{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T15:34:53Z","timestamp":1769355293338,"version":"3.49.0"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T00:00:00Z","timestamp":1462579200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"DSR","award":["RG-1435-048"],"award-info":[{"award-number":["RG-1435-048"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10916-016-0509-2","type":"journal-article","created":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T14:39:38Z","timestamp":1462631978000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":85,"title":["Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges"],"prefix":"10.1007","volume":"40","author":[{"given":"Anam","family":"Sajid","sequence":"first","affiliation":[]},{"given":"Haider","family":"Abbas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,7]]},"reference":[{"key":"509_CR1","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.cose.2013.12.002","volume":"42","author":"X Dong","year":"2014","unstructured":"Dong, X., Yu, J., Luo, Y., Chen, Y., Xue, G., and Li, M., Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Comput. Sec. 42:151\u2013164, 2014. doi: 10.1016\/j.cose.2013.12.002 .","journal-title":"Comput. Sec."},{"key":"509_CR2","doi-asserted-by":"publisher","unstructured":"Othman, S., Bahattab, A., Trad, A., and Youssef, H., Secure data transmission protocol for medical wireless sensor networks. AINA \u201914 Proc. 2014 I.E. 28th Int. Conf. Adv. Inform. Networking Appl. 649\u2013656, 2014. doi: 10.1109\/AINA.2014.80 .","DOI":"10.1109\/AINA.2014.80"},{"key":"509_CR3","doi-asserted-by":"publisher","unstructured":"Divi, K., and Liu, H., Modeling of WBAN and cloud integration for secure and reliable healthcare. Proc. 8Th International Conf. Body Area Networks. 128\u2013131, 2013. doi: 10.4108\/icst.bodynets.2013.253706 .","DOI":"10.4108\/icst.bodynets.2013.253706"},{"issue":"1","key":"509_CR4","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.jnca.2012.09.001","volume":"36","author":"A Waqar","year":"2013","unstructured":"Waqar, A., Raza, A., Abbas, H., and Khurram Khan, M., A framework for preservation of cloud users\u2019 data privacy using dynamic reconstruction of metadata. J. Network Comput. Appl. 36(1):235\u2013248, 2013. doi: 10.1016\/j.jnca.2012.09.001 .","journal-title":"J. Network Comput. Appl."},{"key":"509_CR5","doi-asserted-by":"publisher","unstructured":"Wooten, R., Klink, R., Sinek, F., Bai, Y., and Sharma, M., Design and implementation of a secure healthcare social cloud system. 2012 12Th IEEE\/ACM Int. Symp. Cluster, Cloud Grid Comput. (Ccgrid 2012). 805\u2013810, 2012. doi: 10.1109\/CCGrid.2012.131 .","DOI":"10.1109\/CCGrid.2012.131"},{"key":"509_CR6","doi-asserted-by":"publisher","unstructured":"Javadi, S., and Razzaque, M., Security and privacy in wireless body area networks for health care applications. Sign. Commun. Technol. 165\u2013187, 2013. doi: 10.1007\/978-3-642-36169-2_6 .","DOI":"10.1007\/978-3-642-36169-2_6"},{"issue":"1","key":"509_CR7","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/mwc.2010.5416350","volume":"17","author":"M Li","year":"2010","unstructured":"Li, M., Lou, W., and Ren, K., Data security and privacy in wireless body area networks. IEEE Wireless Commun. 17(1):51\u201358, 2010. doi: 10.1109\/mwc.2010.5416350 .","journal-title":"IEEE Wireless Commun."},{"issue":"1","key":"509_CR8","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2009","unstructured":"Kitchenham, B., Pearl Brereton, O., Budgen, D., Turner, M., Bailey, J., and Linkman, S., Systematic literature reviews in software engineering\u2014a systematic literature review. Inform. Software Technol. 51(1):7\u201315, 2009. doi: 10.1016\/j.infsof.2008.09.009 .","journal-title":"Inform. Software Technol."},{"issue":"2","key":"509_CR9","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/JBHI.2013.2292829","volume":"18","author":"Q Shen","year":"2014","unstructured":"Shen, Q., Liang, X., Shen, X., Lin, X., and Luo, H., Exploiting geo-distributed clouds for a e-health monitoring system with minimum service delay and privacy preservation. IEEE J. Biomed. Health Inform. 18(2):430\u2013439, 2014. doi: 10.1109\/JBHI.2013.2292829 .","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"509_CR10","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.future.2015.01.009","volume":"55","author":"A Lounis","year":"2015","unstructured":"Lounis, A., Hadjidj, A., Bouabdallah, A., and Challal, Y., Healing on the cloud: Secure cloud architecture for medical wireless sensor networks. Futur. Gener. Comput. Syst. 55:266\u2013277, 2015. doi: 10.1016\/j.future.2015.01.009 .","journal-title":"Futur. Gener. Comput. Syst."},{"key":"509_CR11","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.is.2014.05.004","volume":"48","author":"B Fabian","year":"2015","unstructured":"Fabian, B., Ermakova, T., and Junghanns, P., Collaborative and secure sharing of healthcare data in multi-clouds. Inf. Syst. 48:132\u2013150, 2015. doi: 10.1016\/j.is.2014.05.004 .","journal-title":"Inf. Syst."},{"key":"509_CR12","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.ins.2014.03.126","volume":"284","author":"N Han","year":"2014","unstructured":"Han, N., Han, L., Tuan, D., In, H., and Jo, M., A scheme for data confidentiality in cloud-assisted wireless body area networks. Inf. Sci. 284:157\u2013166, 2014. doi: 10.1016\/j.ins.2014.03.126 .","journal-title":"Inf. Sci."},{"issue":"2","key":"509_CR13","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1109\/JBHI.2013.2294932","volume":"18","author":"Y Tong","year":"2014","unstructured":"Tong, Y., Sun, J., Chow, S., and Pan, L., Cloud-assisted mobile-access of health data with privacy and auditability. IEEE J. Biomed. Health Inform. 18(2):419\u2013429, 2014. doi: 10.1109\/JBHI.2013.2294932 .","journal-title":"IEEE J. Biomed. Health Inform."},{"issue":"9","key":"509_CR14","doi-asserted-by":"publisher","first-page":"2268","DOI":"10.1109\/tkde.2013.68","volume":"26","author":"M Nabeel","year":"2014","unstructured":"Nabeel, M., and Bertino, E., Privacy preserving delegated access control in public clouds. IEEE Trans. Knowl. Data Eng. 26(9):2268\u20132280, 2014. doi: 10.1109\/tkde.2013.68 .","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"509_CR15","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.future.2014.06.004","volume":"43\u201344","author":"J Yang","year":"2015","unstructured":"Yang, J., Li, J., and Niu, Y., A hybrid solution for privacy preserving medical data sharing in the cloud environment. Futur. Gener. Comput. Syst. 43\u201344:74\u201386, 2015. doi: 10.1016\/j.future.2014.06.004 .","journal-title":"Futur. Gener. Comput. Syst."},{"key":"509_CR16","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.jbi.2014.02.008","volume":"50","author":"H Wang","year":"2014","unstructured":"Wang, H., Wu, Q., Qin, B., and Domingo-Ferrer, J., FRR: Fair remote retrieval of outsourced private medical records in electronic health networks. J. Biomed. Inform. 50:226\u2013233, 2014. doi: 10.1016\/j.jbi.2014.02.008 .","journal-title":"J. Biomed. Inform."},{"key":"509_CR17","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.ins.2014.06.011","volume":"284","author":"K Zhang","year":"2014","unstructured":"Zhang, K., Liang, X., Baura, M., Lu, R., and Shen, X., PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs. Inf. Sci. 284:130\u2013141, 2014. doi: 10.1016\/j.ins.2014.06.011 .","journal-title":"Inf. Sci."},{"issue":"12","key":"509_CR18","doi-asserted-by":"publisher","first-page":"3430","DOI":"10.1109\/tc.2015.2401033","volume":"64","author":"Z Wang","year":"2015","unstructured":"Wang, Z., Huang, D., Zhu, Y., Li, B., and Chung, C., Efficient attribute-based comparable data access control. IEEE Trans. Comput. 64(12):3430\u20133443, 2015. doi: 10.1109\/tc.2015.2401033 .","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"509_CR19","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1109\/jbhi.2015.2407157","volume":"20","author":"X Liu","year":"2015","unstructured":"Liu, X., Lu, R., Ma, J., Chen, L., and Qin, B., Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification. IEEE J. Biomed. Health Inform. 20(2):655\u2013668, 2015. doi: 10.1109\/jbhi.2015.2407157 .","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"509_CR20","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.ins.2014.09.003","volume":"314","author":"J Zhou","year":"2015","unstructured":"Zhou, J., Cao, Z., Dong, X., Xiong, N., and Vasilakos, A., 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 314:255\u2013276, 2015. doi: 10.1016\/j.ins.2014.09.003 .","journal-title":"Inf. Sci."},{"issue":"1","key":"509_CR21","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s00779-014-0806-z","volume":"19","author":"W Sujansky","year":"2014","unstructured":"Sujansky, W., and Kunz, D., A standard-based model for the sharing of patient-generated health information with electronic health records. Personal Ubiquitous Comput. 19(1):9\u201325, 2014. doi: 10.1007\/s00779-014-0806-z .","journal-title":"Personal Ubiquitous Comput."},{"issue":"2","key":"509_CR22","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.cmpb.2013.04.019","volume":"111","author":"H Yu","year":"2013","unstructured":"Yu, H., Lai, H., Chen, K., Chou, H., Wu, J., Dorjgochoo, S., et al., A sharable cloud-based pancreaticoduodenectomy collaborative database for physicians: Emphasis on security and clinical rule supporting. Comput. Methods Programs Biomed. 111(2):488\u2013497, 2013. doi: 10.1016\/j.cmpb.2013.04.019 .","journal-title":"Comput. Methods Programs Biomed."},{"issue":"6","key":"509_CR23","doi-asserted-by":"publisher","first-page":"1693","DOI":"10.1109\/tpds.2014.2314119","volume":"26","author":"J Zhou","year":"2015","unstructured":"Zhou, J., Lin, X., Dong, X., and Cao, Z., PSMPA: Patient self-controllable and multi-level privacy-preserving cooperative authentication in distributed m-healthcare cloud computing system. IEEE Trans. Parallel Distrib. Syst. 26(6):1693\u20131703, 2015. doi: 10.1109\/tpds.2014.2314119 .","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"509_CR24","doi-asserted-by":"publisher","unstructured":"Sawand, A., Djahel, S., Zhang, Z., and Na\u00a8\u0131t-Abdesselam, F., Multidisciplinary Approaches to achieving efficient and trustworthy eHealth monitoring systems. IEEE\/CIC ICCC 2014 Symp. Privacy Sec. In Commun 187\u2013192, doi: 10.1109\/ICCChina.2014.7008269 .","DOI":"10.1109\/ICCChina.2014.7008269"},{"key":"509_CR25","doi-asserted-by":"publisher","unstructured":"Wang, C., Zhang, B., Ren, K., M. Roveda, J., Wen Chen, C., and Xu, Z., A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing. IEEE INFOCOM 2014 - IEEE Conf. Comput. Communi. 2130\u20132138, 2014. doi: 10.1109\/INFOCOM.2014.6848155 .","DOI":"10.1109\/INFOCOM.2014.6848155"},{"issue":"7","key":"509_CR26","doi-asserted-by":"publisher","first-page":"1332","DOI":"10.1109\/jstsp.2015.2427113","volume":"9","author":"J Zhou","year":"2015","unstructured":"Zhou, J., Cao, Z., Dong, X., and Lin, X., PPDM: A privacy-preserving protocol for cloud-assisted e-healthcare systems. IEEE J. Sel. Top. Sign. Process 9(7):1332\u20131344, 2015. doi: 10.1109\/jstsp.2015.2427113 .","journal-title":"IEEE J. Sel. Top. Sign. Process"},{"key":"509_CR27","doi-asserted-by":"publisher","unstructured":"Hoang, D., and Chen, L., Mobile Cloud for Assistive Healthcare (MoCAsH). 2010 I.E. Asia-Pacific Serv. Comput. Conf. 325\u2013332, 2010. doi: 10.1109\/APSCC.2010.102 .","DOI":"10.1109\/APSCC.2010.102"},{"issue":"4","key":"509_CR28","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/mwc.2015.7224734","volume":"22","author":"K Zhang","year":"2015","unstructured":"Zhang, K., Yang, K., Liang, X., Su, Z., Shen, X., and Luo, H., Security and privacy for mobile healthcare networks: from a quality of protection perspective. IEEE Wireless Commun 22(4):104\u2013112, 2015. doi: 10.1109\/mwc.2015.7224734 .","journal-title":"IEEE Wireless Commun"},{"key":"509_CR29","doi-asserted-by":"publisher","unstructured":"Liu, C., Lin, F., Chiang, D., Chen, T., Chen, C., and Lin, H. et al., Secure PHR access control scheme for healthcare application clouds. 2013 42Nd Int. Conf. Parallel Process. 1067\u20131076, 2013. doi: 10.1109\/icpp.2013.127 .","DOI":"10.1109\/icpp.2013.127"},{"issue":"2\/3","key":"509_CR30","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1504\/ijsn.2011.043666","volume":"6","author":"M Barua","year":"2011","unstructured":"Barua, M., Liang, X., Lu, R., and Shen, X., ESPAC: Enabling security and patient-centric access control for eHealth in cloud computing. Int. J. Sec. Networks 6(2\/3):67\u201376, 2011. doi: 10.1504\/ijsn.2011.043666 .","journal-title":"Int. J. Sec. Networks"},{"key":"509_CR31","doi-asserted-by":"publisher","unstructured":"Narayan, S., Gagn\u00e9, M., and Safavi-Naini, R., Privacy preserving EHR system using attribute-based infrastructure. Proc. 2010 ACM Workshop Cloud Comput. Sec. Workshop - CCSW \u201910. 47-52, 2010. doi: 10.1145\/1866835.1866845","DOI":"10.1145\/1866835.1866845"},{"key":"509_CR32","doi-asserted-by":"publisher","unstructured":"Aljumah, F., Leung, R., Pourzandi, M., and Debbabi, M., Emergency mobile access to personal health records stored on an untrusted cloud. Health Inform. Sci. 30\u201341, 2013. doi: 10.1007\/978-3-642-37899-7_3 .","DOI":"10.1007\/978-3-642-37899-7_3"},{"key":"509_CR33","doi-asserted-by":"publisher","unstructured":"Huang, J., Sharaf, M., and Huang, C., A hierarchical framework for secure and scalable ehr sharing and access control in multi-cloud. 2012 41St Int. Conf. Parallel Process. Workshops. 279\u2013287, 2012. doi: 10.1109\/icppw.2012.42 .","DOI":"10.1109\/icppw.2012.42"},{"key":"509_CR34","doi-asserted-by":"publisher","unstructured":"Chen, L., and Hoang, D., Novel data protection model in healthcare cloud. 2011 I.E. Int. Conf. High Perform. Comput. Commun. 550\u2013555, 2011. doi: 10.1109\/hpcc.2011.148 .","DOI":"10.1109\/hpcc.2011.148"},{"key":"509_CR35","doi-asserted-by":"publisher","unstructured":"Narayan, S., Gagn\u00e9, M., and Safavi-Naini, R., Privacy preserving EHR system using attribute-based infrastructure. Proc. 2010 ACM Workshop Cloud Comput. Sec. Workshop - CCSW \u201910. 47\u201352, 2010. doi: 10.1145\/1866835.1866845 .","DOI":"10.1145\/1866835.1866845"},{"key":"509_CR36","doi-asserted-by":"publisher","unstructured":"L\u00f6hr, H., Sadeghi, A., and Winandy, M., Securing the e-health cloud. Proc. ACM Int. Conf. Health Inform. - IHI \u201910. 220\u2013229, 2010. doi: 10.1145\/1882992.1883024 .","DOI":"10.1145\/1882992.1883024"},{"key":"509_CR37","doi-asserted-by":"publisher","unstructured":"Yu, Z., Thomborson, C., Wang, C., Wang, J., and Li, R., A cloud-based watermarking method for health data security. 2012 Int. Conf. High Perform. Comput. Simulation (HPCS. 642\u2013647, 2012. doi: 10.1109\/hpcsim.2012.6266986 .","DOI":"10.1109\/hpcsim.2012.6266986"},{"key":"509_CR38","doi-asserted-by":"publisher","unstructured":"Alabdulatif, A., Khalil, I., and Mai, V., Protection of electronic health records (EHRs) in cloud. 2013 35Th Ann. Int. Conf. IEEE Eng. Med. Biol. Soc. (EMBC). 4191\u20134194, 2013. doi: 10.1109\/embc.2013.6610469 .","DOI":"10.1109\/embc.2013.6610469"},{"key":"509_CR39","doi-asserted-by":"publisher","unstructured":"Ermakova, T., and Fabian, B., Secret sharing for health data in multi-provider clouds. 2013 I.E. 15Th Conf. Bus. Inform. 93\u2013100, 2013. doi: 10.1109\/CBI.2013.22 .","DOI":"10.1109\/CBI.2013.22"},{"key":"509_CR40","doi-asserted-by":"publisher","unstructured":"Huang, M., Chen, Y., Chen, B., Liu, J., Rho, S., and Ji, W., A semi-supervised privacy-preserving clustering algorithm for healthcare. Peer-To-Peer Network. Appl. 1\u201312, 2015. doi: 10.1007\/s12083-015-0356-9 .","DOI":"10.1007\/s12083-015-0356-9"},{"key":"509_CR41","doi-asserted-by":"publisher","unstructured":"Rahman, S., Masud, M., Hossain, M., Alelaiwi, A., Hassan, M., and Alamri, A., Privacy preserving secure data exchange in mobile P2P cloud healthcare environment. Peer-To-Peer Network. Appl. 1\u201316, 2015. doi: 10.1007\/s12083-015-0334-2 .","DOI":"10.1007\/s12083-015-0334-2"},{"issue":"5","key":"509_CR42","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1007\/s11227-014-1253-3","volume":"71","author":"F Xhafa","year":"2014","unstructured":"Xhafa, F., Feng, J., Zhang, Y., Chen, X., and Li, J., Privacy-aware attribute-based PHR sharing with user accountability in cloud computing. J Supercomput. 71(5):1607\u20131619, 2014. doi: 10.1007\/s11227-014-1253-3 .","journal-title":"J Supercomput."},{"key":"509_CR43","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s10916-014-0143-9","volume":"38","author":"C Chen","year":"2014","unstructured":"Chen, C., Yang, T., Chiang, M., and Shih, T., A privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 38:143, 2014. doi: 10.1007\/s10916-014-0143-9 .","journal-title":"J. Med. Syst."},{"key":"509_CR44","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/s10916-014-0112-3","volume":"38","author":"C Chen","year":"2014","unstructured":"Chen, C., Yang, T., and Shih, T., A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 38:112, 2014. doi: 10.1007\/s10916-014-0112-3 .","journal-title":"J. Med. Syst."},{"key":"509_CR45","doi-asserted-by":"publisher","unstructured":"Jafari, M., Safavi-Naini, R., and Sheppard, N., A rights management approach to protection of privacy in a cloud of electronic health records. Proc. 11Th Ann. ACM Workshop Digit. Rights Manag. - DRM \u201911. 23\u201330, 2011. doi: 10.1145\/2046631.2046637 .","DOI":"10.1145\/2046631.2046637"},{"key":"509_CR46","doi-asserted-by":"publisher","unstructured":"Lam, P., Mitchell, J., Scedrov, A., Sundaram, S., and Wang, F., Declarative privacy policy. Proc. 2Nd ACM SIGHIT Symp. Int. Health Inform. - IHI \u201912. 323\u2013332, 2012. doi: 10.1145\/2110363.2110401 .","DOI":"10.1145\/2110363.2110401"},{"key":"509_CR47","doi-asserted-by":"publisher","unstructured":"Mohanty, M., Atrey, P., and Ooi, W., Secure cloud-based medical data visualization. Proc. 20Th ACM Int. Conf. Multimed. - MM \u201912. 1105\u20131108, 2012. doi: 10.1145\/2393347.2396394 .","DOI":"10.1145\/2393347.2396394"},{"key":"509_CR48","doi-asserted-by":"crossref","unstructured":"Sanz-Requena, R., Ma\u00f1as-Garc\u00eda, A., Cabrera-Ayala, J., and Garc\u00eda-Mart\u00ed, G., A cloud-based radiological portal for the patients: IT contributing to position the patient as the central axis of the 21 st century healthcare cycles. Proc. First Int. Workshop Tech. Legal Aspects Data Privacy. 54\u201357, 2015. Retrieved from http:\/\/dl.acm.org\/citation.cfm?id=2821479 .","DOI":"10.1109\/TELERISE.2015.18"},{"key":"509_CR49","doi-asserted-by":"publisher","unstructured":"Francis, T., Madiajagan, M., and Kumar, V., Privacy issues and techniques in E-Health systems. Proc. 2015 ACM SIGMIS Conf. Comput. People Res. - SIGMIS-CPR \u201915. 113115, 2015. doi: 10.1145\/2751957.2751981 .","DOI":"10.1145\/2751957.2751981"},{"key":"509_CR50","doi-asserted-by":"publisher","unstructured":"Balinsky, H., and Mohammad, N., Fine grained access of interactive personal health records. Proc. 2015 ACM Symp. Doc. Eng. - DocEng \u201915. 207\u2013210, 2015. doi: 10.1145\/2682571.2797098 .","DOI":"10.1145\/2682571.2797098"},{"key":"509_CR51","doi-asserted-by":"publisher","unstructured":"Hei, X., and Lin, S., Multi-part file encryption for electronic health records cloud. Proc. 4Th ACM Mobihoc Workshop Pervasive Wireless Healthcare - Mobilehealth \u201914. 31\u201336, 2014. doi: 10.1145\/2633651.2637473 .","DOI":"10.1145\/2633651.2637473"},{"key":"509_CR52","doi-asserted-by":"publisher","unstructured":"Mohandas, A., and S, S., Privacy preserving content disclosure for enabling sharing of electronic health records in cloud computing. Proc. 7Th ACM India Comput. Conf. - COMPUTE \u201914. article no. 7, 2014. doi: 10.1145\/2675744.2675753 .","DOI":"10.1145\/2675744.2675753"},{"key":"509_CR53","doi-asserted-by":"publisher","unstructured":"Ragesh, G., and Baskaran, K., CRYPE. Proc. First Int. Conf. Sec. Internet Things - Sec. \u201912. 204\u2013209, 2012. doi: 10.1145\/2490428.2490457","DOI":"10.1145\/2490428.2490457"},{"issue":"6","key":"509_CR54","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1109\/tifs.2013.2255593","volume":"8","author":"H Lin","year":"2013","unstructured":"Lin, H., Shao, J., Zhang, C., and Fang, Y., CAM: Cloud-assisted privacy preserving mobile health monitoring. IEEE Trans. Inform. Forensic Sec. 8(6):985\u2013997, 2013. doi: 10.1109\/tifs.2013.2255593 .","journal-title":"IEEE Trans. Inform. Forensic Sec."},{"issue":"1","key":"509_CR55","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/tpds.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., and Lou, W., Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1):131\u2013143, 2013. doi: 10.1109\/tpds.2012.97 .","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"509_CR56","doi-asserted-by":"publisher","unstructured":"Li, M., Yu, S., Ren, K., and Lou, W., Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. Lecture Notes Inst. Comput. Sci. Soc. Inform. Telecommun. Eng. 89\u2013106, 2010. doi: 10.1007\/978-3-642-16161-2_6 .","DOI":"10.1007\/978-3-642-16161-2_6"},{"key":"509_CR57","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.future.2014.07.001","volume":"43\u201344","author":"A Castiglione","year":"2015","unstructured":"Castiglione, A., Pizzolante, R., De Santis, A., Carpentieri, B., Castiglione, A., and Palmieri, F., Cloud-based adaptive compression and secure management services for 3D healthcare data. Futur. Gener. Comput. Syst. 43\u201344:120\u2013134, 2015. doi: 10.1016\/j.future.2014.07.001 .","journal-title":"Futur. Gener. Comput. Syst."},{"key":"509_CR58","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.future.2013.09.011","volume":"35","author":"D Thilakanathan","year":"2014","unstructured":"Thilakanathan, D., Chen, S., Nepal, S., Calvo, R., and Alem, L., A platform for secure monitoring and sharing of generic health data in the Cloud. Futur. Gener. Comput. Syst. 35:102\u2013113, 2014. doi: 10.1016\/j.future.2013.09.011 .","journal-title":"Futur. Gener. Comput. Syst."},{"key":"509_CR59","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.future.2014.10.014","volume":"52","author":"J Liu","year":"2015","unstructured":"Liu, J., Huang, X., and Liu, J., Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption. Futur. Gener. Comput. Syst. 52:67\u201376, 2015. doi: 10.1016\/j.future.2014.10.014 .","journal-title":"Futur. Gener. Comput. Syst."},{"key":"509_CR60","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1016\/j.procs.2015.10.073","volume":"70","author":"H Taneja","year":"2015","unstructured":"Taneja, H., Kapil, and Singh, A., Preserving privacy of patients based on re-identification risk. Proc. Comput. Sci. 70:448\u2013454, 2015. doi: 10.1016\/j.procs.2015.10.073 .","journal-title":"Proc. Comput. Sci."},{"key":"509_CR61","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1016\/j.procs.2014.07.058","volume":"34","author":"F Khan","year":"2014","unstructured":"Khan, F., Ali, A., Abbas, H., and Haldar, N., A cloud-based healthcare framework for security and patients\u2019 data privacy using wireless body area networks. Proc. Comput. Sci. 34:511\u2013517, 2014. doi: 10.1016\/j.procs.2014.07.058 .","journal-title":"Proc. Comput. Sci."},{"key":"509_CR62","doi-asserted-by":"publisher","unstructured":"Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M., and Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 38(5), 2014. doi: 10.1007\/s10916-014-0041-1 .","DOI":"10.1007\/s10916-014-0041-1"},{"issue":"10","key":"509_CR63","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/s10916-014-0120-3","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Srinivas, J., and Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(10):120, 2014. doi: 10.1007\/s10916-014-0120-3 .","journal-title":"J. Med. Syst."},{"issue":"1","key":"509_CR64","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1108\/09685221111115836","volume":"19","author":"H Abbas","year":"2011","unstructured":"Abbas, H., Magnusson, C., Yngstrom, L., and Hemani, A., Addressing dynamic issues in information security management. Info. Mngmnt. Comp. Sec. 19(1):5\u201324, 2011. doi: 10.1108\/09685221111115836 .","journal-title":"Info. Mngmnt. Comp. Sec."},{"issue":"1","key":"509_CR65","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1186\/1687-1499-2013-216","volume":"2013","author":"A Ali","year":"2013","unstructured":"Ali, A., and Khan, F., Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP J. Wirel. Commun. Netw. 2013(1):216, 2013. doi: 10.1186\/1687-1499-2013-216 .","journal-title":"EURASIP J. Wirel. Commun. Netw."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0509-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0509-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0509-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T11:45:20Z","timestamp":1567856720000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0509-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,7]]},"references-count":65,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["509"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0509-2","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,7]]},"article-number":"155"}}