Log in

A new secure data retrieval system based on ECDH and hierarchical clustering with Pearson correlation

  • S.i. : Low Resource Machine Learning Algorithms (lr-mla)
  • Published:
Innovations in Systems and Software Engineering Aims and scope Submit manuscript

Abstract

Data retrieval is termed as the process of identification and extraction of appropriate data from a database management system as per the query provided by an application or user. In recent days, great concern is provided to data security that draws considerable research in the field of cloud computing. Particularly, cryptographic primitives for ensuring data security are adopted with prompt optimization of the existing algorithms. Prevailing cryptographic methods transfer huge data to be unintelligible leading to a major challenge in secured and efficient data retrieval. Therefore, there is a need for effective data retrieval system for transferring the data from owner to user. In that case, this paper aims to develop an efficient data retrieval system thereby accessing a reliable and secured data transfer system between the data owner and data user. For this purpose, this research utilized the advantages of the elliptic-curve Diffie–Hellman algorithm to generate encryption and decryption keys. Meanwhile, the proposed hierarchical clustering based on the Pearson correlation coefficient is employed for data segregation and extraction in accordance with the query. Here, the Pearson correlation coefficient is used for computing the distance matrix that allows the hierarchical clustering method to overcome the prevailing limitations such as computational and time complexity. Finally, the proposed data retrieval system outshines the state-of-the-art method in terms of range query processing time (17.4 ms) and key generation time (encryption time and decryption time as 17.4 ms and 13.2 ms).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability statement

Data sharing is not applicable to this article as no new data were created or analysed in this study.

References

  1. Krishnaraj N, Elhoseny M, Lydia EL, Shankar K, ALDabbas O (2021) An efficient radix trie-based semantic visual indexing model for large-scale image retrieval in cloud environment. Softw Pract Exp 51:489–502

    Article  Google Scholar 

  2. Lin R, Wu B, Su Y (2018) An adaptive weighted pearson similarity measurement method for load curve clustering. Energies 11:2466

    Article  Google Scholar 

  3. Mohammed CM, Zebaree SR (2021) Sufficient comparison among cloud computing services: IaaS, PaaS, and SaaS: a review. Int J Sci Bus 5:17–30

    Google Scholar 

  4. Patil A (2018) Enhanced-elliptic curve Diffie Hellman algorithm for secure data storage in multi cloud environment. Int J Intell Eng Syst 10:184–191

    Google Scholar 

  5. Indhuja A, Shaik RBMV, Sujatha P (2017) A multi-keyword ranked search scheme over encrypted based on hierarchical clustering index. Int J Smart Sens Intell Syst 10:539–559

    Google Scholar 

  6. Saravanabhavan C, Gangalakshmi MT, Ashok P (2021) Preserving privacy using enhanced shadow honeypot algorithm for data retrieval in cloud computing. Des Eng 6166–6173

  7. DurgaNagarjuna T, Anil Kumar T, Santha Sheela A (2021) Privacy preserving and loss data retrieval in cloud computing using bucket algorithm. In: Bhoi KA, Mallick PK (eds) Advances in systems, control and automations. Springer, Berlin, pp 307–313

    Chapter  Google Scholar 

  8. Ali FS, Saad HN, Sarhan FH, Naaeem B (2020) Enhance manet usability for encrypted data retrieval from cloud computing. Indones J Electr Eng Comput Sci 18:64–74

    Google Scholar 

  9. Kumar P, Bhatt AK (2020) Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach. IET Commun 14:3212–3222

    Article  Google Scholar 

  10. Swami R, Das P (2020) An effective secure data retrieval approach using trust evaluation: HBSEE-CBC. Int J Inf Commun Technol 17:403–421

    Google Scholar 

  11. Vengala DVK, Kavitha D, Kumar AS (2020) Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC. Clust Comput 23:1683–1696

    Article  Google Scholar 

  12. Yarava RK, Singh RP (2019) Efficient and secure cloud storage auditing based on the DiffieHellman key exchange. Int J Intell Eng Syst 12:50–58

    Google Scholar 

  13. Murtagh F, Contreras P (2017) Algorithms for hierarchical clustering: an overview, II. Wiley Interdiscip Rev Data Min Knowl Discov 7:e1219

    Article  Google Scholar 

  14. Govender P, Sivakumar V (2020) Application of k-means and hierarchical clustering techniques for analysis of air pollution: a review (1980–2019). Atmos Pollut Res 11:40–56

    Article  Google Scholar 

  15. Zhu H, You X, Liu S (2019) Multiple ant colony optimization based on pearson correlation coefficient. IEEE Access 7:61628–61638

    Article  Google Scholar 

  16. Abdallah NR, Hasan TM, Shakir AC (2018) ECC based data retrieval using LoRaWAN technology. Int J Eng Technol 7:4918–4921

    Article  Google Scholar 

  17. Padhya M, **wala DC (2019) MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data. Front Inf Technol Electron Eng 20:1717–1748

    Article  Google Scholar 

  18. Kumar P, Kumar Bhatt A (2020) Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach. IET Commun 14:3212–3222

    Article  Google Scholar 

  19. Farooq MJ, Zhu Q (2018) On the secure and reconfigurable multi-layer network design for critical information dissemination in the internet of battlefield things (IoBT). IEEE Trans Wirel Commun 17:2618–2632

    Article  Google Scholar 

  20. Kalkan K, Altay L, Gür G, Alagöz F (2018) JESS: joint entropy-based DDoS defense scheme in SDN. IEEE J Sel Areas Commun 36:2358–2372

    Article  Google Scholar 

  21. Xue K, Chen W, Li W, Hong J, Hong P (2018) Combining data owner-side and cloud-side access control for encrypted cloud storage. IEEE Trans Inf Forensics Secur 13:2062–2074

    Article  Google Scholar 

  22. Reddy NCS, Madhuravani B, Sneha D (2020) An approach for efficient and secure data encryption scheme for spatial data. SN Comput Sci 1:1–6

    Article  Google Scholar 

  23. Indira N, Rukmani Devi S, Kalpana A (2021) R2R-CSES: proactive security data process using random round crypto security encryption standard in cloud environment,". J Ambient Intell Human Comput 12:4643–4654

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prodipto Das.

Ethics declarations

Conflict of interest

Authors declare that there is no competing interest involved in the research work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Swami, R., Das, P. A new secure data retrieval system based on ECDH and hierarchical clustering with Pearson correlation. Innovations Syst Softw Eng (2022). https://doi.org/10.1007/s11334-022-00515-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11334-022-00515-w

Keywords

Navigation