Sustainable Approach to Data Security: Multi-Key Biometric Encryption and Cloud Storage for SDG-Focused Businesses

PDF (559KB), PP.39-48

Views: 0 Downloads: 0

Author(s)

Mukesh Kumar 1,2 Vivek Bhardwaj 3,* Karan Bajaj 4 Nandini Modi 5 Ahmed Qtaishat 6

1. Chandigarh Group of Colleges Jhanjeri, Mohali, Punjab 140307, Chandigarh School of Business, India

2. Department of Computer Applications, Advanced Centre of Research & Innovation (ACRI), India

3. School of Computer Science and Engineering, Manipal University Jaipur, Jaipur, Rajasthan, India

4. Department of Computer Science and Engineering, Lovely Professional University, Phagwara, Jalandhar - Delhi, Grand Trunk Rd, Phagwara, Punjab 144411, India

5. Department of Computer Science and Engineering, School of Technology, Pandit Deendayal Energy University, Knowledge Corridor, Gandhinagar, Gujarat 382007, India

6. General Foundation Program, Department of Information Technology, Sohar University Sohar, Sultanate of Oman

* Corresponding author.

DOI: https://doi.org/10.5815/ijieeb.2025.03.03

Received: 30 Aug. 2024 / Revised: 8 Jan. 2025 / Accepted: 23 Feb. 2025 / Published: 8 Jun. 2025

Index Terms

Data Security, Cloud Storage, Multi-Key Biometric Encryption, Sustainable Development Goals, Amazon Web Services

Abstract

This paper presents the implementation and evaluation of a Multi-key Multi-modalities Biometric Encryption System designed for business enterprises, leveraging cloud storage for secure and scalable data management. The system integrates multiple biometric modalities fingerprint, iris scan, and face recognition to enhance data security through advanced multi-key encryption techniques, utilizing algorithms such as Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA). The encrypted biometric data is securely stored in the cloud, providing enterprises with efficient storage solutions. The system's performance was evaluated across several parameters including encryption/decryption time, biometric match accuracy, data transfer speeds, energy consumption, cost, and user satisfaction. The results demonstrate that multi-modal systems offer superior accuracy and security compared to single-modality systems, reducing error rates and enhancing reliability. However, multi-modal authentication incurs higher costs, energy consumption, and slightly longer processing times. Despite these trade-offs, the system achieved high user satisfaction, particularly in high-security environments where data protection is a priority. The findings indicate that the proposed system is a viable solution for businesses seeking a secure, scalable, and efficient method of protecting sensitive data.

Cite This Paper

Mukesh Kumar, Vivek Bhardwaj, Karan Bajaj, Nandini Modi, Ahmed Qtaishat, "Sustainable Approach to Data Security: Multi-Key Biometric Encryption and Cloud Storage for SDG-Focused Businesses", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.17, No.3, pp. 39-48, 2025. DOI:10.5815/ijieeb.2025.03.03

Reference

[1]S. Tiwari, R. Raja, R. S. Wadawadagi, K. Naithani, H. Raja, and D. Ingle, “Emerging Biometric Modalities and Integration Challenges,” in Online Identity-An Essential Guide, IntechOpen, 2024.
[2]U. Sumalatha, K. K. Prakasha, S. Prabhu, and V. C. Nayak, “A Comprehensive Review of Unimodal and Multimodal Fingerprint Biometric Authentication Systems: Fusion, Attacks, and Template Protection,” IEEE Access, 2024.
[3]J. Wang, H. Jiang, Y. Yang, and R. Xin, “Biological Template Protection Based on Multikey Cryptographic Decomposition Features,” in 2023 9th International Conference on Systems and Informatics (ICSAI), IEEE, 2023, pp. 1–6.
[4]D. Prabhu, S. V. Bhanu, and S. Suthir, “Modeling Of Optimal Multi Key Homomorphic Encryption With Deep Learning Biometric Based Authentication System For Cloud Computing,” Asean Engineering Journal, vol. 13, no. 4, pp. 149–156, 2023.
[5]A. A. Talabi, O. B. Longe, M. A. Ahmad, and K. Olusanya, “Cloud-Based Approaches to Multi-Modal Biometric-Based Authentication in Identity Management Systems,” 2022.
[6]D. S. Sumathi and S. J. Raj G, “Multi-Modal Biometric Authentication with Dynamic Hosting: Enhancing Website Security using ML and AWS Cloud,” in Proceedings of the 2024 5th International Conference on Computing, Networks, and Internet of Things, 2024, pp. 642–649.
[7]P. Li et al., “multi-key privacy-preserving deep learning in cloud computing,” Future Generation Computer Systems, vol. 74, pp. 76–85, 2017.
[8]J. Fantaye, “An Introduction and Overview of Privacy-Enhancing Technologies for Data Processing and Analysis,” 2022.
[9]H. El-El-Sofany, “A Proposed Biometric Authentication Model to Improve Cloud Systems Security,” Computer Systems Science and Engineering, vol. 43, no. 2, pp. 573–589, 2022, doi: 10.32604/csse.2022.024302.
[10]M. I. Mihailescu and S. L. Nita, “A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments,” Cryptography, vol. 6, no. 1, Mar. 2022, doi: 10.3390/cryptography6010008.
[11]M. Moradi, M. Moradkhani, and M. B. Tavakoli, “A Real-Time Biometric Encryption Scheme Based on Fuzzy Logic for IoT,” J Sens, vol. 2022, 2022, doi: 10.1155/2022/4336822.
[12]M. A. Hossain and M. A. Al Hasan, “Improving cloud data security through hybrid verification technique based on biometrics and encryption system,” International Journal of Computers and Applications, vol. 44, no. 5, pp. 455–464, 2022, doi: 10.1080/1206212X.2020.1809177.
[13]N. D. Sarier, “Multimodal biometric authentication for mobile edge computing,” Inf Sci (N Y), vol. 573, pp. 82–99, 2021.
[14]G. Balamurugan, K. B. Jayarraman, V. Arulalan, and V. Lokesh, “Multimodal biometric key generation for cryptographic security using face and iris,” Advances in Natural and Applied Sciences, vol. 9, no. 6 SE, pp. 525–531, 2015.
[15]A. Vankadara, V. Myneni, H. Pendyala, and D. Vadlamudi, “Enhancing Encryption Mechanisms using SHA-512 for user Authentication through Password & Face Recognition,” in 2023 International Conference on Inventive Computation Technologies (ICICT), 2023, pp. 1086–1095. doi: 10.1109/ICICT57646.2023.10134233.
[16]T. Kaur and M. Kaur, “Cryptographic key generation from multimodal template using fuzzy extractor,” in 2017 Tenth International Conference on Contemporary Computing (IC3), IEEE, 2017, pp. 1–6.
[17]E. Uzun, C. Yagemann, S. Chung, V. Kolesnikov, and W. Lee, “Cryptographic key derivation from biometric inferences for remote authentication,” in Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 2021, pp. 629–643.
[18]M. Arunachalam and K. Subramanian, “AES Based Multimodal Biometric Authentication using Cryptographic Level Fusion with Fingerprint and Finger Knuckle Print.,” Int. Arab J. Inf. Technol., vol. 12, no. 5, pp. 431–440, 2015.
[19]C. Miyazawa and R. Sato, “Biometric Fusion for Enhanced Authentication in Cloud Computing Environments,” Advances in Engineering and Intelligence Systems, vol. 3, no. 01, pp. 58–69, 2024.
[20]S. Pahuja and N. Goel, “Multimodal biometric authentication: A review,” AI Communications, no. Preprint, pp. 1–23, 2024.
[21]D. M. Ahmed et al., “A state of art for survey of combined iris and fingerprint recognition systems,” Asian Journal of Research in Computer Science, pp. 18–33, 2021.
[22]N. Bala, R. Gupta, and A. Kumar, “Multimodal biometric system based on fusion techniques: a review,” Information Security Journal: A Global Perspective, vol. 31, no. 3, pp. 289–337, 2022.