{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T05:23:50Z","timestamp":1744089830100},"reference-count":38,"publisher":"Wiley","issue":"9","license":[{"start":{"date-parts":[[2022,4,10]],"date-time":"2022-04-10T00:00:00Z","timestamp":1649548800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972094"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Trans Emerging Tel Tech"],"published-print":{"date-parts":[[2022,9]]},"abstract":"Abstract<\/jats:title>Electronic health record (EHR) allows patients to use an open channel (ie, Internet) to control, share and manage their health records among family members, healthcare providers and other third party data users. Thus, in such an environment, privacy, confidentiality, and data consistency are the major challenges. Although cloud\u2010based EHR addresses the aforementioned discussions, these are prone to various malicious attacks, trust management and non\u2010repudiation among servers. Recently, due to the property of immutability, blockchain technology has been introduced to be as an auspicious solution for achieving EHR sharing with privacy and security preservation. Motivated by the above debates, we present BFHS, a blockchain\u2010based fine\u2010grained secure EHR sharing mechanism. On BFHS, we encrypt the EHR using ciphertext\u2010policy attribute\u2010based encryption (CP\u2010ABE) and upload it to the interplanetary file system (IPFS) for storage, while the matching index is encrypted via proxy re\u2010encryption and kept in a medical consortium blockchain. In addition, we created a credit assessment mechanism and incorporated it into the smart contract. Smart contracts, proxy re\u2010encryption, a credit evaluation mechanism, and IPFS all work together to give patients with a trustworthy EHR sharing environment and a dynamic access control interface. The thorough comparison and experimental analysis show that the proposed BFHS has more comprehensive security features and is more practicable.<\/jats:p>","DOI":"10.1002\/ett.4510","type":"journal-article","created":{"date-parts":[[2022,4,11]],"date-time":"2022-04-11T02:15:30Z","timestamp":1649643330000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A fine\u2010grained and secure health data sharing scheme based on blockchain"],"prefix":"10.1002","volume":"33","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-2856-2561","authenticated-orcid":false,"given":"Jiahao","family":"Chen","sequence":"first","affiliation":[{"name":"College of Information and Engineering Yangzhou University Yangzhou China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2045-0781","authenticated-orcid":false,"given":"Xinchun","family":"Yin","sequence":"additional","affiliation":[{"name":"College of Information and Engineering Yangzhou University Yangzhou China"},{"name":"College of Guangling Yangzhou University Yangzhou China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7165-398X","authenticated-orcid":false,"given":"Jianting","family":"Ning","sequence":"additional","affiliation":[{"name":"College of Computer and Cyberspace Security Fujian Normal University Fuzhou China"},{"name":"Institute of Information Engineering Chinese Academy of Sciences Beijing China"}]}],"member":"311","published-online":{"date-parts":[[2022,4,10]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1038\/nrg3208"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.3414\/ME10-01-0038"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.3103\/S0147688211040083"},{"issue":"5","key":"e_1_2_10_5_1","first-page":"35","article-title":"Application of cloud computing technologies in information technology of hospitals","volume":"24","author":"Hou J","year":"2016","journal-title":"Electron Des Eng"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2857205"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.027"},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994581"},{"issue":"4","key":"e_1_2_10_9_1","first-page":"1","article-title":"Survey on blockchain technology and its application prospect","volume":"44","author":"He P","year":"2017","journal-title":"Comput Sci"},{"key":"e_1_2_10_10_1","doi-asserted-by":"crossref","unstructured":"VujicicD JagodicD RandicS et al.Blockchain technology bitcoin and ethereum: a brief overview. In: Proceedings of the 17th International Symposium INFOTEH\u2010JAHORINA; 2018:1\u20106.","DOI":"10.1109\/INFOTEH.2018.8345547"},{"issue":"8","key":"e_1_2_10_11_1","first-page":"1042","article-title":"Bitcoin: a peer\u2010to\u2010peer electronic cash system","volume":"75","author":"Nakamoto S","year":"2009","journal-title":"Consulted"},{"issue":"5","key":"e_1_2_10_12_1","first-page":"113050","article-title":"Blockchain based solutions to secure IoT: background, integration trends and a way forward","volume":"181","author":"Saxena S","year":"2021","journal-title":"J Network Comput Appl"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02445-6"},{"issue":"9","key":"e_1_2_10_14_1","first-page":"106897","article-title":"Untangling blockchain technology: a survey on state of the art, security threats, privacy services, applications and future research directions","volume":"90","author":"Bhushan B","year":"2020","journal-title":"Comput Electric Eng"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2961932"},{"key":"e_1_2_10_16_1","first-page":"102590","article-title":"A secure blockchain\u2010based e\u2010health records storage and sharing scheme","volume":"55","author":"Shamshad S","year":"2020","journal-title":"J Inform Secur Appl"},{"key":"e_1_2_10_17_1","first-page":"1133","volume-title":"A Context\u2010aware Security Model for a Combination of Attribute\u2010based Access Control and Attribute\u2010based Encryption in the Healthcare Domain","author":"Psarra E","year":"2020"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2730843"},{"issue":"5","key":"e_1_2_10_19_1","doi-asserted-by":"crossref","first-page":"e4010","DOI":"10.1002\/ett.4010","article-title":"A data privacy protection scheme for internet of things based on blockchain","volume":"32","author":"Gong J","year":"2020","journal-title":"Trans Emerg Telecommun Technol"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0993-7"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3085405"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0995-5"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9061207"},{"key":"e_1_2_10_24_1","doi-asserted-by":"crossref","unstructured":"AzariaA EkblawA VieriaT.MedRec: using blockchain for medical data access and permission management. In: International Conference on Open & Big Data; 2016:22\u201024.","DOI":"10.1109\/OBD.2016.11"},{"key":"e_1_2_10_25_1","doi-asserted-by":"crossref","unstructured":"WuS Du J.Electronic medical record security sharing model based on blockchain. In: 3rd International Conference on Cryptography Security and Privacy; 2019:19\u201021.","DOI":"10.1145\/3309074.3309079"},{"issue":"8","key":"e_1_2_10_26_1","first-page":"1495","article-title":"Medical chain: alliance medical blockchain system","volume":"45","author":"Zhang C","year":"2020","journal-title":"Acta Automat Sin"},{"issue":"1","key":"e_1_2_10_27_1","first-page":"157","article-title":"Blockchain\u2010based electronic health record sharing scheme","volume":"40","author":"Luo W","year":"2020","journal-title":"J Comput Appl"},{"key":"e_1_2_10_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"issue":"3","key":"e_1_2_10_29_1","first-page":"153","article-title":"Blockchain revolution: how the technology behind bitcoin is changing money business and the world","volume":"9","author":"Tapscott D","year":"2018","journal-title":"Voprosy Ekonomiki"},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3030063"},{"key":"e_1_2_10_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.023"},{"issue":"6","key":"e_1_2_10_32_1","first-page":"134","article-title":"Feasibility of proof of authority as a consensus protocol model","volume":"12","author":"Joshi S","year":"2021","journal-title":"Cryptogr Secur"},{"key":"e_1_2_10_33_1","unstructured":"AngelisS AnielloL BaldoniR et al.PBFT vs proof\u2010of\u2010authority: applying the CAP theorem to permissioned blockchain. In: Italian Conference on Cybersecurity; 2017."},{"key":"e_1_2_10_34_1","first-page":"457","article-title":"Fuzzy identity\u2010based encryption","volume":"3494","author":"Sahai A","year":"2005","journal-title":"Int Conf Theory Appl Cryptogr Tech"},{"key":"e_1_2_10_35_1","doi-asserted-by":"crossref","unstructured":"GoyalV PandeyO SahaiA et al. Attribute\u2010based encryption for fine\u2010grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security; 2006:89\u201098.","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_2_10_36_1","doi-asserted-by":"crossref","unstructured":"BethencourtJ SahaiA WatersB.Ciphertext\u2010policy attribute\u2010based encryption. In: IEEE Symposium on Security & Privacy; 2007:321\u2010334.","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_2_10_37_1","doi-asserted-by":"crossref","unstructured":"RouselakisY WatersB.Practical constructions and new proof methods for large universe attribute\u2010based encryption. In: Proceedings of the 2013 ACM Conference on Computer and Communications Security; 2013:463\u2010474.","DOI":"10.1145\/2508859.2516672"},{"key":"e_1_2_10_38_1","doi-asserted-by":"publisher","DOI":"10.2991\/ijndc.k.210527.001"},{"key":"e_1_2_10_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2021.02.022"}],"container-title":["Transactions on Emerging Telecommunications Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.4510","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/ett.4510","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.4510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T21:17:04Z","timestamp":1700428624000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.4510"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,10]]},"references-count":38,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["10.1002\/ett.4510"],"URL":"https:\/\/doi.org\/10.1002\/ett.4510","archive":["Portico"],"relation":{},"ISSN":["2161-3915","2161-3915"],"issn-type":[{"value":"2161-3915","type":"print"},{"value":"2161-3915","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,10]]},"assertion":[{"value":"2021-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-03-24","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-04-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}