{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:11:25Z","timestamp":1774631485554,"version":"3.50.1"},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001427","name":"All India Council for Technical Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001427","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018333","name":"Tamilnadu State Council For Science And Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018333","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Data &amp; Knowledge Engineering"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1016\/j.datak.2025.102512","type":"journal-article","created":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T11:45:32Z","timestamp":1758023132000},"page":"102512","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Secure data storage in multi-cloud environments using lattice-based saber with Diffie-Hellman cryptography and authentication based on PUF-ECC"],"prefix":"10.1016","volume":"161","author":[{"given":"R.","family":"Iyswarya","sequence":"first","affiliation":[]},{"given":"R.","family":"Anitha","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.datak.2025.102512_bib0001","first-page":"18","article-title":"A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions","volume":"2","author":"Thabit","year":"2021","journal-title":"Int. J. Intell. Networks"},{"key":"10.1016\/j.datak.2025.102512_bib0002","series-title":"2021 Big Data, Knowledge and Control Systems Engineering (BdKCSE)","first-page":"1","article-title":"A hybrid framework to improve data security in cloud computing","author":"Tutubala","year":"2021"},{"issue":"3","key":"10.1016\/j.datak.2025.102512_bib0003","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.3390\/s22031109","article-title":"A dynamic four-step data security model for data in cloud computing based on cryptography and steganography","volume":"22","author":"Adee","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.datak.2025.102512_bib0004","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1016\/j.future.2019.06.026","article-title":"A cloud-edge based data security architecture for sharing and analysing cyber threat information","volume":"102","author":"Chadwick","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"10.1016\/j.datak.2025.102512_bib0005","doi-asserted-by":"crossref","first-page":"2413","DOI":"10.1007\/s11277-022-09666-2","article-title":"Multi-data multi-user end to end encryption for electronic health records data security in cloud","volume":"125","author":"Raj","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.datak.2025.102512_bib0006","series-title":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC)","first-page":"60","article-title":"IoT system accomplishment using blockchain in validating and data security with cloud","author":"Doss","year":"2020"},{"key":"10.1016\/j.datak.2025.102512_bib0007","series-title":"2020 international conference on power electronics & IoT applications in renewable energy and its control (PARC)","first-page":"514","article-title":"A new approach for security in cloud data storage for IOT applications using hybrid cryptography technique","author":"Kumar","year":"2020"},{"issue":"6","key":"10.1016\/j.datak.2025.102512_bib0008","doi-asserted-by":"crossref","first-page":"6141","DOI":"10.1007\/s12652-020-02184-8","article-title":"Retracted article: a multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment","volume":"12","author":"Joseph","year":"2021","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"2","key":"10.1016\/j.datak.2025.102512_bib32","first-page":"76","article-title":"TDP: A Novel Secure and Energy Aware Routing Protocol for Wireless Sensor Networks","volume":"11","author":"Karthick","year":"2018","journal-title":"Int. J. Intell. Eng. Syst."},{"issue":"7","key":"10.1016\/j.datak.2025.102512_bib0009","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1016\/j.jksuci.2019.05.007","article-title":"Reconsidering big data security and privacy in cloud and mobile cloud systems","volume":"33","author":"Lo'ai","year":"2021","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"10.1016\/j.datak.2025.102512_bib0010","article-title":"A new lightweight data security system for data security in the cloud computing","volume":"29","author":"Mohammed","year":"2023","journal-title":"Measurem.: Sensors"},{"key":"10.1016\/j.datak.2025.102512_bib0011","doi-asserted-by":"crossref","first-page":"138245","DOI":"10.1109\/ACCESS.2021.3115238","article-title":"Linear elliptical curve digital signature (LECDS) with blockchain approach for enhanced security on cloud server","volume":"9","author":"Sowmiya","year":"2021","journal-title":"IEEe Access."},{"issue":"1","key":"10.1016\/j.datak.2025.102512_bib0012","article-title":"Privacy data security policy of medical cloud platform based on lightweight Algorithm model","volume":"2021","author":"Liu","year":"2021","journal-title":"Sci. Program."},{"issue":"1","key":"10.1016\/j.datak.2025.102512_bib0013","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.gltp.2021.01.013","article-title":"A new lightweight cryptographic algorithm for enhancing data security in cloud computing","volume":"2","author":"Thabit","year":"2021","journal-title":"Global Trans. Proceed."},{"issue":"3","key":"10.1016\/j.datak.2025.102512_bib0014","first-page":"279","article-title":"Enhancement of quantum key distribution protocol for data security in cloud environment","volume":"11","author":"Jassem","year":"2020","journal-title":"Icic Int."},{"key":"10.1016\/j.datak.2025.102512_bib0015","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1016\/j.comcom.2019.12.041","article-title":"Towards DNA based data security in the cloud computing environment","volume":"151","author":"Namasudra","year":"2020","journal-title":"Comput. Commun."},{"issue":"2","key":"10.1016\/j.datak.2025.102512_bib0016","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1007\/s10586-020-03157-4","article-title":"CryptoGA: a cryptosystem based on genetic algorithm for cloud data security","volume":"24","author":"Tahir","year":"2021","journal-title":"Cluster. Comput."},{"issue":"6","key":"10.1016\/j.datak.2025.102512_bib0017","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1016\/j.jksuci.2020.05.005","article-title":"A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment","volume":"34","author":"Narayanan","year":"2022","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"10.1016\/j.datak.2025.102512_bib0018","first-page":"639","article-title":"An enhancement of data security in cloud computing with an implementation of a two-level cryptographic technique, using AES and ECC algorithm","volume":"9","author":"Hodowu","year":"2020","journal-title":"Int. J. Eng. Res. Technol"},{"issue":"3-4","key":"10.1016\/j.datak.2025.102512_bib0019","first-page":"322","article-title":"HHDSSC: Harnessing healthcare data security in cloud using ciphertext policy attribute-based encryption","volume":"13","author":"Ramesh","year":"2020","journal-title":"Int. J. Inf. Comput. Security"},{"issue":"10","key":"10.1016\/j.datak.2025.102512_bib0020","doi-asserted-by":"crossref","first-page":"6543","DOI":"10.1109\/TII.2020.2966069","article-title":"Secure data storage and recovery in industrial blockchain network environments","volume":"16","author":"Liang","year":"2020","journal-title":"IEEe Trans. Industr. Inform."},{"key":"10.1016\/j.datak.2025.102512_bib0027","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13673-020-00224-y","article-title":"Ensuring user authentication and data integrity in multi-cloud environment","volume":"10","author":"Megouache","year":"2020","journal-title":"Human-centric Comput. Inf. Sci."},{"key":"10.1016\/j.datak.2025.102512_bib0028","doi-asserted-by":"crossref","first-page":"1117","DOI":"10.1007\/s12065-020-00555-w","article-title":"An improved security and privacy management system for data in multi-cloud environments using a hybrid approach","volume":"14","author":"Pachala","year":"2021","journal-title":"Evol. Intell."},{"key":"10.1016\/j.datak.2025.102512_bib0021","doi-asserted-by":"crossref","unstructured":"Cambou, B., Gowanlock, M., Yildiz, B., Ghanaimiandoab, D., Lee, K., Nelson, S., \u2026 & Stenberg, A. (2021). Key Distribution for Post Quantum Cryptography using Physical Unclonable Functions.","DOI":"10.20944\/preprints202102.0336.v1"},{"issue":"6","key":"10.1016\/j.datak.2025.102512_bib0022","doi-asserted-by":"crossref","first-page":"2801","DOI":"10.3390\/app11062801","article-title":"Post quantum cryptographic keys generated with physical unclonable functions","volume":"11","author":"Cambou","year":"2021","journal-title":"Appl. Sci."},{"issue":"2","key":"10.1016\/j.datak.2025.102512_bib0023","doi-asserted-by":"crossref","first-page":"984","DOI":"10.1016\/j.ifacol.2023.10.1693","article-title":"Koopman interpretation and analysis of a public-key cryptosystem: Diffie-Hellman key exchange","volume":"56","author":"Schlor","year":"2023","journal-title":"IFAC-PapersOnLine"},{"key":"10.1016\/j.datak.2025.102512_bib0024","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/j.future.2017.02.013","article-title":"A new content-defined chunking algorithm for data deduplication in cloud storage","volume":"71","author":"X`XWidodo","year":"2017","journal-title":"Future Gener. Computer Systems"},{"key":"10.1016\/j.datak.2025.102512_bib0026","unstructured":"Andrewbaum, \"Binary Classification of Fire Alarm Data\", 2023, (https:\/\/www.kaggle.com\/code\/andrewbaum\/binary-classification-of-fire-alarm-data\/notebook), Accessed by: 20-03-2024."},{"key":"10.1016\/j.datak.2025.102512_bib0025","first-page":"1","article-title":"GOOSE algorithm: A powerful optimization tool for real-world engineering challenges and beyond","author":"Hamad","year":"2024","journal-title":"Evolv. Syst."},{"issue":"1","key":"10.1016\/j.datak.2025.102512_bib0029","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1186\/s13677-023-00464-0","article-title":"An ECC-based mutual data access control protocol for next-generation public cloud","volume":"12","author":"Khan","year":"2023","journal-title":"J. Cloud Comput."},{"issue":"2","key":"10.1016\/j.datak.2025.102512_bib0030","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1007\/s12065-020-00404-w","article-title":"Hybrid encryption framework for securing big data storage in multi-cloud environment","volume":"14","author":"Viswanath","year":"2021","journal-title":"Evol. Intell."},{"key":"10.1016\/j.datak.2025.102512_bib0031","first-page":"1","article-title":"An efficient technique for securing a multi-cloud storage environment","author":"Karnik","year":"2025","journal-title":"Int. J. Syst. Assur. Eng. Manag."}],"container-title":["Data &amp; Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X25001077?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X25001077?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T03:17:12Z","timestamp":1772853432000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0169023X25001077"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":32,"alternative-id":["S0169023X25001077"],"URL":"https:\/\/doi.org\/10.1016\/j.datak.2025.102512","relation":{},"ISSN":["0169-023X"],"issn-type":[{"value":"0169-023X","type":"print"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Secure data storage in multi-cloud environments using lattice-based saber with Diffie-Hellman cryptography and authentication based on PUF-ECC","name":"articletitle","label":"Article Title"},{"value":"Data & Knowledge Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.datak.2025.102512","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"102512"}}