Cybersecurity and Biometric Authentication Analysis
TIME AHEAD OF COVID-19: Outgrowth of Cloud Encryption Algorithm
on Biometric Authentication analysis.
Today, citizens of the world community are unable to function without
identification and authentication operative mechanism. Over the past centuries,
global citizens were represented, identified, and authenticated by a complex set of
external variables such as last name, ethnicity, nationality, religion, ways of life,
and occupation. Amid the COVID-19 pandemic, there is a paradigm shift in the
global system toward using internal mutable human nature aided by digital
measuring and computing tools such as biometric authentication, indicators and
identification of human characteristics and behaviors across all nations. It is worth
noting that human identity and authentication is central to the functioning of the
human environment; hence, evolving threat to biometric authentication and
analysis is a serious challenge and often leads to complication and security risks
for human civilization. Prior to and during the COVID-19 pandemic, advances in
digital biometric authentication, analysis and physical security was shoved aside
and currently private and public organizations and higher education enterprises are
pushed towards issuing human identity cards, the acceptance of artificial
intelligence-driven automation efficiency (Alexander & Sharon, 2020 Kazimov &
Mahmudova 2015). Today, the main trepidation is in the domain of the global
security: what then is the guarantee that world communities are ready to use
biometric identifiers for human identity authentication in the event of the next
At present, the main consternation is the global security. An all-inclusive
security machinery must be established with well-structured budgets, border
security, employee identification, national identification, prison security, airport
security, and immigration and custom service security to battle the alarming pace
of security threat (Esin, 2019; Fennelly, 2017; Chauhan & Gupta, 2015; Kazimov
& Mahmudova, 2015). Indeed, digital biometrics authentication analyses are an
intrinsic segment of human characteristics, currently promoting the increasing
trend to replace traditional encryption keys, passwords, and cyphers process.
The outgrowth of cloud encryption algorithm as natural solution during
COVID-19 must include integration of digital biometric authentication analysis
into individual passports, entry visas and fingerprint deployment process based on
retina scan, iris, and facial recognitions. As Esin (2019), Fennelly (2017), and
Kazimov & Mahmudova (2015) noted, a well-structured security plan of action
must be implemented to protect digital biometric authentication analysis records
from abuse and mismanagement, and failure to do so will exert considering impact
on human society leading to economic and health security risks across national and
geographical borders. Per Alexander & Sharon (2020). Kazimov & Mahmudova
(2015), and Ngwang (2016), integration of cloud encryption algorithm on digital
biometric authentication analysis will play a key role in attaining broad-ranch
achievement of the following:
Active role to improving consumer’s daily traveling obstacles by providing
effective security operation on the use of mobile phone, home security, cars,
and mobile payment systems.
Stimulate acceleration of the Internet of Things (IoT), a highly accurate and
user-friendly electronic device that has superior access and interaction with
Unlike traditional security systems, which typically have physical keys,
digital biometric authentication analysis often requires direct interaction
with sensors while using related biometric devices.
A corresponding increase on the use of in-built cloud encryption algorithm is on
the rise and is expected to drive the growth of digital biometric authentication
analysis across the globe. It is worth noting that cloud encryption algorithm
requires compatible encryption software, installation, configuration, and effective
management security guidelines. The current global outbreak of COVID-19
pandemic is exerting an unbiased control and pressures on the growth of the global
economy, healthcare operations and advancement in education settings which prior
to its occurrence depended on physical proximity and interpersonal connectivity.
But today, COVID-19 has introduced social-distances and the outsourcing of work
environments to the home and the Internet system as the main avenue of work
communication and reliability. These shifts in work milieus and paradigm tend to
increase chances of records and data breaches (Esin, 2018, Kazimov & Mahmudova,
2015). And these gaps must be filled, cloud encryption algorithm on digital
biometric authentication analysis is presently the unique reliable system today.
The exponential increase in COVID-19 pandemic attack and the resultant
dependence on virtual and distance work environments have created big windows
and opportunities for Internet hackers and cybercriminals to invade public and
private digital records, data, and information. Public and private organizations,
higher education settings, immigration and border custom services are strongly
encouraged to adopt integration of cloud encryption algorithm in digital biometric
authentication analysis to mitigate the possibility of record and data breaches.
Alexander, Felipe & Shahnewaz, Sharon. (2020). “Top Ten Mind Blowing Advantages of
Biometric Technology.” CircleCare - Corporate Wellness App Digital Marketing
App Digital Marketing at M2SYS Technology.
Chauhan, Kapil, and Gupta, Himanshu. (2015). “Role of Biometric Security for the
Enhancement of Data Security.” Journal of International Journal of Computers and
Technology. Vol. 14, No. 10. www.ijctonline.com.
Esin, Joseph O. (2019). “Imminent -Threats of Cloud Computing Technology in
Healthcare Operation.” Journal of Educational Research and Technology, 7(7), 29–38.
Esin, Joseph O. (2018). “Offensive and Defensive Approach to Ethical Hacking.” Washington,
D. C.: Washington Center for Cybersecurity Research and Development (WCCRD).
Fennelly, Lawrence J. (2017). Effective Physical Security. Waltham, MA: Elsevier, Inc.
Kazimov, Tofig and Mahmudova, Shafagat. (2015). “The Role of Biometric Technology in
Information Security.” Journal of International Journal of Computers and Technology.
Vol. 02. Issue: 03. www.irjet.net.
Ngwang, E. N. (2016). “Individual Freedom, Cyber Security and Nuclear Proliferation in a
Borderless Land: Innovations and the Trade-offs in Scientific Progress.” The Journal of
Educational Research and Technology (JERT). Vol. 5. No. 5, 33-72. www.thejert.com.
About the Author - Dr. Joseph O. Esin is a Professor in the Department of Computer Science, University of Calabar, Nigeria and Lead Professor of Computer Information Systems/Cybersecurity Jarvis Christian College, Hawkins, Texas