{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T21:08:26Z","timestamp":1725916106646},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319696041"},{"type":"electronic","value":"9783319696058"}],"license":[{"start":{"date-parts":[[2017,11,12]],"date-time":"2017-11-12T00:00:00Z","timestamp":1510444800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-69605-8_10","type":"book-chapter","created":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T04:03:26Z","timestamp":1510373006000},"page":"102-110","source":"Crossref","is-referenced-by-count":0,"title":["Data Storage Protection of Community Medical Internet of Things"],"prefix":"10.1007","author":[{"given":"Ziyang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Fulong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Heping","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Junru","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,12]]},"reference":[{"key":"10_CR1","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-319-44350-8_15","volume-title":"Industrial IoT Technologies and Applications","author":"H Ye","year":"2016","unstructured":"Ye, H., Yang, J., Zhu, J., Zhang, Z., Huang, Y., Chen, F.: A secure privacy data transmission method for medical internet of things. In: Wan, J., Humar, I., Zhang, D. (eds.) Industrial IoT 2016. LNICSSITE, vol. 173, pp. 144\u2013154. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-44350-8_15"},{"issue":"15","key":"10_CR2","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"10_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1674-7_38","volume-title":"The Internet of Things","author":"CM Medaglia","year":"2010","unstructured":"Medaglia, C.M., Serbanati, A.: An overview of privacy and security issues in the internet of things. In: Giusto, D., Iera, A., Morabito, G., Atzori, L. (eds.) The Internet of Things. Springer, New York, NY (2010). \nhttps:\/\/doi.org\/10.1007\/978-1-4419-1674-7_38"},{"issue":"4","key":"10_CR4","first-page":"515","volume":"43","author":"L Mni","year":"2013","unstructured":"Mni, L., Zhang, Q., Tan, H.Y., et al.: Smart healthcare: from IoT to cloud computing. Sci. Sinica 43(4), 515\u2013528 (2013)","journal-title":"Sci. Sinica"},{"issue":"1","key":"10_CR5","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., et al.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 29\u201343 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"10_CR6","unstructured":"Vimercati, S., Foresti, S., Jajodia, S., et al.: Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Base, pp. 123\u2013134 (2007)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-642-14992-4_13","volume-title":"Financial Cryptography and Data Security","author":"S Kamara","year":"2010","unstructured":"Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb\u00e9, F. (eds.) FC 2010. LNCS, vol. 6054, pp. 136\u2013149. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-14992-4_13"},{"issue":"7","key":"10_CR8","first-page":"1146","volume":"48","author":"QH Hou","year":"2011","unstructured":"Hou, Q.H., Wu, Y.W., Zheng, W.M.: A method on protection of user data privacy in cloud storage platform. J. Comput. Res. Dev. 48(7), 1146\u20131154 (2011)","journal-title":"J. Comput. Res. Dev."},{"issue":"12","key":"10_CR9","doi-asserted-by":"crossref","first-page":"2391","DOI":"10.3724\/SP.J.1016.2011.02391","volume":"34","author":"RW HuangX","year":"2011","unstructured":"HuangX, R.W., Gui, L., Yu, S., et al.: Privacy-preserving computable encryption scheme of cloud computing. Chin. J. Comput. 34(12), 2391\u20132402 (2011)","journal-title":"Chin. J. Comput."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Wang, W., Li, Z., Owens, R., et al.: Secure and efficient access to outsourced data. In: Proceedings of the 2009 ACM Workshop on Cloud computing security, pp. 55\u201366 November 2009","DOI":"10.1145\/1655008.1655016"},{"issue":"7","key":"10_CR11","first-page":"1155","volume":"48","author":"FZ Zhang","year":"2011","unstructured":"Zhang, F.Z., Chen, J., Chen, H.B., et al.: Lifetime privacy and self-destruction of data in the cloud. J. Comput. Res. Devel. 48(7), 1155\u20131167 (2011)","journal-title":"J. Comput. Res. Devel."},{"issue":"10","key":"10_CR12","first-page":"1357","volume":"51","author":"J Mao","year":"2011","unstructured":"Mao, J., Li, K., Xu, X.: Privacy protection scheme for cloud computing. J. Tsinghua Univ. (Sci. Tech.) 51(10), 1357\u20131362 (2011)","journal-title":"J. Tsinghua Univ. (Sci. Tech.)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Cloud Computing, Security, Privacy in New Computing Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69605-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T04:07:27Z","timestamp":1510373247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69605-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,12]]},"ISBN":["9783319696041","9783319696058"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69605-8_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017,11,12]]}}}