{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T08:07:45Z","timestamp":1769155665889,"version":"3.49.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,2,14]],"date-time":"2018-02-14T00:00:00Z","timestamp":1518566400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702316"],"award-info":[{"award-number":["61702316"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771230"],"award-info":[{"award-number":["61771230"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2016FM40"],"award-info":[{"award-number":["ZR2016FM40"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s10916-018-0896-7","type":"journal-article","created":{"date-parts":[[2018,2,14]],"date-time":"2018-02-14T06:56:05Z","timestamp":1518591365000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["(a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems"],"prefix":"10.1007","volume":"42","author":[{"given":"Hongtao","family":"Li","sequence":"first","affiliation":[]},{"given":"Feng","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Wenyin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jinsheng","family":"Xing","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,14]]},"reference":[{"issue":"2","key":"896_CR1","first-page":"439","volume":"29","author":"R Agrawal","year":"2000","unstructured":"Agrawal, R., and Srikant, R., Privacy-preserving data mining. SIGMOD Record (ACM Special Interest Group on Management of Data). 29(2):439\u2013450, 2000.","journal-title":"SIGMOD Record (ACM Special Interest Group on Management of Data)"},{"issue":"3","key":"896_CR2","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1166\/jmihi.2016.1757","volume":"6","author":"S Mohana","year":"2016","unstructured":"Mohana, S., Mary, S.A., and Arul, S., Preserving privacy in health care information: a memetic approach. Journal of Medical Imaging and Health Informatics. 6(3):779\u2013783, 2016.","journal-title":"Journal of Medical Imaging and Health Informatics"},{"key":"896_CR3","doi-asserted-by":"crossref","unstructured":"Guan, S.P, Zhang, Y, Ji, Y., Preserving-Privacy Health Data Collection for Preschool Children. Computational and Mathematical Methods in Medical, Article ID 501607, 5 pages, 2013.","DOI":"10.1155\/2013\/501607"},{"key":"896_CR4","unstructured":"Rahman, F, Williams, D, Wang, Q, et al. PriDac: Privacy Preserving Data Collection in Sensor enabled REID based Healthcare Services. 2014 I.E. 15th International Symposium on High-Assurance Systems Engineering, Washington: HASE: 236\u2013242, 2014."},{"key":"896_CR5","doi-asserted-by":"publisher","unstructured":"Ni, J.B., Zhang, K., Lin, X.D., and Shen, X.M., Securing fog computing for internet of things applications: Challenges and solutions. IEEE Communications Surveys and Tutorials. https:\/\/doi.org\/10.1109\/COMST.2017.2762345,2017 .","DOI":"10.1109\/COMST.2017.2762345,2017"},{"key":"896_CR6","first-page":"1","volume":"4","author":"S Kumari","year":"2017","unstructured":"Kumari, S., Karuppiah, M., Das, A.K., et al., A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers[J]. J. Supercomput. 4:1\u201326, 2017.","journal-title":"J. Supercomput."},{"key":"896_CR7","first-page":"167","volume":"5","author":"S Lakshmi","year":"2012","unstructured":"Lakshmi, S., and Ramesh, S.P., Secure encrypted-data routing protocol for wireless sensor networks. Journal of Computer Applications. 5:167\u2013173, 2012.","journal-title":"Journal of Computer Applications"},{"key":"896_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2012\/971685","volume":"2012","author":"S Ganesh","year":"2012","unstructured":"Ganesh, S., and Amutha, R., Efficient and secure routing protocol for wireless sensor networks through optimal power control and optimal handoff-based recovery mechanism. Journal of Computer Networks and Communications. 2012:1\u20138, 2012.","journal-title":"Journal of Computer Networks and Communications"},{"key":"896_CR9","doi-asserted-by":"crossref","unstructured":"Kumari, S., Design flaws of \u201can anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography\u201d[J]. Multimedia Tools & Applications:1\u20133, 2016.","DOI":"10.1007\/s11042-016-3771-x"},{"key":"896_CR10","doi-asserted-by":"publisher","unstructured":"Xiong, J.B., Zhang, Y.Y., Li, X., et al., RSE-PoW: A role symmetric encryption PoW scheme with authorized deduplication for multimedia data. Mobile Networks and Applications, 2017. https:\/\/doi.org\/10.1007\/s11036-017-0975-x .","DOI":"10.1007\/s11036-017-0975-x"},{"key":"896_CR11","unstructured":"Kumar, S, Dohare, D, Kumar, M. An efficient key distribution scheme for wireless sensor networks using polynomial based schemes. 2012 International Conference on Information and Network Technology, Singapore: IACSIT, 21\u201327, 2012."},{"issue":"C","key":"896_CR12","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.adhoc.2014.11.018","volume":"27","author":"S Kumari","year":"2015","unstructured":"Kumari, S., Khan, M.K., and Atiquzzaman, M., User authentication schemes for wireless sensor networks: A review[J]. Ad Hoc Netw. 27(C):159\u2013194, 2015.","journal-title":"Ad Hoc Netw."},{"key":"896_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, N, Wang, S, Zhao, W., A new scheme on privacy-preserving data classification. International Conference on Knowledge Discovery and Data Mining, pp. 374\u2013382, 2005.","DOI":"10.1145\/1081870.1081913"},{"issue":"1","key":"896_CR14","doi-asserted-by":"crossref","first-page":"14","DOI":"10.51983\/ajcst-2015.4.1.1748","volume":"4","author":"V Sivaraman","year":"2015","unstructured":"Sivaraman, V., Swaminathan, N., and Vijayaraghavan, P., Privacy preserving web search by client side generalization of user profile. Asian Journal of Computer Science and Technology. 4(1):14\u201317, 2015.","journal-title":"Asian Journal of Computer Science and Technology"},{"key":"896_CR15","doi-asserted-by":"crossref","unstructured":"Vishwakarma, B, Gupta, H, Manoria, M., A survey on privacy preserving mining implementing techniques[C]\/\/Colossal Data Analysis and Networking (CDAN), Symposium on. IEEE: 1\u20135, 2016.","DOI":"10.1109\/CDAN.2016.7570874"},{"key":"896_CR16","doi-asserted-by":"crossref","unstructured":"Iyengar V.S., Transforming data to satisfy privacy constraints. In: Proceeding of the 8th ACM international conference on knowledge discovery and data mining (SIGKDD), Edmonton: ACM, 279\u2013288, 2002.","DOI":"10.1145\/775047.775089"},{"key":"896_CR17","unstructured":"Samarati, P, Sweeney, L., Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proc. of the IEEE Symposium on Research in Security and Privacy, 1998."},{"issue":"2","key":"896_CR18","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s10844-008-0075-2","volume":"33","author":"R Wong","year":"2009","unstructured":"Wong, R., Li, J., Fu, A., et al., (a,k)-Anonymous data publishing[J]. J. Intell. Inf. Syst. 33(2):209\u2013234, 2009.","journal-title":"J. Intell. Inf. Syst."},{"key":"896_CR19","doi-asserted-by":"crossref","unstructured":"Meyerson, A, Williams, R., On the complexity of optimal k-anonymity. In: Proceeding of POD\u201904 the 23rd ACM SIGMOD-SIGACTSIGART Symposium on the Principles of Database Systems, New York: ACM. 223\u2013228, 2004.","DOI":"10.1145\/1055558.1055591"},{"key":"896_CR20","doi-asserted-by":"publisher","unstructured":"Begum, R.S, Sugumar, R., Conditional entropy with swarm optimization approach for privacy preservation of datasets in cloud [J]. Indian Journal of Science and Technology 9(28), 2016. https:\/\/doi.org\/10.17485\/ijst\/2016\/v9i28\/93817","DOI":"10.17485\/ijst\/2016\/v9i28\/93817"},{"key":"896_CR21","unstructured":"Blake, C. L., and Merz, C. J., UCI repository of machine learning databases[OL]. http:\/\/archive.ics.uci.edu\/ml\/datasets.html , 1998."},{"key":"896_CR22","doi-asserted-by":"crossref","unstructured":"Jin, X, Zhang, N, Das, G., Algorithm-safe privacy preserving data publishing. In: Proceeding of EDBT\u201910 the 13 International Conference on Extending Database Technology, New York: ACM. 633\u2013644, 2010.","DOI":"10.1145\/1739041.1739116"},{"key":"896_CR23","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1016\/j.is.2011.03.001","volume":"36","author":"X Jin","year":"2011","unstructured":"Jin, X., Zhang, N., and Das, G., ASAP: eliminating algorithm-based disclosure in privacy-preserving data publishing. Inf. Syst. 36:859\u2013880, 2011.","journal-title":"Inf. Syst."},{"key":"896_CR24","doi-asserted-by":"publisher","unstructured":"Jiang, Q., Chen, Z.R., Li, B.Y., and Ma, J.F., Security analysis and improvement of biohashing based three-factor authentication scheme for telecare medical information systems. Journal of Ambient Intelligence and Humanized Compiting, 2017. https:\/\/doi.org\/10.1007\/s12652-017-0516-2 .","DOI":"10.1007\/s12652-017-0516-2"},{"issue":"5","key":"896_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-013-9973-0","volume":"37","author":"CC Lee","year":"2013","unstructured":"Lee, C.C., Hsu, C.W., Lai, Y.M., et al., An enhanced mobile-healthcare emergency system based on extended chaotic maps.[J]. J. Med. Syst. 37(5):1\u201312, 2013.","journal-title":"J. Med. Syst."},{"issue":"1","key":"896_CR26","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., Chen, J., et al., Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks[J]. Multimedia Systems. 21(1):49\u201360, 2015.","journal-title":"Multimedia Systems"},{"issue":"11","key":"896_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0586-2","volume":"40","author":"CT Li","year":"2016","unstructured":"Li, C.T., Lee, C.C., Weng, C.Y., et al., A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems[J]. J. Med. Syst. 40(11):1\u201310, 2016.","journal-title":"J. Med. Syst."},{"key":"896_CR28","doi-asserted-by":"publisher","unstructured":"Jiang, Q., Ma, J.F., Yang, C., Ma, X., Ma, X.D., Shen, J., and Chaudhry, S.A., Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput. Electr. Eng., 2017. https:\/\/doi.org\/10.1016\/j.compeleceng.2017 .","DOI":"10.1016\/j.compeleceng.2017"},{"key":"896_CR29","doi-asserted-by":"crossref","unstructured":"Hung, T.H, Hsieh, S.H, Lu, C.S., Privacy-preserving data collection and recovery of compressive sensing[C]\/\/Signal and Information Processing (ChinaSIP), 2015 I.E. China Summit and International Conference on. IEEE: 473\u2013477, 2015.","DOI":"10.1109\/ChinaSIP.2015.7230447"},{"issue":"99","key":"896_CR30","first-page":"1","volume":"PP","author":"D Wu","year":"2017","unstructured":"Wu, D., Si, S., Wu, S., et al., Dynamic Trust Relationships Aware Data Privacy Protection in Mobile Crowd-Sensing[J]. IEEE Internet of Things Journal. PP(99):1\u20131, 2017.","journal-title":"IEEE Internet of Things Journal"},{"key":"896_CR31","doi-asserted-by":"crossref","unstructured":"Mohammed, H, Tonyali, S, Rabieh, K, et al., Efficient privacy-preserving data collection scheme for smart grid ami networks[C]\/\/Proc. of IEEE Globecom. 2016.","DOI":"10.1109\/GLOCOM.2016.7841782"},{"key":"896_CR32","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1080\/01621459.1980.10477481","volume":"75","author":"LH Cox","year":"1980","unstructured":"Cox, L.H., Suppression methodology and statistical disclosure control. J. Am. Stat. Assoc. 75:377\u2013385, 1980.","journal-title":"J. Am. Stat. Assoc."},{"issue":"3","key":"896_CR33","first-page":"1","volume":"58","author":"HT Li","year":"2014","unstructured":"Li, H.T., Ma, J.F., and Fu, S., A privacy-preserving data collection model for digital community. Science China Inf. Sci. 58(3):1\u201316, 2014.","journal-title":"Science China Inf. Sci."},{"issue":"4","key":"896_CR34","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1109\/JSAC.2009.090502","volume":"27","author":"X Lin","year":"2009","unstructured":"Lin, X., Lu, R., Shen, X., Nemoto, Y., and Kato, N., Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE Journal on Selected Areas in Communications. 27(4):365\u2013378, 2009.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"896_CR35","doi-asserted-by":"crossref","unstructured":"Song, J, Myungae, C., SHOES: secure healthcare oriented environment service model. In Proceedings of the IEEE Biomedical Circuits and Systems Conference Healthcare Technology, London, Bio CAS: 89\u201393, 2006.","DOI":"10.1109\/BIOCAS.2006.4600315"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-018-0896-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-0896-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-0896-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:02:17Z","timestamp":1693526537000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-018-0896-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,14]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["896"],"URL":"https:\/\/doi.org\/10.1007\/s10916-018-0896-7","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,14]]},"assertion":[{"value":"18 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"56"}}