{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:40:13Z","timestamp":1758987613962,"version":"3.44.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02061-1","type":"journal-article","created":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T00:38:14Z","timestamp":1751675894000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CuraFrame: a patient-centric secure and privacy preserving medical framework with zero-leak using blockchain"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5170-9501","authenticated-orcid":false,"given":"Lokendra","family":"Vishwakarma","sequence":"first","affiliation":[]},{"given":"Samanyu A.","family":"Saji","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6205-4096","authenticated-orcid":false,"given":"Debasis","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,5]]},"reference":[{"key":"2061_CR1","doi-asserted-by":"publisher","first-page":"92137","DOI":"10.1109\/ACCESS.2022.3202902","volume":"10","author":"AN Gohar","year":"2022","unstructured":"Gohar AN, Abdelmawgoud SA, Farhan MS (2022) A patient-centric healthcare framework reference architecture for better semantic interoperability based on blockchain, Cloud, and IoT. IEEE Access 10:92137\u201392157","journal-title":"IEEE Access"},{"key":"2061_CR2","doi-asserted-by":"crossref","unstructured":"Qahtan S, Yatim K, Zulzalil H, Osman MH, Zaidan A, Alsattar H (2022) Review of healthcare industry 4.0 application-based blockchain in terms of security and privacy development attributes: Comprehensive taxonomy, open issues and challenges and recommended solution. Journal of Network and Computer Applications, p 103529","DOI":"10.1016\/j.jnca.2022.103529"},{"issue":"1","key":"2061_CR3","first-page":"438","volume":"16","author":"M Wang","year":"2021","unstructured":"Wang M, Guo Y, Zhang C, Wang C, Huang H, Jia X (2021) MedShare: A privacy-preserving medical data sharing system by using blockchain. IEEE Trans Serv Comput 16(1):438\u2013451","journal-title":"IEEE Trans Serv Comput"},{"key":"2061_CR4","unstructured":"Babichev SA, Ries J, Lvovsky AI Guide to Privacy and Security of Electronic Health Information. Preprint at https:\/\/www.healthit.gov\/sites\/default\/files\/pdf\/privacy\/privacy-and-security-guide.pdf"},{"issue":"4","key":"2061_CR5","doi-asserted-by":"publisher","first-page":"2060","DOI":"10.1109\/TSC.2020.3031061","volume":"15","author":"Y Guo","year":"2022","unstructured":"Guo Y, Xie H, Miao Y, Wang C, Jia X (2022) FedCrowd: a federated and privacy-preserving crowdsourcing platform on blockchain. IEEE Trans Serv Comput 15(4):2060\u20132073. https:\/\/doi.org\/10.1109\/TSC.2020.3031061","journal-title":"IEEE Trans Serv Comput"},{"key":"2061_CR6","doi-asserted-by":"crossref","unstructured":"Seh AH, Zarour M, Alenezi M, Sarkar AK, Agrawal A, Kumar R, et al (2020) Healthcare data breaches: insights and implications. In: Healthcare. vol 8. Multidisciplinary Digital Publishing Institute, p 133","DOI":"10.3390\/healthcare8020133"},{"key":"2061_CR7","unstructured":": Data Breaches. Accessed: 9 April 2022 . https:\/\/privacyrights.org\/data-breaches"},{"key":"2061_CR8","unstructured":": How Much Would a Data Breach Cost Your Business. https:\/\/www.ibm.com\/security\/data-breach"},{"key":"2061_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107471","volume":"138","author":"A Hajian","year":"2023","unstructured":"Hajian A, Prybutok VR, Chang HC (2023) An empirical study for blockchain-based information sharing systems in electronic health records: A mediation perspective. Computers in Human Behavior. 138:107471","journal-title":"Computers in Human Behavior."},{"key":"2061_CR10","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, p 21260"},{"key":"2061_CR11","doi-asserted-by":"crossref","unstructured":"Merlo V, Pio G, Giusto F, Bilancia M (2022) On the exploitation of the blockchain technology in the healthcare sector: A systematic review. Expert Systems with Applications, p 118897","DOI":"10.1016\/j.eswa.2022.118897"},{"issue":"1","key":"2061_CR12","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1109\/TEM.2020.3013507","volume":"70","author":"L Soltanisehat","year":"2023","unstructured":"Soltanisehat L, Alizadeh R, Hao H, Choo KKR (2023) Technical, temporal, and spatial research challenges and opportunities in blockchain-based healthcare: a systematic literature review. IEEE Trans Eng Manage 70(1):353\u2013368","journal-title":"IEEE Trans Eng Manage"},{"key":"2061_CR13","unstructured":"Jurdak R, Corchado JM, Park JH, Bhatt C, Dev K.: Blockchain based sustainable, secure healthcare systems. Elsevier"},{"issue":"10","key":"2061_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0574-6","volume":"40","author":"X Yue","year":"2016","unstructured":"Yue X, Wang H, Jin D, Li M, Jiang W (2016) Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J Med Syst 40(10):1\u20138","journal-title":"J Med Syst"},{"key":"2061_CR15","doi-asserted-by":"publisher","first-page":"9239","DOI":"10.1109\/ACCESS.2016.2645904","volume":"4","author":"J Zhang","year":"2016","unstructured":"Zhang J, Xue N, Huang X (2016) A secure system for pervasive social network-based healthcare. Ieee Access 4:9239\u20139250","journal-title":"Ieee Access"},{"issue":"8","key":"2061_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0997-3","volume":"42","author":"H Li","year":"2018","unstructured":"Li H, Zhu L, Shen M, Gao F, Tao X, Liu S (2018) Blockchain-based data preservation system for medical data. J Med Syst 42(8):1\u201313","journal-title":"J Med Syst"},{"issue":"8","key":"2061_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0993-7","volume":"42","author":"K Fan","year":"2018","unstructured":"Fan K, Wang S, Ren Y, Li H, Yang Y (2018) Medblock: Efficient and secure medical data sharing via blockchain. J Med Syst 42(8):1\u201311","journal-title":"J Med Syst"},{"issue":"8","key":"2061_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0994-6","volume":"42","author":"H Wang","year":"2018","unstructured":"Wang H, Song Y (2018) Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. J Med Syst 42(8):1\u20139","journal-title":"J Med Syst"},{"key":"2061_CR19","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.future.2019.01.018","volume":"95","author":"L Chen","year":"2019","unstructured":"Chen L, Lee WK, Chang CC, Choo KKR, Zhang N (2019) Blockchain based searchable encryption for electronic health record sharing. Futur Gener Comput Syst 95:420\u2013429","journal-title":"Futur Gener Comput Syst"},{"key":"2061_CR20","doi-asserted-by":"crossref","unstructured":"Tanwar S, Parekh K, Evans R (2020) Blockchain-based electronic healthcare record system for healthcare 4.0 applications. J Inf Secur Appl 50:102407","DOI":"10.1016\/j.jisa.2019.102407"},{"key":"2061_CR21","doi-asserted-by":"crossref","unstructured":"Parthasarathy S, Harikrishnan A, Narayanan G, Singh K, et al (2021) Secure distributed medical record storage using blockchain and emergency sharing using multi-party computation. In: 2021 11th IFIP international conference on new technologies, mobility and security (NTMS). IEEE, p 1\u20135","DOI":"10.1109\/NTMS49979.2021.9432643"},{"key":"2061_CR22","doi-asserted-by":"crossref","unstructured":"Yao AC (1982) Protocols for secure computations. In: 23rd Annual symposium on foundations of computer science (SFCS 1982). IEEE, p 160\u2013164","DOI":"10.1109\/SFCS.1982.38"},{"key":"2061_CR23","doi-asserted-by":"crossref","unstructured":"Chen Y, Meng L, Zhou H, Xue G (2021) A blockchain-based medical data sharing mechanism with attribute-based access control and privacy protection. Wireless Communications and Mobile Computing 2021","DOI":"10.1155\/2021\/6685762"},{"key":"2061_CR24","doi-asserted-by":"crossref","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) l-diversity: Privacy beyond k-anonymity. ACM Trans Knowl Dis Data (TKDD) 1(1):3\u2013es","DOI":"10.1145\/1217299.1217302"},{"key":"2061_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108586","volume":"203","author":"G Zhang","year":"2022","unstructured":"Zhang G, Yang Z, Liu W (2022) Blockchain-based privacy preserving e-health system for healthcare data in cloud. Comput Netw 203:108586","journal-title":"Comput Netw"},{"key":"2061_CR26","doi-asserted-by":"crossref","unstructured":"Liu L, Li Z (2022) Permissioned blockchain and deep reinforcement learning enabled security and energy efficient healthcare internet of things. IEEE Access","DOI":"10.1109\/ACCESS.2022.3176444"},{"key":"2061_CR27","doi-asserted-by":"crossref","unstructured":"Luong DA, Park JH (2022) Privacy-preserving blockchain-based healthcare system for IoT devices using zk-SNARK. IEEE Access","DOI":"10.1109\/ACCESS.2022.3177211"},{"key":"2061_CR28","doi-asserted-by":"crossref","unstructured":"Ghosh T, Roy A, Misra S (2022) B2H: Enabling delay-tolerant blockchain network in healthcare for society 5.0. Comput Netw 210:108860","DOI":"10.1016\/j.comnet.2022.108860"},{"key":"2061_CR29","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1016\/j.comcom.2022.06.013","volume":"192","author":"MS Rahman","year":"2022","unstructured":"Rahman MS, Alabdulatif A, Khalil I (2022) Privacy aware internet of medical things data certification framework on healthcare blockchain of 5G edge. Comput Commun 192:373\u2013381","journal-title":"Comput Commun"},{"issue":"2","key":"2061_CR30","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/JBHI.2022.3187037","volume":"27","author":"S Rahmadika","year":"2023","unstructured":"Rahmadika S, Astillo PV, Choudhary G, Duguma DG, Sharma V, You I (2023) Blockchain-based privacy preservation scheme for misbehavior detection in lightweight IoMT devices. IEEE J Biomed Health Inf 27(2):710\u2013721. https:\/\/doi.org\/10.1109\/JBHI.2022.3187037","journal-title":"IEEE J Biomed Health Inf"},{"issue":"5","key":"2061_CR31","doi-asserted-by":"publisher","first-page":"2231","DOI":"10.1109\/JBHI.2022.3183397","volume":"27","author":"J Liu","year":"2023","unstructured":"Liu J, Jiang W, Sun R, Bashir AK, Alshehri MD, Hua Q et al (2023) Conditional anonymous remote healthcare data sharing over blockchain. IEEE J Biomed Health Inf 27(5):2231\u20132242. https:\/\/doi.org\/10.1109\/JBHI.2022.3183397","journal-title":"IEEE J Biomed Health Inf"},{"key":"2061_CR32","doi-asserted-by":"publisher","unstructured":"Wu G, Wang S, Ning Z, Zhu B (2022) Privacy-preserved electronic medical record exchanging and sharing: a blockchain-based smart healthcare system. IEEE J Biomed Health Inf 26(5):1917\u20131927. https:\/\/doi.org\/10.1109\/JBHI.2021.3123643","DOI":"10.1109\/JBHI.2021.3123643"},{"key":"2061_CR33","doi-asserted-by":"crossref","unstructured":"Canetti R (2001) Universally composable security: A new paradigm for cryptographic protocols. In: Proceedings 42nd IEEE symposium on foundations of computer science. IEEE, p 136\u2013145","DOI":"10.1109\/SFCS.2001.959888"},{"issue":"1","key":"2061_CR34","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1097\/00001786-200601000-00014","volume":"21","author":"D Hampton","year":"2006","unstructured":"Hampton D, Norton J (2006) A model for quantifying quality initiatives in intensive care. J Nurs Care Qual 21(1):70\u201377","journal-title":"J Nurs Care Qual"},{"issue":"97","key":"2061_CR35","first-page":"4293","volume":"08","author":"Z Vahdati","year":"2019","unstructured":"Vahdati Z, Ghasempour A, Salehi M, Md Yasin S (2019) Comparison of ECC and RSA algorithms in IOT devices. J Theor Appl Inf Techol 08(97):4293","journal-title":"J Theor Appl Inf Techol"},{"key":"2061_CR36","unstructured":"Buterin V (2014) A next-generation smart contract and decentralized application platform. white paper. 3(37)"},{"key":"2061_CR37","unstructured":"Eyal I, Gencer AE, Sirer EG, Van Renesse R (2016) $$\\{$$Bitcoin-NG$$\\}$$: A Scalable Blockchain Protocol. In: 13th USENIX symposium on networked systems design and implementation (NSDI 16), p. 45\u201359"},{"key":"2061_CR38","unstructured":"Kogias EK, Jovanovic P, Gailly N, Khoffi I, Gasser L, Ford B (2016) Enhancing bitcoin security and performance with strong consistency via collective signing. In: 25th usenix security symposium (usenix security 16), p 279\u2013296"},{"key":"2061_CR39","doi-asserted-by":"crossref","unstructured":"Miller A, Xia Y, Croman K, Shi E, Song D (2016) The honey badger of BFT protocols. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, p 31\u201342","DOI":"10.1145\/2976749.2978399"},{"key":"2061_CR40","first-page":"173","volume":"99","author":"M Castro","year":"1999","unstructured":"Castro M, Liskov B et al (1999) Practical byzantine fault tolerance. OSDI 99:173\u2013186","journal-title":"OSDI"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02061-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02061-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02061-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:23Z","timestamp":1758986543000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02061-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2061"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02061-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,7]]},"assertion":[{"value":"25 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"NA","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Provided","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"NA","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}],"article-number":"231"}}