{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T20:51:08Z","timestamp":1771275068250,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T00:00:00Z","timestamp":1724284800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T00:00:00Z","timestamp":1724284800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Natural Science Research Project of Anhui Educational Committee","award":["2022AH051836"],"award-info":[{"award-number":["2022AH051836"]}]},{"name":"Chizhou University Scientific Research Foundation","award":["CZ2022YJRC09"],"award-info":[{"award-number":["CZ2022YJRC09"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s11227-024-06441-x","type":"journal-article","created":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T16:52:00Z","timestamp":1724431920000},"page":"26197-26225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["BAPS: a blockchain-assisted privacy-preserving and secure sharing scheme for PHRs in IoMT"],"prefix":"10.1007","volume":"80","author":[{"given":"Hongzhi","family":"Li","sequence":"first","affiliation":[]},{"given":"Peng","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Jiacun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Giancarlo","family":"Fortino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,22]]},"reference":[{"issue":"3","key":"6441_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3511898","volume":"23","author":"M Wazid","year":"2023","unstructured":"Wazid M, Gope P (2023) BACKM-EHA: a novel blockchain-enabled security solution for IoMT-based e-healthcare applications. ACM Trans Internet Technol 23(3):1\u201328","journal-title":"ACM Trans Internet Technol"},{"key":"6441_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119783","volume":"654","author":"Q Lin","year":"2024","unstructured":"Lin Q, Li X, Cai K, Prakash M, Paulraj D (2024) Secure internet of medical things (IoMT) based on ECMQV-MAC authentication protocol and EKMC-SCP blockchain networking. Inf Sci 654:119783","journal-title":"Inf Sci"},{"key":"6441_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121329","volume":"237","author":"J Miao","year":"2024","unstructured":"Miao J, Wang Z, Wu Z, Ning X, Tiwari P (2024) A blockchain-enabled privacy-preserving authentication management protocol for internet of medical things. Expert Syst Appl 237:121329","journal-title":"Expert Syst Appl"},{"issue":"3","key":"6441_CR4","first-page":"2985","volume":"136","author":"C Lan","year":"2023","unstructured":"Lan C, Li H (2023) BC-PC-share: blockchain-based patient-centric data sharing scheme for PHRs in cloud computing. CMES Comput Model Eng Sci 136(3):2985\u20133010","journal-title":"CMES Comput Model Eng Sci"},{"issue":"5","key":"6441_CR5","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/TSC.2023.3272770","volume":"16","author":"S Liu","year":"2023","unstructured":"Liu S, Chen L, Wu G, Wang H, Yu H (2023) Blockchain-backed searchable proxy signcryption for cloud personal health records. IEEE Trans Serv Comput 16(5):3210\u20133223","journal-title":"IEEE Trans Serv Comput"},{"issue":"3","key":"6441_CR6","doi-asserted-by":"publisher","first-page":"3112","DOI":"10.1007\/s11227-022-04772-1","volume":"79","author":"MV Baysal","year":"2023","unstructured":"Baysal MV, \u00d6zcan-Top \u00d6, Betin-Can A (2023) Blockchain technology applications in the health domain: a multivocal literature review. J Supercomput 79(3):3112\u20133156","journal-title":"J Supercomput"},{"issue":"11","key":"6441_CR7","doi-asserted-by":"publisher","first-page":"5174","DOI":"10.3390\/s23115174","volume":"23","author":"S Akbulut","year":"2023","unstructured":"Akbulut S, Semantha FH, Azam S, Pilares ICA, Jonkman M, Yeo KC, Shanmugam B (2023) Designing a private and secure personal health records access management system: a solution based on iota distributed ledger technology. Sensors 23(11):5174","journal-title":"Sensors"},{"key":"6441_CR8","volume":"55","author":"S Shamshad","year":"2020","unstructured":"Shamshad S, Mahmood K, Kumari S, Chen C-M et al (2020) A secure blockchain-based e-health records storage and sharing scheme. J Inf Secur Appl 55:102590","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"6441_CR9","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/JSAC.2020.3020656","volume":"39","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, He D, Obaidat MS, Vijayakumar P, Hsiao K-F (2020) Efficient identity-based distributed decryption scheme for electronic personal health record sharing system. IEEE J Sel Areas Commun 39(2):384\u2013395","journal-title":"IEEE J Sel Areas Commun"},{"issue":"10","key":"6441_CR10","doi-asserted-by":"publisher","first-page":"10125","DOI":"10.1109\/TII.2022.3231424","volume":"19","author":"F Khan","year":"2023","unstructured":"Khan F, Jan MA, Alturki R, Alshehri MD, Shah ST, Ur Rehman A (2023) A secure ensemble learning-based fog-cloud approach for cyberattack detection in IoMT. IEEE Trans Ind Inform 19(10):10125\u201310132","journal-title":"IEEE Trans Ind Inform"},{"issue":"11","key":"6441_CR11","doi-asserted-by":"publisher","first-page":"8949","DOI":"10.1109\/JIOT.2021.3055541","volume":"8","author":"R Guo","year":"2021","unstructured":"Guo R, Yang G, Shi H, Zhang Y, Zheng D (2021) O$$^{3}$$-R-CP-ABE: an efficient and revocable attribute-based encryption scheme in the cloud-assisted IoMT system. IEEE Internet Things J 8(11):8949\u20138963","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"6441_CR12","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1109\/TETC.2021.3052377","volume":"10","author":"J Hao","year":"2021","unstructured":"Hao J, Tang W, Huang C, Liu J, Wang H, Xian M (2021) Secure data sharing with flexible user access privilege update in cloud-assisted IoMT. IEEE Trans Emerg Top Comput 10(2):933\u2013947","journal-title":"IEEE Trans Emerg Top Comput"},{"issue":"1","key":"6441_CR13","doi-asserted-by":"publisher","first-page":"1592","DOI":"10.1109\/JSYST.2020.3045076","volume":"16","author":"C Lin","year":"2022","unstructured":"Lin C, Luo M, Huang X, He D (2022) An efficient privacy-preserving credit score system based on noninteractive zero-knowledge proof. IEEE Syst J 16(1):1592\u20131601","journal-title":"IEEE Syst J"},{"issue":"3","key":"6441_CR14","doi-asserted-by":"publisher","first-page":"2420","DOI":"10.1109\/TCC.2022.3208168","volume":"11","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Guo F, Susilo W, Yang G (2022) Balancing privacy and flexibility of cloud-based personal health records sharing system. IEEE Trans Cloud Comput 11(3):2420\u20132430","journal-title":"IEEE Trans Cloud Comput"},{"key":"6441_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11704-020-9284-9","volume":"15","author":"Z Wang","year":"2021","unstructured":"Wang Z, Jin H, Dai W, Choo K-KR, Zou D (2021) Ethereum smart contract security research: survey and future research opportunities. Front Comput Sci 15:1\u201318","journal-title":"Front Comput Sci"},{"issue":"3","key":"6441_CR16","first-page":"59","volume":"10","author":"NP Owoh","year":"2019","unstructured":"Owoh NP, Singh MM (2019) Applying Diffie\u2013Hellman algorithm to solve the key agreement problem in mobile blockchain-based sensing applications. Int J Adv Comput Sci Appl 10(3):59\u201368","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"2","key":"6441_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102462","volume":"58","author":"T Hu","year":"2021","unstructured":"Hu T, Liu X, Chen T, Zhang X, Huang X, Niu W, Lu J, Zhou K, Liu Y (2021) Transaction-based classification and detection approach for Ethereum smart contract. Inf Process Manag 58(2):102462","journal-title":"Inf Process Manag"},{"key":"6441_CR18","doi-asserted-by":"publisher","first-page":"28382","DOI":"10.1109\/ACCESS.2024.3366069","volume":"12","author":"G Ibba","year":"2024","unstructured":"Ibba G, Aufiero S, Bartolucci S, Neykova R, Ortu M, Tonelli R, Destefanis G (2024) Mindthedapp: a toolchain for complex network-driven structural analysis of Ethereum-based decentralised applications. IEEE Access 12:28382\u201328394. https:\/\/doi.org\/10.1109\/ACCESS.2024.3366069","journal-title":"IEEE Access"},{"issue":"1","key":"6441_CR19","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1007\/s10586-023-04038-2","volume":"27","author":"J Kaur","year":"2024","unstructured":"Kaur J, Rani R, Kalra N (2024) Attribute-based access control scheme for secure storage and sharing of EHRS using blockchain and IPFS. Clust Comput 27(1):1047\u20131061","journal-title":"Clust Comput"},{"issue":"10","key":"6441_CR20","doi-asserted-by":"publisher","first-page":"17482","DOI":"10.1109\/JIOT.2024.3357802","volume":"11","author":"J Lee","year":"2024","unstructured":"Lee J, Oh J, Kwon D, Kim M, Kim K, Park Y (2024) Blockchain-enabled key aggregate searchable encryption scheme for personal health record sharing with multi-delegation. IEEE Internet Things J 11(10):17482\u201317494. https:\/\/doi.org\/10.1109\/JIOT.2024.3357802","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"6441_CR21","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2509912","volume":"11","author":"Y Yang","year":"2015","unstructured":"Yang Y, Ma M (2015) Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans Inf Forensics Secur 11(4):746\u2013759","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"6441_CR22","doi-asserted-by":"publisher","first-page":"5174","DOI":"10.3390\/s23115174","volume":"23","author":"S Akbulut","year":"2023","unstructured":"Akbulut S, Semantha FH, Azam S, Pilares ICA, Jonkman M, Yeo KC, Shanmugam B (2023) Designing a private and secure personal health records access management system: a solution based on iota distributed ledger technology. Sensors 23(11):5174","journal-title":"Sensors"},{"issue":"4","key":"6441_CR23","doi-asserted-by":"publisher","first-page":"5521","DOI":"10.1109\/JSYST.2022.3173538","volume":"16","author":"C Li","year":"2022","unstructured":"Li C, Dong M, Li J, Xu G, Chen X-B, Liu W, Ota K (2022) Efficient medical big data management with keyword-searchable encryption in healthchain. IEEE Syst J 16(4):5521\u20135532","journal-title":"IEEE Syst J"},{"issue":"1","key":"6441_CR24","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2012","unstructured":"Li M, Yu S, Zheng Y, Ren K, Lou W (2012) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131\u2013143","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"6441_CR25","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.neucom.2016.06.100","volume":"274","author":"X Liu","year":"2018","unstructured":"Liu X, Xia Y, Yang W, Yang F (2018) Secure and efficient querying over personal health records in cloud computing. Neurocomputing 274:99\u2013105","journal-title":"Neurocomputing"},{"issue":"1","key":"6441_CR26","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/JIOT.2020.3000775","volume":"8","author":"L Zhang","year":"2020","unstructured":"Zhang L, Ye Y, Mu Y (2020) Multiauthority access control with anonymous authentication for personal health record. IEEE Internet Things J 8(1):156\u2013167","journal-title":"IEEE Internet Things J"},{"issue":"14","key":"6441_CR27","doi-asserted-by":"publisher","first-page":"12482","DOI":"10.1109\/JIOT.2021.3137240","volume":"9","author":"L Zhang","year":"2021","unstructured":"Zhang L, Zhang T, Wu Q, Mu Y, Rezaeibagha F (2021) Secure decentralized attribute-based sharing of personal health records with blockchain. IEEE Internet Things J 9(14):12482\u201312496","journal-title":"IEEE Internet Things J"},{"key":"6441_CR28","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.future.2022.10.031","volume":"140","author":"T Zhang","year":"2023","unstructured":"Zhang T, Shen J, Lai C-F, Ji S, Ren Y (2023) Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems. Future Gener Comput Syst 140:299\u2013310","journal-title":"Future Gener Comput Syst"},{"key":"6441_CR29","doi-asserted-by":"publisher","first-page":"2225","DOI":"10.1109\/OJCOMS.2023.3316922","volume":"4","author":"A Bisht","year":"2023","unstructured":"Bisht A, Das AK, Niyato D, Park Y (2023) Efficient personal-health-records sharing in internet of medical things using searchable symmetric encryption, blockchain and IPFS. IEEE Open J Commun Soc 4:2225\u20132244. https:\/\/doi.org\/10.1109\/OJCOMS.2023.3316922","journal-title":"IEEE Open J Commun Soc"},{"key":"6441_CR30","doi-asserted-by":"publisher","first-page":"84304","DOI":"10.1109\/ACCESS.2019.2917976","volume":"7","author":"AR Rajput","year":"2019","unstructured":"Rajput AR, Li Q, Ahvanooey MT, Masood I (2019) EACMS: emergency access control management system for personal health record based on blockchain. IEEE Access 7:84304\u201384317","journal-title":"IEEE Access"},{"issue":"5","key":"6441_CR31","doi-asserted-by":"publisher","first-page":"2231","DOI":"10.1109\/JBHI.2022.3183397","volume":"27","author":"J Liu","year":"2022","unstructured":"Liu J, Jiang W, Sun R, Bashir AK, Alshehri MD, Hua Q, Yu K (2022) Conditional anonymous remote healthcare data sharing over blockchain. IEEE J Biomed Health Inf 27(5):2231\u20132242","journal-title":"IEEE J Biomed Health Inf"},{"issue":"10","key":"6441_CR32","doi-asserted-by":"publisher","first-page":"7139","DOI":"10.1109\/TII.2022.3145851","volume":"18","author":"J Zhang","year":"2022","unstructured":"Zhang J, Yang Y, Liu X, Ma J (2022) An efficient blockchain-based hierarchical data sharing for healthcare internet of things. IEEE Trans Ind Inf 18(10):7139\u20137150","journal-title":"IEEE Trans Ind Inf"},{"issue":"1","key":"6441_CR33","doi-asserted-by":"publisher","first-page":"1685","DOI":"10.1109\/JSYST.2021.3076759","volume":"16","author":"KO-BO Agyekum","year":"2021","unstructured":"Agyekum KO-BO, Xia Q, Sifah EB, Cobblah CNA, Xia H, Gao J (2021) A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain. IEEE Syst J 16(1):1685\u20131696","journal-title":"IEEE Syst J"},{"issue":"5","key":"6441_CR34","doi-asserted-by":"publisher","first-page":"2710","DOI":"10.1109\/TNSE.2022.3164936","volume":"10","author":"K Mahmood","year":"2022","unstructured":"Mahmood K, Obaidat MS, Ghaffar Z, Shamshad S (2022) Cloud-assisted secure and cost-effective authenticated solution for remote wearable health monitoring system. IEEE Trans Netw Sci Eng 10(5):2710\u20132718","journal-title":"IEEE Trans Netw Sci Eng"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06441-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06441-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06441-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T20:43:15Z","timestamp":1726778595000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06441-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,22]]},"references-count":34,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["6441"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06441-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,22]]},"assertion":[{"value":"9 August 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The corresponding author declares no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable, this submission does not include any human or animal research.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All authors appear on this manuscript: (1) made substantial contributions to the study; (2) revised it critically; and (3) approved the version to be published.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publication"}}]}}