{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T15:54:31Z","timestamp":1726502071944},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T00:00:00Z","timestamp":1686268800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T00:00:00Z","timestamp":1686268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10586-023-04038-2","type":"journal-article","created":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T09:02:15Z","timestamp":1686301335000},"page":"1047-1061","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS"],"prefix":"10.1007","volume":"27","author":[{"given":"Jasleen","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Rinkle","family":"Rani","sequence":"additional","affiliation":[]},{"given":"Nidhi","family":"Kalra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,9]]},"reference":[{"key":"4038_CR1","first-page":"1","volume":"35","author":"J Henry","year":"2016","unstructured":"Henry, J., Pylypchuk, Y., Searcy, T., Patel, V.: Adoption of electronic health record systems among U.S. non-federal acute care hospitals: 2008\u20132015. ONC Data Brief 35, 1\u20139 (2016)","journal-title":"ONC Data Brief"},{"key":"4038_CR2","unstructured":"National trends in hospital and physician adoption of electronic health records: (2021). https:\/\/www.healthit.gov\/data\/quickstats\/national-trends-hospital-and-physician-adoption-electronic-health-records"},{"issue":"5","key":"4038_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.83","volume":"2","author":"A Saha","year":"2019","unstructured":"Saha, A., Amin, R., Kunal, S., Vollala, S., Dwivedi, S.K.: Review on blockchain technology based medical healthcare system with privacy issues. Secur. Priv. 2(5), e83 (2019). https:\/\/doi.org\/10.1002\/spy2.83","journal-title":"Secur. Priv."},{"key":"4038_CR4","unstructured":"Healthcare-data-breach-report. HIPAA Journal. (2020). https:\/\/www.hipaajournal.com\/july-2020-healthcare-data-breach-report\/"},{"key":"4038_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4507","author":"J Kaur","year":"2022","unstructured":"Kaur, J., Rani, R., Kalra, N.: A blockchain-based framework for privacy preservation of electronic health records (EHRS). Trans. Emerg. Telecommun. Technol. (2022). https:\/\/doi.org\/10.1002\/ett.4507","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"5","key":"4038_CR6","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1007\/s11227-014-1253-3","volume":"71","author":"F Xhafa","year":"2015","unstructured":"Xhafa, F., Feng, J., Zhang, Y., Chen, X., Li, J.: Privacy-aware attribute-based PHR sharing with user accountability in cloud computing. J. Supercomput. 71(5), 1607\u20131619 (2015). https:\/\/doi.org\/10.1007\/s11227-014-1253-3","journal-title":"J. Supercomput."},{"issue":"8","key":"4038_CR7","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2494","volume":"15","author":"JJ Rodrigues","year":"2013","unstructured":"Rodrigues, J.J., de la Torre, I., Fern\u00e1ndez, G., L\u00f3pez-Coronado, M., et al.: Analysis of the security and privacy requirements of cloud-based electronic health records systems. J. Med. Internet Res. 15(8), e2494 (2013). https:\/\/doi.org\/10.2196\/jmir.2494","journal-title":"J. Med. Internet Res."},{"key":"4038_CR8","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology-EUROCRYPT 2005. EUROCRYPT 2005. Lecture Notes in Computer Science","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) Advances in Cryptology-EUROCRYPT 2005. EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 457\u2013473. Springer, Berlin (2005). https:\/\/doi.org\/10.1007\/11426639_27"},{"key":"4038_CR9","doi-asserted-by":"publisher","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security, Alexandria Virginia, pp. 89\u201398. (2006). https:\/\/doi.org\/10.1145\/1180405.1180418","DOI":"10.1145\/1180405.1180418"},{"issue":"4","key":"4038_CR10","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1007\/s11036-020-01551-1","volume":"25","author":"A Mubarakali","year":"2020","unstructured":"Mubarakali, A.: Healthcare services monitoring in cloud using secure and robust healthcare-based blockchain (SRHB) approach. Mobile Netw. Appl. 25(4), 1330\u20131337 (2020). https:\/\/doi.org\/10.1007\/s11036-020-01551-1","journal-title":"Mobile Netw. Appl."},{"issue":"1","key":"4038_CR11","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131\u2013143 (2013). https:\/\/doi.org\/10.1109\/TPDS.2012.97","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"4038_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1102-3","author":"H Hong","year":"2018","unstructured":"Hong, H., Liu, X., Sun, Z.: A fine-grained attribute based data retrieval with proxy re-encryption scheme for data outsourcing systems. Mob. Netw. Appl. (2018). https:\/\/doi.org\/10.1007\/s11036-018-1102-3","journal-title":"Mob. Netw. Appl."},{"key":"4038_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03625-z","author":"S Makani","year":"2022","unstructured":"Makani, S., Pittala, R., Alsayed, E., Aloqaily, M., Jararweh, Y.: A survey of blockchain applications in sustainable and smart cities. Clust. Comput. (2022). https:\/\/doi.org\/10.1007\/s10586-022-03625-z","journal-title":"Clust. Comput."},{"key":"4038_CR14","unstructured":"Buterin, V.: A next-generation smart contract and decentralized application platform. https:\/\/ethereum.org\/en\/whitepaper\/ (2014). Accessed 2 Aug 2021"},{"issue":"7","key":"4038_CR15","first-page":"1449","volume":"40","author":"W She","year":"2019","unstructured":"She, W., et al.: New blockchain technology for medical big data security sharing. J. Chin. Comput. Syst 40(7), 1449\u20131454 (2019). (http:\/\/xwxt.sict.ac.cn\/EN\/abstract\/abstract5022.shtml)","journal-title":"J. Chin. Comput. Syst"},{"key":"4038_CR16","unstructured":"Simplyvital health: https:\/\/www.f6s.com\/simply vitalhealth (2020). Accessed 15 Sept 2021"},{"key":"4038_CR17","unstructured":"Koepsell, D.: The future of genomic data encryption. https:\/\/encrypgen.com\/ (2020). Accessed 15 Sept 2021"},{"key":"4038_CR18","doi-asserted-by":"publisher","unstructured":"Vora, J. et\u00a0al.: Bheem: A blockchain-based framework for securing electronic health records. In Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps) 1\u20136. (2018). https:\/\/doi.org\/10.1109\/GLOCOMW.2018.8644088","DOI":"10.1109\/GLOCOMW.2018.8644088"},{"key":"4038_CR19","doi-asserted-by":"publisher","first-page":"147782","DOI":"10.1109\/ACCESS.2019.2946373","volume":"7","author":"A Shahnaz","year":"2019","unstructured":"Shahnaz, A., Qamar, U., Khalid, A.: Using blockchain for electronic health records. IEEE Access 7, 147782\u2013147795 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2946373","journal-title":"IEEE Access"},{"key":"4038_CR20","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8315614","author":"TT Thwin","year":"2019","unstructured":"Thwin, T.T., Vasupongayya, S.: Blockchain-based access control model to preserve privacy for personal health record systems. Secur. Commun. Netw. (2019). https:\/\/doi.org\/10.1155\/2019\/8315614","journal-title":"Secur. Commun. Netw."},{"key":"4038_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103540","volume":"80","author":"N Saravanan","year":"2021","unstructured":"Saravanan, N., Umamakeswari, A.: HAP-CP-ABE based encryption technique with hashed access policy based authentication scheme for privacy preserving of phr. Microprocess. Microsyst. 80, 103540 (2021). https:\/\/doi.org\/10.1016\/j.micpro.2020.103540","journal-title":"Microprocess. Microsyst."},{"issue":"21","key":"4038_CR22","doi-asserted-by":"publisher","first-page":"9999","DOI":"10.3390\/app11219999","volume":"11","author":"A Ali","year":"2021","unstructured":"Ali, A., et al.: A novel secure blockchain framework for accessing electronic health records using multiple certificate authority. Appl. Sci. 11(21), 9999 (2021). https:\/\/doi.org\/10.3390\/app11219999","journal-title":"Appl. Sci."},{"issue":"5","key":"4038_CR23","doi-asserted-by":"publisher","first-page":"2755","DOI":"10.1109\/TSC.2021.3078119","volume":"15","author":"F Li","year":"2022","unstructured":"Li, F., Liu, K., Zhang, L., Huang, S., Wu, Q.: Ehrchain: a blockchain-based EHR system using attribute-based and homomorphic cryptosystem. IEEE Trans. Serv. Comput. 15(5), 2755\u20132765 (2022). https:\/\/doi.org\/10.1109\/TSC.2021.3078119","journal-title":"IEEE Trans. Serv. Comput."},{"key":"4038_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-04179-4","author":"P Sharma","year":"2022","unstructured":"Sharma, P., Jindal, R., Borah, M.D.: Blockchain-based cloud storage system with CP-ABE-based access control and revocation process. J. Supercomput. (2022). https:\/\/doi.org\/10.1007\/s11227-021-04179-4","journal-title":"J. Supercomput."},{"issue":"2","key":"4038_CR25","doi-asserted-by":"publisher","first-page":"572","DOI":"10.3390\/s22020572","volume":"22","author":"A Ali","year":"2022","unstructured":"Ali, A., et al.: An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network. Sensors 22(2), 572 (2022). https:\/\/doi.org\/10.3390\/s22020572","journal-title":"Sensors"},{"issue":"16","key":"4038_CR26","doi-asserted-by":"publisher","first-page":"20","DOI":"10.3390\/electronics10162034","volume":"10","author":"A Ali","year":"2021","unstructured":"Ali, A., et al.: Security, privacy, and reliability in digital healthcare systems using blockchain. Electronics 10(16), 20\u201334 (2021). https:\/\/doi.org\/10.3390\/electronics10162034","journal-title":"Electronics"},{"key":"4038_CR27","first-page":"2365","volume":"13","author":"S Prathima","year":"2022","unstructured":"Prathima, S., Priya, C.: Improved CP-ABE based crypto technique to secure EHRS with access policy-based authentication schemes. J. Pharm. Negat. Results 13, 2365\u20132379 (2022)","journal-title":"J. Pharm. Negat. Results"},{"issue":"4","key":"4038_CR28","doi-asserted-by":"publisher","first-page":"1448","DOI":"10.3390\/s22041448","volume":"22","author":"MA Almaiah","year":"2022","unstructured":"Almaiah, M.A., Hajjej, F., Ali, A., Pasha, M.F., Almomani, O.: A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPS. Sensors 22(4), 1448 (2022). https:\/\/doi.org\/10.3390\/s22041448","journal-title":"Sensors"},{"issue":"6","key":"4038_CR29","doi-asserted-by":"publisher","first-page":"2112","DOI":"10.3390\/s22062112","volume":"22","author":"MA Almaiah","year":"2022","unstructured":"Almaiah, M.A., Ali, A., Hajjej, F., Pasha, M.F., Alohali, M.A.: A lightweight hybrid deep learning privacy-preserving model for FC-based industrial internet of medical things. Sensors 22(6), 2112 (2022). https:\/\/doi.org\/10.3390\/s22062112","journal-title":"Sensors"},{"key":"4038_CR30","unstructured":"Buterin, V.: What is ethereum? Ethereum official webpage. http:\/\/www.ethdocs.org\/en\/latest\/introduction\/what-is-ethereum.html (2020). Accessed 2 Aug 2021"},{"key":"4038_CR31","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. https:\/\/git.dhimmel.com\/bitcoin-whitepaper\/ (2020). Accessed 15 Sept 2020"},{"key":"4038_CR32","doi-asserted-by":"publisher","unstructured":"Zheng, Q., Li, Y., Chen, P., Dong, X.: An innovative IPFS-based storage model for blockchain. In: Proceedings of 2018 IEEE\/WIC\/ACM international conference on web intelligence (WI) pp. 704\u2013708 (2018). Santiago, Chile. https:\/\/doi.org\/10.1109\/WI.2018.000-8","DOI":"10.1109\/WI.2018.000-8"},{"key":"4038_CR33","doi-asserted-by":"publisher","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of 2007 IEEE symposium on security and privacy (SP \u201907), pp. 321\u2013334, (2007). Berkeley, CA, USA. https:\/\/doi.org\/10.1109\/SP.2007.11","DOI":"10.1109\/SP.2007.11"},{"issue":"2","key":"4038_CR34","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","volume":"3","author":"JA Akinyele","year":"2013","unstructured":"Akinyele, J.A., et al.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3(2), 111\u2013128 (2013). https:\/\/doi.org\/10.1007\/s13389-013-0057-3","journal-title":"J. Cryptogr. Eng."},{"key":"4038_CR35","unstructured":"Remix ide: https:\/\/remix-project.org\/ Accessed 2 Aug 2021"},{"key":"4038_CR36","unstructured":"Solidity. https:\/\/docs.soliditylang.org\/en\/v0.7.4\/. Accessed 15 Oct 2020"},{"key":"4038_CR37","doi-asserted-by":"publisher","unstructured":"Dika, A., Nowostawski, M.: Security vulnerabilities in ethereum smart contracts. In: 2018 IEEE international conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE Smart Data (SmartData), pp. 955\u2013962 (2018). Halifax, NS, Canada. https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00182","DOI":"10.1109\/Cybermatics_2018.2018.00182"},{"key":"4038_CR38","doi-asserted-by":"publisher","unstructured":"Luu, L., Chu, D.-H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp. 254\u2013269 (2016). Vienna, Austria. https:\/\/doi.org\/10.1145\/2976749.2978309","DOI":"10.1145\/2976749.2978309"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04038-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-023-04038-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04038-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,24]],"date-time":"2024-02-24T16:22:05Z","timestamp":1708791725000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-023-04038-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,9]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["4038"],"URL":"https:\/\/doi.org\/10.1007\/s10586-023-04038-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,9]]},"assertion":[{"value":"15 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}