{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T16:42:45Z","timestamp":1778776965413,"version":"3.51.4"},"reference-count":43,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T00:00:00Z","timestamp":1738972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>This study presents a Generative AI-Enhanced Cybersecurity Framework designed to strengthen enterprise data privacy management while improving threat detection accuracy and scalability. By leveraging Generative Adversarial Networks (GANs), Variational Autoencoders (VAEs), and traditional anomaly detection methods, the framework generates synthetic datasets that mimic real-world data, ensuring privacy and regulatory compliance. At its core, the anomaly detection engine integrates machine learning models, such as Random Forest and Support Vector Machines (SVMs), alongside deep learning techniques like Long Short-Term Memory (LSTM) networks, delivering robust performance across diverse domains. Experimental results demonstrate the framework\u2019s adaptability and high performance in the financial sector (accuracy: 94%, recall: 95%), healthcare (accuracy: 96%, precision: 93%), and smart city infrastructures (accuracy: 91%, F1 score: 90%). The framework achieves a balanced trade-off between accuracy (0.96) and computational efficiency (processing time: 1.5 s per transaction), making it ideal for real-time enterprise deployments. Unlike analog systems that achieve &gt; 0.99 accuracy at the cost of higher resource consumption and limited scalability, this framework emphasizes practical applications in diverse sectors. Additionally, it employs differential privacy, encryption, and data masking to ensure data security while addressing modern cybersecurity challenges. Future work aims to enhance real-time scalability further and explore reinforcement learning to advance proactive threat mitigation measures. This research provides a scalable, adaptive, and practical solution for enterprise-level cybersecurity and data privacy management.<\/jats:p>","DOI":"10.3390\/computers14020055","type":"journal-article","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T04:37:04Z","timestamp":1739335024000},"page":"55","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Generative AI-Enhanced Cybersecurity Framework for Enterprise Data Privacy Management"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7126-5186","authenticated-orcid":false,"given":"Geeta Sandeep","family":"Nadella","sequence":"first","affiliation":[{"name":"Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3286-8224","authenticated-orcid":false,"given":"Santosh Reddy","family":"Addula","sequence":"additional","affiliation":[{"name":"Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6377-6265","authenticated-orcid":false,"given":"Akhila Reddy","family":"Yadulla","sequence":"additional","affiliation":[{"name":"Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0327-2450","authenticated-orcid":false,"given":"Guna Sekhar","family":"Sajja","sequence":"additional","affiliation":[{"name":"Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3585-5060","authenticated-orcid":false,"given":"Mohan","family":"Meesala","sequence":"additional","affiliation":[{"name":"Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3335-7516","authenticated-orcid":false,"given":"Mohan Harish","family":"Maturi","sequence":"additional","affiliation":[{"name":"Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6056-7577","authenticated-orcid":false,"given":"Karthik","family":"Meduri","sequence":"additional","affiliation":[{"name":"Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3360-154X","authenticated-orcid":false,"given":"Hari","family":"Gonaygunta","sequence":"additional","affiliation":[{"name":"Department of Information Technology, University of the Cumberlands, Williamsburg, KY 40769, USA"}]}],"member":"1968","published-online":{"date-parts":[[2025,2,8]]},"reference":[{"key":"ref_1","first-page":"102786","article-title":"AI-based cybersecurity solutions for evolving cyber threats","volume":"58","author":"Rahman","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_2","first-page":"47","article-title":"Cybersecurity and the internet of things: Vulnerabilities, threats, intruders and attacks","volume":"1","author":"Abomhara","year":"2019","journal-title":"J. Cybersecur. Priv."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.18280\/ijsse.130614","article-title":"A Review of Cybersecurity Management Standards Applied in Higher Education Institutions","volume":"13","author":"Amine","year":"2023","journal-title":"Int. J. Saf. Secur. Eng."},{"key":"ref_4","first-page":"9998","article-title":"Security and privacy in distributed edge computing","volume":"7","author":"Alcaraz","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_5","first-page":"57652","article-title":"Privacy-preserving machine learning: Threats and solutions","volume":"10","author":"Ali","year":"2022","journal-title":"IEEE Access"},{"key":"ref_6","unstructured":"Anderson, R., and Kuhn, M.G. (1996, January 18\u201321). Tamper resistance\u2014A cautionary note. Proceedings of the 2nd USENIX Workshop on Electronic Commerce, Oakland, CA, USA."},{"key":"ref_7","first-page":"129073","article-title":"Generative adversarial networks for cybersecurity: A comprehensive survey","volume":"9","author":"Biswas","year":"2021","journal-title":"IEEE Access"},{"key":"ref_8","first-page":"1234","article-title":"Federated learning-based cybersecurity framework for data privacy management","volume":"18","author":"Cao","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_9","first-page":"116139","article-title":"Data privacy and security challenges in cloud computing","volume":"8","author":"Chaudhry","year":"2020","journal-title":"IEEE Access"},{"key":"ref_10","first-page":"2621","article-title":"AI-enhanced cybersecurity: Threat detection and mitigation using deep learning","volume":"23","author":"Chen","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_11","first-page":"103190","article-title":"Enhancing cybersecurity with blockchain-based decentralized data privacy management","volume":"190","author":"Chowdhury","year":"2022","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"48126","DOI":"10.1109\/ACCESS.2024.3381611","article-title":"Privacy and Security Concerns in Generative AI: A Comprehensive Survey","volume":"12","author":"Golda","year":"2024","journal-title":"IEEE Access"},{"key":"ref_13","first-page":"808","article-title":"AI-driven data privacy and cybersecurity in the cloud environment","volume":"9","author":"Deb","year":"2021","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_14","first-page":"42","article-title":"Generative AI models for cybersecurity: Applications and challenges","volume":"19","author":"Diba","year":"2021","journal-title":"IEEE Secur. Priv."},{"key":"ref_15","first-page":"21498","article-title":"Edge computing in cybersecurity: Challenges and opportunities","volume":"8","author":"Fernandes","year":"2020","journal-title":"IEEE Access"},{"key":"ref_16","first-page":"102408","article-title":"Data privacy in AI-based cybersecurity frameworks: A survey","volume":"127","author":"Gao","year":"2022","journal-title":"J. Syst. Archit."},{"key":"ref_17","first-page":"85170","article-title":"Generative adversarial networks in cybersecurity: A comprehensive review","volume":"7","author":"Hasan","year":"2019","journal-title":"IEEE Access"},{"key":"ref_18","first-page":"8194","article-title":"Blockchain-based privacy-preserving AI for enterprise data security","volume":"17","author":"He","year":"2021","journal-title":"IEEE Trans. Ind. Informatics"},{"key":"ref_19","first-page":"56","article-title":"AI-enhanced cybersecurity for enterprise data privacy: Frameworks and approaches","volume":"5","author":"Hussain","year":"2023","journal-title":"J. Cybersecur. Priv."},{"key":"ref_20","first-page":"1","article-title":"Generative AI models for cybersecurity in enterprise environments","volume":"55","author":"Jain","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_21","first-page":"3357","article-title":"AI-based cybersecurity solutions for privacy-preserving enterprise data management","volume":"15","author":"Jiang","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_22","first-page":"953","article-title":"Machine learning and AI for cybersecurity in the enterprise: Privacy and security implications","volume":"25","author":"Joo","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_23","first-page":"57685","article-title":"Cybersecurity and data privacy management using AI: Challenges and solutions","volume":"10","author":"Kammoun","year":"2022","journal-title":"IEEE Access"},{"key":"ref_24","first-page":"1043","article-title":"AI-driven cybersecurity solutions for enterprise data protection","volume":"8","author":"Kang","year":"2020","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_25","first-page":"103192","article-title":"Cybersecurity frameworks for AI-enhanced data privacy in enterprises","volume":"68","author":"Khan","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/s40012-022-00348-9","article-title":"Privacy and data protection in the enterprise world","volume":"10","author":"Shaik","year":"2022","journal-title":"CSIT"},{"key":"ref_27","first-page":"102654","article-title":"AI-powered privacy-preserving cybersecurity solutions for enterprises","volume":"163","author":"Li","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_28","first-page":"2345","article-title":"AI-enhanced data privacy management in enterprise cybersecurity","volume":"18","author":"Liu","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_29","first-page":"110287","article-title":"AI-based enterprise cybersecurity: Challenges and prospects","volume":"191","author":"Luo","year":"2022","journal-title":"J. Syst. Softw."},{"key":"ref_30","first-page":"4053","article-title":"Generative AI techniques for enhancing cybersecurity in enterprise networks","volume":"17","author":"Mahmood","year":"2021","journal-title":"IEEE Trans. Ind. Infor."},{"key":"ref_31","first-page":"864","article-title":"Blockchain-based AI frameworks for enterprise data privacy management","volume":"69","author":"Mollah","year":"2021","journal-title":"IEEE Trans. Eng. Manag."},{"key":"ref_32","first-page":"3456","article-title":"Privacy-preserving AI in cybersecurity: Techniques and challenges","volume":"24","author":"Nasr","year":"2022","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_33","first-page":"103910","article-title":"Data privacy and AI-enhanced cybersecurity in cloud computing","volume":"8","author":"Phan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_34","first-page":"3357","article-title":"AI-enhanced cybersecurity frameworks for enterprise data privacy","volume":"16","author":"Prasad","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_35","first-page":"31245","article-title":"Federated learning for cybersecurity and data privacy in enterprises","volume":"11","author":"Qadir","year":"2023","journal-title":"IEEE Access"},{"key":"ref_36","first-page":"154","article-title":"Generative adversarial networks for enterprise cybersecurity: A review","volume":"23","author":"Ren","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_37","first-page":"102489","article-title":"AI-driven cybersecurity strategies for enterprise data protection","volume":"52","author":"Shao","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_38","first-page":"154573","article-title":"Data privacy challenges in AI-based cybersecurity frameworks","volume":"9","author":"Smith","year":"2021","journal-title":"IEEE Access"},{"key":"ref_39","first-page":"154","article-title":"AI and blockchain for cybersecurity in enterprise data privacy management","volume":"10","author":"Wang","year":"2022","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_40","first-page":"1456","article-title":"AI-enhanced cybersecurity frameworks for data privacy in enterprise environments","volume":"69","author":"Xu","year":"2023","journal-title":"IEEE Trans. Eng. Manag."},{"key":"ref_41","first-page":"1769","article-title":"A survey of AI-enhanced cybersecurity techniques for data privacy management","volume":"25","author":"Zhang","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_42","first-page":"26","article-title":"Semantic analysis of ISO\/IEC 27000 standard series and NIST cybersecurity framework to outline differences and consistencies in the context of operational and strategic information security","volume":"2","author":"Koza","year":"2022","journal-title":"Med. Eng. Themes"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3425780","article-title":"The creation and detection of deepfakes: A survey","volume":"54","author":"Mirsky","year":"2021","journal-title":"ACM Comput. Surv. (CSUR)"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/2\/55\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:29:41Z","timestamp":1760027381000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/2\/55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,8]]},"references-count":43,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["computers14020055"],"URL":"https:\/\/doi.org\/10.3390\/computers14020055","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,8]]}}}