{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:24:34Z","timestamp":1769916274465,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T00:00:00Z","timestamp":1674432000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T00:00:00Z","timestamp":1674432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s00521-023-08270-0","type":"journal-article","created":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T19:39:02Z","timestamp":1674502742000},"page":"241-257","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["FC-SEEDA: fog computing-based secure and energy efficient data aggregation scheme for Internet of healthcare Things"],"prefix":"10.1007","volume":"36","author":[{"given":"Chinmay","family":"Chakraborty","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8856-9450","authenticated-orcid":false,"given":"Soufiene Ben","family":"Othman","sequence":"additional","affiliation":[]},{"given":"Faris A.","family":"Almalki","sequence":"additional","affiliation":[]},{"given":"Hedi","family":"Sakli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,23]]},"reference":[{"issue":"2","key":"8270_CR1","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1109\/COMST.2020.2973314","volume":"22","author":"YA Qadri","year":"2020","unstructured":"Qadri YA, Nauman A, Zikria YB, Vasilakos AV, Kim SW (2020) The future of healthcare internet of things: a survey of emerging technologies. IEEE Commun Surv Tutor 22(2):1121\u20131167. https:\/\/doi.org\/10.1109\/COMST.2020.2973314","journal-title":"IEEE Commun Surv Tutor"},{"key":"8270_CR2","doi-asserted-by":"publisher","first-page":"5369","DOI":"10.3390\/s21165369","volume":"21","author":"Q Wang","year":"2021","unstructured":"Wang Q, Mu H (2021) Privacy-preserving and lightweight selective aggregation with fault-tolerance for edge computing-enhanced IoT. Sensors 21:5369. https:\/\/doi.org\/10.3390\/s21165369","journal-title":"Sensors"},{"key":"8270_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3128954","author":"L Yang","year":"2021","unstructured":"Yang L, Yu K, Yang SX, Chinmay C, Liu Y, Guo T (2021) An intelligent trust cloud management method for secure clustering in 5G enabled internet of medical things. IEEE Trans Ind Inform. https:\/\/doi.org\/10.1109\/TII.2021.3128954","journal-title":"IEEE Trans Ind Inform"},{"key":"8270_CR4","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1016\/j.procs.2020.07.053","volume":"175","author":"BO Soufiene","year":"2020","unstructured":"Soufiene BO, Bahattab AA, Trad A, Youssef H (2020) PEERP: an priority-based energy-efficient routing protocol for reliable data transmission in healthcare using the IoT. Procedia Comput Sci 175:373\u2013378. https:\/\/doi.org\/10.1016\/j.procs.2020.07.053","journal-title":"Procedia Comput Sci"},{"issue":"6","key":"8270_CR5","doi-asserted-by":"publisher","first-page":"7539","DOI":"10.3934\/mbe.2021373","volume":"18","author":"FA Al-Zumia","year":"2021","unstructured":"Al-Zumia FA, Tian Y, Al-Rodhaan M (2021) A novel fault-tolerant privacy-preserving cloud-based data aggregation scheme for lightweight health data. Math Biosci Eng 18(6):7539\u20137560. https:\/\/doi.org\/10.3934\/mbe.2021373","journal-title":"Math Biosci Eng"},{"key":"8270_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1155\/2019\/3985232","volume":"2019","author":"Y Pu","year":"2019","unstructured":"Pu Y, Luo J, Hu C, Yu J, Zhao R, Huang H, Xiang T (2019) Two secure privacy-preserving data aggregation schemes for IoT. Wirel Commun Mobile Comput 2019:11. https:\/\/doi.org\/10.1155\/2019\/3985232","journal-title":"Wirel Commun Mobile Comput"},{"key":"8270_CR7","doi-asserted-by":"publisher","unstructured":"Othman SB, Bahattab AA, Trad A, Youssef H (2019) LSDA: lightweight secure data aggregation scheme in healthcare using IoT. In: 10th International conference on information systems and technologies, Lecce, Italy, Dec 28, 2019\u2013Dec 30, 2019, Tunisia. https:\/\/doi.org\/10.1145\/3447568.3448530","DOI":"10.1145\/3447568.3448530"},{"key":"8270_CR8","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.patrec.2021.07.027","volume":"151","author":"D Sujata","year":"2021","unstructured":"Sujata D, Chinmay C, Sourav KG, Subhendu KP (2021) Intelligent computing on time-series data analysis and prediction of COVID-19 pandemics. Pattern Recognit Lett 151:69\u201375. https:\/\/doi.org\/10.1016\/j.patrec.2021.07.027","journal-title":"Pattern Recognit Lett"},{"key":"8270_CR9","doi-asserted-by":"publisher","unstructured":"Soufiene BO, Bahattab AA, Trad A, Youssef H (2019) RESDA: robust and efficient secure data aggregation scheme in healthcare using the IoT. In: 2019 International conference on internet of things, embedded systems and communications (IINTEC),Tunis, Tunisia, pp 209\u2013213, https:\/\/doi.org\/10.1109\/IINTEC48298.2019.9112125","DOI":"10.1109\/IINTEC48298.2019.9112125"},{"key":"8270_CR10","doi-asserted-by":"publisher","first-page":"1629","DOI":"10.1007\/s12083-021-01077-7","volume":"14","author":"JA Onesimu","year":"2021","unstructured":"Onesimu JA, Karthikeyan J, Sei Y (2021) An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services. Peer-to-Peer Netw Appl 14:1629\u20131649. https:\/\/doi.org\/10.1007\/s12083-021-01077-7","journal-title":"Peer-to-Peer Netw Appl"},{"key":"8270_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00530-021-00826-1","volume":"28","author":"R Vinayakumar","year":"2021","unstructured":"Vinayakumar R, Harini N, Chinmay C, Tuan DP (2021) Deep learning based meta-classifier approach for COVID-19 classification using CT scan and chest X-ray images. Multimed Syst 28:1\u201315. https:\/\/doi.org\/10.1007\/s00530-021-00826-1","journal-title":"Multimed Syst"},{"key":"8270_CR12","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1155\/2021\/9988038","volume":"2021","author":"FA Almalki","year":"2021","unstructured":"Almalki FA, Othman SB, Almalki FA, Sakli H (2021) EERP-DPM: energy efficient routing protocol using dual prediction model for healthcare using IoT. J Healthc Eng 2021:15. https:\/\/doi.org\/10.1155\/2021\/9988038","journal-title":"J Healthc Eng"},{"key":"8270_CR13","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.1007\/s10586-020-03121-2","volume":"23","author":"AH Sharmila","year":"2020","unstructured":"Sharmila AH, Jaisankar N (2020) E-MHMS: enhanced MAC-based secure delay-aware healthcare monitoring system in WBAN. Cluster Comput 23:1725\u20131740. https:\/\/doi.org\/10.1007\/s10586-020-03121-2","journal-title":"Cluster Comput"},{"issue":"2","key":"8270_CR14","doi-asserted-by":"publisher","first-page":"231","DOI":"10.22059\/jitm.2021.80625","volume":"13","author":"R Sukanya","year":"2021","unstructured":"Sukanya R, Chinmay C (2021) Panic buying situation during COVID-19 global pandemic. J Inform Technol Manag 13(2):231\u2013244. https:\/\/doi.org\/10.22059\/jitm.2021.80625","journal-title":"J Inform Technol Manag"},{"key":"8270_CR15","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/j.future.2016.05.032","volume":"80","author":"R Amin","year":"2018","unstructured":"Amin R, Islam SH, Biswas G, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Futur Gener Comput Syst 80:483\u2013495. https:\/\/doi.org\/10.1016\/j.future.2016.05.032","journal-title":"Futur Gener Comput Syst"},{"key":"8270_CR16","doi-asserted-by":"publisher","first-page":"101948","DOI":"10.1016\/j.adhoc.2019.101948","volume":"94","author":"Y Harbi","year":"2019","unstructured":"Harbi Y, Aliouat Z, Refoufi A, Harous S, Bentaleb A (2019) Enhanced authentication and key management scheme for securing data transmission in the internet of things. Ad Hoc Netw 94:101948. https:\/\/doi.org\/10.1016\/j.adhoc.2019.101948","journal-title":"Ad Hoc Netw"},{"key":"8270_CR17","doi-asserted-by":"publisher","first-page":"100624","DOI":"10.1016\/j.imu.2021.100624","volume":"24","author":"C Singh","year":"2021","unstructured":"Singh C, Chauhan D, Deshmukh SA, Vishnu SS, Walia R (2021) Medi-Block record: Secure data sharing using block chain technology. Inform Med Unlocked 24:100624. https:\/\/doi.org\/10.1016\/j.imu.2021.100624","journal-title":"Inform Med Unlocked"},{"key":"8270_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.021","author":"A Gupta","year":"2018","unstructured":"Gupta A, Tripathi M, Shaikh TJ, Sharma A (2018) A lightweight anonymous user authentication and key establishment scheme for wearable devices. Comput Netw. https:\/\/doi.org\/10.1016\/j.comnet.2018.11.021","journal-title":"Comput Netw"},{"key":"8270_CR19","doi-asserted-by":"publisher","first-page":"135632","DOI":"10.1109\/ACCESS.2019.2941575","volume":"7","author":"BD Deebak","year":"2019","unstructured":"Deebak BD, Al-Turjman F, Aloqaily M, Alfandi O (2019) An authentic-based privacy preservation protocol for smart e-healthcare systems in IoT. IEEE Access 7:135632\u2013135649. https:\/\/doi.org\/10.1109\/ACCESS.2019.2941575","journal-title":"IEEE Access"},{"issue":"2","key":"8270_CR20","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1109\/TSC.2020.2964537","volume":"13","author":"Z Cui","year":"2020","unstructured":"Cui Z et al (2020) A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans Serv Comput 13(2):241\u2013251. https:\/\/doi.org\/10.1109\/TSC.2020.2964537","journal-title":"IEEE Trans Serv Comput"},{"key":"8270_CR21","doi-asserted-by":"publisher","first-page":"1448","DOI":"10.3390\/s22041448","volume":"22","author":"MA Almaiah","year":"2022","unstructured":"Almaiah MA, Hajjej F, Ali A, Pasha MF, Almomani O (2022) A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPS. Sensors 22:1448. https:\/\/doi.org\/10.3390\/s22041448","journal-title":"Sensors"},{"issue":"4","key":"8270_CR22","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.3390\/s22041497","volume":"22","author":"B Dammak","year":"2022","unstructured":"Dammak B, Turki M, Cheikhrouhou S, Baklouti M, Mars R, Dhahbi A (2022) LoRaChainCare: an IoT architecture integrating blockchain and LoRa network for personal health care data monitoring. Sensors (Basel, Switzerland) 22(4):1497. https:\/\/doi.org\/10.3390\/s22041497","journal-title":"Sensors (Basel, Switzerland)"},{"key":"8270_CR23","doi-asserted-by":"publisher","first-page":"772","DOI":"10.3390\/s21030772","volume":"21","author":"H Honar Pajooh","year":"2021","unstructured":"Honar Pajooh H, Rashid M, Alam F, Demidenko S (2021) Multi-layer blockchain-based security architecture for internet of things. Sensors 21:772. https:\/\/doi.org\/10.3390\/s21030772","journal-title":"Sensors"},{"key":"8270_CR24","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.jnca.2018.09.005","volume":"123","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Deng RH, Han G, Zheng D (2018) \u2019Secure smart health with privacy-aware aggregate authentication and access control in internet of things. J Netw Comput Appl 123:89\u2013100. https:\/\/doi.org\/10.1016\/j.jnca.2018.09.005","journal-title":"J Netw Comput Appl"},{"key":"8270_CR25","doi-asserted-by":"publisher","first-page":"102189","DOI":"10.1016\/j.cose.2021.102189","volume":"103","author":"K Li","year":"2021","unstructured":"Li K, Yang Y, Wang S, Shi R, Li J (2021) A lightweight privacy-preserving and sharing scheme with dual blockchain for intelligent pricing system of smart grid. Comput Secur 103:102189. https:\/\/doi.org\/10.1016\/j.cose.2021.102189","journal-title":"Comput Secur"},{"issue":"1","key":"8270_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur (TISSEC) 9(1):1\u201330. https:\/\/doi.org\/10.1145\/1127345.1127346","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"key":"8270_CR27","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/s10916-015-0424-y","volume":"40","author":"C Chakraborty","year":"2016","unstructured":"Chakraborty C, Gupta B, Ghosh SK et al (2016) Telemedicine supported chronic wound tissue prediction using classification approaches. J Med Syst 40:68. https:\/\/doi.org\/10.1007\/s10916-015-0424-y","journal-title":"J Med Syst"},{"key":"8270_CR28","doi-asserted-by":"publisher","unstructured":"Zhang J, Zhao Y, Wu J, Chen B (2018) LPDA-EC: a lightweight privacy-preserving data aggregation scheme for edge computing. In: 2018 IEEE 15th international conference on mobile ad hoc and sensor systems (MASS), pp 98\u2013106, https:\/\/doi.org\/10.1109\/MASS.2018.00024","DOI":"10.1109\/MASS.2018.00024"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08270-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-08270-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-08270-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,4]],"date-time":"2024-01-04T17:07:12Z","timestamp":1704388032000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-08270-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,23]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["8270"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-08270-0","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,23]]},"assertion":[{"value":"9 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflicts of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Data sharing not applicable to this article as no datasets were generated or analysed during the current study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data availability"}}]}}