{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:02:22Z","timestamp":1774022542092,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,2,25]],"date-time":"2023-02-25T00:00:00Z","timestamp":1677283200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,25]],"date-time":"2023-02-25T00:00:00Z","timestamp":1677283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s12652-023-04526-8","type":"journal-article","created":{"date-parts":[[2023,2,25]],"date-time":"2023-02-25T05:03:06Z","timestamp":1677301386000},"page":"4221-4235","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Patient centric pre-transaction signature verification assisted smart contract based blockchain for electronic healthcare records"],"prefix":"10.1007","volume":"14","author":[{"given":"A. G.","family":"Chandini","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P. I.","family":"Basarkod","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,2,25]]},"reference":[{"key":"4526_CR1","doi-asserted-by":"publisher","first-page":"22313","DOI":"10.1109\/ACCESS.2017.2757844","volume":"5","author":"HA Al Hamid","year":"2017","unstructured":"Al Hamid HA, Rahman SMM, Hossain MS, Almogren A, Alamri A (2017) A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5:22313\u201322328","journal-title":"IEEE Access"},{"key":"4526_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/7516035","volume":"2019","author":"Y Al-Issa","year":"2019","unstructured":"Al-Issa Y, Ottom MA, Tamrawi A (2019) eHealth cloud security challenges: a survey. Hindavi, J Healthc Eng 2019:1\u201315","journal-title":"Hindavi, J Healthc Eng"},{"key":"4526_CR3","doi-asserted-by":"crossref","unstructured":"Alzahrani AGM, Alenezi A, Mershed A, Atlam H, Mousa F, Wills G (2020) A framework for data sharing between healthcare providers using blockchain Tech. Rep","DOI":"10.5220\/0009413403490358"},{"issue":"1","key":"4526_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1186\/s12911-018-0724-5","volume":"19","author":"ST Argaw","year":"2019","unstructured":"Argaw ST, Bempong NE, Eshaya-Chauvin B, Flahault A (2019) The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review BMC Med. Inform Decis Mak 19(1):10","journal-title":"Inform Decis Mak"},{"issue":"5","key":"4526_CR5","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1109\/JBHI.2013.2257818","volume":"17","author":"A Bahga","year":"2013","unstructured":"Bahga A, Madisetti VK, Jamoom E, Yang N, Hing E (2013) Adoption of certified electronic health record systems and electronic information sharing in A cloud-based approach for interoperable electronic health records (EHRs). IEEE Biomed J Health Inform 17(5):894\u2013906","journal-title":"IEEE Biomed J Health Inform"},{"issue":"1","key":"4526_CR6","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1007\/s12652-021-03163-3","volume":"13","author":"U Chelladurai","year":"2022","unstructured":"Chelladurai U, Pandian S (2022) A novel blockchain based electronic health record automation system for healthcare. J Ambient Intell Humaniz Comput 13(1):693\u2013703","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"6","key":"4526_CR7","doi-asserted-by":"publisher","first-page":"4005","DOI":"10.1007\/s10916-012-9873-8","volume":"36","author":"TS Chen","year":"2012","unstructured":"Chen TS, Liu CH, Chen TL, Chen CS, Bau JG, Lin TC (2012) Secure dynamic access control scheme of PHR in cloud computing. J Med Syst 36(6):4005\u20134020","journal-title":"J Med Syst"},{"key":"4526_CR8","doi-asserted-by":"publisher","first-page":"74361","DOI":"10.1109\/ACCESS.2019.2919982","volume":"7","author":"S Chenthara","year":"2019","unstructured":"Chenthara S, Ahmed K, Wang H, Whittaker F (2019) Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE Access 7:74361\u201374382","journal-title":"IEEE Access"},{"key":"4526_CR9","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.maturitas.2018.04.008","volume":"113","author":"L Coventry","year":"2018","unstructured":"Coventry L, Branley D (2018) Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas 113:48\u201352","journal-title":"Maturitas"},{"key":"4526_CR10","doi-asserted-by":"crossref","unstructured":"Dean DJ et al (2017) Engineering scalable, secure, multi-tenant cloud for healthcare data. In: IEEE World Congress on Services (SERVICES), Honolulu, HI, pp 21\u201329","DOI":"10.1109\/SERVICES.2017.13"},{"issue":"4","key":"4526_CR11","doi-asserted-by":"publisher","first-page":"6301","DOI":"10.1109\/JIOT.2018.2878216","volume":"6","author":"C Hahn","year":"2019","unstructured":"Hahn C, Kwon H, Hur J (2019) Trustworthy delegation toward securing mobile healthcare cyber-physical systems. IEEE Internet of Things J 6(4):6301\u20136309","journal-title":"IEEE Internet of Things J"},{"key":"4526_CR12","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1007\/978-981-15-3284-9_69","volume-title":"Intelligent computing and innovation on data science","author":"R Haque","year":"2020","unstructured":"Haque R, Sarwar H, Kabir SR, Forhat R, Sadeq MJ, Akhtaruzzaman M, Haque N (2020) Blockchain-based information security of electronic medical records (EMR) in a healthcare communication system. Intelligent computing and innovation on data science. Springer, Singapore, pp 641\u2013650"},{"key":"4526_CR13","doi-asserted-by":"publisher","first-page":"65439","DOI":"10.1109\/ACCESS.2018.2876971","volume":"6","author":"HR Hasan","year":"2018","unstructured":"Hasan HR, Salah K (2018) Proof of delivery of digital assets using blockchain and smart contracts. IEEE Access 6:65439\u201365448","journal-title":"IEEE Access"},{"key":"4526_CR14","doi-asserted-by":"crossref","unstructured":"Hong J, Morris P, Seo J (2017) Interconnected personal health record ecosystem using IoT cloud platform and HL7 FHIR. In: IEEE Intl. Conf. on Healthcare Informatics (ICHI), Park City, UT, pp 362\u2013367","DOI":"10.1109\/ICHI.2017.82"},{"key":"4526_CR15","unstructured":"https:\/\/economictimes.indiatimes.com\/tech\/internet\/why-cybersecurity-should-be-indias-foremost-priority\/articleshow\/71843562.cms?from=mdr [Accessed on 15 Nov 2021]"},{"key":"4526_CR16","unstructured":"https:\/\/www.healthcareitnews.com\/projects\/biggest-healthcare-data-breaches-2018-so-far [Accessed on 15 Nov 2021]"},{"key":"4526_CR17","doi-asserted-by":"publisher","first-page":"36584","DOI":"10.1109\/ACCESS.2018.2852784","volume":"6","author":"Q Huang","year":"2018","unstructured":"Huang Q, Yue W, He Y, Yang Y (2018) Secure identity-based data sharing and profile matching for mobile healthcare social networks in cloud computing. IEEE Access 6:36584\u201336594","journal-title":"IEEE Access"},{"key":"4526_CR18","unstructured":"Jamoom E, Yang N, Hing E (2016) Adoption of certified electronic health record systems and electronic information sharing in physician offices: United States US Dept. Health Hubb, Services Centers Disease Control Prevention Nat. Center Health Statist Hyattsville, MD, USA, Tech. Rep, p 236"},{"issue":"9","key":"4526_CR19","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1038\/nbt.3340","volume":"33","author":"LJ Kish","year":"2015","unstructured":"Kish LJ, Topol EJ (2015) Unpatients\u2014why patients should own their medical data. Nat Biotechnol 33(9):921","journal-title":"Nat Biotechnol"},{"issue":"2","key":"4526_CR20","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1007\/s11205-018-1837-z","volume":"141","author":"WW Koczkodaj","year":"2019","unstructured":"Koczkodaj WW, Mazurek M, Strzaka D, Wolny-Dominiak A, Woodbury-Smith M (2019) Electronic health record breaches as social indicators. Soc Indic Res 141(2):861\u2013871","journal-title":"Soc Indic Res"},{"issue":"2","key":"4526_CR21","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1109\/TSC.2014.2363654","volume":"9","author":"S Lee","year":"2016","unstructured":"Lee S, Song JH, Kim IK (2016) CDA generation and integration for health information exchange based on cloud computing system. IEEE Trans Serv Comp 9(2):241\u2013249","journal-title":"IEEE Trans Serv Comp"},{"key":"4526_CR22","doi-asserted-by":"crossref","unstructured":"Lubamba C, Bagula A (2017) Cyber-healthcare cloud computing interoperability using the HL7-CDA standard. In: IEEE Symposium on Computers and Communications (ISCC), Heraklion, pp 105\u2013110","DOI":"10.1109\/ISCC.2017.8024513"},{"key":"4526_CR23","doi-asserted-by":"publisher","first-page":"193102","DOI":"10.1109\/ACCESS.2020.3032553","volume":"8","author":"MM Madine","year":"2020","unstructured":"Madine MM, Battah AA, Yaqoob I, Salah K, Jayaraman R, Al-Hammadi Y, Pesic S, Ellahham S (2020) Blockchain for giving patients control over their medical records. IEEE Access 8:193102\u2013193115","journal-title":"IEEE Access"},{"key":"4526_CR24","doi-asserted-by":"publisher","first-page":"25666","DOI":"10.1109\/ACCESS.2018.2833509","volume":"6","author":"MI Malik","year":"2018","unstructured":"Malik MI, Mcateer I, Hannay P, Baig Z (2018) Preparing for secure wireless medical environment in 2050: a vision. IEEE Access 6:25666\u201325674","journal-title":"IEEE Access"},{"key":"4526_CR25","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.dss.2018.02.007","volume":"108","author":"A McLeod","year":"2018","unstructured":"McLeod A, Dolezel D (2018) Cyber-analytics: modeling factors associated with healthcare data breaches. Decis Support Syst 108:57\u201368","journal-title":"Decis Support Syst"},{"key":"4526_CR26","doi-asserted-by":"crossref","unstructured":"Mehraeen E, Ghazisaeedi M, Farzi J, Mirshekari S (2017) Security challenges in healthcare cloud computing: a systematic review. Glob J Health Sci 3","DOI":"10.5539\/gjhs.v9n3p157"},{"issue":"2","key":"4526_CR27","first-page":"729","volume":"7","author":"M Nandhini","year":"2016","unstructured":"Nandhini M, Muthukumar KA (2016) Secured sharing of medical data on hybrid cloud environment. Int J Comput Sci Inform Technol 7(2):729\u2013733","journal-title":"Int J Comput Sci Inform Technol"},{"issue":"4","key":"4526_CR28","doi-asserted-by":"publisher","first-page":"1398","DOI":"10.1177\/1460458218769699","volume":"25","author":"V Patel","year":"2018","unstructured":"Patel V (2018) A framework for secure and decentralized sharing of medical imaging data via blockchain consensus. Health Inform J 25(4):1398\u20131411","journal-title":"Health Inform J"},{"key":"4526_CR29","doi-asserted-by":"crossref","unstructured":"Ramani V, Kumar T, Bracken A, Liyanage M, Ylianttila M (2018) Secure and efficient data accessibility in blockchain based healthcare systems. In: Proc. GLOBECOM, pp 206-212","DOI":"10.1109\/GLOCOM.2018.8647221"},{"key":"4526_CR30","unstructured":"Ri N, Rachkidi E, Agoulmine N, Taher NC (2017) Towards using blockchain technology for eHealth data access management. In: Proc. IEEE 4th Int. Conf. Adv. Biomed. Eng, pp 1\u20134"},{"key":"4526_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2019.101144","volume":"58","author":"D Spatar","year":"2019","unstructured":"Spatar D, Kok O, Basoglu N, Daim T (2019) Adoption factors of electronic health record systems. Technol Soc 58:101144","journal-title":"Technol Soc"},{"key":"4526_CR32","doi-asserted-by":"publisher","first-page":"59389","DOI":"10.1109\/ACCESS.2020.2982964","volume":"8","author":"J Sun","year":"2020","unstructured":"Sun J, Yao X, Wang S, Wu Y (2020) Blockchain-based secure storage and access scheme for electronic medical records in IPFS. IEEE Access 8:59389\u2013401","journal-title":"IEEE Access"},{"key":"4526_CR33","volume":"50","author":"S Tanwar","year":"2020","unstructured":"Tanwar S, Parekh K, Evans R (2020) Blockchain-based electronic healthcare record system for healthcare 4.0 applications. J Inform Secur Appl 50:102407","journal-title":"J Inform Secur Appl"},{"key":"4526_CR34","doi-asserted-by":"crossref","unstructured":"The future of health care cybersecurity. J Nurs Regul 2018;8(4): S29- S31","DOI":"10.1016\/S2155-8256(18)30025-5"},{"key":"4526_CR35","doi-asserted-by":"publisher","first-page":"25167","DOI":"10.1109\/ACCESS.2018.2817560","volume":"6","author":"S Walker-Roberts","year":"2018","unstructured":"Walker-Roberts S, Hammoudeh M, Dehghantanha A (2018) A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access 6:25167\u201325177","journal-title":"IEEE Access"},{"key":"4526_CR36","doi-asserted-by":"publisher","first-page":"165842","DOI":"10.1109\/ACCESS.2019.2953042","volume":"7","author":"W Wang","year":"2019","unstructured":"Wang W, Huang H, Wu Y, Huang Q (2019) Cryptanalysis and improvement of an anonymous batch verification scheme for mobile healthcare crowd sensing. IEEE Access 7:165842\u2013165851","journal-title":"IEEE Access"},{"issue":"3","key":"4526_CR37","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2356","volume":"15","author":"SS Woods","year":"2013","unstructured":"Woods SS, Schwartz E, Tuepker A, Press NA, Nazi KM, Turvey CL, Nichol WP (2013) Patient experiences with full electronic access to health records and clinical notes through my HealtheVet personal health record pilot: qualitative study. Med J Internet Res 15(3):e65","journal-title":"Med J Internet Res"},{"issue":"01n02","key":"4526_CR38","doi-asserted-by":"publisher","first-page":"2040006","DOI":"10.1142\/S0218843020400067","volume":"29","author":"Y Wu","year":"2020","unstructured":"Wu Y, He F, Yang Y (2020) A grid-based secure product data exchange for cloud-based collaborative design. Int J Coop Inform Syst 29(01n02):2040006","journal-title":"Int J Coop Inform Syst"},{"issue":"2","key":"4526_CR39","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/info8020044","volume":"8","author":"Q Xia","year":"2017","unstructured":"Xia Q, Sifah EB, Smahi A, Amofa S, Zhang X (2017) BBDS: blockchain-based data sharing for electronic medical records in cloud environments. Information 8(2):44","journal-title":"Information"},{"issue":"5","key":"4526_CR40","doi-asserted-by":"publisher","first-page":"8345","DOI":"10.1109\/JIOT.2019.2917186","volume":"6","author":"C Xu","year":"2019","unstructured":"Xu C, Wang N, Zhu L, Sharif K, Zhang C (2019) Achieving searchable and privacy-preserving data sharing for cloud-assisted E-healthcare system. IEEE Internet of Things J 6(5):8345\u20138356","journal-title":"IEEE Internet of Things J"},{"key":"4526_CR41","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3804553","author":"K Zala","year":"2022","unstructured":"Zala K, Thakkar HK, Jadeja R, Dholakia NH, Kotecha K, Jain DK, Shukla M (2022) On the design of secured and reliable dynamic access control scheme of patient e-healthcare records in cloud environment. Comput Intell Neurosci. https:\/\/doi.org\/10.1155\/2022\/3804553","journal-title":"Comput Intell Neurosci"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-023-04526-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-023-04526-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-023-04526-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T04:31:01Z","timestamp":1728966661000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-023-04526-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,25]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["4526"],"URL":"https:\/\/doi.org\/10.1007\/s12652-023-04526-8","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,25]]},"assertion":[{"value":"7 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}