{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:52:35Z","timestamp":1774367555320,"version":"3.50.1"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,1,23]],"date-time":"2022-01-23T00:00:00Z","timestamp":1642896000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,23]],"date-time":"2022-01-23T00:00:00Z","timestamp":1642896000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s00607-021-01044-3","type":"journal-article","created":{"date-parts":[[2022,1,23]],"date-time":"2022-01-23T00:03:55Z","timestamp":1642896235000},"page":"1019-1037","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["FedFlow: a federated platform to build secure sharing and synchronization services for health dataflows"],"prefix":"10.1007","volume":"105","author":[{"given":"Diana","family":"Carrizales-Espinoza","sequence":"first","affiliation":[]},{"given":"Dante D.","family":"Sanchez-Gallegos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2160-4407","authenticated-orcid":false,"given":"J. L.","family":"Gonzalez-Compean","sequence":"additional","affiliation":[]},{"given":"Jesus","family":"Carretero","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,23]]},"reference":[{"issue":"1","key":"1044_CR1","first-page":"288","volume":"9","author":"C Bala","year":"2012","unstructured":"Bala C (2012) Fault tolerance-challenges, techniques and implementation in cloud computing. Int J Comput Sci Issues 9(1):288","journal-title":"Int J Comput Sci Issues"},{"key":"1044_CR2","doi-asserted-by":"crossref","unstructured":"Bart\u00edk Ubik K (2015) Lz4 compression algorithm on fpga. In: ICECS. IEEE, pp 179\u2013182","DOI":"10.1109\/ICECS.2015.7440278"},{"issue":"2","key":"1044_CR3","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1504\/IJBDI.2017.083116","volume":"4","author":"G Bhushan","year":"2017","unstructured":"Bhushan G (2017) Security challenges in cloud computing: state-of-art. Int J Big Data Intell 4(2):81\u2013107","journal-title":"Int J Big Data Intell"},{"key":"1044_CR4","doi-asserted-by":"crossref","unstructured":"Carrizales S-G, Reyes G-C, Morales-Sandoval C, Galaviz-Mosqueda A (2019) A data preparation approach for cloud storage based on containerized parallel patterns. In: IDCS. Springer, pp 478\u2013490","DOI":"10.1007\/978-3-030-34914-1_45"},{"key":"1044_CR5","doi-asserted-by":"crossref","unstructured":"Carrizales-Espinoza D, S\u00e1nchez-Gallegos DD, Gonzalez-Compean J, Carretero J (2021) A federated content distribution system to build health data synchronization services. In: PDP. IEEE, pp 1\u20138","DOI":"10.1109\/PDP52278.2021.00011"},{"key":"1044_CR6","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1016\/j.future.2017.09.061","volume":"92","author":"N Chervyakov","year":"2019","unstructured":"Chervyakov N, Babenko M, Tchernykh A, Kucherov N, Miranda-L\u00f3pez V, Cort\u00e9s-Mendoza JM (2019) Ar-rrns: configurable reliable distributed data storage systems for internet of things to ensure security. FGCS 92:1080\u20131092","journal-title":"FGCS"},{"key":"1044_CR7","unstructured":"CloudFront A (2014) Amazon cloudfront. http:\/\/aws.amazon.com\/cloudfront. Accessed 15 July 2019"},{"issue":"1","key":"1044_CR8","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1177\/1073110519840479","volume":"47","author":"R Cook-Deegan","year":"2019","unstructured":"Cook-Deegan R, Majumder MA, McGuire AL (2019) Introduction: sharing data in a medical information commons. J Law Med Ethics 47(1):7\u201311","journal-title":"J Law Med Ethics"},{"key":"1044_CR9","doi-asserted-by":"crossref","unstructured":"Davami F, Adabi S, Rezaee A, Rahmani AM (2021) Fog-based architecture for scheduling multiple workflows with high availability requirement. Computing, pp 1\u201340","DOI":"10.1007\/s00607-021-00905-1"},{"key":"1044_CR10","doi-asserted-by":"crossref","unstructured":"Deryabin M, Chervyakov N, Tchernykh A, Berezhnoy V, Djurabaev A, Nazarov A, Babenko M (2019) Comparative performance analysis of information dispersal methods. In: 24th FRUCT. IEEE, pp 67\u201374","DOI":"10.23919\/FRUCT.2019.8711955"},{"key":"1044_CR11","doi-asserted-by":"crossref","unstructured":"Domadiya N, Rao UP (2020) Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining. Computing, pp 1\u201323","DOI":"10.1007\/s00607-020-00847-0"},{"issue":"1","key":"1044_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41746-020-00373-5","volume":"4","author":"A DuMont\u00a0Sch\u00fctte","year":"2021","unstructured":"DuMont\u00a0Sch\u00fctte A, Hetzel J, Gatidis S, Hepp T, Dietz B, Bauer S, Schwab P (2021) Overcoming barriers to data sharing with medical image generation: a comprehensive evaluation. npj Dig Med 4(1):1\u201314","journal-title":"npj Dig Med"},{"key":"1044_CR13","unstructured":"Duplicity (2021) duplicity encrypted bandwidth-efficient backup using the rsync algorithm. http:\/\/duplicity.nongnu.org\/. Accessed 28 April 2021"},{"issue":"8","key":"1044_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0993-7","volume":"42","author":"K Fan","year":"2018","unstructured":"Fan K, Wang S, Ren Y, Li H, Yang Y (2018) Medblock: Efficient and secure medical data sharing via blockchain. J Med Syst 42(8):1\u201311","journal-title":"J Med Syst"},{"issue":"3s","key":"1044_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3408322","volume":"16","author":"L Fang","year":"2020","unstructured":"Fang L, Yin C, Zhu J, Ge C, Tanveer M, Jolfaei A, Cao Z (2020) Privacy protection for medical data sharing in smart healthcare. ACM Trans Multim Comput Commun Appl 16(3s):1\u201318","journal-title":"ACM Trans Multim Comput Commun Appl"},{"issue":"6","key":"1044_CR16","doi-asserted-by":"publisher","first-page":"e333","DOI":"10.1016\/S2589-7500(21)00078-9","volume":"3","author":"T Ford","year":"2021","unstructured":"Ford T et al (2021) The challenges and opportunities of mental health data sharing in the uk. Lancet Dig Health 3(6):e333\u2013e336","journal-title":"Lancet Dig Health"},{"issue":"1","key":"1044_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.5815\/ijcnis.2018.01.03","volume":"10","author":"A French-Baidoo","year":"2018","unstructured":"French-Baidoo A (2018) Oppong: achieving confidentiality in electronic health records using cloud systems. IJCNIS 10(1):18","journal-title":"IJCNIS"},{"key":"1044_CR18","doi-asserted-by":"crossref","unstructured":"Gonzalez P, Sosa-Sosa SB (2015) Skycds: a resilient content delivery service based on diversified cloud storage. SIMPAT 54:64\u201385","DOI":"10.1016\/j.simpat.2015.03.006"},{"key":"1044_CR19","doi-asserted-by":"crossref","unstructured":"Gonzalez S, Diaz CY (2018) Sacbe: a building block approach for constructing efficient and flexible end-to-end cloud storage. JSS 135:143\u2013156","DOI":"10.1016\/j.jss.2017.10.004"},{"key":"1044_CR20","doi-asserted-by":"crossref","unstructured":"Gunawi Hao OS, Laksono S, Adityatama E (2016) Why does the cloud stop computing? Lessons from hundreds of service outages. In: SoCC. ACM, pp 1\u201316","DOI":"10.1145\/2987550.2987583"},{"key":"1044_CR21","doi-asserted-by":"crossref","unstructured":"Herrmann MD, Clunie DA, Fedorov A, Doyle SW, Pieper S, Klepeis V, Le LP, Mutter GL, Milstone DS, Schultz TJ et\u00a0al (2018) Implementing the dicom standard for digital pathology. J Pathol Inform 9","DOI":"10.4103\/jpi.jpi_42_18"},{"key":"1044_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2019.02.023","volume":"137","author":"MA Jan","year":"2019","unstructured":"Jan MA, Zhang W, Usman M, Tan Z, Khan F, Luo E (2019) Smartedge: An end-to-end encryption framework for an edge-enabled smart city application. J Netw Comput Appl 137:1\u201310","journal-title":"J Netw Comput Appl"},{"key":"1044_CR23","unstructured":"joe42: joe42\/cloudfusion (2021). https:\/\/github.com\/joe42\/CloudFusion"},{"issue":"12","key":"1044_CR24","doi-asserted-by":"publisher","first-page":"1861","DOI":"10.1007\/s00607-019-00714-7","volume":"101","author":"DO Kim","year":"2019","unstructured":"Kim DO, Kim HY, Kim YK, Kim JJ (2019) Efficient techniques of parallel recovery for erasure-coding-based distributed file systems. Computing 101(12):1861\u20131884","journal-title":"Computing"},{"key":"1044_CR25","unstructured":"Li Abramson A et\u00a0al (2016) Data from qin-breast. Cancer Imaging Archive"},{"key":"1044_CR26","doi-asserted-by":"crossref","unstructured":"Liu J, Li X, Ye L, Zhang H, Du X, Guizani M (2018) Bpds: a blockchain based privacy-preserving data sharing for electronic medical records. In: 2018 IEEE global communications conference (GLOBECOM). IEEE, pp 1\u20136","DOI":"10.1109\/GLOCOM.2018.8647713"},{"key":"1044_CR27","doi-asserted-by":"crossref","unstructured":"Mao Wu J (2015) Improving storage availability in cloud-of-clouds with hybrid redundant data distribution. In: IPDPS 2015m. IEEE, pp 633\u2013642","DOI":"10.1109\/IPDPS.2015.47"},{"key":"1044_CR28","doi-asserted-by":"publisher","first-page":"159284","DOI":"10.1109\/ACCESS.2020.3020501","volume":"8","author":"R Marcel\u00edn-Jim\u00e9nez","year":"2020","unstructured":"Marcel\u00edn-Jim\u00e9nez R, Ram\u00edrez-Ort\u00edz JL, De La Colina ER, Pascoe-Chalke M, Gonz\u00e1lez-Compe\u00e1n JL (2020) On the complexity and performance of the information dispersal algorithm. IEEE Access 8:159284\u2013159290","journal-title":"IEEE Access"},{"key":"1044_CR29","unstructured":"Mathew Varia (2014) Overview of amazon web services. Amazon Whitepapers"},{"key":"1044_CR30","doi-asserted-by":"crossref","unstructured":"Mayan JA, Anand DK, Sadhvi N (2017) Efficient and secure server migration on cloud storage with vsm and dropbox services. In: ICICES. IEEE, pp 1\u20135","DOI":"10.1109\/ICICES.2017.8070725"},{"key":"1044_CR31","unstructured":"McAfee (2019) Cloud adoption and risk report"},{"key":"1044_CR32","doi-asserted-by":"crossref","unstructured":"Meister B (2009) Multi-level comparison of data deduplication in a backup scenario. In: Proceedings of SYSTOR. ACM, p\u00a08","DOI":"10.1145\/1534530.1534541"},{"key":"1044_CR33","doi-asserted-by":"crossref","unstructured":"Meister B (2010) dedupv1: improving deduplication throughput using solid state drives (ssd). In: MSST 2010. IEEE, pp 1\u20136","DOI":"10.1109\/MSST.2010.5496992"},{"issue":"1","key":"1044_CR34","first-page":"27","volume":"22","author":"H Mier","year":"2018","unstructured":"Mier H, Delgadillo T (2018) Regulaci\u00f3n del acceso al expediente cl\u00ednico con fines de investigaci\u00f3n en m\u00e9xico. Revista CONAMED 22(1):27\u201331","journal-title":"Revista CONAMED"},{"key":"1044_CR35","unstructured":"Miller K (2018) Storreduce"},{"issue":"10","key":"1044_CR36","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1109\/71.963420","volume":"12","author":"M Mitzenmacher","year":"2001","unstructured":"Mitzenmacher M (2001) The power of two choices in randomized load balancing. IEEE Trans Parallel Distrib Syst 12(10):1094\u20131104","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"1044_CR37","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s10619-020-07301-2","volume":"39","author":"SM Mohamed","year":"2021","unstructured":"Mohamed SM, Wang Y (2021) A survey on novel classification of deduplication storage systems. Distrib Parallel Databases 39(1):201\u2013230","journal-title":"Distrib Parallel Databases"},{"key":"1044_CR38","doi-asserted-by":"crossref","unstructured":"Morales G, Diaz S (2018) A pairing-based cryptographic approach for data security in the cloud. IJISP 17(4):441\u2013461","DOI":"10.1007\/s10207-017-0375-z"},{"key":"1044_CR39","doi-asserted-by":"crossref","unstructured":"Morales-Ferreira P, Santiago-Duran M, Gaytan-Diaz C, Gonzalez-Compean J, Sosa-Sosa VJ, Lopez-Arevalo I (2018) A data distribution service for cloud and containerized storage based on information dispersal. In: SOSE. IEEE, pp 86\u201395","DOI":"10.1109\/SOSE.2018.00020"},{"key":"1044_CR40","doi-asserted-by":"crossref","unstructured":"Odelu R, Kumari, Khan C (2017) Pairing-based cp-abe with constant-size ciphertexts and secret keys for cloud environment. Comput Stand Interf 54:3\u20139","DOI":"10.1016\/j.csi.2016.05.002"},{"issue":"1","key":"1044_CR41","first-page":"4","volume":"5","author":"J Opara-Martins","year":"2016","unstructured":"Opara-Martins J, Sahandi R, Tian F (2016) Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective. JoCCASA 5(1):4","journal-title":"JoCCASA"},{"key":"1044_CR42","doi-asserted-by":"crossref","unstructured":"Packer M (2018) Data sharing in medical research","DOI":"10.1136\/bmj.k510"},{"issue":"4","key":"1044_CR43","doi-asserted-by":"publisher","first-page":"1398","DOI":"10.1177\/1460458218769699","volume":"25","author":"V Patel","year":"2019","unstructured":"Patel V (2019) A framework for secure and decentralized sharing of medical imaging data via blockchain consensus. Health Inform J 25(4):1398\u20131411","journal-title":"Health Inform J"},{"issue":"8","key":"1044_CR44","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/s00439-018-1919-7","volume":"137","author":"Phillips","year":"2018","unstructured":"Phillips (2018) International data-sharing norms: from the oecd to the general data protection regulation (gdpr). Hum Genet 137(8):575\u2013582","journal-title":"Hum Genet"},{"key":"1044_CR45","first-page":"110665","volume":"168","author":"HG Reyes-Anastacio","year":"2020","unstructured":"Reyes-Anastacio HG, Gonzalez-Compean J, Sosa-Sosa VJ, Carretero J, Garcia-Blas J (2020) Kulla, a container-centric construction model for building infrastructure-agnostic distributed and parallel applications. JSS 168:110665","journal-title":"JSS"},{"key":"1044_CR46","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1109\/ACCESS.2015.2437951","volume":"3","author":"SM Riazul\u00a0Islam","year":"2015","unstructured":"Riazul\u00a0Islam SM, Daehan K, Humaun\u00a0Kabir M et al (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678\u2013708","journal-title":"IEEE Access"},{"key":"1044_CR47","unstructured":"Robin.io: Cloud native kubernetes storage. https:\/\/robin.io\/"},{"key":"1044_CR48","doi-asserted-by":"crossref","unstructured":"Roukounaki A, Efremidis S, Soldatos J, Neises J, Walloschke T, Kefalakis N (2019) Scalable and configurable end-to-end collection and analysis of iot security data: Towards end-to-end security in iot systems. In: GIoTS. IEEE, pp 1\u20136","DOI":"10.1109\/GIOTS.2019.8766407"},{"issue":"1","key":"1044_CR49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s41073-017-0025-z","volume":"2","author":"Rowhani-Farid","year":"2017","unstructured":"Rowhani-Farid et al (2017) What incentives increase data sharing in health and medical research? a systematic review. Res Integ Peer Rev 2(1):1\u201310","journal-title":"Res Integ Peer Rev"},{"key":"1044_CR50","unstructured":"rsync (2021) rsync. https:\/\/rsync.samba.org\/. Accessed 28 April 2021"},{"key":"1044_CR51","volume-title":"The digitization of the world from edge to core","author":"DRJGJ Rydning","year":"2018","unstructured":"Rydning DRJGJ (2018) The digitization of the world from edge to core. International Data Corporation, Framingham"},{"issue":"12","key":"1044_CR52","doi-asserted-by":"publisher","first-page":"1813","DOI":"10.1007\/s00607-019-00711-w","volume":"101","author":"G Sakellariou","year":"2019","unstructured":"Sakellariou G, Gounaris A (2019) Homomorphically encrypted k-means on cloud-hosted servers with low client-side load. Computing 101(12):1813\u20131836","journal-title":"Computing"},{"key":"1044_CR53","doi-asserted-by":"crossref","unstructured":"Samant SS, Chhetri MB, Vo QB, Kowalczyk R, Nepal S (2018) Towards end-to-end qos and cost-aware resource scaling in cloud-based iot data processing pipelines. In: SCC. IEEE, pp 287\u2013290","DOI":"10.1109\/SCC.2018.00050"},{"key":"1044_CR54","doi-asserted-by":"crossref","unstructured":"S\u00e1nchez-Gallegos D, Carrizales-Espinoza A, Reyes-Anastacio, Gonzalez-Compean, Morales-Sandoval C, Galaviz-Mosqueda (2020) From the edge to the cloud: a continuous delivery and preparation model for processing big iot data. SIMPAT, p 102136","DOI":"10.1016\/j.simpat.2020.102136"},{"key":"1044_CR55","doi-asserted-by":"publisher","first-page":"120255","DOI":"10.1109\/ACCESS.2020.3006037","volume":"8","author":"G-M S\u00e1nchez-Gallegos","year":"2020","unstructured":"S\u00e1nchez-Gallegos G-M, Gonzalez-Compean V-R, Perez-Ramos C-E, Carretero (2020) On the continuous processing of health data in edge-fog-cloud computing by using micro\/nanoservice composition. IEEE Access 8:120255\u2013120281","journal-title":"IEEE Access"},{"issue":"11","key":"1044_CR56","doi-asserted-by":"publisher","first-page":"2409","DOI":"10.1007\/s00607-020-00837-2","volume":"102","author":"FA Satti","year":"2020","unstructured":"Satti FA, Ali T, Hussain J, Khan WA, Khattak AM, Lee S (2020) Ubiquitous health profile (uhpr): a big data curation platform for supporting health data interoperability. Computing 102(11):2409\u20132444","journal-title":"Computing"},{"key":"1044_CR57","doi-asserted-by":"crossref","unstructured":"Sayood K (2017) Introduction to data compression. Morgan Kaufmann","DOI":"10.1016\/B978-0-12-809474-7.00019-7"},{"key":"1044_CR58","doi-asserted-by":"crossref","unstructured":"Shuaib M, Samad A, Alam S, Siddiqui ST (2019) Why adopting cloud is still a challenge?\u2014a review on issues and challenges for cloud migration in organizations. Amb Commun Comput Syst 387\u2013399","DOI":"10.1007\/978-981-13-5934-7_35"},{"issue":"4","key":"1044_CR59","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1016\/j.future.2012.06.004","volume":"29","author":"J Spillner","year":"2013","unstructured":"Spillner J, M\u00fcller J, Schill A (2013) Creating optimal cloud storage systems. Futur Gener Comput Syst 29(4):1062\u20131072","journal-title":"Futur Gener Comput Syst"},{"key":"1044_CR60","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.jnca.2018.03.017","volume":"110","author":"CB Tan","year":"2018","unstructured":"Tan CB, Hijazi MHA, Lim Y, Gani A (2018) A survey on proof of retrievability for cloud data integrity and availability: cloud storage state-of-the-art, issues, solutions and future trends. J Netw Comput Appl 110:75\u201386","journal-title":"J Netw Comput Appl"},{"key":"1044_CR61","doi-asserted-by":"crossref","unstructured":"Tan L, Yu K, Shi N, Yang C, Wei W, Lu H (2021) Towards secure and privacy-preserving data sharing for covid-19 medical records: a blockchain-empowered approach. IEEE Trans Netw Sci Eng","DOI":"10.1109\/TNSE.2021.3101842"},{"key":"1044_CR62","unstructured":"Uthayakumar J, Vengattaraman T, Dhavachelvan P (2018) A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications. J King Saud Univ Comput Inform Sci"},{"key":"1044_CR63","doi-asserted-by":"publisher","first-page":"14757","DOI":"10.1109\/ACCESS.2017.2730843","volume":"5","author":"Q Xia","year":"2017","unstructured":"Xia Q et al (2017) Medshare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5:14757\u201314767","journal-title":"IEEE Access"},{"key":"1044_CR64","doi-asserted-by":"crossref","unstructured":"Xu Z, Zhang J, Song Z, Liu Y, Li J, Zhou J (2021) A scheme for intelligent blockchain-based manufacturing industry supply chain management. Computing 1\u201320","DOI":"10.1007\/s00607-020-00880-z"},{"key":"1044_CR65","unstructured":"Yang J, Sharp G, Veeraraghavan H, van Elmpt W, Dekker A, Lustberg T, Gooding M (2017) Data from lung ct segmentation challenge. Cancer Imaging Arch"},{"key":"1044_CR66","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.future.2014.06.004","volume":"43","author":"JJ Yang","year":"2015","unstructured":"Yang JJ et al (2015) A hybrid solution for privacy preserving medical data sharing in the cloud environment. Futur Gener Comput Syst 43:74\u201386","journal-title":"Futur Gener Comput Syst"},{"issue":"8","key":"1044_CR67","first-page":"2125","volume":"27","author":"Z Zhang","year":"2015","unstructured":"Zhang Z (2015) Secure and efficient data-sharing in clouds. CCPE 27(8):2125\u20132143","journal-title":"CCPE"},{"issue":"8","key":"1044_CR68","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1007\/s00607-018-0637-2","volume":"101","author":"Y Zhao","year":"2019","unstructured":"Zhao Y, Ren M, Jiang S, Zhu G, Xiong H (2019) An efficient and revocable storage cp-abe scheme in the cloud computing. Computing 101(8):1041\u20131065","journal-title":"Computing"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-021-01044-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-021-01044-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-021-01044-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T15:07:53Z","timestamp":1682348873000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-021-01044-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,23]]},"references-count":68,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["1044"],"URL":"https:\/\/doi.org\/10.1007\/s00607-021-01044-3","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,23]]},"assertion":[{"value":"1 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}