{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T10:32:50Z","timestamp":1774866770351,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T00:00:00Z","timestamp":1530144000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the National Natural Science Foundation of China","award":["61601005"],"award-info":[{"award-number":["61601005"]}]},{"name":"Natural Science Foundation of Anhui Province","award":["1608085QF138"],"award-info":[{"award-number":["1608085QF138"]}]},{"DOI":"10.13039\/501100003995","name":"Natural Science Foundation of Anhui Province","doi-asserted-by":"publisher","award":["1808085MF164"],"award-info":[{"award-number":["1808085MF164"]}],"id":[{"id":"10.13039\/501100003995","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Anhui Provincial Key Laboratory of Network and Information Security","award":["AHNIS2018003"],"award-info":[{"award-number":["AHNIS2018003"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s10916-018-0995-5","type":"journal-article","created":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T08:02:20Z","timestamp":1530172940000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":483,"title":["Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain"],"prefix":"10.1007","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5286-188X","authenticated-orcid":false,"given":"Aiqing","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,28]]},"reference":[{"issue":"4","key":"995_CR1","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1109\/JBHI.2014.2300846","volume":"18","author":"A Abbas","year":"2014","unstructured":"Abbas, A., and Khan, S. U., A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE Journal of Biomedical and Health Informatics 18(4):1431\u20131441, 2014.","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"issue":"2","key":"995_CR2","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/JBHI.2013.2292829","volume":"18","author":"Q Shen","year":"2014","unstructured":"Shen, Q., Liang, X., Shen, X., Lin, X., and Luo, H., Exploiting geo-distributed clouds for a e-Health monitoring system with minimum service delay and privacy preservation. IEEE Journal of Biomedical and Health Informatics 18(2):430\u2013439, 2014.","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"issue":"4","key":"995_CR3","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TIFS.2015.2509912","volume":"11","author":"Y Yang","year":"2016","unstructured":"Yang, Y., and Ma, M., Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-Health clouds. IEEE Transactions on Information Forensics and Security 11(4):746\u2013759, 2016.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"7","key":"995_CR4","doi-asserted-by":"publisher","first-page":"1332","DOI":"10.1109\/JSTSP.2015.2427113","volume":"9","author":"J Zhou","year":"2015","unstructured":"Zhou, J., Cao, Z., Dong, X., and Lin, X., PPDM: A Privacy-preserving protocol for cloud-assisted e-Healthcare systems. IEEE Journal of Selected Topics in Signal Processing 9(7):1332\u20131344, 2015.","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"995_CR5","doi-asserted-by":"publisher","unstructured":"Zhang, Z., Dong, M., Zhu, L., Guan, Z., Chen, R., Xu, R., and Ota, K.: Achieving privacy-friendly storage and secure Statistics for smart meter data on outsourced clouds, IEEE Transactions on Cloud Computing. https:\/\/doi.org\/10.1109\/TCC.2017.2685583","DOI":"10.1109\/TCC.2017.2685583"},{"issue":"7","key":"995_CR6","doi-asserted-by":"publisher","first-page":"4900","DOI":"10.1109\/TVT.2015.2466651","volume":"65","author":"S Chang","year":"2016","unstructured":"Chang, S., Zhu, H., Dong, M., Ota, K., Liu, X., and Shen, X., Private and flexible urban message delivery. IEEE Transactions on Vehicular Technology 65(7):4900\u20134910, 2016.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"1","key":"995_CR7","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MCC.2018.011791712","volume":"5","author":"C Esposito","year":"2018","unstructured":"Esposito, C., De Santis, A., Tortora, G., Chang, H., and Choo, K. K. R., Blockchain: a panacea for healthcare cloud-based data security and privacy?. IEEE Cloud Computing 5(1):31\u201337, 2018.","journal-title":"IEEE Cloud Computing"},{"issue":"2","key":"995_CR8","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1109\/JIOT.2018.2812239","volume":"5","author":"O Novo","year":"2018","unstructured":"Novo, O., Blockchain meets IoT: An architecture for scalable access management in IoT. IEEE Internet of Things Journal 5(2):1184\u20131195, 2018.","journal-title":"IEEE Internet of Things Journal"},{"key":"995_CR9","doi-asserted-by":"publisher","first-page":"17545","DOI":"10.1109\/ACCESS.2018.2805837","volume":"6","author":"J Wang","year":"2018","unstructured":"Wang, J., Li, M., He, Y., Li, H., Xiao, K., and Wang, C., A blockchain based privacy-preserving incentive mechanism in crowdsensing applications. IEEE Access 6:17545\u201317556, 2018.","journal-title":"IEEE Access"},{"issue":"12","key":"995_CR10","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/MCOM.2017.1700879","volume":"55","author":"A Dorri","year":"2017","unstructured":"Dorri, A., Steger, M., Kanhere, S. S., and Jurdak, R., Blockchain: A distributed solution to automotive security and privacy. IEEE Communications Magazine 55(12):119\u2013125, 2017.","journal-title":"IEEE Communications Magazine"},{"issue":"44","key":"995_CR11","first-page":"1","volume":"8","author":"Q Xia","year":"2017","unstructured":"Xia, Q., Sifah, E., Smahi, A., Amofa, S., and Zhang, X., BBDS: Blockchain-Based data sharing for electronic medical records in cloud environments. Information 8(44):1\u201316, 2017.","journal-title":"Information"},{"issue":"6","key":"995_CR12","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1093\/jamia\/ocx068","volume":"24","author":"T Kuo","year":"2017","unstructured":"Kuo, T., Kim, H., and Ohno-Machado, L., Blockchain distributed ledger technologies for biomedical and health care applications. Journal of the American Medical Informatics Association 24(6):1211\u20131220, 2017.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"995_CR13","doi-asserted-by":"publisher","unstructured":"Xia, Q., Sifah, E. B., Asamoah, K. O., Gao, J., and Du, X.: MeDShare: Trust-less medical data sharing among cloud service providers via blockchain, IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2017.2730843","DOI":"10.1109\/ACCESS.2017.2730843"},{"issue":"10","key":"995_CR14","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/s10916-016-0574-6","volume":"40","author":"X Yue","year":"2016","unstructured":"Yue, X., Wang, H., Jin, D., Li, M., and Jiang, W., Healthcare data gateways: Found healthcare intelligence on blockchain with novel privacy risk control. Journal of Medical Systems 40(10):218 , 2016.","journal-title":"Journal of Medical Systems"},{"key":"995_CR15","unstructured":"Zyskind, G., Nathan, O., and Pentland, A.: Decentralizing privacy: Using blockchain to protect personal data. IEEE Security and Privacy Workshops: San Jose, 18\u201320, 2015"},{"key":"995_CR16","doi-asserted-by":"crossref","unstructured":"Azaria, A., Ekblaw, A., Vieiraand, T., and Lippmanl, A.: Medrec: Using blockchain for medical data access and permission management. IEEE International Conference on Open and Big Data, 25\u201330, 2016","DOI":"10.1109\/OBD.2016.11"},{"issue":"99","key":"995_CR17","doi-asserted-by":"publisher","first-page":"9239","DOI":"10.1109\/ACCESS.2016.2645904","volume":"4","author":"J Zhang","year":"2016","unstructured":"Zhang, J., Xue, N., and Huang, X., A secure system for pervasive social network-based healthcare. IEEE Access 4(99):9239\u20139250, 2016.","journal-title":"IEEE Access"},{"key":"995_CR18","unstructured":"Peterson, K., Deeduvanu, R., Kanjamala, P., and Boles, K.: A blockchain-based approach to health information exchange networks"},{"key":"995_CR19","unstructured":"Shae, Z., and Tsai, J.: On the design of a blockchain platform for clinical trial and precision medicine. International Conference on Distributed Computing Systems (ICDCS 2017): Atlanta , 2017"},{"key":"995_CR20","unstructured":"Zhao, H., Zhang, Y., Peng, Y., and Xu, R.: Lightweight backup and efficient recovery scheme for health blockchain keys. IEEE International Symposium on Autonomous Decentralized System (ISADS): Bangkok, 22\u201324, 2017"},{"key":"995_CR21","first-page":"506","volume-title":"Public key encryption with keyword search, EUROCRYPT 2004, LNCS, Vol. 3027","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Crescenzo, G. D., Ostrovsky, R., and Persiano, G., Public key encryption with keyword search, EUROCRYPT 2004, LNCS. Vol. 3027, pp. 506\u2013522. Berlin: Springer, 2004."},{"key":"995_CR22","unstructured":"Baek, J., Safavi-Naini, R., and Susilo, W.: Public key encryption with keyword search revisited, International Conference on Computational Sciences and its Applications (ICCSA): Perugia, 2008"},{"issue":"3","key":"995_CR23","doi-asserted-by":"publisher","first-page":"716","DOI":"10.4304\/jcp.7.3.716-723","volume":"7","author":"C Hu","year":"2012","unstructured":"Hu, C., and Liu, P., An enhanced searchable public key encryption scheme with a designated tester and its extensions. Journal of Computer 7(3):716\u2013723, 2012.","journal-title":"Journal of Computer"},{"issue":"13","key":"995_CR24","doi-asserted-by":"publisher","first-page":"2576","DOI":"10.1016\/j.ins.2010.03.026","volume":"180","author":"J Shao","year":"2010","unstructured":"Shao, J., Cao, Z., Liang, X., and Lin, H., Proxy re-encryption with keyword search. Information Science 180(13):2576\u20132587, 2010.","journal-title":"Information Science"},{"key":"995_CR25","unstructured":"Yau, W., Phan, R., Heng, S., and Goi, B.: Proxy re-encryption with keyword search: New definitions and algorithms. International Conference, SecTech and DRBC: Jeju Island, 13\u201315, 2010"},{"issue":"2-3","key":"995_CR26","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1016\/j.jco.2003.08.023","volume":"20","author":"W Ogata","year":"2004","unstructured":"Ogata, W., and Kurosawa, K., Oblivious keyword search. Journal of Complexity 20(2-3):356\u2013371, 2004.","journal-title":"Journal of Complexity"},{"key":"995_CR27","unstructured":"Ryu, E., and Takagi, T.: Efficient conjunctive keyword-searchable encryption. IEEE 21st International Conference on Advanced Information Networking and Applications: Niagara Falls, 21\u201323, 2007"},{"key":"995_CR28","unstructured":"Bethencourt, J., Song, D., and Waters, B.: New constructions and practical applications for private stream searching (extended abstract). IEEE Symposium on Security & Privacy: Berkeley, 21\u201324, 2006"},{"key":"995_CR29","unstructured":"Boneh, D., and Waters, B., Conjunctive, subset, and range queries on encrypted data, TCC 2007, LNCS. Vol. 4392, pp. 535\u2013554. Berlin: Springer, 2007."},{"key":"995_CR30","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.jss.2011.09.035","volume":"85","author":"X Wang","year":"2012","unstructured":"Wang, X., Huang, X., Yang, X., Liu, L., and Wu, X., Further observation on proxy re-encryption with keyword search. The Journal of Systems and Software 85:643\u2013654, 2012.","journal-title":"The Journal of Systems and Software"},{"key":"995_CR31","unstructured":"Castro, M., and liskov, B.: Practical Byzantine Fault Tolerance, the Third Symposium on Operating Systems Design and Implementation: New Orleans, 1999"},{"key":"995_CR32","unstructured":"HL7. HL7 Fast Healthcare Interoperability Resources (FHIR). https:\/\/www.hl7.org\/fhir\/ . Accessed: 2017-11-20"},{"key":"995_CR33","unstructured":"Leftwich, R.: The path to deriving clinical value from FHIR - InterSystems, http:\/\/www.intersystems.com\/library\/library-item\/path-deriving-clinical-value-fhir\/ . Accessed: 2017-11-20"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-018-0995-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-0995-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-0995-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T11:31:51Z","timestamp":1693740711000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-018-0995-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,28]]},"references-count":33,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["995"],"URL":"https:\/\/doi.org\/10.1007\/s10916-018-0995-5","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,28]]},"assertion":[{"value":"28 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"Author Aiqing Zhang declares that she has no conflict of interest. Author Xiaodong Lin declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Ethical approval"}}],"article-number":"140"}}