deep Reinforcement Learning,” Future Gen. Comput. Syst., vol. 135, pp. 278–288, 2022.
  39. L. Floridi and J. Cowls, “A Unified Framework for AI Ethics and Governance,” Minds & Machines, vol. 30, pp. 1–14, 2020.
  40. M. Ahmed and S. Kim, “Survey of Network Anomaly Detection Using AI,” J. Netw. Comput. Appl., vol. 60, pp. 19–31, 2023.

This research examines the role of artificial intelligence (AI) in enhancing cybersecurity, with a specific focus on its integration into encryption, cloud security, digital identity management, and financial asset protection. The primary objective is to evaluate how AI techniques, including machine learning, deep learning, natural language processing, and blockchain-assisted models, enhance real-time threat detection and secure data processing, while also addressing governance and ethical challenges. A systematic literature review methodology was employed, screening 1,248 records from five major databases, of which 64 studies met the inclusion criteria. Results indicate that deep learning models achieved detection accuracies exceeding 90%, while anomaly detection in cloud environments reduced false positives by nearly 25% compared with rule-based methods. Nonetheless, adversarial AI models exposed vulnerabilities, and homomorphic encryption integration faced scalability issues, with error rates in computational performance ranging from 8% to 12% across test environments. The study concludes that although AI offers transformative benefits for digital safeguarding, significant challenges remain, including those related to ethics, bias, resource intensity, and regulatory harmonisation, underscoring the need for scalable and inclusive frameworks.

Keywords : Artificial Intelligence (AI); Cybersecurity; Homomorphic Encryption; Cloud Security; Digital Identity Protection; Adversarial AI.

CALL FOR PAPERS


Paper Submission Last Date
31 - December - 2025

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe