{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:03:50Z","timestamp":1771517030944,"version":"3.50.1"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T00:00:00Z","timestamp":1572048000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T00:00:00Z","timestamp":1572048000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s11036-019-01379-4","type":"journal-article","created":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T13:08:35Z","timestamp":1572095315000},"page":"1755-1762","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["An Attempt to Design Improved and Fool Proof Safe Distribution of Personal Healthcare Records for Cloud Computing"],"prefix":"10.1007","volume":"24","author":[{"given":"P.","family":"Preethi","sequence":"first","affiliation":[]},{"given":"R.","family":"Asokan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,26]]},"reference":[{"key":"1379_CR1","first-page":"1","volume":"2","author":"K Satheesh","year":"2018","unstructured":"Satheesh K, Ram Kumar A (2018) Scalable and Secure Distribution of Medical Records in Cloud Computing Using Multi-Authority and Element -Based Encryption. International Journal of Research in Computer, Communicative Engineering and Technology 2:1","journal-title":"International Journal of Research in Computer, Communicative Engineering and Technology"},{"issue":"22","key":"1379_CR2","first-page":"637","volume":"118","author":"D Mohan","year":"2018","unstructured":"Mohan D, Rabbani SW, Mangalagowri R (2018) Data Sharing Strategy in Cloud Computing Using Element Based Encryption. International Journal of Pure and Applied Mathematics 118(22):637\u2013640","journal-title":"International Journal of Pure and Applied Mathematics"},{"key":"1379_CR3","first-page":"3","volume":"5","author":"D Supriya","year":"2018","unstructured":"Supriya D, Talekar K, Raskar R, Chavans P (2018) Attribute Based Access Control in Personal Health Records Using Cloud Computing. International Research Journal of Engineering, Communication and Technology 5:3","journal-title":"International Research Journal of Engineering, Communication and Technology"},{"key":"1379_CR4","doi-asserted-by":"crossref","unstructured":"Ali M, Abbas A, Khan U, Khan SU (2018) SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud. IEEE Transactions on Cloud Computing 1","DOI":"10.1109\/TCC.2018.2854790"},{"key":"1379_CR5","doi-asserted-by":"crossref","unstructured":"Sun W, Cai Z, Li Y, Liu F, Fang S, Wang G (2018) Security and Privacy in Medical Internet of Things: A Review. Journal of Security and Communication Networks","DOI":"10.1155\/2018\/5978636"},{"issue":"4","key":"1379_CR6","first-page":"124","volume":"2","author":"C Safeena","year":"2018","unstructured":"Safeena C, Nagarajan VP (2018) Ensuring the Privacy of Patient Health Records (PHR) Sharing Scheme in Public Cloud by the Hybrid Encryption Cryptography. Asian Journal of Applied Science and Technology 2(4):124\u2013131","journal-title":"Asian Journal of Applied Science and Technology"},{"key":"1379_CR7","doi-asserted-by":"crossref","unstructured":"Salama U, Yao L, Paik H\u2013Y (2018) An Internet of Things Based Multi-LevelPrivacy-PreservingAccess Control for Smart Living. In: Informatics Journal 5(23)","DOI":"10.3390\/informatics5020023"},{"key":"1379_CR8","unstructured":"Sreesaila B, Abinaya K, Swarnalatha M, Sugumar R (2018) Aadhaar Card Based Health Records Monitoring System. International Journal of Innovative Research in Computer Engineering and Technology 7(2)"},{"key":"1379_CR9","first-page":"3","volume":"4","author":"R Gokula Priya","year":"2018","unstructured":"Gokula Priya R, Madhu UP, Yuvashree M, Karthikeyan M (2018) A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing. International Journal of Engineering Research in Computer Science and Engineering 4:3","journal-title":"International Journal of Engineering Research in Computer Science and Engineering"},{"key":"1379_CR10","unstructured":"Abdulla R (2017) Safe Sharing of Health Records in Cloud Repositories Using HABSE. IOSR Journal of Electronics and Communication Engineering:62\u201367"},{"key":"1379_CR11","unstructured":"Vaishnavi Y, Patel C, Vithlani S, Bhojak P (2017) Secret Distribution of Health Records in Cloud Using Attribute-Based Encryption. Int J Comput Eng Sci 7(1)"},{"key":"1379_CR12","unstructured":"Pagar S, Yadhav R, Boraste S, Bairagi H (2017) Sharing of PHR on Cloud Using Attribute-Based Encryption and Access by QR \u2013 Code. International Research Journal of Engineering, Communication and Technology 4(2)"},{"key":"1379_CR13","doi-asserted-by":"crossref","unstructured":"Zheng H, Wu J, Wang B, Chen J (2017) Modified Ciphertext-PolicyAttribute-Based Encryption Scheme with Efficient Revocation for PHR System. Journal of Mathematical Problems in Engineering","DOI":"10.1155\/2017\/6808190"},{"key":"1379_CR14","unstructured":"Mafawez A, Qawqzeh Y (2017) Proposed PHR Architecture for Saudi Arabia Health Services. J Eng Appl Sci 4(1)"},{"key":"1379_CR15","unstructured":"Varshini BV, Vigilson Prem M, Geethapriya J (2017) A Review on Secure Data Sharing in Cloud Computing Environment. International Journal of Advanced Research in Computer Engineering, Communication and Technology 6(3)"},{"key":"1379_CR16","doi-asserted-by":"crossref","unstructured":"Kumarasamy S, Asokan R (2011) An Efficient Detection Mechanism for Distributed Denial of Service (DDoS) Attack. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT) 1(5)","DOI":"10.5121\/ijcseit.2011.1504"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01379-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-019-01379-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01379-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,24]],"date-time":"2020-10-24T23:25:34Z","timestamp":1603581934000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-019-01379-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,26]]},"references-count":16,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1379"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01379-4","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,26]]},"assertion":[{"value":"26 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}