{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T22:20:33Z","timestamp":1767219633910},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"26","license":[{"start":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T00:00:00Z","timestamp":1679875200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T00:00:00Z","timestamp":1679875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s11042-023-15006-8","type":"journal-article","created":{"date-parts":[[2023,4,4]],"date-time":"2023-04-04T15:12:59Z","timestamp":1680621179000},"page":"40443-40472","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Collusion-resistant and privacy-preserving data sharing scheme on outsourced data in e-healthcare system"],"prefix":"10.1007","volume":"82","author":[{"given":"Chanchal","family":"Maurya","sequence":"first","affiliation":[]},{"given":"Vijay Kumar","family":"Chaurasiya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,27]]},"reference":[{"key":"15006_CR1","unstructured":"AVISPA (2019) Automated validation of internet security protocols and applications. http:\/\/www.avispa-project.org\/. Accessed: Oct 2019"},{"issue":"5","key":"15006_CR2","doi-asserted-by":"publisher","first-page":"1235","DOI":"10.3390\/s19051235","volume":"19","author":"O Agyekum","year":"2019","unstructured":"Agyekum O, Opuni-Boachie K, Qi X, Sifah EB, Gao J, Xia H, Xiaojiang D, Guizani M (2019) A secured proxy-based data sharing module in IoT environments using blockchain. Sensors 19(5):1235","journal-title":"Sensors"},{"key":"15006_CR3","doi-asserted-by":"publisher","first-page":"3619","DOI":"10.1109\/ACCESS.2017.2779844","volume":"6","author":"GA Akpakwu","year":"2018","unstructured":"Akpakwu GA, Silva BJ, Hancke GP, Abu-Mahfouz AM (2018) A survey on 5G networks for the internet of things: communication technologies and challenges. IEEE Access 6:3619\u20133647","journal-title":"IEEE Access"},{"key":"15006_CR4","unstructured":"Ali M, Abbas A, Khan U, Khan SU (2018) SeSPHR: a methodology for secure sharing of personal health records in the cloud. IEEE Trans Cloud Comput"},{"key":"15006_CR5","doi-asserted-by":"publisher","first-page":"23951","DOI":"10.1109\/ACCESS.2020.2969957","volume":"8","author":"M Ali","year":"2020","unstructured":"Ali M, Sadeghi M-R, Liu X (2020) Lightweight revocable hierarchical attribute-based encryption for internet of things. IEEE Access 8:23951\u201323964","journal-title":"IEEE Access"},{"key":"15006_CR6","doi-asserted-by":"publisher","first-page":"12601","DOI":"10.1109\/ACCESS.2017.2716439","volume":"5","author":"A Ara","year":"2017","unstructured":"Ara A, Al-Rodhaan M, Tian Y, Al-Dhelaan A (2017) A secure privacy-preserving data aggregation scheme based on bilinear ElGamal cryptosystem for remote health monitoring systems. IEEE Access 5:12601\u201312617","journal-title":"IEEE Access"},{"key":"15006_CR7","unstructured":"Ateniese G, Fu K, Green M, Hohenberger S (2005) Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proc. of the 12th Annual network and distributed system security symposium, pp 29\u201344"},{"key":"15006_CR8","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on security and privacy (SP\u201907), IEEE, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"15006_CR9","doi-asserted-by":"crossref","unstructured":"Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Proceedings of Eurocrypt \u201998. vol 1403, pp 127\u2013144","DOI":"10.1007\/BFb0054122"},{"key":"15006_CR10","doi-asserted-by":"crossref","unstructured":"Bleichenbacher D (1998) Chosen cipher-text attacks against protocols based on the RSA encryption standard PKCS 1. In: Annual international cryptology conference. Springer, Berlin, pp 1\u201312","DOI":"10.1007\/BFb0055716"},{"key":"15006_CR11","doi-asserted-by":"crossref","unstructured":"Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. In: Annual international cryptology conference. Springer, Berlin, pp 213\u2013229","DOI":"10.1007\/3-540-44647-8_13"},{"issue":"12","key":"15006_CR12","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCOM.2009.5350373","volume":"47","author":"H Cao","year":"2009","unstructured":"Cao H, Leung V, Chow C, Chan H (2009) Enabling technologies for wireless body area networks a survey and outlook. IEEE Commun Mag 47(12):84\u201393","journal-title":"IEEE Commun Mag"},{"key":"15006_CR13","doi-asserted-by":"crossref","unstructured":"Chu C, Tzeng W (2007) Identity-based proxy re-encryption without random oracles. In: Garay JA, Lenstra AK, Mambo M, Peralta R (eds) ISC 2007. LNCS, vol. 4779. Springer, Berlin, pp 189\u2013202","DOI":"10.1007\/978-3-540-75496-1_13"},{"key":"15006_CR14","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.ins.2019.09.052","volume":"511","author":"H Deng","year":"2020","unstructured":"Deng H, Qin Z, Qianhong W, Guan Z, Zhou Y (2020) Flexible attribute-based proxy re-encryption for efficient data sharing. Inf Sci 511:94\u2013113","journal-title":"Inf Sci"},{"issue":"20","key":"15006_CR15","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.tcs.2012.08.017","volume":"462","author":"L Fang","year":"2012","unstructured":"Fang L, Susilo W, Ge C, Wang J (2012) Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theor Comput Sci 462(20):39\u201358","journal-title":"Theor Comput Sci"},{"key":"15006_CR16","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.protcy.2013.12.183","volume":"11","author":"A Ghazvini","year":"2013","unstructured":"Ghazvini A, Shukur Z (2013) Security challenges and success factors of electronic healthcare system. Procedia Technol 11:212\u2013219","journal-title":"Procedia Technol"},{"key":"15006_CR17","doi-asserted-by":"crossref","unstructured":"Gupta A, Chaurasiya VK (2019) Reinforcement learning based energy management in wireless body area network: a survey. In: 2019 IEEE Conference on information and communication technology, IEEE, pp 1\u20136","DOI":"10.1109\/CICT48419.2019.9066260"},{"issue":"1","key":"15006_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSSCI.309709","volume":"14","author":"A Hidalgo","year":"2022","unstructured":"Hidalgo A, P\u00e9rez N, Lemus-Aguilar I (2022) Factors Determining the Success of eHealth Innovation Projects. Int J Softw Sci Comput Intell (IJSSCI) 14 (1):1\u201322","journal-title":"Int J Softw Sci Comput Intell (IJSSCI)"},{"key":"15006_CR19","doi-asserted-by":"crossref","unstructured":"Hong H, Liu X, Sun Z (2018) A fine-grained attribute based data retrieval with proxy re-encryption scheme for data outsourcing systems. Mob Netw Appl 1\u20136","DOI":"10.1007\/s11036-018-1102-3"},{"key":"15006_CR20","doi-asserted-by":"publisher","first-page":"1523","DOI":"10.1016\/j.future.2017.05.026","volume":"86","author":"Q Huang","year":"2018","unstructured":"Huang Q, Yang Y, Jingyi F (2018) PRECISE Identity-based private data sharing with conditional proxy re-encryption in online social networks. Futur Gener Comput Syst 86:1523\u20131533","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"15006_CR21","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/TGCN.2021.3081616","volume":"5","author":"M Kaur","year":"2021","unstructured":"Kaur M, Singh D, Kumar V, Gupta BB, Abd El-Latif AA (2021) Secure and energy efficient-based E-health care framework for green internet of things. IEEE Trans Green Commun Netw 5(3):1223\u20131231","journal-title":"IEEE Trans Green Commun Netw"},{"key":"15006_CR22","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential Power Analysis. In: Proceedings of 19th Annual international cryptology conference (CRYPTO\u201999), Lecture Notes in Computer Science, vol 1666, Santa Barbara, California, USA, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"15006_CR23","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414465","volume-title":"Expressive, CP-ABE with partially hidden access structures","author":"J Lai","year":"2012","unstructured":"Lai J, Deng RH, Li Y (2012) Expressive, CP-ABE with partially hidden access structures. Computerand Communications Security, Seoul"},{"key":"15006_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","volume":"72","author":"J Li","year":"2018","unstructured":"Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1\u201312","journal-title":"Comput Secur"},{"issue":"8","key":"15006_CR25","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s10916-018-0997-3","volume":"42","author":"H Li","year":"2018","unstructured":"Li H, Zhu L, Shen M, Gao F, Tao X, Liu S (2018) Blockchain-based data preservation system for medical data. J Med Syst 42(8):141","journal-title":"J Med Syst"},{"key":"15006_CR26","doi-asserted-by":"crossref","unstructured":"Liang K, Liu JK, Wong DS, Susilo W (2014) An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Computer security ESORICS 2014, Springer, pp 257\u2013272","DOI":"10.1007\/978-3-319-11203-9_15"},{"key":"15006_CR27","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.future.2014.11.016","volume":"52","author":"K Liang","year":"2015","unstructured":"Liang K, Man Ho A, Liu JK, Susilo W, Wong DS, Yang G, Yong Y, Yang A (2015) A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Futur Gener Comput Syst 52:95\u2013108","journal-title":"Futur Gener Comput Syst"},{"key":"15006_CR28","first-page":"125","volume":"47","author":"Y Liu","year":"2019","unstructured":"Liu Y, Ren Y, Ge C, Xia J, Wang Q (2019) A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system. J Inf Secur Appl 47:125\u2013131","journal-title":"J Inf Secur Appl"},{"key":"15006_CR29","doi-asserted-by":"crossref","unstructured":"Luo W, Ma, W (2018) A secure revocable identity-based proxy re-encryption scheme for cloud storage. In: International conference on cloud computing and security. Springer, Cham, pp 519\u2013530","DOI":"10.1007\/978-3-030-00009-7_47"},{"key":"15006_CR30","unstructured":"Nakamoto S (2019) Bitcoin: a peer-to-peer electronic cash system. Manubot"},{"key":"15006_CR31","doi-asserted-by":"crossref","unstructured":"Plageras AP, Stergiou C, Kokkonis G, Psannis KE, Ishibashi Y, Kim BG, Gupta BB (2017) Efficient large-scale medical data (ehealth big data) analytics in internet of things. In: 2017 IEEE 19th Conference on business informatics (CBI), vol 2, IEEE, pp 21\u201327","DOI":"10.1109\/CBI.2017.3"},{"key":"15006_CR32","doi-asserted-by":"publisher","first-page":"101291","DOI":"10.1016\/j.pmcj.2020.101291","volume":"69","author":"AN Raghav","year":"2020","unstructured":"Raghav AN, Venkatesan S, Verma S (2020) poEWAL: a lightweight consensus mechanism for blockchain in IoT. Pervasive Mob Comput 69:101291","journal-title":"Pervasive Mob Comput"},{"issue":"1","key":"15006_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSWIS.300820","volume":"18","author":"SC Rasmusen","year":"2022","unstructured":"Rasmusen SC, Penz M, Widauer S, Nako P, Kurteva A, Roa-Valverde A, Fensel A (2022) Raising consent awareness with gamification and knowledge graphs: an automotive use case. Int J Semant Web Inf Syst (IJSWIS) 18(1):1\u201321","journal-title":"Int J Semant Web Inf Syst (IJSWIS)"},{"issue":"1","key":"15006_CR34","doi-asserted-by":"publisher","first-page":"56","DOI":"10.4018\/IJSSCI.2021010104","volume":"13","author":"DE Salhi","year":"2021","unstructured":"Salhi DE, Tari A, Kechadi MT (2021) Using clustering for forensics analysis on internet of things. Int J Softw Sci Comput Intell (IJSSCI) 13(1):56\u201371","journal-title":"Int J Softw Sci Comput Intell (IJSSCI)"},{"issue":"5","key":"15006_CR35","doi-asserted-by":"publisher","first-page":"3322","DOI":"10.1109\/TII.2019.2953289","volume":"16","author":"AK Sangaiah","year":"2020","unstructured":"Sangaiah AK, Medhane DV, Bian G-B, Ghoneim A, Alrashoud M, Hossain MS (2020) Energy-aware green adversary model for cyber physical security in industrial system. IEEE Trans Ind Inform 16(5):3322\u20133329","journal-title":"IEEE Trans Ind Inform"},{"issue":"7","key":"15006_CR36","doi-asserted-by":"publisher","first-page":"4189","DOI":"10.1109\/TII.2019.2898174","volume":"15","author":"AK Sangaiah","year":"2019","unstructured":"Sangaiah AK, Medhane DV, Han T, Hossain MS, Muhammad G (2019) Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics. IEEE Trans Ind Inform 15(7):4189\u20134196","journal-title":"IEEE Trans Ind Inform"},{"key":"15006_CR37","doi-asserted-by":"crossref","unstructured":"Shao J, Cao Z (2009) CCA-Secure proxy re-encryption without pairings. In: Jarecki S, Tsudik G (eds) PKC 2009. LNCS, vol. 5443. Springer, Berlin, pp 357\u2013376","DOI":"10.1007\/978-3-642-00468-1_20"},{"key":"15006_CR38","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.ins.2019.01.051","volume":"527","author":"M Su","year":"2020","unstructured":"Su M, Bo Z, Anmin F, Yan Y, Gongxuan Z (2020) PRTA a proxy re-encryption based trusted authorization scheme for nodes on CloudIoT. Inf Sci 527:533\u2013547","journal-title":"Inf Sci"},{"issue":"2","key":"15006_CR39","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.ijinfomgt.2013.12.011","volume":"34","author":"N Sultan","year":"2014","unstructured":"Sultan N (2014) Making use of cloud computing for healthcare provision: opportunities and challenges. Int J Inf Manag 34(2):177\u2013184","journal-title":"Int J Inf Manag"},{"issue":"3","key":"15006_CR40","doi-asserted-by":"publisher","first-page":"20","DOI":"10.4018\/IJSWIS.2020070102","volume":"16","author":"A Tewari","year":"2020","unstructured":"Tewari A, Gupta BB (2020) Secure timestamp-based mutual authentication protocol for iot devices using rfid tags. Int J Semant Web Inf Syst (IJSWIS) 16(3):20\u201334","journal-title":"Int J Semant Web Inf Syst (IJSWIS)"},{"key":"15006_CR41","doi-asserted-by":"crossref","unstructured":"Wang C, Fang J, Li Y (2015) An improved cloud-based revocable identity-based proxy re-encryption scheme. In: International conference on applications and techniques in information security. Springer, Berlin, pp 14\u201326","DOI":"10.1007\/978-3-662-48683-2_2"},{"key":"15006_CR42","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.jss.2011.09.035","volume":"85","author":"XA Wang","year":"2012","unstructured":"Wang XA, Huang X, Yang X, Liu L, Wu X (2012) Further observation on proxy re-encryption with keyword search. J Syst Softw 85:643\u2013654","journal-title":"J Syst Softw"},{"issue":"20","key":"15006_CR43","doi-asserted-by":"publisher","first-page":"e4035","DOI":"10.1002\/cpe.4035","volume":"29","author":"C Wang","year":"2017","unstructured":"Wang C, Li Y, Fang J, Xie J (2017) Cloud-aided scalable revocable identity-based encryption scheme with cipher-text update. Concurr Comput Pract Exp 29(20):e4035","journal-title":"Concurr Comput Pract Exp"},{"key":"15006_CR44","doi-asserted-by":"publisher","first-page":"48417","DOI":"10.1109\/ACCESS.2019.2908009","volume":"7","author":"Q Wang","year":"2019","unstructured":"Wang Q, Li W, Qin Z (2019) Proxy re-encryption in access control framework of information-centric networks. IEEE Access 7:48417\u201348429","journal-title":"IEEE Access"},{"issue":"3","key":"15006_CR45","doi-asserted-by":"publisher","first-page":"585","DOI":"10.2298\/CSIS171218024W","volume":"15","author":"XA Wang","year":"2018","unstructured":"Wang XA, Yang Xiaoyuan, Li Cong, Liu Yudong, Ding Yong (2018) Improved functional proxy re-encryption schemes for secure cloud data sharing. Comput Sci Inf Syst 15(3):585\u2013614","journal-title":"Comput Sci Inf Syst"},{"issue":"2014","key":"15006_CR46","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G (2014) Ethereum a secure decentralized generalized transaction ledger. Ethereum Proj Yellow Pap 151(2014):1\u201332","journal-title":"Ethereum Proj Yellow Pap"},{"key":"15006_CR47","doi-asserted-by":"crossref","unstructured":"Wu R, Ahn G-J, Hu H (2012) Secure sharing of electronic health records in clouds. In: Proc. 8th Int. Conf. Collaborative Comput., Netw., Appl Worksharing (CollaborateCom), pp 711\u2013718","DOI":"10.4108\/icst.collaboratecom.2012.250497"},{"issue":"5","key":"15006_CR48","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1007\/s11227-014-1253-3","volume":"71","author":"F Xhafa","year":"2015","unstructured":"Xhafa F, Feng J, Zhang Y, Chen X, Li J (2015) Privacy-aware attributebased PHR sharing with user accountability in cloud computing. J Supercomput 71(5):1607\u20131619","journal-title":"J Supercomput"},{"key":"15006_CR49","doi-asserted-by":"publisher","first-page":"14757","DOI":"10.1109\/ACCESS.2017.2730843","volume":"5","author":"QI Xia","year":"2017","unstructured":"Xia QI, Sifah EB, Asamoah KO, Gao J, Xiaojiang D, MeDShare MG (2017) Trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5:14757\u201314767","journal-title":"IEEE Access"},{"issue":"1","key":"15006_CR50","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/TC.2015.2417544","volume":"65","author":"P Xu","year":"2015","unstructured":"Xu P, Jiao T, Qianhong W, Wang W, Jin H (2015) Conditional identity-based broadcast proxy re-encryption and its application to cloud email. IEEE Trans Comput 65(1):66\u201379","journal-title":"IEEE Trans Comput"},{"key":"15006_CR51","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/j.future.2019.12.028","volume":"105","author":"J-PA Yaacoub","year":"2020","unstructured":"Yaacoub J-PA, Noura M, Noura HN, Salman O, Yaacoub E, Couturier R, Chehab A (2020) Securing internet of medical things systems: limitations, issues and recommendations. Futur Gener Comput Syst 105:581\u2013606","journal-title":"Futur Gener Comput Syst"},{"key":"15006_CR52","doi-asserted-by":"crossref","unstructured":"Yang Y, Lu H, Weng J, et al. (2014) Fine-grained conditional proxy re-encryption and application. In: Proceedings of the 8th International conference on provable security, pp 206\u2013222","DOI":"10.1007\/978-3-319-12475-9_15"},{"issue":"5","key":"15006_CR53","first-page":"484","volume":"41","author":"MEI Ying","year":"2017","unstructured":"Ying MEI (2017) The utilizing Blockchain-Based method of the secure storage of medical records [J]. J Jiangxi Norm Univ (Nat Sci Ed) 41(5):484\u2013490","journal-title":"J Jiangxi Norm Univ (Nat Sci Ed)"},{"key":"15006_CR54","doi-asserted-by":"publisher","first-page":"53698","DOI":"10.1109\/ACCESS.2018.2871170","volume":"6","author":"Z Ying","year":"2018","unstructured":"Ying Z, Wei L, Li Q, Liu X, Cui J (2018) A lightweight policy preserving EHR sharing scheme in the cloud. IEEE Access 6:53698\u201353708","journal-title":"IEEE Access"},{"key":"15006_CR55","doi-asserted-by":"crossref","unstructured":"Zhang Y, Chen X, Li J, W ong DS, Li H (2013) Anonymous attribute-based encryption supporting efficient decryption test. In: Proceedings o f the 8th ACMSIGSAC symposium on information, computer and communications security. Hangzhou, China","DOI":"10.1145\/2484313.2484381"},{"issue":"8","key":"15006_CR56","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/s10916-018-0995-5","volume":"42","author":"A Zhang","year":"2018","unstructured":"Zhang A, Lin X (2018) Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. J Med Syst 42(8):140","journal-title":"J Med Syst"},{"issue":"3","key":"15006_CR57","doi-asserted-by":"publisher","first-page":"2130","DOI":"10.1109\/JIOT.2018.2825289","volume":"5","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130\u20132145","journal-title":"IEEE Internet Things J"},{"key":"15006_CR58","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.future.2017.09.002","volume":"79","author":"C Zhang","year":"2018","unstructured":"Zhang C, Zhu L, Xu C, Lu R (2018) PPDP: an efficient and privacy preserving disease prediction scheme in cloud-based e-Healthcare system. Futur Gener Comput Syst 79:16\u201325","journal-title":"Futur Gener Comput Syst"},{"key":"15006_CR59","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.future.2018.07.064","volume":"90","author":"C Zhang","year":"2019","unstructured":"Zhang C, Zhu L, Xu C, Sharif K, Du X, Guizani M (2019) LPTD: achieving lightweight and privacy-preserving truth discovery in CIot. Futur Gener Comput Syst 90:175\u2013184","journal-title":"Futur Gener Comput Syst"},{"key":"15006_CR60","doi-asserted-by":"publisher","first-page":"101666","DOI":"10.1016\/j.sysarc.2019.101666","volume":"102","author":"X Zheng","year":"2020","unstructured":"Zheng X, Zhou Y, Ye Y, Li F (2020) A cloud data deduplication scheme based on certificateless proxy re-encryption. J Syst Archit 102:101666","journal-title":"J Syst Archit"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15006-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15006-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15006-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T09:13:51Z","timestamp":1698052431000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15006-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,27]]},"references-count":60,"journal-issue":{"issue":"26","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["15006"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15006-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,27]]},"assertion":[{"value":"2 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The ministry of education under the government of India has sponsored this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Financial disclosure"}},{"value":"The authors declare no potential conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}