{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:44:46Z","timestamp":1767339886316},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T00:00:00Z","timestamp":1699833600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T00:00:00Z","timestamp":1699833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s11227-023-05735-w","type":"journal-article","created":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T18:01:58Z","timestamp":1699898518000},"page":"7955-7992","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication"],"prefix":"10.1007","volume":"80","author":[{"given":"Shweta","family":"Mittal","sequence":"first","affiliation":[]},{"given":"Mohona","family":"Ghosh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,13]]},"reference":[{"key":"5735_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1121-4","author":"Y Chen","year":"2019","unstructured":"Chen Y, Ding S, Xu Z, Zheng H, Yang S (2019) Blockchain-based medical records secure storage and medical service framework. J Med Syst. https:\/\/doi.org\/10.1007\/s10916-018-1121-4","journal-title":"J Med Syst"},{"issue":"1","key":"5735_CR2","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MCC.2018.011791712","volume":"5","author":"C Esposito","year":"2018","unstructured":"Esposito C, De Santis A, Tortora G, Chang H, Choo KK (2018) Blockchain: a panacea for healthcare cloud-based data security and privacy? IEEE Cloud Comput 5(1):31\u20137","journal-title":"IEEE Cloud Comput"},{"key":"5735_CR3","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.ijinfomgt.2018.07.009","volume":"43","author":"O Ali","year":"2018","unstructured":"Ali O, Shrestha A, Soar J, Wamba SF (2018) Cloud computing-enabled healthcare opportunities, issues, and applications: a systematic review. Int J Inf Manag 43:146\u201358","journal-title":"Int J Inf Manag"},{"key":"5735_CR4","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/s10207-020-00521-8","volume":"20","author":"TF Lee","year":"2021","unstructured":"Lee TF, Li HZ, Hsieh YP (2021) A blockchain-based medical data preservation scheme for telecare medical information systems. Int J Inf Secur 20:589\u2013601","journal-title":"Int J Inf Secur"},{"key":"5735_CR5","volume-title":"Mastering bitcoin: unlocking digital cryptocurrencies","author":"AM Antonopoulos","year":"2014","unstructured":"Antonopoulos AM (2014) Mastering bitcoin: unlocking digital cryptocurrencies. O\u2019Reilly Media Inc, New York"},{"key":"5735_CR6","doi-asserted-by":"publisher","unstructured":"Kumar R, Marchang N, Tripathi R (2020) Distributed off-chain storage of patient diagnostic reports in healthcare system using IPFS and blockchain. In: International Conference on Communication Systems and Networks (COMSNETS), pp 1\u20135. https:\/\/doi.org\/10.1109\/COMSNETS48256.2020.9027313.","DOI":"10.1109\/COMSNETS48256.2020.9027313."},{"issue":"176","key":"5735_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102917","volume":"15","author":"A Manzoor","year":"2021","unstructured":"Manzoor A, Braeken A, Kanhere SS, Ylianttila M, Liyanage M (2021) Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain. J Netw Comput Appl 15(176):102917. https:\/\/doi.org\/10.1016\/j.jnca.2020.102917","journal-title":"J Netw Comput Appl"},{"key":"5735_CR8","doi-asserted-by":"crossref","unstructured":"Qin Q, Jin B, Liu Y (2021) A secure storage and sharing scheme of stroke electronic medical records based on consortium blockchain. BioMed Res Int","DOI":"10.1155\/2021\/6676171"},{"key":"5735_CR9","doi-asserted-by":"publisher","unstructured":"Manzoor A, Liyanage M, Braeke A, Kanhere SS, Ylianttila M (2019) Blockchain based proxy re-encryption scheme for secure IoT data sharing. In: IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp 99\u2013103. https:\/\/doi.org\/10.1109\/BLOC.2019.8751336","DOI":"10.1109\/BLOC.2019.8751336"},{"key":"5735_CR10","doi-asserted-by":"crossref","unstructured":"Zhang A, Lin X (2018) Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. J Med Syst","DOI":"10.1007\/s10916-018-0995-5"},{"key":"5735_CR11","doi-asserted-by":"crossref","unstructured":"Zhiqiang G, Lingsong H, Hang T, Cong L (2015) A cloud computing based mobile healthcare service system. In: IEEE 3rd International Conference on Smart Instrumentation, Measurement and Applications (ICSIMA)","DOI":"10.1109\/ICSIMA.2015.7559009"},{"issue":"2","key":"5735_CR12","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.ijinfomgt.2013.12.011","volume":"34","author":"N Sultan","year":"2014","unstructured":"Sultan N (2014) Making use of cloud computing for healthcare provision: opportunities and challenges. Int J Inf Manag 34(2):177\u201384","journal-title":"Int J Inf Manag"},{"key":"5735_CR13","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/s11227-020-03561-y","volume":"77","author":"CM Chen","year":"2021","unstructured":"Chen CM, Deng X, Gan W, Chen J, Islam S (2021) A secure blockchain-based group key agreement protocol for IoT. J Supercomput 77:234. https:\/\/doi.org\/10.1007\/s11227-020-03561-y","journal-title":"J Supercomput"},{"issue":"1","key":"5735_CR14","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.icte.2019.08.002","volume":"7","author":"O Pal","year":"2021","unstructured":"Pal O, Alam B, Thakur V, Singh S (2021) Key management for blockchain technology. ICT Express 7(1):76\u201380","journal-title":"ICT Express"},{"issue":"2","key":"5735_CR15","first-page":"329","volume":"23","author":"K Azbeg","year":"2022","unstructured":"Azbeg K, Ouchetto O, Andaloussi SJ (2022) BlockMedCare: a healthcare system based on IoT. Blockchain and IPFS for data management security. Egypt Inf J 23(2):329\u201343","journal-title":"Egypt Inf J"},{"key":"5735_CR16","doi-asserted-by":"crossref","unstructured":"Kumar S, Bharti AK, Amin R (2021) Decentralized secure storage of medical records using Blockchain and IPFS: a comparative analysis with future directions. Secur Privacy","DOI":"10.1002\/spy2.162"},{"key":"5735_CR17","doi-asserted-by":"publisher","DOI":"10.1201\/9781420010756","volume-title":"Introduction to modern cryptography: principles and protocols","author":"J Katz","year":"2007","unstructured":"Katz J, Lindell Y (2007) Introduction to modern cryptography: principles and protocols. Chapman and hall\/CRC, New York"},{"key":"5735_CR18","doi-asserted-by":"crossref","unstructured":"Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp 127\u2013144","DOI":"10.1007\/BFb0054122"},{"key":"5735_CR19","doi-asserted-by":"publisher","unstructured":"Zheng Q, Li Y, Chen P, Dong X (2018) An innovative IPFS-based storage model for blockchain. In: IEEE\/WIC\/ACM International Conference on Web Intelligence (WI), pp 704\u2013708. https:\/\/doi.org\/10.1109\/WI.2018.000-8.","DOI":"10.1109\/WI.2018.000-8."},{"key":"5735_CR20","unstructured":"Mridula RD, Rajesh S (2013) Group key management techniques. Global J Comput Sci Technol"},{"issue":"5","key":"5735_CR21","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.compmedimag.2005.02.003","volume":"29","author":"M Li","year":"2005","unstructured":"Li M, Poovendran R, Narayanan S (2005) Protecting patient privacy against unauthorized release of medical images in a group communication environment. Comput Med Imaging Graph 29(5):367\u201383","journal-title":"Comput Med Imaging Graph"},{"key":"5735_CR22","doi-asserted-by":"publisher","first-page":"196813","DOI":"10.1109\/ACCESS.2020.3034260","volume":"8","author":"AA Battah","year":"2020","unstructured":"Battah AA, Madine MM, Alzaabi H, Yaqoob I, Salah K, Jayaraman R (2020) Blockchain-based multi-party authorization for accessing IPFS encrypted data. IEEE Access 8:196813\u201325","journal-title":"IEEE Access"},{"key":"5735_CR23","doi-asserted-by":"publisher","unstructured":"Chen Y, Li H, Li K, Zhang J (2017) An improved P2P file system scheme based on IPFS and Blockchain. In: IEEE International Conference on Big Data (Big Data). https:\/\/doi.org\/10.1109\/BigData.2017.8258226","DOI":"10.1109\/BigData.2017.8258226"},{"issue":"1","key":"5735_CR24","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst (TOCS) 8(1):18\u201336","journal-title":"ACM Trans Comput Syst (TOCS)"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05735-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05735-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05735-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T11:55:25Z","timestamp":1711367725000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05735-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,13]]},"references-count":24,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["5735"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05735-w","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,13]]},"assertion":[{"value":"14 October 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies involving human and\/or animal participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights statement"}}]}}