{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T23:10:36Z","timestamp":1766790636325,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T00:00:00Z","timestamp":1557273600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11277-019-06450-7","type":"journal-article","created":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T07:14:34Z","timestamp":1557299674000},"page":"1021-1035","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment"],"prefix":"10.1007","volume":"108","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2970-1957","authenticated-orcid":false,"given":"V.","family":"Sri Vigna Hema","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ramesh","family":"Kesavan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,5,8]]},"reference":[{"issue":"2","key":"6450_CR1","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MMM.2016.2635898","volume":"18","author":"J Miranda","year":"2017","unstructured":"Miranda, J., Memon, M., Cabral, J., Ravelo, B., Wagner, S. R., Pedersen, C. F., et al. (2017). Eye on patient care: Continuous health monitoring: Design and implementation of a wireless platform for healthcare applications. IEEE Microwave Magazine,\n                           18(2), 83\u201394.","journal-title":"IEEE Microwave Magazine"},{"key":"6450_CR2","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1155\/2014\/380787","volume":"2014","author":"M Abo-Zahhad","year":"2014","unstructured":"Abo-Zahhad, M., Ahmed, S. M., & Elnahas, O. (2014). A wireless emergency telemedicine system for patients monitoring and diagnosis. International Journal of Telemedicine and Applications,\n                           2014, 4.","journal-title":"International Journal of Telemedicine and Applications"},{"issue":"1","key":"6450_CR3","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MPRV.2015.19","volume":"14","author":"Z Jin","year":"2015","unstructured":"Jin, Z., & Chen, Y. (2015). Telemedicine in the cloud era: Prospects and challenges. IEEE Pervasive Computing,\n                           14(1), 54\u201361.","journal-title":"IEEE Pervasive Computing"},{"issue":"1","key":"6450_CR4","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1186\/1472-6947-12-77","volume":"12","author":"J-C Hsieh","year":"2012","unstructured":"Hsieh, J.-C., & Hsu, M.-W. (2012). A cloud computing based 12-lead ECG telemedicine service. BMC Medical Informatics and Decision Making,\n                           12(1), 77.","journal-title":"BMC Medical Informatics and Decision Making"},{"key":"6450_CR5","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.future.2016.08.008","volume":"67","author":"XA Wang","year":"2017","unstructured":"Wang, X. A., Ma, J., Xhafa, F., Zhang, M., & Luo, X. (2017). Cost-effective secure E-health cloud system using identity based cryptographic techniques. Future Generation Computer Systems,\n                           67, 242\u2013254.","journal-title":"Future Generation Computer Systems"},{"key":"6450_CR6","doi-asserted-by":"crossref","unstructured":"Ruiz-Zafra, \u00c1., Benghazi, K., Noguera, M., & Garrido, J. L. (2013). Zappa: An open mobile platform to build cloud-based m-health systems. In Ambient intelligence-software and applications (pp. 87\u201394). Springer.","DOI":"10.1007\/978-3-319-00566-9_12"},{"key":"6450_CR7","unstructured":"Bourouis, A., Feham, M., & Bouchachia, A. (2012). A new architecture of a ubiquitous health monitoring system: A prototype of cloud mobile health monitoring system. \n                    arXiv:1205.6910\n                    \n                  ."},{"key":"6450_CR8","doi-asserted-by":"crossref","unstructured":"Li, Z.-R., Chang, E.-C., Huang, K.-H., & Lai, F. (2011). A secure electronic medical record sharing mechanism in the cloud computing platform. In 2011 IEEE 15th international symposium on consumer electronics (ISCE) (pp. 98\u2013103). IEEE.","DOI":"10.1109\/ISCE.2011.5973792"},{"key":"6450_CR9","unstructured":"Wu, R., Ahn, G.-J., & Hu, H. (2012). Secure sharing of electronic health records in clouds. In 2012 8th International conference on collaborative computing: Networking, applications and worksharing (CollaborateCom) (pp. 711\u2013718). IEEE."},{"key":"6450_CR10","doi-asserted-by":"crossref","unstructured":"Liu, D.-l., Chen, Y.-p., & Huai-ping, Z. (2010). Secure applications of RSA system in the electronic commerce. In 2010 International conference on future information technology and management engineering (FITME) (Vol. 1, pp. 86\u201389). IEEE.","DOI":"10.1109\/FITME.2010.5655780"},{"issue":"13","key":"6450_CR11","first-page":"13","volume":"106","author":"KK Gola","year":"2014","unstructured":"Gola, K. K., Gupta, B., & Iqbal, Z. (2014). Modified RSA digital signature scheme for data confidentiality. International Journal of Computer Applications, 106(13), 13\u201316.","journal-title":"International Journal of Computer Applications"},{"issue":"4","key":"6450_CR12","first-page":"1922","volume":"3","author":"R Arora","year":"2013","unstructured":"Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International Journal of Engineering Research and Applications,\n                           3(4), 1922\u20131926.","journal-title":"International Journal of Engineering Research and Applications"},{"key":"6450_CR13","doi-asserted-by":"crossref","unstructured":"Rahumed, A., Chen, H. C., Tang, Y., Lee, P. P., & Lui, J. C. (2011). A secure cloud backup system with assured deletion and version control. In 2011 40th International conference on parallel processing workshops (ICPPW) (pp. 160\u2013167). IEEE.","DOI":"10.1109\/ICPPW.2011.17"},{"key":"6450_CR14","doi-asserted-by":"crossref","unstructured":"Xu, L., Wu, X., & Zhang, X. (2012). CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. In Proceedings of the 7th ACM symposium on information, computer and communications security, 2012 (pp 87\u201388). ACM.","DOI":"10.1145\/2414456.2414507"},{"issue":"9","key":"6450_CR15","doi-asserted-by":"publisher","first-page":"2107","DOI":"10.1109\/TKDE.2013.138","volume":"26","author":"S-H Seo","year":"2014","unstructured":"Seo, S.-H., Nabeel, M., Ding, X., & Bertino, E. (2014). An efficient certificateless encryption for secure data sharing in public clouds. IEEE Transactions on Knowledge and Data Engineering,\n                           26(9), 2107\u20132119.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"6450_CR16","doi-asserted-by":"crossref","unstructured":"Itani, W., Kayssi, A., & Chehab, A. (2010). Energy-efficient incremental integrity for securing storage in mobile cloud computing. In 2010 International conference on energy aware computing (ICEAC) (pp. 1\u20132). IEEE.","DOI":"10.1109\/ICEAC.2010.5702296"},{"issue":"2","key":"6450_CR17","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1007\/s11227-013-1055-z","volume":"68","author":"AN Khan","year":"2014","unstructured":"Khan, A. N., Kiah, M. M., Madani, S. A., Ali, M., & Shamshirband, S. (2014). Incremental proxy re-encryption scheme for mobile cloud computing environment. The Journal of Supercomputing,\n                           68(2), 624\u2013651.","journal-title":"The Journal of Supercomputing"},{"key":"6450_CR18","doi-asserted-by":"crossref","unstructured":"Chen, Y.-R., & Tzeng, W.-G. (2012). Efficient and provably-secure group key management scheme using key derivation. In 2012 IEEE 11th International conference on trust, security and privacy in computing and communications (TrustCom) (pp. 295\u2013302). IEEE.","DOI":"10.1109\/TrustCom.2012.138"},{"key":"6450_CR19","doi-asserted-by":"crossref","unstructured":"Chen, Y.-R., Tygar, J., & Tzeng, W.-G. (2011). Secure group key management using uni-directional proxy re-encryption schemes. In INFOCOM, 2011 proceedings IEEE (pp. 1952\u20131960). IEEE.","DOI":"10.1109\/INFCOM.2011.5934999"},{"issue":"2","key":"6450_CR20","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/JSYST.2014.2379646","volume":"11","author":"M Ali","year":"2017","unstructured":"Ali, M., Dhamotharan, R., Khan, E., Khan, S. U., Vasilakos, A. V., Li, K., et al. (2017). SeDaSC: Secure data sharing in clouds. IEEE Systems Journal,\n                           11(2), 395\u2013404.","journal-title":"IEEE Systems Journal"},{"issue":"12","key":"6450_CR21","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10916-016-0595-1","volume":"40","author":"L Zhang","year":"2016","unstructured":"Zhang, L., Wu, Q., Mu, Y., & Zhang, J. (2016). Privacy-preserving and secure sharing of PHR in the cloud. Journal of Medical Systems,\n                           40(12), 267.","journal-title":"Journal of Medical Systems"},{"key":"6450_CR22","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.future.2016.07.019","volume":"67","author":"YS Rao","year":"2017","unstructured":"Rao, Y. S. (2017). A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Generation Computer Systems,\n                           67, 133\u2013151.","journal-title":"Future Generation Computer Systems"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06450-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-019-06450-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06450-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,6]],"date-time":"2020-05-06T23:21:16Z","timestamp":1588807276000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-019-06450-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,8]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["6450"],"URL":"https:\/\/doi.org\/10.1007\/s11277-019-06450-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2019,5,8]]},"assertion":[{"value":"8 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}