top of page

Cybersecurity and Biometric Authentication Analysis

TIME AHEAD OF COVID-19: Outgrowth of Cloud Encryption Algorithm

on Biometric Authentication analysis.

Today, citizens of the world community are unable to function without

identification and authentication operative mechanism. Over the past centuries,

global citizens were represented, identified, and authenticated by a complex set of

external variables such as last name, ethnicity, nationality, religion, ways of life,

and occupation. Amid the COVID-19 pandemic, there is a paradigm shift in the

global system toward using internal mutable human nature aided by digital

measuring and computing tools such as biometric authentication, indicators and

identification of human characteristics and behaviors across all nations. It is worth

noting that human identity and authentication is central to the functioning of the

human environment; hence, evolving threat to biometric authentication and

analysis is a serious challenge and often leads to complication and security risks

for human civilization. Prior to and during the COVID-19 pandemic, advances in

digital biometric authentication, analysis and physical security was shoved aside

and currently private and public organizations and higher education enterprises are

pushed towards issuing human identity cards, the acceptance of artificial

intelligence-driven automation efficiency (Alexander & Sharon, 2020 Kazimov &

Mahmudova 2015). Today, the main trepidation is in the domain of the global

security: what then is the guarantee that world communities are ready to use

biometric identifiers for human identity authentication in the event of the next


At present, the main consternation is the global security. An all-inclusive

security machinery must be established with well-structured budgets, border

security, employee identification, national identification, prison security, airport

security, and immigration and custom service security to battle the alarming pace

of security threat (Esin, 2019; Fennelly, 2017; Chauhan & Gupta, 2015; Kazimov

& Mahmudova, 2015). Indeed, digital biometrics authentication analyses are an

intrinsic segment of human characteristics, currently promoting the increasing

trend to replace traditional encryption keys, passwords, and cyphers process.


The outgrowth of cloud encryption algorithm as natural solution during

COVID-19 must include integration of digital biometric authentication analysis

into individual passports, entry visas and fingerprint deployment process based on

retina scan, iris, and facial recognitions. As Esin (2019), Fennelly (2017), and

Kazimov & Mahmudova (2015) noted, a well-structured security plan of action

must be implemented to protect digital biometric authentication analysis records

from abuse and mismanagement, and failure to do so will exert considering impact

on human society leading to economic and health security risks across national and

geographical borders. Per Alexander & Sharon (2020). Kazimov & Mahmudova

(2015), and Ngwang (2016), integration of cloud encryption algorithm on digital

biometric authentication analysis will play a key role in attaining broad-ranch

achievement of the following:

 Active role to improving consumer’s daily traveling obstacles by providing

effective security operation on the use of mobile phone, home security, cars,

and mobile payment systems.

 Stimulate acceleration of the Internet of Things (IoT), a highly accurate and

user-friendly electronic device that has superior access and interaction with


 Unlike traditional security systems, which typically have physical keys,

digital biometric authentication analysis often requires direct interaction

with sensors while using related biometric devices.

A corresponding increase on the use of in-built cloud encryption algorithm is on

the rise and is expected to drive the growth of digital biometric authentication

analysis across the globe. It is worth noting that cloud encryption algorithm

requires compatible encryption software, installation, configuration, and effective

management security guidelines. The current global outbreak of COVID-19

pandemic is exerting an unbiased control and pressures on the growth of the global

economy, healthcare operations and advancement in education settings which prior

to its occurrence depended on physical proximity and interpersonal connectivity.

But today, COVID-19 has introduced social-distances and the outsourcing of work

environments to the home and the Internet system as the main avenue of work

communication and reliability. These shifts in work milieus and paradigm tend to

increase chances of records and data breaches (Esin, 2018, Kazimov & Mahmudova,

2015). And these gaps must be filled, cloud encryption algorithm on digital

biometric authentication analysis is presently the unique reliable system today.


The exponential increase in COVID-19 pandemic attack and the resultant

dependence on virtual and distance work environments have created big windows

and opportunities for Internet hackers and cybercriminals to invade public and

private digital records, data, and information. Public and private organizations,

higher education settings, immigration and border custom services are strongly

encouraged to adopt integration of cloud encryption algorithm in digital biometric

authentication analysis to mitigate the possibility of record and data breaches.


Alexander, Felipe & Shahnewaz, Sharon. (2020). “Top Ten Mind Blowing Advantages of

Biometric Technology.” CircleCare - Corporate Wellness App Digital Marketing

App Digital Marketing at M2SYS Technology.

Chauhan, Kapil, and Gupta, Himanshu. (2015). “Role of Biometric Security for the

Enhancement of Data Security.” Journal of International Journal of Computers and

Technology. Vol. 14, No. 10.

Esin, Joseph O. (2019). “Imminent -Threats of Cloud Computing Technology in

Healthcare Operation.” Journal of Educational Research and Technology, 7(7), 29–38.


Esin, Joseph O. (2018). “Offensive and Defensive Approach to Ethical Hacking.” Washington,

D. C.: Washington Center for Cybersecurity Research and Development (WCCRD).

Fennelly, Lawrence J. (2017). Effective Physical Security. Waltham, MA: Elsevier, Inc.

Kazimov, Tofig and Mahmudova, Shafagat. (2015). “The Role of Biometric Technology in

Information Security.” Journal of International Journal of Computers and Technology.

Vol. 02. Issue: 03.

Ngwang, E. N. (2016). “Individual Freedom, Cyber Security and Nuclear Proliferation in a

Borderless Land: Innovations and the Trade-offs in Scientific Progress.” The Journal of

Educational Research and Technology (JERT). Vol. 5. No. 5, 33-72.

About the Author - Dr. Joseph O. Esin is a Professor in the Department of Computer Science, University of Calabar, Nigeria and Lead Professor of Computer Information Systems/Cybersecurity Jarvis Christian College, Hawkins, Texas

Featured Posts
Check back soon
Once posts are published, you’ll see them here.
Recent Posts
Search By Tags
No tags yet.
Follow Us
  • Facebook Basic Square
  • Twitter Basic Square
  • Google+ Basic Square
bottom of page