{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T03:10:15Z","timestamp":1741403415496,"version":"3.38.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T00:00:00Z","timestamp":1670284800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T00:00:00Z","timestamp":1670284800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Innovations Syst Softw Eng"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s11334-022-00515-w","type":"journal-article","created":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T08:04:03Z","timestamp":1670313843000},"page":"195-205","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A new secure data retrieval system based on ECDH and hierarchical clustering with Pearson correlation"],"prefix":"10.1007","volume":"21","author":[{"given":"Rosy","family":"Swami","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0026-8907","authenticated-orcid":false,"given":"Prodipto","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,6]]},"reference":[{"key":"515_CR1","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1002\/spe.2834","volume":"51","author":"N Krishnaraj","year":"2021","unstructured":"Krishnaraj N, Elhoseny M, Lydia EL, Shankar K, ALDabbas O (2021) An efficient radix trie-based semantic visual indexing model for large-scale image retrieval in cloud environment. Softw Pract Exp 51:489\u2013502","journal-title":"Softw Pract Exp"},{"key":"515_CR2","doi-asserted-by":"publisher","first-page":"2466","DOI":"10.3390\/en11092466","volume":"11","author":"R Lin","year":"2018","unstructured":"Lin R, Wu B, Su Y (2018) An adaptive weighted pearson similarity measurement method for load curve clustering. Energies 11:2466","journal-title":"Energies"},{"key":"515_CR3","first-page":"17","volume":"5","author":"CM Mohammed","year":"2021","unstructured":"Mohammed CM, Zebaree SR (2021) Sufficient comparison among cloud computing services: IaaS, PaaS, and SaaS: a review. Int J Sci Bus 5:17\u201330","journal-title":"Int J Sci Bus"},{"key":"515_CR4","first-page":"184","volume":"10","author":"A Patil","year":"2018","unstructured":"Patil A (2018) Enhanced-elliptic curve Diffie Hellman algorithm for secure data storage in multi cloud environment. Int J Intell Eng Syst 10:184\u2013191","journal-title":"Int J Intell Eng Syst"},{"key":"515_CR5","first-page":"539","volume":"10","author":"A Indhuja","year":"2017","unstructured":"Indhuja A, Shaik RBMV, Sujatha P (2017) A multi-keyword ranked search scheme over encrypted based on hierarchical clustering index. Int J Smart Sens Intell Syst 10:539\u2013559","journal-title":"Int J Smart Sens Intell Syst"},{"key":"515_CR6","unstructured":"Saravanabhavan C, Gangalakshmi MT, Ashok P (2021) Preserving privacy using enhanced shadow honeypot algorithm for data retrieval in cloud computing. Des Eng 6166\u20136173"},{"key":"515_CR7","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-981-15-8685-9_32","volume-title":"Advances in systems, control and automations","author":"T DurgaNagarjuna","year":"2021","unstructured":"DurgaNagarjuna T, Anil Kumar T, Santha Sheela A (2021) Privacy preserving and loss data retrieval in cloud computing using bucket algorithm. In: Bhoi KA, Mallick PK (eds) Advances in systems, control and automations. Springer, Berlin, pp 307\u2013313"},{"key":"515_CR8","first-page":"64","volume":"18","author":"FS Ali","year":"2020","unstructured":"Ali FS, Saad HN, Sarhan FH, Naaeem B (2020) Enhance manet usability for encrypted data retrieval from cloud computing. Indones J Electr Eng Comput Sci 18:64\u201374","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"515_CR9","doi-asserted-by":"publisher","first-page":"3212","DOI":"10.1049\/iet-com.2020.0255","volume":"14","author":"P Kumar","year":"2020","unstructured":"Kumar P, Bhatt AK (2020) Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach. IET Commun 14:3212\u20133222","journal-title":"IET Commun"},{"key":"515_CR10","first-page":"403","volume":"17","author":"R Swami","year":"2020","unstructured":"Swami R, Das P (2020) An effective secure data retrieval approach using trust evaluation: HBSEE-CBC. Int J Inf Commun Technol 17:403\u2013421","journal-title":"Int J Inf Commun Technol"},{"key":"515_CR11","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1007\/s10586-020-03114-1","volume":"23","author":"DVK Vengala","year":"2020","unstructured":"Vengala DVK, Kavitha D, Kumar AS (2020) Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC. Clust Comput 23:1683\u20131696","journal-title":"Clust Comput"},{"key":"515_CR12","first-page":"50","volume":"12","author":"RK Yarava","year":"2019","unstructured":"Yarava RK, Singh RP (2019) Efficient and secure cloud storage auditing based on the DiffieHellman key exchange. Int J Intell Eng Syst 12:50\u201358","journal-title":"Int J Intell Eng Syst"},{"key":"515_CR13","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1219","volume":"7","author":"F Murtagh","year":"2017","unstructured":"Murtagh F, Contreras P (2017) Algorithms for hierarchical clustering: an overview, II. Wiley Interdiscip Rev Data Min Knowl Discov 7:e1219","journal-title":"Wiley Interdiscip Rev Data Min Knowl Discov"},{"key":"515_CR14","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.apr.2019.09.009","volume":"11","author":"P Govender","year":"2020","unstructured":"Govender P, Sivakumar V (2020) Application of k-means and hierarchical clustering techniques for analysis of air pollution: a review (1980\u20132019). Atmos Pollut Res 11:40\u201356","journal-title":"Atmos Pollut Res"},{"key":"515_CR15","doi-asserted-by":"publisher","first-page":"61628","DOI":"10.1109\/ACCESS.2019.2915673","volume":"7","author":"H Zhu","year":"2019","unstructured":"Zhu H, You X, Liu S (2019) Multiple ant colony optimization based on pearson correlation coefficient. IEEE Access 7:61628\u201361638","journal-title":"IEEE Access"},{"key":"515_CR16","first-page":"4918","volume":"7","author":"NR Abdallah","year":"2018","unstructured":"Abdallah NR, Hasan TM, Shakir AC (2018) ECC based data retrieval using LoRaWAN technology. Int J Eng Technol 7:4918\u20134921","journal-title":"Int J Eng Technol"},{"key":"515_CR17","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1631\/FITEE.1800192","volume":"20","author":"M Padhya","year":"2019","unstructured":"Padhya M, Jinwala DC (2019) MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data. Front Inf Technol Electron Eng 20:1717\u20131748","journal-title":"Front Inf Technol Electron Eng"},{"key":"515_CR18","doi-asserted-by":"publisher","first-page":"3212","DOI":"10.1049\/iet-com.2020.0255","volume":"14","author":"P Kumar","year":"2020","unstructured":"Kumar P, Kumar Bhatt A (2020) Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach. IET Commun 14:3212\u20133222","journal-title":"IET Commun"},{"key":"515_CR19","doi-asserted-by":"publisher","first-page":"2618","DOI":"10.1109\/TWC.2018.2799860","volume":"17","author":"MJ Farooq","year":"2018","unstructured":"Farooq MJ, Zhu Q (2018) On the secure and reconfigurable multi-layer network design for critical information dissemination in the internet of battlefield things (IoBT). IEEE Trans Wirel Commun 17:2618\u20132632","journal-title":"IEEE Trans Wirel Commun"},{"key":"515_CR20","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.1109\/JSAC.2018.2869997","volume":"36","author":"K Kalkan","year":"2018","unstructured":"Kalkan K, Altay L, G\u00fcr G, Alag\u00f6z F (2018) JESS: joint entropy-based DDoS defense scheme in SDN. IEEE J Sel Areas Commun 36:2358\u20132372","journal-title":"IEEE J Sel Areas Commun"},{"key":"515_CR21","doi-asserted-by":"publisher","first-page":"2062","DOI":"10.1109\/TIFS.2018.2809679","volume":"13","author":"K Xue","year":"2018","unstructured":"Xue K, Chen W, Li W, Hong J, Hong P (2018) Combining data owner-side and cloud-side access control for encrypted cloud storage. IEEE Trans Inf Forensics Secur 13:2062\u20132074","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"515_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-020-0095-8","volume":"1","author":"NCS Reddy","year":"2020","unstructured":"Reddy NCS, Madhuravani B, Sneha D (2020) An approach for efficient and secure data encryption scheme for spatial data. SN Comput Sci 1:1\u20136","journal-title":"SN Comput Sci"},{"key":"515_CR23","doi-asserted-by":"publisher","first-page":"4643","DOI":"10.1007\/s12652-020-01860-z","volume":"12","author":"N Indira","year":"2021","unstructured":"Indira N, Rukmani Devi S, Kalpana A (2021) R2R-CSES: proactive security data process using random round crypto security encryption standard in cloud environment,\". J Ambient Intell Human Comput 12:4643\u20134654","journal-title":"J Ambient Intell Human Comput"}],"container-title":["Innovations in Systems and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-022-00515-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11334-022-00515-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-022-00515-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T02:41:05Z","timestamp":1741401665000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11334-022-00515-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,6]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["515"],"URL":"https:\/\/doi.org\/10.1007\/s11334-022-00515-w","relation":{},"ISSN":["1614-5046","1614-5054"],"issn-type":[{"type":"print","value":"1614-5046"},{"type":"electronic","value":"1614-5054"}],"subject":[],"published":{"date-parts":[[2022,12,6]]},"assertion":[{"value":"24 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors declare that there is no competing interest involved in the research work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}