{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T21:04:34Z","timestamp":1773867874511,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,10,28]],"date-time":"2022-10-28T00:00:00Z","timestamp":1666915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,28]],"date-time":"2022-10-28T00:00:00Z","timestamp":1666915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172245, 62102211"],"award-info":[{"award-number":["62172245, 62102211"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10586-022-03785-y","type":"journal-article","created":{"date-parts":[[2022,10,28]],"date-time":"2022-10-28T12:03:00Z","timestamp":1666958580000},"page":"3839-3854","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Enabling Secure Data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems"],"prefix":"10.1007","volume":"26","author":[{"given":"Zhiqiang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Wenjing","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Rong","family":"Hao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,28]]},"reference":[{"key":"3785_CR1","volume-title":"The Digitization of the World from Edge to Core","author":"D Reinsel","year":"2018","unstructured":"Reinsel, D., Gantz, J., Rydning, J.: The Digitization of the World from Edge to Core. International Data Corporation, Framingham (2018)"},{"key":"3785_CR2","unstructured":"Reinsel, G., Gantz, J.: The digital universe decade-are you ready. IDC White Paper (2010)"},{"key":"3785_CR3","unstructured":"Biggar, H.: Experiencing data de-duplication: Improving efficiency and reducing capacity requirements. The Enterprise Strategy Group (2007)"},{"issue":"6","key":"3785_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MCC.2016.139","volume":"3","author":"V Casola","year":"2016","unstructured":"Casola, V., Castiglione, A., Choo, K.-K.R., Esposito, C.: Healthcare-related data in the cloud: challenges and opportunities. IEEE Cloud Comput. 3(6), 10\u201314 (2016)","journal-title":"IEEE Cloud Comput."},{"key":"3785_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3106780","author":"X Gao","year":"2021","unstructured":"Gao, X., Yu, J., Chang, Y., Wang, H., Fan, J.: Checking only when it is necessary: enabling integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data. IEEE Trans Dependable Secure Compu (2021). https:\/\/doi.org\/10.1109\/TDSC.2021.3106780","journal-title":"IEEE Trans Dependable Secure Compu"},{"key":"3785_CR6","doi-asserted-by":"crossref","unstructured":"Sun, J., Zhu, X., Zhang, C., Fang, Y.: HCPP: cryptography based secure EHR system for patient privacy and emergency healthcare. In: 31st International Conference on Distributed Computing Systems, pp 373\u2013382 (2011)","DOI":"10.1109\/ICDCS.2011.83"},{"issue":"19","key":"3785_CR7","doi-asserted-by":"publisher","first-page":"2024","DOI":"10.1056\/NEJMsa054479","volume":"354","author":"DM Studdert","year":"2006","unstructured":"Studdert, D.M., Mello, M.M., Gawande, A.A., Gandhi, T.K., Kachalia, A., Yoon, C., Puopolo, A.L., Brennan, T.A.: Claims, errors, and compensation payments in medical malpractice litigation. N. Engl. J. Med. 354(19), 2024\u20132033 (2006)","journal-title":"N. Engl. J. Med."},{"key":"3785_CR8","unstructured":"List of antibiotics (2018). https:\/\/en.wikipedia.org\/wiki\/List_of_antibiotics."},{"issue":"4","key":"3785_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2078861.2078864","volume":"7","author":"DT Meyer","year":"2012","unstructured":"Meyer, D.T., Bolosky, W.J.: A study of practical deduplication. ACM Trans. Storage 7(4), 1\u201320 (2012)","journal-title":"ACM Trans. Storage"},{"issue":"3","key":"3785_CR10","doi-asserted-by":"publisher","first-page":"2010","DOI":"10.1109\/TII.2021.3100873","volume":"18","author":"Y Liu","year":"2021","unstructured":"Liu, Y., Yu, J., Fan, J., Vijayakumar, P., Chang, V.: Achieving privacy-preserving DSSE for intelligent IoT healthcare system. IEEE Trans. Industr. Inf. 18(3), 2010\u20132020 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"3785_CR11","doi-asserted-by":"publisher","first-page":"5573","DOI":"10.1109\/TII.2021.3126611","volume":"18","author":"X Ge","year":"2021","unstructured":"Ge, X., Yu, J., Hao, R., Lv, H.: Verifiable keyword search supporting sensitive information hiding for the cloud-based healthcare sharing system. IEEE Trans. Ind. Inf. 18, 5573\u20135583 (2021)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"3785_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Xu, C., Cheng, N., Shen, X.: Secure encrypted data deduplication for cloud storage against compromised key servers. In: IEEE Global Communications Conference, pp. 1\u20136 (2019)","DOI":"10.1109\/GLOBECOM38437.2019.9013792"},{"key":"3785_CR13","doi-asserted-by":"crossref","unstructured":"Shakarami, A., Ghobaei-Arani, M., Shahidinejad, A., Masdari, M., Shakarami, H.: Data replication schemes in cloud computing: a survey. Clust. Comput., 2545\u20132579 (2021)","DOI":"10.1007\/s10586-021-03283-7"},{"key":"3785_CR14","doi-asserted-by":"crossref","unstructured":"Douceur, J.R., Adya, A., Bolosky, W.J., Simon, P., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings 22nd International Conference on Distributed Computing Systems, pp. 617\u2013624 (2002)","DOI":"10.1109\/ICDCS.2002.1022312"},{"key":"3785_CR15","doi-asserted-by":"crossref","unstructured":"Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: 32nd Annual IACR Eurocrypt International Conference on the Theory and Applications of Cryptographic Techniques, pp. 296\u2013312, (2013)","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"3785_CR16","doi-asserted-by":"crossref","unstructured":"Stanek, J., Sorniotti, A., Androulaki, E., Kencl, L.: A secure data deduplication scheme for cloud storage. In: 18th International Conference on Financial Cryptography and Data Security, pp. 99\u2013118 (2014)","DOI":"10.1007\/978-3-662-45472-5_8"},{"key":"3785_CR17","doi-asserted-by":"crossref","unstructured":"Liu, X., Sun, W., Lou, W., Pei, Q., Zhang, Y.: One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1\u20139 (2017)","DOI":"10.1109\/INFOCOM.2017.8056999"},{"issue":"12","key":"3785_CR18","doi-asserted-by":"publisher","first-page":"2643","DOI":"10.1109\/TIFS.2015.2470221","volume":"10","author":"R Chen","year":"2015","unstructured":"Chen, R., Mu, Y., Yang, G., Guo, F.: BL-MLE: block-level message-locked encryption for secure large file deduplication. IEEE Trans. Inf. Forensics Secur. 10(12), 2643\u20132652 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3785_CR19","unstructured":"Anderson, P., Zhang, L.: Fast and secure laptop backups with encrypted de-duplication. In: Proceedings of the 24th International Conference on Large Installation System Administration, pp. 1\u20138 (2010)"},{"key":"3785_CR20","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.pmcj.2015.03.002","volume":"24","author":"M Miao","year":"2015","unstructured":"Miao, M., Wang, J., Li, H., Chen, X.: Secure multi-server-aided data deduplication in cloud computing. Pervasive Mob. Comput. 24, 129\u2013137 (2015)","journal-title":"Pervasive Mob. Comput."},{"key":"3785_CR21","unstructured":"Bellare, M., Keelveedhi, S., Ristenpart, T.: DupLESS: Server-aided encryption for deduplicated storage. In: 22nd USENIX Security Symposium, pp. 179\u2013194 (2013)"},{"issue":"6","key":"3785_CR22","first-page":"1021","volume":"13","author":"Y Shin","year":"2020","unstructured":"Shin, Y., Koo, D., Yun, J., Hur, J.: Decentralized server-aided encryption for secure deduplication in cloud storage. IEEE Trans. Serv. Comput. 13(6), 1021\u20131033 (2020)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"3785_CR23","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TBDATA.2017.2701352","volume":"5","author":"Z Yan","year":"2017","unstructured":"Yan, Z., Zhang, L., Wenxiu, D., Zheng, Q.: Heterogeneous data storage management with deduplication in cloud computing. IEEE Trans. Big Data 5(3), 393\u2013407 (2017)","journal-title":"IEEE Trans. Big Data"},{"issue":"11","key":"3785_CR24","doi-asserted-by":"publisher","first-page":"3113","DOI":"10.1109\/TKDE.2016.2580139","volume":"28","author":"J Hur","year":"2016","unstructured":"Hur, J., Koo, D., Shin, Y., Kang, K.: Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans. Knowl. Data Eng. 28(11), 3113\u20133125 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"8","key":"3785_CR25","doi-asserted-by":"publisher","first-page":"2386","DOI":"10.1109\/TC.2015.2389960","volume":"65","author":"J Li","year":"2015","unstructured":"Li, J., Li, J., Xie, D., Cai, Z.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. 65(8), 2386\u20132396 (2015)","journal-title":"IEEE Trans. Comput."},{"issue":"9","key":"3785_CR26","doi-asserted-by":"publisher","first-page":"4101","DOI":"10.1109\/TII.2018.2832251","volume":"14","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Xu, C., Li, H., Yang, K., Zhou, J., Lin, X.: Healthdep: an efficient and secure deduplication scheme for cloud-assisted ehealth systems. IEEE Trans. Ind. Inf. 14(9), 4101\u20134112 (2018)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"3785_CR27","doi-asserted-by":"crossref","unstructured":"Duan, Y.: Distributed key generation for encrypted deduplication: Achieving the strongest privacy. In: Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing Security, pp. 57\u201368 (2014)","DOI":"10.1145\/2664168.2664169"},{"key":"3785_CR28","unstructured":"Vo, D.L., Zhang, F., Kim, K.: A new threshold blind signature scheme from pairings. In: The 2003 Symposium on Cryptography and Information Security, pp. 699\u2013702 (2003)"},{"issue":"6","key":"3785_CR29","first-page":"1152","volume":"13","author":"S Jiang","year":"2020","unstructured":"Jiang, S., Jiang, T., Wang, L.: Secure and efficient cloud data deduplication with ownership management. IEEE Trans. Serv. Comput. 13(6), 1152\u20131165 (2020)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"3785_CR30","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1016\/j.future.2017.01.024","volume":"78","author":"D Koo","year":"2018","unstructured":"Koo, D., Hur, J.: Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Futur. Gener. Comput. Syst. 78, 739\u2013752 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"12","key":"3785_CR31","doi-asserted-by":"publisher","first-page":"3569","DOI":"10.1109\/TC.2015.2401017","volume":"64","author":"J Li","year":"2015","unstructured":"Li, J., Chen, X., Huang, X., Tang, S., Xiang, Y., Hassan, M.M., Alelaiwi, A.: Secure distributed deduplication systems with improved reliability. IEEE Trans. Comput. 64(12), 3569\u20133579 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"3785_CR32","unstructured":"Yang, X., Lu, R., Shao, J., Tang, X., Ghorbani, A.: Achieving efficient secure deduplication with user-defined access control in cloud. In: IEEE Transactions on Dependable and Secure Computing (2020)"},{"key":"3785_CR33","doi-asserted-by":"crossref","unstructured":"Puzio, P., Molva, R., Onen, M., Loureiro, S.: PerfectDedup: secure data deduplication. In: Data Privacy Management, and Security Assurance: 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21\u201322, 2015, pp. 150\u2013166 (2016)","DOI":"10.1007\/978-3-319-29883-2_10"},{"key":"3785_CR34","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3144430","author":"S Li","year":"2022","unstructured":"Li, S., Xu, C., Zhang, Y., Du, Y., Chen, K.: Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage. IEEE Trans Serv. Comput. (2022). https:\/\/doi.org\/10.1109\/TSC.2022.3144430","journal-title":"IEEE Trans Serv. Comput."},{"key":"3785_CR35","doi-asserted-by":"crossref","unstructured":"Shao, B., Ji, Y.: Efficient TPA-based auditing scheme for secure cloud storage. Cluster Comput., pp. 1989\u20132000 (2021)","DOI":"10.1007\/s10586-021-03239-x"},{"issue":"2","key":"3785_CR36","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1109\/TIFS.2018.2850312","volume":"14","author":"W Shen","year":"2018","unstructured":"Shen, W., Qin, J., Yu, J., Hao, R., Hu, J.: Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans. Inf. Forens. Secur. 14(2), 331\u2013346 (2018)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"issue":"1","key":"3785_CR37","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TSMC.2021.3073542","volume":"52","author":"X Ge","year":"2022","unstructured":"Ge, X., Yu, J., Zhang, H., Bai, J., Fan, J., Xiong, N.: SPPS: a search pattern privacy system for approximate shortest distance query of encrypted graphs in IIoT. IEEE Trans. Syst. Man Cybernet: Syst. 52(1), 136\u2013150 (2022)","journal-title":"IEEE Trans. Syst. Man Cybernet: Syst."},{"key":"3785_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2022.01.027","volume":"132","author":"L Cong","year":"2022","unstructured":"Cong, L., Yu, J., Ge, X.: Enabling efficient privacy-preserving subgraph isomorphic query over graphs. Futur. Gener. Comput. Syst. 132, 1\u201310 (2022)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"3785_CR39","unstructured":"Heart failure clinical records Data Set. (2020). http:\/\/archive.ics.uci.edu\/ml\/datasets\/Heart+failure+clinical+records."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03785-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-022-03785-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03785-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T00:14:27Z","timestamp":1744157667000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-022-03785-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,28]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["3785"],"URL":"https:\/\/doi.org\/10.1007\/s10586-022-03785-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,28]]},"assertion":[{"value":"23 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This study does not violate and does not involve moral and ethical statement.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"I have read and comprehended the journal\u2019s contents, and I agree to all of the terms and conditions stated. All authors were aware of the publication of the paper and agreed to its publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}