{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T15:20:56Z","timestamp":1767972056610,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T00:00:00Z","timestamp":1735776000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T00:00:00Z","timestamp":1735776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s12083-024-01883-9","type":"journal-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T22:02:53Z","timestamp":1735855373000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Enhancing security in electronic health records using an adaptive feature-centric polynomial data security model with blockchain integration"],"prefix":"10.1007","volume":"18","author":[{"given":"D.","family":"Dhinakaran","sequence":"first","affiliation":[]},{"given":"R.","family":"Ramani","sequence":"additional","affiliation":[]},{"given":"S.","family":"Edwin Raja","sequence":"additional","affiliation":[]},{"given":"D.","family":"Selvaraj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,2]]},"reference":[{"key":"1883_CR1","doi-asserted-by":"publisher","first-page":"5768","DOI":"10.1109\/ACCESS.2022.3141079","volume":"10","author":"AA Mamun","year":"2022","unstructured":"Mamun AA, Azam S, Gritti C (2022) Blockchain-Based Electronic Health Records Management: A Comprehensive Review and Future Research Direction. IEEE Access 10:5768\u20135789. https:\/\/doi.org\/10.1109\/ACCESS.2022.3141079","journal-title":"IEEE Access"},{"issue":"1","key":"1883_CR2","doi-asserted-by":"publisher","first-page":"107","DOI":"10.3390\/engproc2023059107","volume":"59","author":"LK Venugopal","year":"2023","unstructured":"Venugopal LK, Rajaganapathi R, Birjepatil A, Raja SE, Subramaniam G (2023) A Novel Information Security Framework for Securing Big Data in Healthcare Environment Using Blockchain. Eng Proc 59(1):107. https:\/\/doi.org\/10.3390\/engproc2023059107","journal-title":"Eng Proc"},{"key":"1883_CR3","doi-asserted-by":"publisher","first-page":"158367","DOI":"10.1109\/ACCESS.2021.3129284","volume":"9","author":"RG Sonkamble","year":"2021","unstructured":"Sonkamble RG, Phansalkar SP, Potdar VM, Bongale AM (2021) Survey of Interoperability in Electronic Health Records Management and Proposed Blockchain Based Framework: MyBlockEHR. IEEE Access 9:158367\u2013158401. https:\/\/doi.org\/10.1109\/ACCESS.2021.3129284","journal-title":"IEEE Access"},{"issue":"3&4","key":"1883_CR4","doi-asserted-by":"publisher","first-page":"0227","DOI":"10.26421\/QIC24.3-4-3","volume":"24","author":"D Dhinakaran","year":"2024","unstructured":"Dhinakaran D, Srinivasan L, UdhayaSankar SM, Selvaraj D (2024) Quantum-based privacy-preserving techniques for secure and trustworthy internet of medical things an extensive analysis. Quantum Inform Comput 24(3&4):0227\u20130266. https:\/\/doi.org\/10.26421\/QIC24.3-4-3","journal-title":"Quantum Inform Comput"},{"key":"1883_CR5","doi-asserted-by":"publisher","unstructured":"Jayasri R, Jayakumar D, Roselin SJ, Ramkumar MO (2022) \"Plan of Block-chain Enabled Confirmed Key Management Protocol for Internet of Medical Things Development,\" 2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, pp. 668\u2013673. https:\/\/doi.org\/10.1109\/ICESC54411.2022.9885295.","DOI":"10.1109\/ICESC54411.2022.9885295"},{"issue":"2024","key":"1883_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2024.106213","volume":"93","author":"R Ramani","year":"2024","unstructured":"Ramani R, Rosline Mary A, Edwin Raja S, ArunShunmugam D (2024) Optimized data management and secured federated learning in the Internet of Medical Things (IoMT) with blockchain technology. Biomed Signal Process Control 93(2024):106213. https:\/\/doi.org\/10.1016\/j.bspc.2024.106213","journal-title":"Biomed Signal Process Control"},{"key":"1883_CR7","doi-asserted-by":"publisher","first-page":"92137","DOI":"10.1109\/ACCESS.2022.3202902","volume":"10","author":"AN Gohar","year":"2022","unstructured":"Gohar AN, Abdelmawgoud SA, Farhan MS (2022) A Patient-Centric Healthcare Framework Reference Architecture for Better Semantic Interoperability Based on Blockchain, Cloud, and IoT. IEEE Access 10:92137\u201392157. https:\/\/doi.org\/10.1109\/ACCESS.2022.3202902","journal-title":"IEEE Access"},{"issue":"16","key":"1883_CR8","doi-asserted-by":"publisher","first-page":"17559","DOI":"10.1007\/s11227-022-04517-0","volume":"78","author":"D Dhinakaran","year":"2022","unstructured":"Dhinakaran D, Prathap PJ (2022) Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining. J Supercomput 78(16):17559\u201317593. https:\/\/doi.org\/10.1007\/s11227-022-04517-0","journal-title":"J Supercomput"},{"key":"1883_CR9","doi-asserted-by":"publisher","first-page":"28493","DOI":"10.1007\/s11042-023-14488-w","volume":"82","author":"K Kiania","year":"2023","unstructured":"Kiania K, Jameii SM, Rahmani AM (2023) Blockchain-based privacy and security preserving in electronic health: a systematic review. Multimed Tools Appl 82:28493\u201328519. https:\/\/doi.org\/10.1007\/s11042-023-14488-w","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"1883_CR10","doi-asserted-by":"publisher","first-page":"5609","DOI":"10.1109\/TII.2021.3136884","volume":"18","author":"H Ghayvat","year":"2022","unstructured":"Ghayvat H, Sharma M, Gope P, Sharma PK (2022) SHARIF: Solid Pod-Based Secured Healthcare Information Storage and Exchange Solution in Internet of Things. IEEE Trans Industr Inf 18(8):5609\u20135618. https:\/\/doi.org\/10.1109\/TII.2021.3136884","journal-title":"IEEE Trans Industr Inf"},{"issue":"2","key":"1883_CR11","first-page":"286","volume":"12","author":"D Dhinakaran","year":"2023","unstructured":"Dhinakaran D, Selvaraj D, Dharini N, Raja SE, Priya CSL (2023) Towards a Novel Privacy-Preserving Distributed Multiparty Data Outsourcing Scheme for Cloud Computing with Quantum Key Distribution. Int J Intel Syst Appl Eng 12(2):286\u2013300","journal-title":"Int J Intel Syst Appl Eng"},{"key":"1883_CR12","doi-asserted-by":"publisher","first-page":"66792","DOI":"10.1109\/ACCESS.2019.2917555","volume":"7","author":"DC Nguyen","year":"2019","unstructured":"Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2019) Blockchain for Secure EHRs Sharing of Mobile Cloud Based E-Health Systems. IEEE Access 7:66792\u201366806. https:\/\/doi.org\/10.1109\/ACCESS.2019.2917555","journal-title":"IEEE Access"},{"key":"1883_CR13","doi-asserted-by":"publisher","first-page":"41678","DOI":"10.1109\/ACCESS.2019.2904300","volume":"7","author":"F Tang","year":"2019","unstructured":"Tang F, Ma S, Xiang Y, Lin C (2019) An Efficient Authentication Scheme for Blockchain-Based Electronic Health Records. IEEE Access 7:41678\u201341689. https:\/\/doi.org\/10.1109\/ACCESS.2019.2904300","journal-title":"IEEE Access"},{"issue":"5","key":"1883_CR14","doi-asserted-by":"publisher","first-page":"1937","DOI":"10.1109\/JBHI.2021.3097237","volume":"26","author":"H Ghayvat","year":"2022","unstructured":"Ghayvat H et al (2022) CP-BDHCA: Blockchain-Based Confidentiality-Privacy Preserving Big Data Scheme for Healthcare Clouds and Applications. IEEE J Biomed Health Inform 26(5):1937\u20131948. https:\/\/doi.org\/10.1109\/JBHI.2021.3097237","journal-title":"IEEE J Biomed Health Inform"},{"issue":"5","key":"1883_CR15","doi-asserted-by":"publisher","first-page":"2755","DOI":"10.1109\/TSC.2021.3078119","volume":"15","author":"F Li","year":"2022","unstructured":"Li F, Liu K, Zhang L, Huang S, Wu Q (2022) EHRChain: A Blockchain-Based EHR System Using Attribute-Based and Homomorphic Cryptosystem. IEEE Trans Services Computing 15(5):2755\u20132765. https:\/\/doi.org\/10.1109\/TSC.2021.3078119","journal-title":"IEEE Trans Services Computing"},{"key":"1883_CR16","first-page":"10","volume":"2022","author":"SK Dwivedi","year":"2022","unstructured":"Dwivedi SK, Amin R, Lazarus JD, Pandi V (2022) Blockchain-Based Electronic Medical Records System with Smart Contract and Consensus Algorithm in Cloud Environment. Sec Commun Netw 2022:10","journal-title":"Sec Commun Netw"},{"issue":"4","key":"1883_CR17","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.3390\/electronics12041015","volume":"12","author":"RG Sonkamble","year":"2023","unstructured":"Sonkamble RG, Bongale AM, Phansalkar S, Sharma A, Rajput S (2023) Secure Data Transmission of Electronic Health Records Using Blockchain Technology. Electronics 12(4):1015. https:\/\/doi.org\/10.3390\/electronics12041015","journal-title":"Electronics"},{"key":"1883_CR18","doi-asserted-by":"publisher","unstructured":"Arunkumar B, Kousalya G (2020) Blockchain-Based Decentralized and Secure Lightweight E-Health System for Electronic Health Records. In: Thampi, S., et al. Intelligent Systems, Technologies and Applications. Advances in Intelligent Systems and Computing, vol 1148. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-15-3914-5_21","DOI":"10.1007\/978-981-15-3914-5_21"},{"issue":"23","key":"1883_CR19","doi-asserted-by":"publisher","first-page":"3003","DOI":"10.3390\/electronics10233003","volume":"10","author":"V Mani","year":"2021","unstructured":"Mani V, Manickam P, Alotaibi Y, Alghamdi S, Khalaf OI (2021) Hyperledger Healthchain: Patient-Centric IPFS-Based Storage of Health Records. Electronics 10(23):3003. https:\/\/doi.org\/10.3390\/electronics10233003","journal-title":"Electronics"},{"key":"1883_CR20","doi-asserted-by":"publisher","unstructured":"Nikhil KV, Sreevidya B (2022) \"Prevention of Man in the Middle Attacks on Electronic Health Records over Internet, using Block Chain,\" 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC), Salem, India pp. 1287\u20131292. https:\/\/doi.org\/10.1109\/ICAAIC53929.2022.9793191","DOI":"10.1109\/ICAAIC53929.2022.9793191"},{"issue":"2","key":"1883_CR21","doi-asserted-by":"publisher","first-page":"205","DOI":"10.52700\/jn.v3i2.80","volume":"3","author":"S Khan","year":"2022","unstructured":"Khan S, Ahmed F, Baig MS, Khan ZA, Yousufzai UA (2022) Securing Medical Datasets using Block Chain Technology. J Nanoscope (JN). 3(2):205\u2013217. https:\/\/doi.org\/10.52700\/jn.v3i2.80","journal-title":"J Nanoscope (JN)."},{"key":"1883_CR22","doi-asserted-by":"publisher","first-page":"87803","DOI":"10.1109\/ACCESS.2022.3186682","volume":"10","author":"Z Pang","year":"2022","unstructured":"Pang Z, Yao Y, Li Q, Zhang X, Zhang J (2022) Electronic Health Records Sharing Model Based on Blockchain with Checkable State PBFT Consensus Algorithm. IEEE Access 10:87803\u201387815. https:\/\/doi.org\/10.1109\/ACCESS.2022.3186682","journal-title":"IEEE Access"},{"key":"1883_CR23","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.procs.2020.06.021","volume":"1753","author":"Y Sharma","year":"2020","unstructured":"Sharma Y, Balamurugan B (2020) Preserving the Privacy of Electronic Health Records using Blockchain. Procedia Comput Sci 1753:171\u2013180. https:\/\/doi.org\/10.1016\/j.procs.2020.06.021","journal-title":"Procedia Comput Sci"},{"issue":"4s","key":"1883_CR24","doi-asserted-by":"publisher","first-page":"2364","DOI":"10.52783\/jes.2441","volume":"20","author":"DB Sathiya","year":"2024","unstructured":"Sathiya DB, Joseph LN (2024) Securing the Patient\u2019s Breast Cancer Data using Blockchain-based IBE with Deep Learning Model in IoT. J Elect Syst 20(4s):2364\u20132377","journal-title":"J Elect Syst"},{"issue":"Issue4","key":"1883_CR25","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.231","volume":"5","author":"S Barman","year":"2022","unstructured":"Barman S, Chattopadhyay S, Samanta D, Barman S (2022) A blockchain-based approach to secure electronic health records using fuzzy commitment scheme. Security and Privacy 5(Issue4):e231","journal-title":"Security and Privacy"},{"issue":"1","key":"1883_CR26","doi-asserted-by":"publisher","first-page":"4026","DOI":"10.1109\/TCE.2024.3357115","volume":"70","author":"S Datta","year":"2024","unstructured":"Datta S, Namasudra S (2024) Blockchain-Based Smart Contract Model for Securing Healthcare Transactions by Using Consumer Electronics and Mobile-Edge Computing. IEEE Trans Consum Electron 70(1):4026\u20134036. https:\/\/doi.org\/10.1109\/TCE.2024.3357115","journal-title":"IEEE Trans Consum Electron"},{"issue":"3","key":"1883_CR27","doi-asserted-by":"publisher","first-page":"1877","DOI":"10.32604\/iasc.2022.024509","volume":"33","author":"D Dhinakaran","year":"2022","unstructured":"Dhinakaran D, Prathap PM (2022) Preserving data confidentiality in association rule mining using data share allocator algorithm. Intel Automat Soft Comput 33(3):1877\u20131892. https:\/\/doi.org\/10.32604\/iasc.2022.024509","journal-title":"Intel Automat Soft Comput"},{"issue":"2","key":"1883_CR28","doi-asserted-by":"publisher","first-page":"3025","DOI":"10.1109\/JSYST.2022.3148989","volume":"16","author":"R Guo","year":"2022","unstructured":"Guo R, Li K, Li X, Zhang Y, Li X (2022) Compact Multiple Attribute-Based Signatures with Key Aggregation and Its Application. IEEE Syst J 16(2):3025\u20133035. https:\/\/doi.org\/10.1109\/JSYST.2022.3148989","journal-title":"IEEE Syst J"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01883-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01883-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01883-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:34:55Z","timestamp":1747474495000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01883-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,2]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1883"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01883-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,2]]},"assertion":[{"value":"16 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No ethics approval is required.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"7"}}