{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T14:53:42Z","timestamp":1773759222008,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T00:00:00Z","timestamp":1628726400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T00:00:00Z","timestamp":1628726400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,7]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A patient-centered personal health records system has been actively promoted in recent years. Its purpose is to maintain long-term personal records and health improvement plans. It combines a cloud computing environment to build a personal health records system to quickly collect personal information and transfer it to the back end for storage for future access. However, in a cloud environment, the message transmission process is more open. Therefore, a lack of an authority security mechanism for the users of such an architecture will result in distrust and doubt by the users. This adversely affects the implementation and quality of long-term health plans. To protect the crucial privacy of the users from malicious attacks or theft, it is necessary to ensure that the users have different authority to access their personal health records under the cloud computing environment and manage the openness of their authority to other users. A secured identify authentication mechanism can ensure that only legitimate users can log in to the system and obtain system service resources through verification. For a personal health records system in the cloud computing environment, this study proposes a secure and reliable user authentication mechanism allowing relevant users access to the user\u2019s PHR in the cloud based on their authority. The proposed authentication method uses a password combined with a smart card, allowing the owner and authorized users to log in to the system and access the relevant personal records. In this study, an authentication method based on bilinear pairing was used to verify the identity of users and to effectively prevent malicious intrusion and theft.<\/jats:p>","DOI":"10.1007\/s11276-021-02743-7","type":"journal-article","created":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T08:03:01Z","timestamp":1628755381000},"page":"3759-3769","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A reliable authentication scheme of personal health records in cloud computing"],"prefix":"10.1007","volume":"30","author":[{"given":"Chia-Hui","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2586-0993","authenticated-orcid":false,"given":"Tzer-Long","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chien-Yun","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Zhen-Yu","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,12]]},"reference":[{"issue":"2","key":"2743_CR1","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1377\/hlthaff.23.2.116","volume":"32","author":"RH Miller","year":"2004","unstructured":"Miller, R. H., & Sim, I. (2004). Physician\u2019s use of electronic medical records: Barriers and solutions. Health affairs, 32(2), 116\u2013126.","journal-title":"Health affairs"},{"issue":"2","key":"2743_CR2","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1197\/jamia.M2025","volume":"13","author":"PC Tang","year":"2006","unstructured":"Tang, P. C., Ash, J. S., Bates, D. W., Overhage, J. M., & Sands, D. Z. (2006). Personal health records: Dentitions, benefits, and strategies for overcoming barriers to adoption. Journal of American Medical Informatics Association, 13(2), 121\u2013126.","journal-title":"Journal of American Medical Informatics Association"},{"key":"2743_CR3","unstructured":"US Public Law. (1996). Health Insurance Portability and Accountability Act of 1996, 104th Congress, Public Law, 104\u2013191."},{"key":"2743_CR4","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.cmpb.2006.04.002","volume":"82","author":"CM Yang","year":"2006","unstructured":"Yang, C. M., Lin, H. C., Chang, P., & Jian, W. S. (2006). Taiwan\u2019s perspective on electronic medical records\u2019 security and privacy protection: Lessons learned from HIPAA. Computer Methods and Programs in Biomedicine, 82, 277\u2013282.","journal-title":"Computer Methods and Programs in Biomedicine"},{"issue":"6","key":"2743_CR5","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1197\/jamia.M2547","volume":"15","author":"DC Kaelber","year":"2008","unstructured":"Kaelber, D. C., Jha, A. K., Johnston, D., Middleton, B., & Bates, D. W. (2008). A research agenda for personal health records (PHRs). Journal of the American Medical Informatics Association, 15(6), 729\u2013736.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"2743_CR6","doi-asserted-by":"crossref","unstructured":"Joux, A. (2002). The weil and tate pairings as building blocks for public key cryptosystems. International Algorithmic Number Theory Symposium, pp. 20\u201332.","DOI":"10.1007\/3-540-45455-1_3"},{"issue":"4","key":"2743_CR7","first-page":"22","volume":"78","author":"AHIMA, J","year":"2007","unstructured":"AHIMA, J. (2007). The value of personal health records: A joint position statement for consumers of healthcare. Journal of the American Medical Informatics Association, 78(4), 22\u201324.","journal-title":"Journal of the American Medical Informatics Association"},{"issue":"2","key":"2743_CR8","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1197\/jamia.M0978","volume":"9","author":"MI Kim","year":"2002","unstructured":"Kim, M. I., & Johnson, K. B. (2002). Personal health records: Evaluation of functionality and utility. Journal of American Medical Informatics Association, 9(2), 171\u2013180.","journal-title":"Journal of American Medical Informatics Association"},{"issue":"3","key":"2743_CR9","doi-asserted-by":"publisher","first-page":"248","DOI":"10.4258\/hir.2020.26.3.248","volume":"26","author":"P Yujin","year":"2020","unstructured":"Yujin, P., & Hyung-Jin, Y. (2020). Understanding personal health record and facilitating its market. Healthcare Informatics Research, 26(3), 248\u2013250.","journal-title":"Healthcare Informatics Research"},{"key":"2743_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2_6","author":"M Li","year":"2010","unstructured":"Li, M., Yu, S., Ren, K., & Lou, W. (2010). Securing personal health records in cloud computing: Patient-centric and _ne-grained data access control in multi-owner settings. Security and Privacy in Communication Networks. https:\/\/doi.org\/10.1007\/978-3-642-16161-2_6","journal-title":"Security and Privacy in Communication Networks"},{"key":"2743_CR11","doi-asserted-by":"crossref","unstructured":"Benaloh, J.C., Chase, M.P., Horvitz, E.J., Lauter, K.E. (2009). Patient controlled encryption: Ensuring privacy of electronic medical records. CCSW '09: Proceedings of the 2009 ACM workshop on Cloud computing security, 103\u2013114.","DOI":"10.1145\/1655008.1655024"},{"key":"2743_CR12","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.compeleceng.2016.01.002","volume":"59","author":"CH Liu","year":"2017","unstructured":"Liu, C. H., & Chung, Y. F. (2017). Secure user authentication scheme for wireless healthcare sensor networks. Computers & Electrical Engineering, 59, 250\u2013261.","journal-title":"Computers & Electrical Engineering"},{"key":"2743_CR13","doi-asserted-by":"crossref","unstructured":"Shamir, A. (1985). Identity-based cryptosystems and signature schemes. Advances in Cryptology-Proceedings of CRYPTO'84, Springer-Verlag LNCS 196.","DOI":"10.1007\/3-540-39568-7_5"},{"key":"2743_CR14","first-page":"213","volume":"2139","author":"D Boneh","year":"2001","unstructured":"Boneh, D., & Franklin, M. (2001). Identity-based cryptosystems and signature schemes. Advances in Cryptology-Proceedings of Crypto, 2139, 213\u2013229.","journal-title":"Advances in Cryptology-Proceedings of Crypto"},{"issue":"2","key":"2743_CR15","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.camwa.2010.01.021","volume":"60","author":"CI Fan","year":"2010","unstructured":"Fan, C. I., Sun, W. Z., & Huang, V. S. (2010). Provably secure randomized blind signature scheme based on bilinear pairing. Computers & Mathematics with Applications, 60(2), 285\u2013293.","journal-title":"Computers & Mathematics with Applications"},{"key":"2743_CR16","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s10207-006-0011-9","volume":"6","author":"L Chen","year":"2007","unstructured":"Chen, L., Cheng, Z., & Smart, N. P. (2007). Identity-based key agreement protocols from pairings. International Journal of Information Security, 6, 213\u2013241.","journal-title":"International Journal of Information Security"},{"issue":"2","key":"2743_CR17","first-page":"181","volume":"7","author":"S Wang","year":"2008","unstructured":"Wang, S., Zhenfu, C., & Feng, C. (2008). Efficient identity-based authenticated key agreement protocol with pkg forward secrecy. International Journal of Information Security, 7(2), 181\u2013186.","journal-title":"International Journal of Information Security"},{"issue":"7","key":"2743_CR18","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1093\/comjnl\/bxp083","volume":"53","author":"SY Wu","year":"2010","unstructured":"Wu, S. Y., & Tseng, Y. M. (2010). An ID-based mutual authentication and key exchange protocol for low-power mobile devices. The Computer Journal, 53(7), 1062\u20131070.","journal-title":"The Computer Journal"},{"key":"2743_CR19","unstructured":"Chan, C., Duan, P., Cui, S. (2006). An efficient identity-based signature scheme with batch verifications. InfoScale '06: Proceedings of the 1st international conference on Scalable information systems, 22\u201328"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02743-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-021-02743-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02743-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T15:44:57Z","timestamp":1720021497000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-021-02743-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,12]]},"references-count":19,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["2743"],"URL":"https:\/\/doi.org\/10.1007\/s11276-021-02743-7","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,12]]},"assertion":[{"value":"28 July 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declared that here is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}