{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:33:28Z","timestamp":1772120008085,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T00:00:00Z","timestamp":1734393600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T00:00:00Z","timestamp":1734393600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01841-5","type":"journal-article","created":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T02:02:48Z","timestamp":1734400968000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Chebyshev chaotic map with attribute based encryption on session based data-sharing in fog environment"],"prefix":"10.1007","volume":"18","author":[{"given":"Thushara","family":"G.A","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.Mary Saira","family":"Bhanu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,12,17]]},"reference":[{"key":"1841_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"A Iera","year":"2010","unstructured":"Iera A, Atzori L, Morabito G (2010) The internet of things: A survey. Comput Netw 54:2787\u20132805","journal-title":"Comput Netw"},{"key":"1841_CR2","unstructured":"Elizabeth S, Kyle M (2013) Malware most common smart hospital data security threat, 05.12.2016"},{"key":"1841_CR3","doi-asserted-by":"crossref","unstructured":"Chen D, Wang L, Ma Y, Hu Y, Wang J (2013) Towards enabling cyberinfrastructure as a service in clouds. Comput Electr Eng, 39:3\u201314,","DOI":"10.1016\/j.compeleceng.2012.05.001"},{"key":"1841_CR4","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2009.87","volume":"7","author":"LM Kaufman","year":"2009","unstructured":"Kaufman LM (2009) Data security in the world of cloud computing. IEEE Secur Priv 7:61\u201364","journal-title":"IEEE Secur Priv"},{"key":"1841_CR5","doi-asserted-by":"crossref","unstructured":"Lekkas D, Zissis D (2012) Addressing cloud computing security issues. Future Gener Comput Syst, page 583\u2013592,","DOI":"10.1016\/j.future.2010.12.006"},{"key":"1841_CR6","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.future.2014.06.004","volume":"43","author":"JJ Yang","year":"2015","unstructured":"Yang JJ, Li JQ, Niu Y (2015) A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener Comput Syst 43:74\u201386","journal-title":"Future Gener Comput Syst"},{"key":"1841_CR7","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy identity based encryption. In: Advances in Cryptology \u2013 Eurocrypt, 3494:457\u2013473,","DOI":"10.1007\/11426639_27"},{"key":"1841_CR8","doi-asserted-by":"crossref","unstructured":"Sahai A, Bethencourt J, Waters B (2007) Ciphertext-policy attribute-based encryption. Secur Pri, pages 321\u2013334,","DOI":"10.1109\/SP.2007.11"},{"key":"1841_CR9","unstructured":"Chen Yongfeng QM, Chen Kai HJ, Shiwen Long HM (2016) Privacy protection and intrusion avoidance for cloudlet-based medical data sharing. IEEE Trans Cloud Comput 43:74\u201386"},{"key":"1841_CR10","first-page":"74","volume":"43","author":"LS Zhang Xiong","year":"2016","unstructured":"Zhang Xiong LS, Tan Tao Peng Z, Wang G (2016) A caching and spatial k-anonymity driven privacy enhancement scheme in continuous location-based services. IEEE Trans Cloud Comput 43:74\u201386","journal-title":"IEEE Trans Cloud Comput"},{"key":"1841_CR11","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.future.2014.06.004","volume":"43","author":"J Yang","year":"2015","unstructured":"Yang J, Li J, Niu Y (2015) A hybrid solution for privacy preserving medical data sharing in the cloud environment. Fut Gener Comput Syst 43:74\u201386","journal-title":"Fut Gener Comput Syst"},{"key":"1841_CR12","doi-asserted-by":"crossref","unstructured":"Rongxing\u00a0L, Cheng\u00a0H, Jun\u00a0S, Hui\u00a0Z, Xiaodong L (2016) Fssr: Fine-grained ehrs sharing via similarity-based recommendation in cloud-assisted ehealthcare system. In: In Proceedings of the Annual Conference of the ACM ASIA Conference on Computer and Communications Security (AisaCCS\u201916), pages 95\u2013106,","DOI":"10.1145\/2897845.2897870"},{"key":"1841_CR13","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1109\/TIFS.2017.2774439","volume":"13","author":"T Shen","year":"2017","unstructured":"Shen T, Zhou J, Chen J, Li X, Susilo W (2017) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forens Secur 13:912\u2013925","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"1841_CR14","doi-asserted-by":"crossref","unstructured":"YanKit\u00a0L, Jin\u00a0L, Wenjing\u00a0L, Xiaofeng\u00a0C, PatrickPC\u00a0L (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst, 26","DOI":"10.1109\/TPDS.2014.2318320"},{"key":"1841_CR15","doi-asserted-by":"crossref","unstructured":"Reetu G, Priyesh K, Nirmal D, Golla M, Kshira\u00a0Sagar S, NZ\u00a0J, Mehedi M, Nabil\u00a0Sharaf A, Mohammed\u00a0A A (2023) Secured and privacy-preserving multi-authority access control system for cloud-based healthcare data sharing. Sensors, 23(5):2617,","DOI":"10.3390\/s23052617"},{"key":"1841_CR16","doi-asserted-by":"crossref","unstructured":"Yang K, Liu Z, Jia X, Shen XS (2016) Time-domain attribute-based access control for cloud-based video content sharing: A cryptographic approach. IEEE Trans Multimed 18:940\u2013950","DOI":"10.1109\/TMM.2016.2535728"},{"key":"1841_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","volume":"72","author":"Y Li","year":"2018","unstructured":"Li Y, Zhang J, Chen Y, Xiang X (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1\u201312","journal-title":"Comput Secur"},{"key":"1841_CR18","doi-asserted-by":"crossref","unstructured":"Yin H, Qin Z, Ou L, Li K (2017) A query privacy-enhanced and secure search scheme over encrypted data in cloud computing. J Comput Syst 90:14\u201327","DOI":"10.1016\/j.jcss.2016.12.003"},{"key":"1841_CR19","first-page":"4660","volume":"6","author":"Y Rong","year":"2018","unstructured":"Rong Y, Jiawen K, Maoqiang W, Xumin H, Yan Z, Sabita M, Shengli X (2018) Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE IoT J 6:4660\u20134670","journal-title":"IEEE IoT J"},{"key":"1841_CR20","doi-asserted-by":"crossref","unstructured":"ShermanSM\u00a0C, ChengKang\u00a0C, RobertH\u00a0D, WenGuey\u00a0T, Jianying\u00a0Z (2014) Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Trans Parallel Distrib Syst, 25:468\u2013477,","DOI":"10.1109\/TPDS.2013.112"},{"key":"1841_CR21","doi-asserted-by":"crossref","unstructured":"Junwei\u00a0Z, Shulan\u00a0W, Jianping\u00a0Y, Joseph K\u00a0L, Weixin\u00a0X, Jianyong\u00a0C (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forens Secur, 11:1265\u20131277,","DOI":"10.1109\/TIFS.2016.2523941"},{"key":"1841_CR22","doi-asserted-by":"crossref","unstructured":"Shucheng\u00a0Y, Ming\u00a0L, Wenjing\u00a0L, Yao\u00a0Z, Kui\u00a0R (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst, 24:131\u2013143,","DOI":"10.1109\/TPDS.2012.97"},{"key":"1841_CR23","doi-asserted-by":"crossref","unstructured":"Yi\u00a0L, Yinghui Z, Zhusong\u00a0L, Jie\u00a0L (2018) Secure and fine-grained access control on e-healthcare records in mobile cloud computing. Future Gener Comput Syst, 78:1020\u20131026,","DOI":"10.1016\/j.future.2016.12.027"},{"issue":"7","key":"1841_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-022-3585-9","volume":"66","author":"D Ghopur","year":"2023","unstructured":"Ghopur D, Ma J, Ma X, Miao Y, Hao J, Jiang T (2023) Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation. Sci China Inf Sci 66(7):1\u201317","journal-title":"Sci China Inf Sci"},{"issue":"1","key":"1841_CR25","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s10586-021-03382-5","volume":"25","author":"A Saidi","year":"2022","unstructured":"Saidi A, Nouali O, Amira A (2022) Share-abe: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and fog computing. Cluster Comput 25(1):167\u2013185","journal-title":"Cluster Comput"},{"key":"1841_CR26","unstructured":"Hadis H, Mohammad\u00a0Ebrahim S, Amir\u00a0Masoud R (2023) New attribute-based encryption schemes with anonymous authentication and time limitation in fog computing. Concurrency and Computation: Prac Exp, page e7681,"},{"key":"1841_CR27","doi-asserted-by":"crossref","unstructured":"Jie C, Jiaxu N, Hao L, Li\u00a0L, Yunhao L (2023) Adaptively secure multi-authority attribute-based broadcast encryption in fog computing. Comput Netw, page 109844,","DOI":"10.1016\/j.comnet.2023.109844"},{"key":"1841_CR28","unstructured":"Chinmay C, Soufiene\u00a0Ben O, Faris\u00a0A A, Hedi S (2023) Fc-seeda: fog computing-based secure and energy efficient data aggregation scheme for internet of healthcare things. Neural Comput Appl, pages 1\u201317,"},{"key":"1841_CR29","doi-asserted-by":"crossref","unstructured":"Kavuri\u00a0KSVA S, Krishna Sree T (2023) Enhancing security using secure authentication model in fog computing model. Wire Personal Commu, 130(2):909\u2013933,","DOI":"10.1007\/s11277-023-10313-7"},{"issue":"5","key":"1841_CR30","doi-asserted-by":"publisher","first-page":"2706","DOI":"10.3390\/s23052706","volume":"23","author":"H-Y Lin","year":"2023","unstructured":"Lin H-Y, Tsai T-T, Ting P-Y, Fan Y-R (2023) Identity-based proxy re-encryption scheme using fog computing and anonymous key generation. Sensors 23(5):2706","journal-title":"Sensors"},{"key":"1841_CR31","doi-asserted-by":"crossref","unstructured":"Ma R, Zhang L (2023) Spmac: Secure and privacy-preserving multi-authority access control for fog-enabled iot cloud storage. J Syst Arch 142:102951","DOI":"10.1016\/j.sysarc.2023.102951"},{"key":"1841_CR32","doi-asserted-by":"crossref","unstructured":"Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons and Fractals, 37,","DOI":"10.1016\/j.chaos.2006.09.047"},{"key":"1841_CR33","doi-asserted-by":"crossref","unstructured":"Han Q, Meikang Q, Meiqin L, Gerard M (2020) Secure health data sharing for medical cyber-physical systems for the healthcare 4.0. IEEE J Biomed Health Inf, 24(9):2499\u20132505,","DOI":"10.1109\/JBHI.2020.2973467"},{"key":"1841_CR34","doi-asserted-by":"publisher","first-page":"86384","DOI":"10.1109\/ACCESS.2019.2926354","volume":"7","author":"K Riad","year":"2019","unstructured":"Riad K, Hamza R, Yan H (2019) Sensitive and energetic iot access control for managing cloud electronic health records. IEEE Access 7:86384\u201386393","journal-title":"IEEE Access"},{"issue":"4","key":"1841_CR35","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.1109\/TCC.2016.2617382","volume":"8","author":"M Chen","year":"2020","unstructured":"Chen M, Qian Y, Chen J, Hwang K, Mao S, Long H (2020) Privacy protection and intrusion avoidance for cloudlet-based medical data sharing. IEEE Trans Cloud Comput 8(4):1274\u20131283","journal-title":"IEEE Trans Cloud Comput"},{"key":"1841_CR36","doi-asserted-by":"publisher","first-page":"60290","DOI":"10.1109\/ACCESS.2019.2914862","volume":"7","author":"S Han","year":"2019","unstructured":"Han S, Han K, Zhang S (2019) A data sharing protocol to minimize security and privacy risks of cloud storage in big data era. IEEE Access 7:60290\u201360298","journal-title":"IEEE Access"},{"key":"1841_CR37","doi-asserted-by":"publisher","first-page":"28019","DOI":"10.1109\/ACCESS.2018.2840504","volume":"6","author":"D Zheng","year":"2018","unstructured":"Zheng D, Axin W, Zhang Y, Zhao Q (2018) Efficient and privacy-preserving medical data sharing in internet of things with limited computing power. IEEE Access 6:28019\u201328027","journal-title":"IEEE Access"},{"issue":"5","key":"1841_CR38","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/TDSC.2018.2844814","volume":"17","author":"H Ma","year":"2020","unstructured":"Ma H, Zhang R, Yang G, Song Z, He K, Xiao Y (2020) Efficient fine-grained data sharing mechanism for electronic medical record systems with mobile devices. IEEE Trans Depend Secur Comput 17(5):1026\u20131038","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"1841_CR39","doi-asserted-by":"crossref","unstructured":"Sreenivasa Rao Y (2017) A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener Comput Syst 67:133\u2013151","DOI":"10.1016\/j.future.2016.07.019"},{"issue":"1","key":"1841_CR40","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s10586-020-03101-6","volume":"24","author":"T Yuanfei","year":"2021","unstructured":"Yuanfei T, Yang G, Wang J, Qingjian S (2021) A secure, efficient and verifiable multimedia data sharing scheme in fog networking system. Cluster Comput 24(1):225\u2013247","journal-title":"Cluster Comput"},{"issue":"5","key":"1841_CR41","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3785","volume":"33","author":"Y Zhao","year":"2022","unstructured":"Zhao Y, Zhang X, Xie X, Ding Y, Kumar S (2022) A verifiable hidden policy cp-abe with decryption testing scheme and its application in vanet. Trans Emerg Telecommu Technol 33(5):e3785","journal-title":"Trans Emerg Telecommu Technol"},{"key":"1841_CR42","doi-asserted-by":"publisher","first-page":"1525","DOI":"10.1007\/s10586-020-03202-2","volume":"24","author":"K Sethi","year":"2021","unstructured":"Sethi K, Pradhan A, Bera P (2021) Pmter-abe: a practical multi-authority cp-abe with traceability, revocation and outsourcing decryption for secure access control in cloud systems. Cluster Comput 24:1525\u20131550","journal-title":"Cluster Comput"},{"key":"1841_CR43","unstructured":"Adrian D\u00a0H, Woo Suk\u00a0H, Andrew Taylor R (2017) Hospital triage and patient history data. https:\/\/www.kaggle.com\/datasets\/maalona\/hospital-triage-and-patient-history-data,"},{"issue":"5","key":"1841_CR44","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/TSC.2016.2520932","volume":"10","author":"J Li","year":"2017","unstructured":"Li J, Yao W, Zhang Y, Qian H, Han J (2017) Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans Serv Comput 10(5):785\u2013796","journal-title":"IEEE Trans Serv Comput"},{"issue":"7","key":"1841_CR45","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"H Junbeom","year":"2011","unstructured":"Junbeom H, Dong KN (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel and Distribut Syst 22(7):1214\u20131221","journal-title":"IEEE Trans Parallel and Distribut Syst"},{"key":"1841_CR46","doi-asserted-by":"crossref","unstructured":"Kim\u00a0JW, Edemacu\u00a0K, Jang\u00a0B (2021) Cescr:cp-abe for efficient and secure sharing of data in collaborative ehealth with revocation and no dummy attribute. PLoS One, 16(5),","DOI":"10.1371\/journal.pone.0250992"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01841-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01841-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01841-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T05:33:41Z","timestamp":1747460021000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01841-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,17]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1841"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01841-5","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2639473\/v1","asserted-by":"object"}]},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,17]]},"assertion":[{"value":"28 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"Authors are responsible for correctness of the statements provided in the manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval and Consent to Participate"}},{"value":"Additional informed consent was obtained from all individual participants for whom identifying information is included in this article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"Not Applicable","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human Ethics"}}],"article-number":"52"}}