{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T17:21:21Z","timestamp":1778692881642,"version":"3.51.4"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T00:00:00Z","timestamp":1614297600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T00:00:00Z","timestamp":1614297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s12652-021-02942-2","type":"journal-article","created":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T12:03:17Z","timestamp":1614340997000},"page":"1001-1019","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":89,"title":["HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3202-4299","authenticated-orcid":false,"given":"P.","family":"Chinnasamy","sequence":"first","affiliation":[]},{"given":"P.","family":"Deepalakshmi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,26]]},"reference":[{"key":"2942_CR1","unstructured":"2018. https:\/\/health.data.ny.gov\/api\/views\/tsg2-5hds\/files\/5ded175fecf34dd2bb38df464b137958?ilename=NYSDOHHospitalInpatientDischargesSPARCSDeIdentified2016.zip"},{"key":"2942_CR2","unstructured":"AHIMA (2016) what is a personal health record (PHR)? http:\/\/myphr.com\/StartaPHR\/whatisaphr.aspx"},{"key":"2942_CR3","doi-asserted-by":"publisher","unstructured":"Ajala JA, Singh S, Mukherjee S, Chakraborty S (2019) Application of steganography technique in cloud computing. In: 2019 international conference on computational intelligence and knowledge economy (ICCIKE), pp 532\u2013537. https:\/\/doi.org\/10.1109\/ICCIKE47802.2019.9004347","DOI":"10.1109\/ICCIKE47802.2019.9004347"},{"key":"2942_CR4","first-page":"179","volume":"4","author":"OII Al-Farraji","year":"2016","unstructured":"Al-Farraji OII (2016) Steganography by use binary operations. Int J Eng Res General Sci 4:179\u201387","journal-title":"Int J Eng Res General Sci"},{"issue":"4","key":"2942_CR5","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1109\/TCC.2015.2446458","volume":"5","author":"M Ali","year":"2017","unstructured":"Ali M, Malik SUR, Khan SU (2017) Dasce: data security for cloud environment with semi-trusted third party. IEEE Trans Cloud Comput 5(4):642\u2013655. https:\/\/doi.org\/10.1109\/TCC.2015.2446458","journal-title":"IEEE Trans Cloud Comput"},{"key":"2942_CR6","doi-asserted-by":"publisher","unstructured":"Alshehri S, Mishra S, Raj RK (2016) Using access control to mitigate insider threats to healthcare systems. In: 2016 IEEE international conference on healthcare informatics (ICHI), pp 55\u201360. https:\/\/doi.org\/10.1109\/ICHI.2016.11","DOI":"10.1109\/ICHI.2016.11"},{"key":"2942_CR7","first-page":"426","volume":"5","author":"AK Singh","year":"2015","unstructured":"Singh AK, Singh J, Singh V (2015) Steganography in images using lsb technique. Int J Latest Trends Eng Technol (IJLTET) 5:426\u2013430","journal-title":"Int J Latest Trends Eng Technol (IJLTET)"},{"key":"2942_CR8","doi-asserted-by":"crossref","unstructured":"Sirisha BL, Kumar SS, Mohan BC (2015) Steganography based information security with high embedding capacity. In: National conference on recent advances in electronics computer engineering","DOI":"10.1109\/RAECE.2015.7510218"},{"key":"2942_CR9","doi-asserted-by":"publisher","unstructured":"Bansal VP, Singh S (2015) A hybrid data encryption technique using rsa and blowfish for cloud computing on fpgas. In: 2015 2nd international conference on recent advances in engineering computational sciences (RAECS), pp 1\u20135. https:\/\/doi.org\/10.1109\/RAECS.2015.7453367","DOI":"10.1109\/RAECS.2015.7453367"},{"key":"2942_CR10","doi-asserted-by":"publisher","unstructured":"Bhase G, Mangrulkar RS (2018) An access control system using visual cryptography and steganography. In: 2018 fourteenth international conference on information processing (ICINPRO), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICINPRO43533.2018.9096673","DOI":"10.1109\/ICINPRO43533.2018.9096673"},{"key":"2942_CR11","doi-asserted-by":"publisher","unstructured":"Bouchti AE, Bahsani S, Nahhal T (2016) Encryption as a service for data healthcare cloud security. In: 2016 fifth international conference on future generation communication technologies (FGCT), pp 48\u201354. https:\/\/doi.org\/10.1109\/FGCT.2016.7605072","DOI":"10.1109\/FGCT.2016.7605072"},{"key":"2942_CR12","doi-asserted-by":"publisher","unstructured":"Buchade AR, Ingle R (2014) Key management for cloud data storage: methods and comparisons. In: 2014 fourth international conference on advanced computing communication technologies, pp 263\u2013270. https:\/\/doi.org\/10.1109\/ACCT.2014.78","DOI":"10.1109\/ACCT.2014.78"},{"key":"2942_CR13","doi-asserted-by":"publisher","unstructured":"Liang C, Ye N, Malekian R, Wang R (2016) The hybrid encryption algorithm of lightweight data in cloud storage. In: 2016 2nd international symposium on agent, multi-agent systems and robotics (ISAMSR), pp 160\u2013166. https:\/\/doi.org\/10.1109\/ISAMSR.2016.7810021","DOI":"10.1109\/ISAMSR.2016.7810021"},{"key":"2942_CR14","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/978-981-10-7200-0_31","volume-title":"Advances in big data and cloud computing","author":"P Chinnasamy","year":"2018","unstructured":"Chinnasamy P, Deepalakshmi P (2018) Improved key generation scheme of rsa (ikgsr) algorithm based on offline storage for cloud. In: Rajsingh EB, Veerasamy J, Alavi AH, Peter JD (eds) Advances in big data and cloud computing. Springer Singapore, Singapore, pp 341\u2013350"},{"key":"2942_CR15","doi-asserted-by":"publisher","unstructured":"Chinnasamy P, Deepalakshmi P (2018) Design of secure storage for health-care cloud using hybrid cryptography. In: 2018 second international conference on inventive communication and computational technologies (ICICCT), pp 1717\u20131720. https:\/\/doi.org\/10.1109\/ICICCT.2018.8473107","DOI":"10.1109\/ICICCT.2018.8473107"},{"key":"2942_CR16","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/B978-0-12-819511-6.00006-6","volume-title":"Intelligent data security solutions for e-health applications, intelligent data-centric systems","author":"P Chinnasamy","year":"2020","unstructured":"Chinnasamy P, Deepalakshmi P, Shankar K (2020) Chapter 6\u2014an analysis of security access control on healthcare records in the cloud. In: Singh AK, Elhoseny M (eds) Intelligent data security solutions for e-health applications, intelligent data-centric systems. Academic Press, New York, pp 113\u2013130. https:\/\/doi.org\/10.1016\/B978-0-12-819511-6.00006-6 (ISBN 978-0-12-819511-6)"},{"key":"2942_CR17","doi-asserted-by":"publisher","unstructured":"Chiuchisan I, Balan D, Geman O, Chiuchisan I, Gordin I (2017) A security approach for health care information systems. In: 2017 E-health and bioengineering conference (EHB), pp 721\u2013724. https:\/\/doi.org\/10.1109\/EHB.2017.7995525","DOI":"10.1109\/EHB.2017.7995525"},{"issue":"1","key":"2942_CR18","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R Cramer","year":"2004","unstructured":"Cramer R, Shoup V (2004) Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J Comput 33(1):167\u2013226. https:\/\/doi.org\/10.1137\/S0097539702403773","journal-title":"SIAM J Comput"},{"issue":"1","key":"2942_CR19","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MCC.2018.011791712","volume":"5","author":"C Esposito","year":"2018","unstructured":"Esposito C, De Santis A, Tortora G, Chang H, Choo KR (2018) Blockchain: a panacea for healthcare cloud-based data security and privacy? IEEE Cloud Comput 5(1):31\u201337. https:\/\/doi.org\/10.1109\/MCC.2018.011791712","journal-title":"IEEE Cloud Comput"},{"key":"2942_CR20","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.future.2019.01.054","volume":"96","author":"Y Fan","year":"2019","unstructured":"Fan Y, Lin X, Tan G, Zhang Y, Dong W, Lei J (2019) One secure data integrity verification scheme for cloud storage. Future Gener Comput Syst 96:376\u2013385. https:\/\/doi.org\/10.1016\/j.future.2019.01.054","journal-title":"Future Gener Comput Syst"},{"key":"2942_CR21","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1002\/9781118722367.ch10","volume-title":"Primes","author":"N Ferguson","year":"2015","unstructured":"Ferguson N, Schneier B, Kohno T (2015) Primes. Wiley, New York, pp 163\u2013180. https:\/\/doi.org\/10.1002\/9781118722367.ch10 (chapter\u00a010)"},{"key":"2942_CR22","doi-asserted-by":"publisher","unstructured":"Fu Z, Shu J, Sun X, Zhang D (2014) Semantic keyword search based on trie over encrypted cloud data. In: Proceedings of the 2nd international workshop on security in cloud computing, SCC \u201914, pp 59\u201362, New York, NY, USA. Association for Computing Machinery. ISBN 9781450328050. https:\/\/doi.org\/10.1145\/2600075.2600081","DOI":"10.1145\/2600075.2600081"},{"key":"2942_CR23","unstructured":"Gallagher LA (2012) Cloud computing in healthcare: privacy and security considerations, WSHIMA. http:\/\/www.himss.org\/sites\/himssorg\/files\/HIMSSorg\/Content\/files\/CloudComputing WSHIMA042012-LG.pdf"},{"key":"2942_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0365-5","volume":"40","author":"C Guo","year":"2016","unstructured":"Guo C, Zhuang R, Jie Y, Ren Y, Wu T, Choo KK (2016) Fine-grained database field search using attribute-based encryption for e-healthcare clouds. J Med Syst 40:1\u20138","journal-title":"J Med Syst"},{"key":"2942_CR25","doi-asserted-by":"publisher","first-page":"7951","DOI":"10.1007\/s11042-019-08427-x","volume":"79","author":"A Gutub","year":"2019","unstructured":"Gutub A, Al-Ghamdi M (2019) Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimed Tools Appl 79:7951\u20137985. https:\/\/doi.org\/10.1007\/s11042-019-08427-x","journal-title":"Multimed Tools Appl"},{"key":"2942_CR26","first-page":"153","volume":"19","author":"O Hosam","year":"2019","unstructured":"Hosam O, Ahmad MH (2019) Hybrid design for cloud data security using combination of aes, ecc and lsb steganography. Int J Comput Sci Eng 19:153\u2013161","journal-title":"Int J Comput Sci Eng"},{"key":"2942_CR27","first-page":"528","volume":"3","author":"J Ahaiwe","year":"2014","unstructured":"Ahaiwe J (2014) Document security within institutions using image steganography technique. Int J Sci Res (IJSR) 3:528\u2013535","journal-title":"Int J Sci Res (IJSR)"},{"key":"2942_CR28","unstructured":"Alhassan JK, Abba E, Olaniyi OM, Waziri VO (2016) Threat modeling of electronic health systems and mitigating countermeasures. In: International conference on information and communication technology and its applications, pp 82\u201389"},{"issue":"3","key":"2942_CR29","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1109\/TCC.2017.2670559","volume":"7","author":"GO Karame","year":"2019","unstructured":"Karame GO, Soriente C, Lichota K, Capkun S (2019) Securing cloud data under key exposure. IEEE Trans Cloud Comput 7(3):838\u2013849. https:\/\/doi.org\/10.1109\/TCC.2017.2670559","journal-title":"IEEE Trans Cloud Comput"},{"key":"2942_CR30","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-981-287-990-5_12","volume-title":"Advances in ubiquitous networking","author":"Z Kartit","year":"2016","unstructured":"Kartit Z, Azougaghe A, Idrissi HK, El Marraki M, Hedabou M, Belkasmi M, Kartit A (2016) Applying encryption algorithm for data security in cloud storage. In: Sabir E, Medromi H, Sadik M (eds) Advances in ubiquitous networking. Springer Singapore, Singapore, pp 141\u2013154"},{"key":"2942_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-017-0778-4","author":"CS Kruse","year":"2017","unstructured":"Kruse CS, Smith B, Vanderlinden H, Nealand A (2017) Security techniques for the electronic health records. J Med Syst. https:\/\/doi.org\/10.1007\/s10916-017-0778-4","journal-title":"J Med Syst"},{"key":"2942_CR32","doi-asserted-by":"publisher","unstructured":"Coppolino L, D\u2019Antonio S, Romano L, Sgaglione L, Staffa M (2017) Addressing security issues in the e-health domain relying on siem solutions. In: IEEE 41st annual computer software and applications conference (COMPSAC), pp 510\u2013515 https:\/\/doi.org\/10.1109\/COMPSAC.2017.45","DOI":"10.1109\/COMPSAC.2017.45"},{"key":"2942_CR33","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1002\/sec.333","volume":"9","author":"CF Lee","year":"2016","unstructured":"Lee CF, Weng CY, Sharma A (2016) Steganographic access control in data hiding using run length encoding and modulo operations. Secur Commun Netw 9:139\u2013148","journal-title":"Secur Commun Netw"},{"key":"2942_CR34","doi-asserted-by":"publisher","unstructured":"Mai V, Khalil I, Ibaida A (2013) Steganography-based access control to medical data hidden in electrocardiogram. In: 2013 35th annual international conference of the IEEE engineering in medicine and biology society (EMBC), pp 1302\u20131305. https:\/\/doi.org\/10.1109\/EMBC.2013.6609747","DOI":"10.1109\/EMBC.2013.6609747"},{"key":"2942_CR35","doi-asserted-by":"publisher","unstructured":"Maitri PV, Verma A (2016) Secure file storage in cloud computing using hybrid cryptography algorithm. In: 2016 international conference on wireless communications, signal processing and networking (WiSPNET), pp 1635\u20131638. https:\/\/doi.org\/10.1109\/WiSPNET.2016.7566416","DOI":"10.1109\/WiSPNET.2016.7566416"},{"key":"2942_CR36","unstructured":"Medicare (2018) Centers for Medicare Medicaid Services. Electronic Health Record. https:\/\/www.cms.gov\/Medicare\/Ehealth\/EHealthRecords\/index.html"},{"key":"2942_CR37","doi-asserted-by":"publisher","first-page":"53","DOI":"10.5815\/ijcnis.2017.06.06","volume":"9","author":"M.\u00a0O.\u00a0A Oladeji","year":"2017","unstructured":"Oladeji M.\u00a0O.\u00a0A, Akomolafe P (2017) A hybrid cryptographic model for data storage in mobile cloud computing. Int J Comput Netw Inf Secur (IJCNIS) 9:53\u201360. https:\/\/doi.org\/10.5815\/ijcnis.2017.06.06","journal-title":"Int J Comput Netw Inf Secur (IJCNIS)"},{"key":"2942_CR38","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/S1005-8885(11)60424-X","volume":"19","author":"PE Yong","year":"2012","unstructured":"Yong PE, Wei ZH, Feng XI, Dai ZH, Yang GA, Chen DQ (2012) Secure cloud storage based on cryptographic techniques. J China Univ Posts Telecommun 19:182\u2013189. https:\/\/doi.org\/10.1016\/S1005-8885(11)60424-X","journal-title":"J China Univ Posts Telecommun"},{"key":"2942_CR39","first-page":"36","volume":"2","author":"S Phad Vitthal","year":"2011","unstructured":"Phad Vitthal S, Bhosale Rajkumar S, Panhalkar Archana R (2011) A novel security scheme for secret data using cryptography and steganography. Int J Comput Netw Inf Secur 2:36\u201342","journal-title":"Int J Comput Netw Inf Secur"},{"issue":"78","key":"2942_CR40","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1016\/j.procs.2016.02.108","volume":"322","author":"P Patil","year":"2016","unstructured":"Patil P, Narayankar P, Narayan DG, Meena SM (2016) A comprehensive evaluation of cryptographic algorithms: Des, 3des, aes, rsa and blowfish. Proc Comput Sci 322(78):617\u2013624. https:\/\/doi.org\/10.1016\/j.procs.2016.02.108","journal-title":"Proc Comput Sci"},{"key":"2942_CR41","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/0022-314X(80)90084-0","volume":"12","author":"M Rabin","year":"1980","unstructured":"Rabin M (1980) Probabilistic algorithm for testing primality. J Number Theory 12:128\u2013138","journal-title":"J Number Theory"},{"key":"2942_CR42","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.procs.2016.06.062","volume":"89","author":"S Raghavendra","year":"2016","unstructured":"Raghavendra S, Meghana K, Doddabasappa P, Geeta C, Buyya R, Venugopal K, Iyengar S, Patnaik L (2016) Index generation and secure multi-user access control over an encrypted cloud data. Proc Comput Sci 89:293\u2013300. https:\/\/doi.org\/10.1016\/j.procs.2016.06.062","journal-title":"Proc Comput Sci"},{"key":"2942_CR43","first-page":"718","volume":"14","author":"S Raghavendra","year":"2016","unstructured":"Raghavendra S, Reddy CS, Geeta CM, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2016) Survey on data storage and retrieval techniques over encrypted cloud data. Int J Comput Sci Inf Secur (IJCSIS) 14:718","journal-title":"Int J Comput Sci Inf Secur (IJCSIS)"},{"key":"2942_CR44","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1016\/j.protcy.2013.12.314","volume":"11","author":"H Rahmani","year":"2013","unstructured":"Rahmani H, Sundararajan E, Ali ZM, Zin AM (2013) Encryption as a service (eaas) as a solution for cryptography in cloud. Proc Technol 11:1202\u20131210. https:\/\/doi.org\/10.1016\/j.protcy.2013.12.314 (4th International Conference on Electrical Engineering and Informatics, ICEEI 2013)","journal-title":"Proc Technol"},{"key":"2942_CR45","doi-asserted-by":"publisher","unstructured":"Reshma V, Gladwin SJ, Thiruvenkatesan C (2019) Pairing-free cp-abe based cryptography combined with steganography for multimedia applications. In: 2019 international conference on communication and signal processing (ICCSP), pp 0501\u20130505. https:\/\/doi.org\/10.1109\/ICCSP.2019.8698053","DOI":"10.1109\/ICCSP.2019.8698053"},{"key":"2942_CR46","first-page":"126","volume":"7","author":"R Tavoli","year":"2016","unstructured":"Tavoli R, Bakhshi M, Salehian F (2016) A new method for text hiding in the image by using LSB. Int J Adv Comput Sci Appl 7:126\u201332","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"8","key":"2942_CR47","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1049\/iet-ifs.2018.5295","volume":"13","author":"JA Ruth","year":"2019","unstructured":"Ruth JA, Sirmathi H, Meenakshi A (2019) Secure data storage and intrusion detection in the cloud using mann and dual encryption through various attacks. IET Inf Secur 13(8):321\u2013329","journal-title":"IET Inf Secur"},{"key":"2942_CR48","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01403-1","author":"KR Sajay","year":"2019","unstructured":"Sajay KR, Babu SS, Vijayalakshmi Y (2019) Enhancing the security of cloud data using hybrid encryption algorithm. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-019-01403-1","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2942_CR49","doi-asserted-by":"crossref","unstructured":"Saleh S (2013) A secure data communication system using cryptography and steganography. Int J Comput Netw Commun 5(3):125\u2013137","DOI":"10.5121\/ijcnc.2013.5310"},{"key":"2942_CR50","doi-asserted-by":"publisher","unstructured":"Sarkar MK, Kumar S (2016) Ensuring data storage security in cloud computing based on hybrid encryption schemes. In: 2016 fourth international conference on parallel, distributed and grid computing (PDGC), pp 320\u2013325. https:\/\/doi.org\/10.1109\/PDGC.2016.7913169","DOI":"10.1109\/PDGC.2016.7913169"},{"key":"2942_CR51","unstructured":"Schneier B (1996) Applied cryptography, 2 edn. Wiley, Inc, US"},{"key":"2942_CR52","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.procs.2015.03.089","volume":"45","author":"N Shekokar","year":"2015","unstructured":"Shekokar N, Sampat K, Chandawalla C, Shah J (2015) Implementation of fuzzy keyword search over encrypted data in cloud computing. Proc Comput Sci 45:499\u2013505. https:\/\/doi.org\/10.1016\/j.procs.2015.03.089(International Conference on Advanced Computing Technologies and Applications (ICACTA))","journal-title":"Proc Comput Sci"},{"key":"2942_CR53","doi-asserted-by":"publisher","first-page":"145","DOI":"10.14257\/ijdta.2015.8.3.12","volume":"8","author":"N Singh","year":"2015","unstructured":"Singh N, Kaur PD (2015) A hybrid approach for encrypting data on cloud to prevent dos attacks. Int J Database Theory Appl 8:145\u2013154. https:\/\/doi.org\/10.14257\/ijdta.2015.8.3.12","journal-title":"Int J Database Theory Appl"},{"key":"2942_CR54","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1007\/s41870-018-0091-6","volume":"12","author":"H Tariq","year":"2018","unstructured":"Tariq H, Agarwal P (2018) Secure keyword search using dual encryption in cloud computing. Int J Inf Technol 12:1063\u20131072. https:\/\/doi.org\/10.1007\/s41870-018-0091-6","journal-title":"Int J Inf Technol"},{"key":"2942_CR55","doi-asserted-by":"publisher","unstructured":"Timothy DP, Santra AK (2017) A hybrid cryptography algorithm for cloud computing security. In: 2017 international conference on microelectronic devices, circuits and systems (ICMDCS), pp 1\u20135. https:\/\/doi.org\/10.1109\/ICMDCS.2017.8211728","DOI":"10.1109\/ICMDCS.2017.8211728"},{"key":"2942_CR56","doi-asserted-by":"publisher","unstructured":"Vegh L, Miclea L (2015) Access control in cyber-physical systems using steganography and digital signatures. In: 2015 IEEE international conference on industrial technology (ICIT), pp 1504\u20131509. https:\/\/doi.org\/10.1109\/ICIT.2015.7125309","DOI":"10.1109\/ICIT.2015.7125309"},{"issue":"3","key":"2942_CR57","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1080\/00051144.2019.1624409","volume":"60","author":"K Venkatraman","year":"2019","unstructured":"Venkatraman K, Geetha K (2019) Dynamic virtual cluster cloud security using hybrid steganographic image authentication algorithm. Automatika 60(3):314\u2013321. https:\/\/doi.org\/10.1080\/00051144.2019.1624409","journal-title":"Automatika"},{"key":"2942_CR58","doi-asserted-by":"publisher","first-page":"160","DOI":"10.2174\/1874431100802010160","volume":"2","author":"J Wainer","year":"2008","unstructured":"Wainer J, Campos CJ, Salinas MD, Sigulem D (2008) Security requirements for a lifelong electronic health record system: an opinion. Open Med Inform J 2:160\u2013165. https:\/\/doi.org\/10.2174\/1874431100802010160","journal-title":"Open Med Inform J"},{"key":"2942_CR59","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-015-0034-8","volume":"4","author":"Y Yang","year":"2015","unstructured":"Yang Y (2015) Attribute-based data retrieval with semantic keyword search for e-health cloud. J Cloud Comput 4:1\u20136","journal-title":"J Cloud Comput"},{"key":"2942_CR60","doi-asserted-by":"publisher","unstructured":"Zhang R, Liu L (2010) Security models and requirements for healthcare application clouds. In: 2010 IEEE 3rd international conference on cloud computing, pp 268\u2013275. https:\/\/doi.org\/10.1109\/CLOUD.2010.62","DOI":"10.1109\/CLOUD.2010.62"},{"key":"2942_CR61","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2923222","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Xu C, Ni J, Li H, Shen XS (2019) Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Trans Cloud Comput. https:\/\/doi.org\/10.1109\/TCC.2019.2923222","journal-title":"IEEE Trans Cloud Comput"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-02942-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-021-02942-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-02942-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T14:36:25Z","timestamp":1644330985000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-021-02942-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,26]]},"references-count":61,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["2942"],"URL":"https:\/\/doi.org\/10.1007\/s12652-021-02942-2","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,26]]},"assertion":[{"value":"21 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}