Authors :
Elizabeth A. Adeola; Adeyinka G. Ologun; Victoria M. Jegede; Olabisi D, Salau; Kemi K. Oladapo; Bolanle B Olatunji; Rukayat Abisola Olawale
Volume/Issue :
Volume 10 - 2025, Issue 9 - September
Google Scholar :
https://tinyurl.com/3zzsa5uw
Scribd :
https://tinyurl.com/ywuhjk5j
DOI :
https://doi.org/10.38124/ijisrt/25sep1242
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
This research examines the role of artificial intelligence (AI) in enhancing cybersecurity, with a specific focus on
its integration into encryption, cloud security, digital identity management, and financial asset protection. The primary
objective is to evaluate how AI techniques, including machine learning, deep learning, natural language processing, and
blockchain-assisted models, enhance real-time threat detection and secure data processing, while also addressing governance
and ethical challenges. A systematic literature review methodology was employed, screening 1,248 records from five major
databases, of which 64 studies met the inclusion criteria. Results indicate that deep learning models achieved detection
accuracies exceeding 90%, while anomaly detection in cloud environments reduced false positives by nearly 25% compared
with rule-based methods. Nonetheless, adversarial AI models exposed vulnerabilities, and homomorphic encryption
integration faced scalability issues, with error rates in computational performance ranging from 8% to 12% across test
environments. The study concludes that although AI offers transformative benefits for digital safeguarding, significant
challenges remain, including those related to ethics, bias, resource intensity, and regulatory harmonisation, underscoring
the need for scalable and inclusive frameworks.
Keywords :
Artificial Intelligence (AI); Cybersecurity; Homomorphic Encryption; Cloud Security; Digital Identity Protection; Adversarial AI.
References :
- R. Wang, “AI Use in Enhancing Cybersecurity for Safeguarding Digital Information,” Proc. Int. Conf. Adv. Parallel Comput., Dec. 2023.
- R. V. Reddy and E. C. Reddy, “Intelligent Cyber Defense: Exploring the Role of AI in Safeguarding Digital Assets,” Int. J. Sci. Technol. Eng., Nov. 2024.
- B. Manale, A. Srhir, and T. Mazri, “Enhancing Image Security through AI-Based Fingerprint, Watermarking Approach,” Proc. IEEE Int. Conf. CIST, Dec. 2023.
- H. Rehan, “AI-Driven Cloud Security: The Future of Safeguarding Sensitive Data in the Digital Age,” J. Artif. Intell. Glob. Secur., Jan. 2024.
- M. Gao, “Obstacles and Impacts of Artificial Intelligence in Digital Security,” Adv. Econ. Manage. Polit. Sci., vol. 93, pp. 1092–1104, Jun. 2024.
- M. Ababneh and A. Al-Jarrah, “Role of Artificial Intelligence in Data Protection for Digital Asset Systems: A Review of Recent Development,” TEM J., vol. 13, no. 4, pp. 1421–1433, Nov. 2024.
- R.A. Olawale, B.I. Oladapo, Impact of community-driven biogas initiatives on waste vegetable reduction for energy sustainability in developing countries, Waste Manag Bull, 2 (2024), pp. 101-108, 10.1016/j.wmb.2024.07.001
- B.I. Oladapo, O.K. Bowoto, V.A. Adebiyi, O.M. Ikumapayi, Net zero on 3D printing filament recycling: a sustainable analysis, Sci. Total Environ., 894 (2023), 10.1016/j.scitotenv.2023.165046
- MA Olawumi, BI Oladapo, TO Olugbade, Evaluating the impact of recycling on polymer of 3D printing for energy and material sustainability, Resour Conserv Recycl, 209 (2024), Article 107769, 10.1016/j.resconrec.2024.107769
- M. Binhammad, S. Alqaydi, A. Othman, and R. Ali, “The Role of AI in Cyber Security: Safeguarding Digital Identity,” J. Inf. Secur., vol. 15, no. 2, pp. 145–159, Jan. 2024.
- C. Dwork and A. Roth, “The Algorithmic Foundations of Differential Privacy,” Found. Trends Theor. Comput. Sci., vol. 9, no. 3–4, pp. 211–407, 2014.
- K. Bonawitz et al., “Practical Secure Aggregation for Privacy-Preserving Machine Learning,” Proc. ACM CCS, pp. 1175–1191, 2017.
- A. Gaurav and M. Singh, “Adversarial Attacks on AI Systems: Emerging Challenges for Cybersecurity,” IEEE Access, vol. 10, pp. 20134–20147, 2022.
- B.I. Oladapo, M.A. Olawumi, F.T. Omigbodun, Renewable Energy Credits Transforming Market Dynamics. Sustainability, 16 (2024), Article 8602, 10.3390/su16198602
- A.R. Olawale, N.F. Orimabuyaku, B.I. Oladapo, A.R. Olawale, N.F. Orimabuyaku, B.I. Oladapo, Empowering agriculture: A holistic approach to combat food insecurity in Africa, International Journal of Science and Research Archive, 9 (2023), pp. 041-046, 10.30574/IJSRA.2023.9.1.0313
- Yohanna K Jimah, Rolland O. Okojie, Simon O Akinlabi, Abisola R. Olawaled, Joseph F Kayode, Bankole I Oladapo, 2023. Aligning humanitarian outreach with united nations sustainable development goals: World Journal of Advanced Research, and Reviews 18 (2), 051-056. https://doi.org/10.30574/wjarr.2023.18.2.0642
- J. Kaur and A. K. Sood, “AI for Cloud Security: Anomaly Detection Frameworks,” Future Gen. Comput. Syst., vol. 129, pp. 242–252, 2022.
- A. Shokri et al., “Membership Inference Attacks Against Machine Learning Models,” Proc. IEEE Symp. Secur. Privacy, pp. 3–18, 2017.
- A. Madry et al., “Towards Deep Learning Models Resistant to Adversarial Attacks,” Proc. Int. Conf. Learn. Representations (ICLR), 2018.
- B.I. Oladapo, Review of flexible energy harvesting for bioengineering in alignment with SDG, Mater. Sci. Eng. R Rep., 157 (2024), Article 100763, 10.1016/J.MSER.2023.100763
- Oladapo, B.I.; Olawumi, M.A.; Omigbodun, F.T. Revolutionizing Battery Longevity by Optimising Magnesium Alloy Anodes Performance. Batteries 2024, 10, 383. https://doi.org/10.3390/batteries10110383
- Oladapo, B.I.; Olawumi, M.A.; Omigbodun, F.T. Machine Learning for Optimising Renewable Energy and Grid Efficiency. Atmosphere 2024, 15, 1250. https://doi.org/10.3390/atmos15101250
- A. Kendall and Y. Gal, “What Uncertainties Do We Need in Bayesian Deep Learning for Computer Vision?,” Proc. NeurIPS, pp. 5574–5584, 2017.
- B. Biggio and F. Roli, “Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning,” Pattern Recognit., vol. 84, pp. 317–331, 2018.
- J. Zhang and H. Chen, “Federated Learning for Cybersecurity: Opportunities and Challenges,” IEEE Internet Things J., vol. 8, no. 6, pp. 4373–4385, 2021.
- M. Rigaki and S. Garcia, “Bringing a GAN to a Knife-Fight: Adapting Malware Communication to Avoid Detection,” Proc. IEEE S&P Workshops, pp. 70–79, 2018.
- J. Manyika et al., “Ethics and Governance of Artificial Intelligence for Cybersecurity,” McKinsey Global Institute Report, 2021.
- Olawade, D.B.; Wada, O.Z.; Popoola, T.T.; Egbon, E.; Ijiwade, J.O.; Oladapo, B.I. AI-Driven Waste Management in Innovating Space Exploration. Sustainability 2025, 17, 4088. https://doi.org/10.3390/su17094088
- Malachi, I.O.; Olawumi, A.O.; Afolabi, S.O.; Oladapo, B.I. Looking Beyond Lithium for Breakthroughs in Magnesium-Ion Batteries as Sustainable Solutions. Sustainability 2025, 17, 3782. https://doi.org/10.3390/su17093782
- Adeyinka G. Ologun Ifeoluwa Elemure Rukayat A. Olawale, Owoade O. Odesanya, Peter T. Oluwasola, Olanrewaju O. Akinola, Elizabeth A. Adeola, AI-Driven Regenerative Agriculture of Socioecological Framework for Biodiversity, Climate Resilience, and Soil Health, 2319-7668. Volume 27, Issue 8. Ser. 8 (August. 2025), PP 39-48 www.iosrjournals.org, https://www.iosrjournals.org/iosr-jbm/papers/Vol27-issue8/Ser-8/F2708083948.pdf
- J. Silverman, “AI and the Future of Cyber Risk Management,” Harv. Bus. Rev., vol. 99, no. 3, pp. 65–74, 2021.
- T. Oswald and R. Richards, “Cross-Border Data Flows and AI Security: Regulatory Challenges,” Int. Data Privacy Law, vol. 12, no. 2, pp. 95–106, 2022.
- S. Goyal, A. Sharma, and M. Gupta, “Lightweight AI Models for SME Cybersecurity,” Comput. Secur., vol. 124, p. 102989, 2023.
- Elizabeth A. Adeola, Adeyinka G. Ologun, Ifeoluwa Elemure, Owoade O. Odesanya, Peter T. Oluwasola, & Rukayat Abisola Olawale. (2025). Integrating IoT and Digital Twins to Transform Urban Governance. International Journal of Progressive Research in Science and Engineering, 6(08), 1–7. Retrieved from https://journal.ijprse.com/index.php/ijprse/article/view/1228
- Ifeoluwa Elemure, Elizabeth A. Adeola, Adeyinka G. Ologun, Owoade O. Odesanya, Peter T. Oluwasola and Rukayat Abisola Olawale. Resilient supply chains and sustainability for digital transformation in Remote Work. International Journal of Science and Research Archive, 2025, 16(02), 1294-1309. Article DOI: https://doi.org/10.30574/ijsra.2025.16.2.2470.
- O. O. Akinola, “Balancing AI Efficiency and Ethics for Long-Term Business Sustainability”, IJRESM, vol. 8, no. 8, pp. 61–69, Aug. 2025, Accessed: Sep. 19, 2025: https://journal.ijresm.com/index.php/ijresm/article/view/3340
- M. Crawford and S. A. Rahman, “AI for Phishing Detection Using NLP,” J. Cybersecurity, vol. 9, no. 1, pp. 33–44, 2023.
- P. Zhou and H. Li, “Cloud Security Enhancement Using Deep Reinforcement Learning,” Future Gen. Comput. Syst., vol. 135, pp. 278–288, 2022.
- L. Floridi and J. Cowls, “A Unified Framework for AI Ethics and Governance,” Minds & Machines, vol. 30, pp. 1–14, 2020.
- M. Ahmed and S. Kim, “Survey of Network Anomaly Detection Using AI,” J. Netw. Comput. Appl., vol. 60, pp. 19–31, 2023.
This research examines the role of artificial intelligence (AI) in enhancing cybersecurity, with a specific focus on
its integration into encryption, cloud security, digital identity management, and financial asset protection. The primary
objective is to evaluate how AI techniques, including machine learning, deep learning, natural language processing, and
blockchain-assisted models, enhance real-time threat detection and secure data processing, while also addressing governance
and ethical challenges. A systematic literature review methodology was employed, screening 1,248 records from five major
databases, of which 64 studies met the inclusion criteria. Results indicate that deep learning models achieved detection
accuracies exceeding 90%, while anomaly detection in cloud environments reduced false positives by nearly 25% compared
with rule-based methods. Nonetheless, adversarial AI models exposed vulnerabilities, and homomorphic encryption
integration faced scalability issues, with error rates in computational performance ranging from 8% to 12% across test
environments. The study concludes that although AI offers transformative benefits for digital safeguarding, significant
challenges remain, including those related to ethics, bias, resource intensity, and regulatory harmonisation, underscoring
the need for scalable and inclusive frameworks.
Keywords :
Artificial Intelligence (AI); Cybersecurity; Homomorphic Encryption; Cloud Security; Digital Identity Protection; Adversarial AI.