The growing rate of using cloud computing has posed a serious dilemma in providing the security, privacy, and the integrity of authentication of data. Older protection systems, including passwords and two-factor authentication, frequently prove susceptible to cyberattack and identities theft. This paper discusses how to use the biometric encryption technology (i.e. biometric authentication (e.g., facial recognition, fingerprints) + cryptographic algorithm) to secure the cloud network. The analysis of the recent literature (20192024) demonstrates that some of the encryption methods, such as RSA, AES, ECC, and homomorphic encryption, and even the combination of blockchain, IoT, and deep learning are effective. Biometric encryption schemes, including key-binding, key-generation, fuzzy vault, biometric hashing, and cancellable biometrics are also discussed and their application to the protection of sensitive data on the cloud is highlighted. Nevertheless, there has been significant progress, and there are still difficulties in the domain of data privacy, computational cost, scalability, and regulatory compliance. In order to overcome these constraints, future studies ought to emphasise on the creation of lightweight, and privacy preserving biometric encryption models, with capability of operating in real time, in a cloud environment. The results highlight the fact that biometric encryption is a progressive strategy of attaining robust, dynamic and user-friendly cloud data security in the emerging digital ecosystem.
Biometric Encryption; Cloud Computing Security; Cryptography; Deep Learning; Data Privacy
IRE Journals:
Asogwa, T. C., Omeje, K. N. "Integration of Biometric Encryption Technology Combining Biometric Authentication with Cryptographic Algorithms to Enhance Cloud Network Security" Iconic Research And Engineering Journals Volume 9 Issue 4 2025 Page 1869-1879
IEEE:
Asogwa, T. C., Omeje, K. N.
"Integration of Biometric Encryption Technology Combining Biometric Authentication with Cryptographic Algorithms to Enhance Cloud Network Security" Iconic Research And Engineering Journals, 9(4)