Biometric-Based Encryption System to Enhance Cloud Data Security through the Integration of Facial Recognition and Homomorphic Encryption

Authors

Omeje, K. N.

Department of computer Science, David Umahi Federal University of Health Sciences (Nigeria)

Asogwa, T. C.

Department of Computer Science, Enugu State University of Science and Technology. (Nigeria)

Article Information

DOI: 10.51584/IJRIAS.2026.110100128

Subject Category: Computer Science

Volume/Issue: 11/1 | Page No: 1520-1531

Publication Timeline

Submitted: 2026-02-07

Accepted: 2026-02-12

Published: 2026-02-19

Abstract

The rapid growth of cloud computing has introduced significant benefits in terms of data storage and processing but it has also increased the risks of unauthorized access and data breaches. Therefore, this study presents a biometric-based encryption system which is designed to enhance cloud data security through the integration of facial recognition and homomorphic encryption. The proposed system employs an Autoencoder (AE) for feature extraction, Convolutional Neural Network (CNN) for facial recognition, and the Brakerski-Gentry-Vaikuntanathan (BGV) algorithm for secure data encryption and decryption. The adopted AE is used to efficiently compresses facial features into latent vectors used both for recognition and as encryption keys. Furthermore, the experimental evaluation of the techniques adopted using both primary facial datasets and the LFW dataset demonstrated that the AE achieved a training accuracy of 99.84% and validation accuracy of 98.59%, while the CNN attained a training accuracy of 97.05% and validation accuracy of 95.04%. Additionally, the result of the BGV encryption process recorded an average encryption time of 0.023 seconds and decryption time of 0.019 seconds, indicating minimal computational overhead. Results confirm that the integration of biometric encryption enhances both data confidentiality and authentication reliability in cloud environments. This system provides a robust and efficient framework for securing sensitive data in modern cloud infrastructures, ensuring privacy, integrity, and accessibility for authorized users.

Keywords

Biometric Encryption; Cloud Security; Facial Recognition; AE; CNN

Downloads

References

1. Babu, P. (2023). Cloud data security enhancements through the biometric and encryption system [Unpublished master's thesis]. School of Computing, National College of Ireland. [Google Scholar] [Crossref]

2. Bagga, P., Mitra, A., Das, A., Vijayakumar, P., Park, Y., & Karuppiah, M. (2022). Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system. Computer Communications, 195, 27-39. https://doi.org/10.1016/j.comcom.2022.08.003 [Google Scholar] [Crossref]

3. Bakurov, I., Buzzelli, M., Schettini, R., Castelli, M., & Vanneschi, L. (2022). Structural similarity index (SSIM) revisited: A data-driven approach. Expert Systems with Applications, 189, Article 116087. https://doi.org/10.1016/j.eswa.2021.116087 [Google Scholar] [Crossref]

4. Crawford, J. L. H. (2019). Fully homomorphic encryption applications: The strive towards practicality [Master's thesis, Queen Mary University of London]. Department of Electronic Engineering and Computer Science. [Google Scholar] [Crossref]

5. Helmy, M., El-Rabaie, E., El-Dokany, I., & El-Samie, F. E. (2023). A novel cancellable biometric recognition system based on Rubik's cube technique for cyber-security applications. Optik, 285, Article 170475. https://doi.org/10.1016/j.ijleo.2022.170475 [Google Scholar] [Crossref]

6. Huang, J., & Wu, D. (2022). Cloud storage model based on the BGV fully homomorphic encryption in the blockchain environment. Security and Communication Networks, 2022, Article 8541313. https://doi.org/10.1155/2022/8541313 [Google Scholar] [Crossref]

7. Lu, Y., & Zhao, D. (2023). Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service. Computer Communications, 182, 22-30. https://doi.org/10.1016/j.comcom.2021.10.029 [Google Scholar] [Crossref]

8. Mostafa, A., Ezz, M., Elbashir, M., Alruily, M., Hamouda, E., Alsarhani, M., & Said, W. (2023). Strengthening cloud security: An innovative multi-factor multi-layer authentication framework for cloud user authentication. Applied Sciences, 13(19), Article 10871. https://doi.org/10.3390/app131910871 [Google Scholar] [Crossref]

9. Rahman, K., Hridoy, M., Rahman, M., Islam, R., & Banik, S. (2024). Highly secured and effective management of app-based online voting system using RSA encryption and decryption. Heliyon, 10(4), Article e25373. https://doi.org/10.1016/j.heliyon.2024.e25373 [Google Scholar] [Crossref]

10. Shruti, Rani, S., & Srivastava, G. (2024). Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme. Expert Systems with Applications, 235, Article 121180. https://doi.org/10.1016/j.eswa.2023.121180 [Google Scholar] [Crossref]

11. Umar, T., Nadeem, M., & Anwer, F. (2024). Chaos based image encryption scheme to secure sensitive multimedia content in cloud storage. Expert Systems with Applications, 257, Article 125050. https://doi.org/10.1016/j.eswa.2024.125050 [Google Scholar] [Crossref]

12. Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: From error measurement to structural similarity. IEEE Transactions on Image Processing, 13(4), 600-612. https://doi.org/10.1109/TIP.2003.819861 [Google Scholar] [Crossref]

13. Weir, B. (2013). Homomorphic encryption [Master's thesis, University of Waterloo]. [Google Scholar] [Crossref]

Metrics

Views & Downloads

Similar Articles