Abstract
Data retrieval is termed as the process of identification and extraction of appropriate data from a database management system as per the query provided by an application or user. In recent days, great concern is provided to data security that draws considerable research in the field of cloud computing. Particularly, cryptographic primitives for ensuring data security are adopted with prompt optimization of the existing algorithms. Prevailing cryptographic methods transfer huge data to be unintelligible leading to a major challenge in secured and efficient data retrieval. Therefore, there is a need for effective data retrieval system for transferring the data from owner to user. In that case, this paper aims to develop an efficient data retrieval system thereby accessing a reliable and secured data transfer system between the data owner and data user. For this purpose, this research utilized the advantages of the elliptic-curve Diffie–Hellman algorithm to generate encryption and decryption keys. Meanwhile, the proposed hierarchical clustering based on the Pearson correlation coefficient is employed for data segregation and extraction in accordance with the query. Here, the Pearson correlation coefficient is used for computing the distance matrix that allows the hierarchical clustering method to overcome the prevailing limitations such as computational and time complexity. Finally, the proposed data retrieval system outshines the state-of-the-art method in terms of range query processing time (17.4 ms) and key generation time (encryption time and decryption time as 17.4 ms and 13.2 ms).
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11334-022-00515-w/MediaObjects/11334_2022_515_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11334-022-00515-w/MediaObjects/11334_2022_515_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11334-022-00515-w/MediaObjects/11334_2022_515_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11334-022-00515-w/MediaObjects/11334_2022_515_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11334-022-00515-w/MediaObjects/11334_2022_515_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11334-022-00515-w/MediaObjects/11334_2022_515_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11334-022-00515-w/MediaObjects/11334_2022_515_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11334-022-00515-w/MediaObjects/11334_2022_515_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11334-022-00515-w/MediaObjects/11334_2022_515_Fig9_HTML.png)
Similar content being viewed by others
Data availability statement
Data sharing is not applicable to this article as no new data were created or analysed in this study.
References
Krishnaraj N, Elhoseny M, Lydia EL, Shankar K, ALDabbas O (2021) An efficient radix trie-based semantic visual indexing model for large-scale image retrieval in cloud environment. Softw Pract Exp 51:489–502
Lin R, Wu B, Su Y (2018) An adaptive weighted pearson similarity measurement method for load curve clustering. Energies 11:2466
Mohammed CM, Zebaree SR (2021) Sufficient comparison among cloud computing services: IaaS, PaaS, and SaaS: a review. Int J Sci Bus 5:17–30
Patil A (2018) Enhanced-elliptic curve Diffie Hellman algorithm for secure data storage in multi cloud environment. Int J Intell Eng Syst 10:184–191
Indhuja A, Shaik RBMV, Sujatha P (2017) A multi-keyword ranked search scheme over encrypted based on hierarchical clustering index. Int J Smart Sens Intell Syst 10:539–559
Saravanabhavan C, Gangalakshmi MT, Ashok P (2021) Preserving privacy using enhanced shadow honeypot algorithm for data retrieval in cloud computing. Des Eng 6166–6173
DurgaNagarjuna T, Anil Kumar T, Santha Sheela A (2021) Privacy preserving and loss data retrieval in cloud computing using bucket algorithm. In: Bhoi KA, Mallick PK (eds) Advances in systems, control and automations. Springer, Berlin, pp 307–313
Ali FS, Saad HN, Sarhan FH, Naaeem B (2020) Enhance manet usability for encrypted data retrieval from cloud computing. Indones J Electr Eng Comput Sci 18:64–74
Kumar P, Bhatt AK (2020) Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach. IET Commun 14:3212–3222
Swami R, Das P (2020) An effective secure data retrieval approach using trust evaluation: HBSEE-CBC. Int J Inf Commun Technol 17:403–421
Vengala DVK, Kavitha D, Kumar AS (2020) Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC. Clust Comput 23:1683–1696
Yarava RK, Singh RP (2019) Efficient and secure cloud storage auditing based on the DiffieHellman key exchange. Int J Intell Eng Syst 12:50–58
Murtagh F, Contreras P (2017) Algorithms for hierarchical clustering: an overview, II. Wiley Interdiscip Rev Data Min Knowl Discov 7:e1219
Govender P, Sivakumar V (2020) Application of k-means and hierarchical clustering techniques for analysis of air pollution: a review (1980–2019). Atmos Pollut Res 11:40–56
Zhu H, You X, Liu S (2019) Multiple ant colony optimization based on pearson correlation coefficient. IEEE Access 7:61628–61638
Abdallah NR, Hasan TM, Shakir AC (2018) ECC based data retrieval using LoRaWAN technology. Int J Eng Technol 7:4918–4921
Padhya M, **wala DC (2019) MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data. Front Inf Technol Electron Eng 20:1717–1748
Kumar P, Kumar Bhatt A (2020) Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach. IET Commun 14:3212–3222
Farooq MJ, Zhu Q (2018) On the secure and reconfigurable multi-layer network design for critical information dissemination in the internet of battlefield things (IoBT). IEEE Trans Wirel Commun 17:2618–2632
Kalkan K, Altay L, Gür G, Alagöz F (2018) JESS: joint entropy-based DDoS defense scheme in SDN. IEEE J Sel Areas Commun 36:2358–2372
Xue K, Chen W, Li W, Hong J, Hong P (2018) Combining data owner-side and cloud-side access control for encrypted cloud storage. IEEE Trans Inf Forensics Secur 13:2062–2074
Reddy NCS, Madhuravani B, Sneha D (2020) An approach for efficient and secure data encryption scheme for spatial data. SN Comput Sci 1:1–6
Indira N, Rukmani Devi S, Kalpana A (2021) R2R-CSES: proactive security data process using random round crypto security encryption standard in cloud environment,". J Ambient Intell Human Comput 12:4643–4654
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Authors declare that there is no competing interest involved in the research work.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Swami, R., Das, P. A new secure data retrieval system based on ECDH and hierarchical clustering with Pearson correlation. Innovations Syst Softw Eng (2022). https://doi.org/10.1007/s11334-022-00515-w
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11334-022-00515-w