{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T21:04:35Z","timestamp":1777928675854,"version":"3.51.4"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T00:00:00Z","timestamp":1618012800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T00:00:00Z","timestamp":1618012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11042-021-10817-z","type":"journal-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T18:02:15Z","timestamp":1618077735000},"page":"22065-22085","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Multi keyword searchable attribute based encryption for efficient retrieval of health Records in Cloud"],"prefix":"10.1007","volume":"81","author":[{"given":"D.","family":"Sangeetha","sequence":"first","affiliation":[]},{"given":"S. Sibi","family":"Chakkaravarthy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8236-4104","authenticated-orcid":false,"given":"Suresh Chandra","family":"Satapathy","sequence":"additional","affiliation":[]},{"given":"V.","family":"Vaidehi","sequence":"additional","affiliation":[]},{"given":"Meenalosini Vimal","family":"Cruz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,10]]},"reference":[{"key":"10817_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order- preserving encryption for numeric data. In: SIGMOD 2004, pp. 563\u2013574. ACM, New York","DOI":"10.1145\/1007568.1007632"},{"key":"10817_CR2","doi-asserted-by":"publisher","unstructured":"Besher KM, Subah Z, Ali MZ IoT Sensor Initiated Healthcare Data Security, in IEEE Sens J. https:\/\/doi.org\/10.1109\/JSEN.2020.3013634.","DOI":"10.1109\/JSEN.2020.3013634"},{"key":"10817_CR3","doi-asserted-by":"crossref","unstructured":"Boldyreva A, Chenette N, Lee Y, O\u2019Neill A (2009) Order-preserving symmetric encryption, advances in cryptology - EUROCRYPT 2009. Lecture Notes in Com- puter Science, vol 5479","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"10817_CR4","doi-asserted-by":"crossref","unstructured":"Borse Manoj V, Bhandure Harshad D, Patil Dhiraj M, Bhad Pratik B (2014) Location Based Encryption-Decryption Approach for Data Security, Int J Comput Appl Technol Res. Volume 3\u2013 Issue 10, 610\u2013611","DOI":"10.7753\/IJCATR0310.1002"},{"key":"10817_CR5","doi-asserted-by":"crossref","unstructured":"Cao N, Wang C, Li M, Ren K, Lou W (2011) Privacy-preserving multi-keyword ranked search over encrypted cloud data, Proc IEEE INFOCOM, pp. 829\u2013837","DOI":"10.1109\/INFCOM.2011.5935306"},{"issue":"1","key":"10817_CR6","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao N, Wang C, Li M, Ren K, Lou W (Jan. 2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distributed Syst 25(1):222\u2013233","journal-title":"IEEE Trans Parallel Distributed Syst"},{"key":"10817_CR7","doi-asserted-by":"publisher","unstructured":"Ding J, Errapotu SM, Guo Y, Zhang H, Yuan D, Pan M Private Empirical Risk Minimization with Analytic Gaussian Mechanism for Healthcare System, in IEEE Trans Big Data. https:\/\/doi.org\/10.1109\/TBDATA.2020.2997732.","DOI":"10.1109\/TBDATA.2020.2997732"},{"key":"10817_CR8","doi-asserted-by":"publisher","first-page":"7397","DOI":"10.1007\/s13369-018-3104-7","volume":"43","author":"L Dolendro Singh","year":"2018","unstructured":"Dolendro Singh L, Manglem Singh K (2018) Visually meaningful multi-image encryption scheme. Arab J Sci Eng 43:7397\u20137407. https:\/\/doi.org\/10.1007\/s13369-018-3104-7","journal-title":"Arab J Sci Eng"},{"key":"10817_CR9","doi-asserted-by":"crossref","unstructured":"Golle P, Staddon J, Wa-ters B (2004) Secure Conjunctive Keyword Search over Encrypted Data","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"10817_CR10","doi-asserted-by":"crossref","unstructured":"Guo, Cheng, et al. (2016) Fine-Grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds. J Med Syst, vol. 40, no. 11","DOI":"10.1007\/s10916-016-0588-0"},{"issue":"2","key":"10817_CR11","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1109\/JIOT.2018.2845106","volume":"6","author":"C Guo","year":"2019","unstructured":"Guo C, Zhuang R, Jie Y, Choo KR, Tang X (2019a) Secure range search over encrypted uncertain IoT outsourced data. IEEE Internet Things J 6(2):1520\u20131529","journal-title":"IEEE Internet Things J"},{"key":"10817_CR12","unstructured":"Guo C, Su S, Choo KR, Tang X (2019b) A Fast Nearest Neighbor Search Scheme over Outsourced Encrypted Medical Images, in IEEE Trans Ind Inf"},{"key":"10817_CR13","doi-asserted-by":"crossref","unstructured":"Guo C, Chen X, Jie Y, Zhangjie F, Li M, Feng B (2019c) Dynamic Multi-phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption, in IEEE Trans Service Comput.","DOI":"10.1109\/TSC.2017.2768045"},{"key":"10817_CR14","doi-asserted-by":"publisher","first-page":"3559","DOI":"10.1007\/s13369-018-3580-9","volume":"44","author":"R Handa","year":"2019","unstructured":"Handa R, Rama Krishna C, Aggarwal N (2019) Keyword binning-based efficient search on encrypted cloud data. Arab J Sci Eng 44:3559\u20133584","journal-title":"Arab J Sci Eng"},{"key":"10817_CR15","doi-asserted-by":"publisher","unstructured":"Karimi R, Kalantari M (2011) Enhancing security and confidentiality in location based data encryption algorithms, IEEE, pp 30\u201335. https:\/\/doi.org\/10.1109\/ICADIWT.2011.6041421","DOI":"10.1109\/ICADIWT.2011.6041421"},{"key":"10817_CR16","doi-asserted-by":"crossref","unstructured":"Kaushik K, Varadharajan V, Nallusamy R (2013) Multi-user Attribute Based Searchable Encryption, 2013 IEEE 14th international conference on Mobile data man- agement, Milan, 200\u2013205","DOI":"10.1109\/MDM.2013.94"},{"key":"10817_CR17","doi-asserted-by":"publisher","unstructured":"Krall A, Finke D, Yang H Mosaic Privacy-preserving Mechanisms for Healthcare Analytics, in IEEE J Biomed Health Inf. https:\/\/doi.org\/10.1109\/JBHI.2020.3036422.","DOI":"10.1109\/JBHI.2020.3036422"},{"key":"10817_CR18","doi-asserted-by":"crossref","unstructured":"Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health Records in Cloud Computing using attribute-based encryption. IEEE trans parallel distributed syst Vol:24 no:1 year","DOI":"10.1109\/TPDS.2012.97"},{"key":"10817_CR19","doi-asserted-by":"publisher","first-page":"1532","DOI":"10.1016\/j.jcss.2014.12.026","volume":"81","author":"J Li","year":"2015","unstructured":"Li J, Chen XF, Xhafa F, Barolli L (2015a) Secure deduplication storage systems supporting keyword search. J Comput Syst Sci 81:1532\u20131541","journal-title":"J Comput Syst Sci"},{"key":"10817_CR20","doi-asserted-by":"crossref","unstructured":"Jin Li, Yan Kit Li, Xiao Feng Chen, Patrick P.C. Lee, and Wenjing Lou (2015b) A Hybrid Cloud Approach for Secure Authorized Deduplication, IEEE Trans Parallel Distribute Syst, Vol. 26, No. 5","DOI":"10.1109\/TPDS.2014.2318320"},{"issue":"9","key":"10817_CR21","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1109\/TIFS.2015.2442215","volume":"10","author":"K Liang","year":"2015","unstructured":"Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981\u20131992","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10817_CR22","doi-asserted-by":"crossref","unstructured":"Liang K, Fang L, Susilo W, Wong DS (2013) A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security","DOI":"10.1109\/INCoS.2013.103"},{"issue":"10","key":"10817_CR23","doi-asserted-by":"publisher","first-page":"1667","DOI":"10.1109\/TIFS.2014.2346023","volume":"9","author":"K Liang","year":"2014","unstructured":"Liang K, Au MH, Liu JK, Susilo W, Wong DS, Yang G, Phuong TVX, Xie Q (2014) A DFA-based functional proxy re- encryption scheme for secure public cloud data sharing. IEEE Trans Inf Forensics Secur 9(10):1667\u20131680","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"10817_CR24","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MIC.2011.44","volume":"15","author":"D Miloji\u010di\u0107","year":"2011","unstructured":"Miloji\u010di\u0107 D, Llorente IM, Montero RS (2011) OpenNebula: A Cloud Management Tool. IEEE Internet Comput 15(2):11\u201314","journal-title":"IEEE Internet Comput"},{"key":"10817_CR25","doi-asserted-by":"crossref","unstructured":"Sahai A, Goyal V, Pandey O, Wa-ters B (2005) Attribute-based encryption for fine-grained access control of encrypted data. IEEE transactions on parallel and distributed systems year","DOI":"10.1145\/1180405.1180418"},{"key":"10817_CR26","unstructured":"Vidya S, Vani K, Kavin Priya D (2012) \u201cSecured per- sonal health records transactions using Homomorphic encryption in cloud computing. Int J Eng Res Technol volume 1\u2013 issue 10"},{"key":"10817_CR27","unstructured":"Wang B, Fan X (2016) Search ranges efficiently and compatibly as keywords over encrypted data, IEEE Trans Dependable Secure Comput"},{"key":"10817_CR28","doi-asserted-by":"crossref","unstructured":"Wang Q, Zhu Y*, Luo X, Multi-user Searchable Encryption with Fine-Grained Access Control without Key Sharing, 2014 3rd International Conference on Advanced Computer Science Applications and Technolo- gies.","DOI":"10.1109\/ACSAT.2014.32"},{"key":"10817_CR29","doi-asserted-by":"crossref","unstructured":"Wang B, Song W, Lou W, Hou YT (2015) Inverted index based multi-keyword public-key searchable encryp- tion with strong privacy guarantee, 2015 IEEE Confer- ence on Computer Communications (INFOCOM), Kowloon, 2092\u20132100","DOI":"10.1109\/INFOCOM.2015.7218594"},{"key":"10817_CR30","doi-asserted-by":"publisher","first-page":"50136","DOI":"10.1109\/ACCESS.2019.2910828","volume":"7","author":"S Wang","year":"2019","unstructured":"Wang S, Jia S, Zhang Y (2019) Verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage. IEEE Access 7:50136\u201350147","journal-title":"IEEE Access"},{"issue":"2","key":"10817_CR31","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2016) A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Trans Parallel Distributed Syst 27(2):340\u2013352","journal-title":"IEEE Trans Parallel Distributed Syst"},{"key":"10817_CR32","doi-asserted-by":"crossref","unstructured":"Ya-ling Z, Kai L, Shang-ping W, Qin-dong S, A Multi-users Searchable Encryption Scheme with Proxy Re-encryption, 2014 10th International Conference on Computational Intelligence and Security.","DOI":"10.1109\/CIS.2014.167"},{"key":"10817_CR33","doi-asserted-by":"crossref","unstructured":"Zhang C, Zhang Y, Zhang W, X. Lin (2016) Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search, IEEE Trans Knowledge Data Eng, vol. 28, no.7, pp.1706-1721","DOI":"10.1109\/TKDE.2016.2530060"},{"key":"10817_CR34","doi-asserted-by":"crossref","unstructured":"Zheng Q, Xu S, Ateniese G (2014) VABKS:Verifiable attribute-based keyword search over outsourced encrypted data, in Proc. IEEE Conf. Comput. Commun. (INFOCOM), Toronto, ON, Canada, pp.522\u2013530.","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"10817_CR35","doi-asserted-by":"publisher","unstructured":"Zhou T, Shen J, He D, Vijayakumar P, Kumar N Human-in-the-Loop-Aided Privacy-Preserving Scheme for Smart Healthcare, IEEE Trans Emerg Topics Comput Intell. https:\/\/doi.org\/10.1109\/TETCI.2020.2993841.","DOI":"10.1109\/TETCI.2020.2993841"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10817-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10817-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10817-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T07:25:13Z","timestamp":1655882713000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10817-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,10]]},"references-count":35,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["10817"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10817-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,10]]},"assertion":[{"value":"25 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"All authors have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}