Home
World Journal of Advanced Research and Reviews
International Journal with High Impact Factor for fast publication of Research and Review articles

Main navigation

  • Home
    • Journal Information
    • Editorial Board Members
    • Reviewer Panel
    • Abstracting and Indexing
    • Journal Policies
    • Our CrossMark Policy
    • Publication Ethics
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Join Editorial Board
    • Join Reviewer Panel
  • Contact us
  • Downloads

eISSN: 2581-9615 || CODEN: WJARAI || Impact Factor 8.2 ||  CrossRef DOI

Research and review articles are invited for publication in March 2026 (Volume 29, Issue 3) Submit manuscript

Graph-based security models for AI-driven data storage: A novel approach to protecting classified documents

Breadcrumb

  • Home
  • Graph-based security models for AI-driven data storage: A novel approach to protecting classified documents

Eliel Kundai Zhuwankinyu 1, *, Munashe Naphtali Mupa 2 and Sylvester Tafirenyika 2

1 Illinois Institute of Technology.

2 Hult International Business School.

Review Article

World Journal of Advanced Research and Reviews, 2025, 26(02), 1108-1124

Article DOI: 10.30574/wjarr.2025.26.2.1631

DOI url: https://doi.org/10.30574/wjarr.2025.26.2.1631

Received on 25 March 2025; revised on 05 May 2025; accepted on 08 May 2025

Corporate data storage systems are susceptible to cyber threats; thus, securing them is a central problem in Artificial Intelligence (AI). Graph-Based Security Models (GBSM) form a reliable and scalable approach to reinforcing cybersecurity. These models help to map out extended cyber threats comprehensively and facilitate enhanced threat identification, anomaly detection, and cryptographic integrity. Special emphasis has to do with integrating AI with GBSM as it enhances real-time anomaly detection, automated threat response, cryptographic computing, and other approaches that make it a helpful solution for the secured handling of classified documents in fluid technological contexts.

This work examines the specific problem of how traditional approaches to implementing information security are ineffective against, for example, zero-day exploits and advanced persistent threats. GBSM, therefore, provides more versatile security measures for defence, which are brought about by the constant analysis of relationships between different entities in different threat vectors. Additionally, advanced elements of cryptography key management and decentralized blockchain frameworks add more strength to the protection of identity and valuables, giving the advantage of a nearly unalterable and transparent access control, which are remedies for modern security needs.

The proposed study focuses on integrating GBSM and AI to defend distributed systems and cloud environments. It explains how these models allow organizations to map out and recognize threats and address them before they occur in a decentralized environment. Besides, the application of graph-based methods in quantum-safe cryptography and blockchain applications makes it possible to develop protection against novel threats in quantum computing and adversarial actions.

By using programs that utilize artificial intelligence, this article explores a progressive outlook on the issue of cybersecurity. Here, he saves a place for the comprehensiveness of future security frameworks enriched by AI, quantum cryptography, and GBSM, which should be suitable for future increased threats. Furthermore, the study recommends that future works to solve the outlined issues must develop adaptive AI models that include post-quantum cryptographic methods for protecting data when faced with new technological threats.

Artificial Intelligence; Classified; Data; Graph-based; Models

https://wjarr.com/sites/default/files/fulltext_pdf/WJARR-2025-1631.pdf

Preview Article PDF

Eliel Kundai Zhuwankinyu, Munashe Naphtali Mupa and Sylvester Tafirenyika. Graph-based security models for AI-driven data storage: A novel approach to protecting classified documents. World Journal of Advanced Research and Reviews, 2025, 26(2), 1108-1124. Article DOI: https://doi.org/10.30574/wjarr.2025.26.2.1631

Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


All statements, opinions, and data contained in this publication are solely those of the individual author(s) and contributor(s). The journal, editors, reviewers, and publisher disclaim any responsibility or liability for the content, including accuracy, completeness, or any consequences arising from its use.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content

Copyright © 2026 World Journal of Advanced Research and Reviews - All rights reserved

Developed & Designed by VS Infosolution