{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:49Z","timestamp":1740099169651,"version":"3.37.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000080"},{"type":"electronic","value":"9783030000097"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00009-7_52","type":"book-chapter","created":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T17:20:42Z","timestamp":1537464042000},"page":"578-588","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["An Architecture of Secure Health Information Storage System Based on Blockchain Technology"],"prefix":"10.1007","author":[{"given":"Huirui","family":"Han","sequence":"first","affiliation":[]},{"given":"Mengxing","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Uzair Aslam","family":"Bhatti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,21]]},"reference":[{"key":"52_CR1","unstructured":"WannaCry ransomware attack. https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack"},{"key":"52_CR2","unstructured":"Charles, D., Gabriel, M., Furukawa, M.: Adoption of electronic health record systems among U.S. non-federal acutecare hospitals: 2008-2012. ONC Data Brief, 9, 1\u20139 (2013)"},{"issue":"3","key":"52_CR3","doi-asserted-by":"crossref","first-page":"235","DOI":"10.3414\/ME9116","volume":"47","author":"D Weerasinghe","year":"2008","unstructured":"Weerasinghe, D., Rajarajan, M., Elmufti, K.: Patient privacy protection using anonymous access control techniques. Method. Inf. Med. 47(3), 235 (2008)","journal-title":"Method. Inf. Med."},{"key":"52_CR4","doi-asserted-by":"crossref","unstructured":"Tsai, W., Blower, R., Zhu, Y.: A system view of financial blockchains. In: Service-Oriented System Engineering, pp. 450\u2013457 (2016)","DOI":"10.1109\/SOSE.2016.66"},{"key":"52_CR5","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292\u20132303 (2016)","journal-title":"IEEE Access"},{"key":"52_CR6","unstructured":"Mainelli, M., Milne, A.: The Impact and Potential of Blockchain on Securities Transaction Lifecycle. Social Science Electronic Publishing (2016)"},{"key":"52_CR7","doi-asserted-by":"crossref","unstructured":"Do, H.G., Ng, W.K.: Blockchain-based system for secure data storage with private keyword search. In: IEEE Services, pp. 90\u201393(2017)","DOI":"10.1109\/SERVICES.2017.23"},{"issue":"10","key":"52_CR8","first-page":"1","volume":"40","author":"Y Xiao","year":"2016","unstructured":"Xiao, Y., Wang, H., Jin, D.: Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40(10), 1\u20138 (2016)","journal-title":"J. Med. Syst."},{"key":"52_CR9","unstructured":"Ekblaw, A., Azaria, A., Halamka, J., Lippman, A.: A case study for blockchain in healthcare: \u201cMedRec\u201d prototype for electronic health records and medical research data. In: Proceedings of the 2016 IEEE of International Conference on Open and Big Data, pp. 25\u201330 (2016)"},{"issue":"1","key":"52_CR10","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1093\/itnow\/bww017","volume":"58","author":"G Baxendale","year":"2016","unstructured":"Baxendale, G.: Can blockchain revolutionise EPRs? ITNow 58(1), 38\u201339 (2016)","journal-title":"ITNow"},{"issue":"5","key":"52_CR11","first-page":"481","volume":"45","author":"M Ying","year":"2017","unstructured":"Ying, M.: The utilizing blockchain-based method of the secure storage of medical records. J. Jiangxi Norm. Univ. 45(5), 481\u2013487 (2017)","journal-title":"J. Jiangxi Norm. Univ."},{"issue":"2","key":"52_CR12","doi-asserted-by":"crossref","first-page":"96","DOI":"10.3905\/jwm.2015.18.2.096","volume":"18","author":"DLK Chuen","year":"2015","unstructured":"Chuen, D.L.K.: Handbook of digital currency: bitcoin, innovation, financial instruments, and big data. J. Wealth Manag. 18(2), 96\u201397 (2015)","journal-title":"J. Wealth Manag."},{"key":"52_CR13","doi-asserted-by":"crossref","unstructured":"Chen, Z., Zhu, Y.: Personal archive service system using blockchain technology: case study, promising and challenging. In: IEEE International Conference on Ai & Mobile Services, pp. 93\u201399 (2017)","DOI":"10.1109\/AIMS.2017.31"},{"key":"52_CR14","unstructured":"Guegan, D.: Public Blockchain versus Private blockchain. Documents De Travail Du Centre Deconomie De La Sorbonne (2017)"},{"issue":"1","key":"52_CR15","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ecdsa). Int. J. Inf. Secur. 1(1), 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."},{"key":"52_CR16","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Consulted (2008)"},{"issue":"10","key":"52_CR17","doi-asserted-by":"crossref","first-page":"3441","DOI":"10.1007\/s11042-013-1829-6","volume":"74","author":"F Xhafa","year":"2015","unstructured":"Xhafa, F., Li, J., Zhao, G.: Designing cloud-based electronic health record system with attribute-based encryption. Multimed. Tools Appl. 74(10), 3441\u20133458 (2015)","journal-title":"Multimed. Tools Appl."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00009-7_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T09:46:59Z","timestamp":1571910419000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00009-7_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000080","9783030000097"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00009-7_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}