{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T08:25:35Z","timestamp":1769847935841,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T00:00:00Z","timestamp":1669248000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T00:00:00Z","timestamp":1669248000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s13198-022-01791-2","type":"journal-article","created":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T17:17:13Z","timestamp":1669310233000},"page":"503-518","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Flexible access control mechanism for cloud stored EHR using consortium blockchain"],"prefix":"10.1007","volume":"15","author":[{"given":"C. Eben","family":"Exceline","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8945-6412","authenticated-orcid":false,"given":"Sivakumar","family":"Nagarajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,24]]},"reference":[{"key":"1791_CR1","doi-asserted-by":"publisher","unstructured":"Bethencourt J, Sahai A, and Waters B (2007) Ciphertext-policy attribute-based encryption. Proceedings\u2013IEEE Symposium on Security and Privacy, 321\u2013334. https:\/\/doi.org\/10.1109\/SP.2007.11","DOI":"10.1109\/SP.2007.11"},{"key":"1791_CR2","doi-asserted-by":"crossref","unstructured":"Boneh D, and Franklin M (2001) Identity-based encryption from the Weil Pairing. 213\u2013229.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"1791_CR3","unstructured":"Buterin BV (2009) A Next Generation Smart Contract & Decentralized Application Platform. January, 1\u201336."},{"key":"1791_CR4","unstructured":"Cachin C (2016) Architecture of the Hyperledger Blockchain Fabric \u2217."},{"key":"1791_CR5","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.ins.2019.02.038","volume":"485","author":"S Cao","year":"2019","unstructured":"Cao S, Zhang G, Liu P, Zhang X, Neri F (2019) Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain. Inf Sci 485:427\u2013440. https:\/\/doi.org\/10.1016\/j.ins.2019.02.038","journal-title":"Inf Sci"},{"key":"1791_CR6","doi-asserted-by":"crossref","unstructured":"Chatterjee S, and Sarkar P (2011) Identity based encryption. Springer Science & Business Media","DOI":"10.1007\/978-1-4419-9383-0"},{"key":"1791_CR7","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.future.2019.01.018","volume":"95","author":"L Chen","year":"2019","unstructured":"Chen L, Lee WK, Chang CC, Choo KKR, Zhang N (2019) Blockchain based searchable encryption for electronic health record sharing. Futur Gener Comput Syst 95:420\u2013429. https:\/\/doi.org\/10.1016\/j.future.2019.01.018","journal-title":"Futur Gener Comput Syst"},{"key":"1791_CR8","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.scs.2018.02.014","volume":"39","author":"GG Dagher","year":"2018","unstructured":"Dagher GG, Mohler J, Milojkovic M, Marella PB (2018) Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain Cities Soc 39:283\u2013297. https:\/\/doi.org\/10.1016\/j.scs.2018.02.014","journal-title":"Sustain Cities Soc"},{"key":"1791_CR9","doi-asserted-by":"crossref","unstructured":"Exceline CE, Norman J, Exceline CE, and Norman J (2019). EAI Endorsed Transactions Biometric based Multi-Authority Inner Product Encryption for Electronic Health Record. 5(20), 1\u201313.","DOI":"10.4108\/eai.13-7-2018.163135"},{"key":"1791_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0993-7","volume":"42","author":"K Fan","year":"2018","unstructured":"Fan K, Wang S, Ren Y, Li H, Yang Y (2018) Systems-level quality improvement medblock: efficient and secure medical data sharing via blockchain. J Med Syst 42:1\u201311. https:\/\/doi.org\/10.1007\/s10916-018-0993-7","journal-title":"J Med Syst"},{"issue":"2","key":"1791_CR11","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TIFS.2015.2489179","volume":"11","author":"F Guo","year":"2016","unstructured":"Guo F, Susilo W, Mu Y (2016) Distance-based encryption: how to embed fuzziness in biometric-based encryption. IEEE Trans Inf Forensics Secur 11(2):247\u2013257. https:\/\/doi.org\/10.1109\/TIFS.2015.2489179","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1791_CR12","doi-asserted-by":"publisher","first-page":"11676","DOI":"10.1109\/ACCESS.2018.2801266","volume":"6","author":"R Guo","year":"2018","unstructured":"Guo R, Shi H, Zhao Q, Zheng D (2018) Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems. IEEE Access 6:11676\u201311686. https:\/\/doi.org\/10.1109\/ACCESS.2018.2801266","journal-title":"IEEE Access"},{"issue":"8","key":"1791_CR13","doi-asserted-by":"publisher","first-page":"e13592","DOI":"10.2196\/13592","volume":"21","author":"RH Hylock","year":"2019","unstructured":"Hylock RH, Zeng X (2019) A blockchain framework for patient-centered health records and exchange (healthchain): evaluation and proof-of-concept study. J Med Internet Res 21(8):e13592. https:\/\/doi.org\/10.2196\/13592","journal-title":"J Med Internet Res"},{"issue":"2","key":"1791_CR14","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s00145-012-9119-4","volume":"26","author":"J Katz","year":"2013","unstructured":"Katz J, Sahai A, Waters B (2013) Predicate encryption supporting disjunctions, polynomial equations, and inner products. J Cryptol 26(2):191\u2013224. https:\/\/doi.org\/10.1007\/s00145-012-9119-4","journal-title":"J Cryptol"},{"key":"1791_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1007-5","author":"H Kaur","year":"2018","unstructured":"Kaur H, Alam MA, Jameel R, Mourya AK, Chang V (2018) A proposed solution and future direction for blockchain-based heterogeneous medicare data in cloud environment. J Med Sys. https:\/\/doi.org\/10.1007\/s10916-018-1007-5","journal-title":"J Med Sys"},{"key":"1791_CR16","volume-title":"The Truth About Blockchain","author":"I Marco","year":"2017","unstructured":"Marco I, Karim L (2017) The Truth About Blockchain. Harvard University, Harvard Business Review"},{"key":"1791_CR17","unstructured":"Nakamoto, S. (n.d.). Bitcoin\u202f: a Peer-to-Peer Electronic Cash System. 1\u20139."},{"key":"1791_CR18","doi-asserted-by":"publisher","first-page":"66792","DOI":"10.1109\/ACCESS.2019.2917555","volume":"7","author":"DC Nguyen","year":"2019","unstructured":"Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2019) Blockchain for secure EHRs sharing of mobile cloud based E-health systems. IEEE Access 7:66792\u201366806. https:\/\/doi.org\/10.1109\/ACCESS.2019.2917555","journal-title":"IEEE Access"},{"issue":"2","key":"1791_CR29","first-page":"28","volume":"18","author":"N Szabo","year":"1996","unstructured":"Szabo N (1996) Smart contracts: building blocks for digital markets. \u00a0EXTROPY J Transhumanist Thought, 16. 18(2):28","journal-title":"EXTROPY J Transhumanist Thought"},{"key":"1791_CR19","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8315614","author":"TT Thwin","year":"2019","unstructured":"Thwin TT, Vasupongayya S (2019) Blockchain-based access control model to preserve privacy for personal health record systems. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2019\/8315614","journal-title":"Secur Commun Netw"},{"key":"1791_CR20","doi-asserted-by":"publisher","first-page":"112713","DOI":"10.1109\/access.2019.2929205","volume":"7","author":"S Wang","year":"2019","unstructured":"Wang S, Wang X, Zhang Y (2019a) A secure cloud storage framework with access control based on blockchain. IEEE Access 7:112713\u2013112725. https:\/\/doi.org\/10.1109\/access.2019.2929205","journal-title":"IEEE Access"},{"key":"1791_CR21","doi-asserted-by":"publisher","first-page":"136704","DOI":"10.1109\/access.2019.2943153","volume":"7","author":"Y Wang","year":"2019","unstructured":"Wang Y, Zhang A, Zhang P, Wang H (2019b) Cloud-assisted EHR sharing with security and privacy preservation via consortium blockchain. IEEE Access 7:136704\u2013136719. https:\/\/doi.org\/10.1109\/access.2019.2943153","journal-title":"IEEE Access"},{"key":"1791_CR22","doi-asserted-by":"publisher","unstructured":"Wang H, and Song Y (2018) BAB 2 PITA ezahan. https:\/\/doi.org\/10.1007\/s10916-018-0994-6","DOI":"10.1007\/s10916-018-0994-6"},{"issue":"July","key":"1791_CR23","doi-asserted-by":"publisher","first-page":"14757","DOI":"10.1109\/ACCESS.2017.2730843","volume":"5","author":"Q Xia","year":"2017","unstructured":"Xia Q, Sifah EB, Asamoah KO, Gao J, Du X, Guizani M (2017a) MeDShare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5(July):14757\u201314767. https:\/\/doi.org\/10.1109\/ACCESS.2017.2730843","journal-title":"IEEE Access"},{"key":"1791_CR24","doi-asserted-by":"publisher","DOI":"10.3390\/info8020044","author":"Q Xia","year":"2017","unstructured":"Xia Q, Sifah EB, Smahi A, Amofa S, Zhang X (2017b) BBDS: blockchain-based data sharing for electronic medical records in cloud environments. Inform. https:\/\/doi.org\/10.3390\/info8020044","journal-title":"Inform"},{"key":"1791_CR25","unstructured":"Yang H, & Yang B (2017). A blockchain-based approach to the secure sharing of healthcare data. Norwgian information security conference. https:\/\/ojs.bibsys.no\/index.php\/NISK\/article\/view\/462"},{"key":"1791_CR26","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.future.2018.09.019","volume":"91","author":"L Zhu","year":"2019","unstructured":"Zhu L, Wu Y, Gai K, Choo KKR (2019a) Controllable and trustworthy blockchain-based cloud data management. Futur Gener Comput Syst 91:527\u2013535. https:\/\/doi.org\/10.1016\/j.future.2018.09.019","journal-title":"Futur Gener Comput Syst"},{"key":"1791_CR27","doi-asserted-by":"publisher","DOI":"10.2196\/13767","author":"X Zhu","year":"2019","unstructured":"Zhu X, Shi J, Lu C (2019b) Cloud health resource sharing based on consensus-oriented blockchain technology: Case study on a breast tumor diagnosis service. J Med Internet Res. https:\/\/doi.org\/10.2196\/13767","journal-title":"J Med Internet Res"},{"key":"1791_CR28","doi-asserted-by":"publisher","unstructured":"Zyskind G, Nathan O, Pentland AS (2015) Decentralizing privacy: using blockchain to protect personal data. Proceedings\u20132015 IEEE security and privacy workshops, SPW 2015, 180\u2013184. https:\/\/doi.org\/10.1109\/SPW.2015.27","DOI":"10.1109\/SPW.2015.27"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-022-01791-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-022-01791-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-022-01791-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T17:12:48Z","timestamp":1706721168000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-022-01791-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,24]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["1791"],"URL":"https:\/\/doi.org\/10.1007\/s13198-022-01791-2","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,24]]},"assertion":[{"value":"12 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We, the authors of this manuscript have no conflicts of interest to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"We, the authors ensure that no human or animal participation is involved in this research.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human participants and\/or animals"}},{"value":"We haven\u2019t used human participation or other personal information, informed consent is not required.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}