{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T17:30:30Z","timestamp":1768584630044,"version":"3.49.0"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T00:00:00Z","timestamp":1671408000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T00:00:00Z","timestamp":1671408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Iran J Comput Sci"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s42044-022-00129-2","type":"journal-article","created":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T08:03:08Z","timestamp":1671436988000},"page":"169-183","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A new hybrid encryption in fog\u2013cloud environment for secure medical data-sharing"],"prefix":"10.1007","volume":"6","author":[{"given":"G. A.","family":"Thushara","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S. Mary Saira","family":"Bhanu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,12,19]]},"reference":[{"key":"129_CR1","unstructured":"Bercovitz, A., Moss, A., Sengupta, M., Park-Lee, E.Y., Jones, A., Harris-Kojetin, L.D.: An overview of home health aides: United States, 2007. Natl. Health Stat. Rep. 34, 1\u201331 (2011)"},{"key":"129_CR2","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457\u2013473. Springer (2005)","DOI":"10.1007\/11426639_27"},{"key":"129_CR3","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP\u201907), pp. 321\u2013334. IEEE (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"129_CR4","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"129_CR5","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.future.2017.04.036","volume":"78","author":"B Farahani","year":"2018","unstructured":"Farahani, B., Firouzi, F., Chang, V., Badaroglu, M., Constant, N., Mankodiya, K.: Towards fog-driven iot ehealth: promises and challenges of iot in medicine and healthcare. Futur. Gener. Comput. Syst. 78, 659\u2013676 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"129_CR6","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1016\/j.future.2017.11.020","volume":"82","author":"SM Mahmud Hossain","year":"2018","unstructured":"Mahmud Hossain, S.M., Islam, R., Ali, F., Kwak, K.-S., Hasan, R.: An internet of things-based health prescription assistant and its security system design. Future Gener. Comput. Syst. 82, 422\u2013439 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"129_CR7","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.future.2015.11.005","volume":"66","author":"HF Badawi","year":"2017","unstructured":"Badawi, H.F., Dong, H., El Saddik, A.: Mobile cloud-based physical activity advisory system using biofeedback sensors. Future Gener. Comput. Syst. 66, 59\u201370 (2017)","journal-title":"Future Gener. Comput. Syst."},{"key":"129_CR8","doi-asserted-by":"crossref","unstructured":"Strielkina, A., Uzun, D., Kharchenko, V.: Modelling of healthcare iot using the queueing theory. In: 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol. 2, pp. 849\u2013852. IEEE (2017)","DOI":"10.1109\/IDAACS.2017.8095207"},{"issue":"6","key":"129_CR9","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCC.2015.114","volume":"2","author":"H Li","year":"2015","unstructured":"Li, H., Dong, M., Ota, K.: Radio access network virtualization for the social Internet of Things. IEEE Cloud Comput. 2(6), 42\u201350 (2015)","journal-title":"IEEE Cloud Comput."},{"key":"129_CR10","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.compeleceng.2018.02.047","volume":"67","author":"MME Mahmoud","year":"2018","unstructured":"Mahmoud, M.M.E., Rodrigues, J.J.P.C., Saleem, K., Al-Muhtadi, J., Kumar, N., Korotaev, V.: Towards energy-aware fog-enabled cloud of things for healthcare. Comput. Electr. Eng. 67, 58\u201369 (2018)","journal-title":"Comput. Electr. Eng."},{"key":"129_CR11","unstructured":"Kashani, M.H., Ahmadzadeh, A., Mahdipour, E.: Load balancing mechanisms in fog computing: a systematic review. arXiv preprint arXiv:2011.14706 (2020)"},{"issue":"3","key":"129_CR12","doi-asserted-by":"publisher","first-page":"1826","DOI":"10.1109\/COMST.2018.2814571","volume":"20","author":"M Mukherjee","year":"2018","unstructured":"Mukherjee, M., Shu, L., Wang, D.: Survey of fog computing: fundamental, network applications, and research challenges. IEEE Commun. Surv. Tutor. 20(3), 1826\u20131857 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"129_CR13","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1016\/j.pec.2018.11.013","volume":"102","author":"JHY Ng","year":"2019","unstructured":"Ng, J.H.Y., Luk, B.H.K.: Patient satisfaction: concept analysis in the healthcare context. Patient Educ. Couns. 102(4), 790\u2013796 (2019)","journal-title":"Patient Educ. Couns."},{"issue":"7","key":"129_CR14","first-page":"2296","volume":"24","author":"MN Mohammed","year":"2020","unstructured":"Mohammed, M.N., Syamsudin, H., Al-Zubaidi, S., Aks, R.R., Yusuf, E.: Novel covid-19 detection and diagnosis system using iot based smart helmet. Int. J. Psychosoc. Rehabil. 24(7), 2296\u20132303 (2020)","journal-title":"Int. J. Psychosoc. Rehabil."},{"key":"129_CR15","doi-asserted-by":"crossref","unstructured":"Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 85\u201390 (2009)","DOI":"10.1145\/1655008.1655020"},{"key":"129_CR16","doi-asserted-by":"crossref","unstructured":"Mota, A.V., Azam, S., Shanmugam, B., Yeo, K.C., Kannoorpatti, K.: Comparative analysis of different techniques of encryption for secured data transmission. In: 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), pp. 231\u2013237. IEEE (2017)","DOI":"10.1109\/ICPCSI.2017.8392158"},{"issue":"1","key":"129_CR17","first-page":"80","volume":"25","author":"VKR Muthi","year":"2017","unstructured":"Muthi, V.K.R., Reddy, P., Manjula, S.H.: Secure data sharing in cloud computing: a comprehensive review. Int. J. Comput. (IJC) 25(1), 80\u2013115 (2017)","journal-title":"Int. J. Comput. (IJC)"},{"issue":"1","key":"129_CR18","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.amjms.2015.10.015","volume":"351","author":"BW Mamlin","year":"2016","unstructured":"Mamlin, B.W., Tierney, W.M.: The promise of information and communication technology in healthcare: extracting value from the chaos. Am. J. Med. Sci. 351(1), 59\u201368 (2016)","journal-title":"Am. J. Med. Sci."},{"key":"129_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.compind.2015.01.012","volume":"69","author":"J-J Yang","year":"2015","unstructured":"Yang, J.-J., Li, J., Mulder, J., Wang, Y., Chen, S., Hong, W., Wang, Q., Pan, H.: Emerging information technologies for enhanced healthcare. Comput. Ind. 69, 3\u201311 (2015)","journal-title":"Comput. Ind."},{"key":"129_CR20","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.bdr.2016.05.002","volume":"4","author":"S Sakr","year":"2016","unstructured":"Sakr, S., Elgammal, A.: Towards a comprehensive data analytics framework for smart healthcare services. Big Data Res. 4, 44\u201358 (2016)","journal-title":"Big Data Res."},{"issue":"3s","key":"129_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3408322","volume":"16","author":"L Fang","year":"2020","unstructured":"Fang, L., Yin, C., Zhu, J., Ge, C., Tanveer, M., Jolfaei, A., Cao, Z.: Privacy protection for medical data sharing in smart healthcare. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 16(3s), 1\u201318 (2020)","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl. (TOMM)"},{"issue":"1","key":"129_CR22","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TNSM.2019.2941214","volume":"17","author":"Y Meng","year":"2019","unstructured":"Meng, Y., Huang, Z., Shen, G., Ke, C.: Sdn-based security enforcement framework for data sharing systems of smart healthcare. IEEE Trans. Netw. Serv. Manag. 17(1), 308\u2013318 (2019)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"3","key":"129_CR23","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1007\/s10586-020-03058-6","volume":"23","author":"U Khalid","year":"2020","unstructured":"Khalid, U., Asim, M., Baker, T., Hung, P.C.K., Tariq, M.A., Rafferty, L.: A decentralized lightweight blockchain-based authentication mechanism for iot systems. Clust. Comput. 23(3), 2067\u20132087 (2020)","journal-title":"Clust. Comput."},{"key":"129_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compind.2018.04.015","volume":"101","author":"H Boyes","year":"2018","unstructured":"Boyes, H., Hallaq, B., Cunningham, J., Watson, T.: The industrial internet of things (iiot): an analysis framework. Comput. Ind. 101, 1\u201312 (2018)","journal-title":"Comput. Ind."},{"issue":"4","key":"129_CR25","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MIC.2019.2935800","volume":"23","author":"C Tsigkanos","year":"2019","unstructured":"Tsigkanos, C., Avasalcai, C., Dustdar, S.: Architectural considerations for privacy on the edge. IEEE Internet Comput. 23(4), 76\u201383 (2019)","journal-title":"IEEE Internet Comput."},{"key":"129_CR26","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Cunche, M.,\u00a0M\u00e9tayer, D.L., Morel, V.: Enhancing transparency and consent in the iot. In: 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 116\u2013119. IEEE (2018)","DOI":"10.1109\/EuroSPW.2018.00023"},{"key":"129_CR27","doi-asserted-by":"publisher","first-page":"47657","DOI":"10.1109\/ACCESS.2018.2856896","volume":"6","author":"X Wang","year":"2018","unstructured":"Wang, X., Wang, L., Li, Y., Gai, K.: Privacy-aware efficient fine-grained data access control in internet of medical things based fog computing. IEEE Access 6, 47657\u201347665 (2018)","journal-title":"IEEE Access"},{"key":"129_CR28","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Annual international cryptology conference, pp. 213\u2013229. Springer (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"129_CR29","doi-asserted-by":"crossref","unstructured":"Xue, Y., Hong, J., Li, W., Xue, K., Hong, P.: Labac: a location-aware attribute-based access control scheme for cloud storage. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/GLOCOM.2016.7841945"},{"issue":"4","key":"129_CR30","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1109\/TIFS.2016.2647222","volume":"12","author":"K Xue","year":"2017","unstructured":"Xue, K., Xue, Y., Hong, J., Li, W., Yue, H., Wei, D.S.L., Hong, P.: Raac: robust and auditable access control with multiple attribute authorities for public cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 953\u2013967 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"129_CR31","doi-asserted-by":"publisher","first-page":"799","DOI":"10.3233\/JCS-2009-0383","volume":"18","author":"M Pirretti","year":"2010","unstructured":"Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure attribute-based systems. J. Comput. Secur. 18(5), 799\u2013837 (2010)","journal-title":"J. Comput. Secur."},{"issue":"2","key":"129_CR32","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1109\/JSYST.2017.2667679","volume":"12","author":"J Li","year":"2017","unstructured":"Li, J., Yao, W., Han, J., Zhang, Y., Shen, J.: User collusion avoidance cp-abe with efficient attribute revocation for cloud storage. IEEE Syst. J. 12(2), 1767\u20131777 (2017)","journal-title":"IEEE Syst. J."},{"issue":"8","key":"129_CR33","doi-asserted-by":"publisher","first-page":"2101","DOI":"10.1109\/TIFS.2018.2810065","volume":"13","author":"X Shengmin","year":"2018","unstructured":"Shengmin, X., Yang, G., Yi, M., Deng, R.H.: Secure fine-grained access control and data sharing for dynamic groups in the cloud. IEEE Trans. Inf. Forensics Secur. 13(8), 2101\u20132113 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"129_CR34","doi-asserted-by":"publisher","unstructured":"Wang, S., Guo, K., Zhang, Y.: Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage. PLoS One. 13(9), e0203225 (2018). https:\/\/doi.org\/10.1371\/journal.pone.0203225 [Erratum in: PLoS One. 13(10), e0206952 (2018)]","DOI":"10.1371\/journal.pone.0203225"},{"issue":"1","key":"129_CR35","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/TIFS.2012.2223683","volume":"8","author":"Z Liu","year":"2012","unstructured":"Liu, Z., Cao, Z., Wong, D.S.: White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans. Inf. Forensics Secur. 8(1), 76\u201388 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"129_CR36","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1007\/s10586-020-03114-1","volume":"23","author":"DVK Vengala","year":"2020","unstructured":"Vengala, D.V.K., Kavitha, D., Kumar, A.P.: Secure data transmission on a distributed cloud server with the help of hmca and data encryption using optimized cp-abe-ecc. Clust. Comput. 23(3), 1683\u20131696 (2020)","journal-title":"Clust. Comput."},{"key":"129_CR37","doi-asserted-by":"publisher","unstructured":"Sajay, K.R., Babu, S.S., Vijayalakshmi, Y.: Enhancing the security of cloud data using hybrid encryption algorithm. J. Ambient Intell. Hum. Comput. (2019). https:\/\/doi.org\/10.1007\/s12652-019-01403-1","DOI":"10.1007\/s12652-019-01403-1"},{"key":"129_CR38","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.procs.2016.02.035","volume":"78","author":"P Patel","year":"2016","unstructured":"Patel, P., Patel, R., Patel, N.: Integrated ecc and blowfish for smartphone security. Procedia Comput. Sci. 78, 210\u2013216 (2016)","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"129_CR39","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s10586-021-03382-5","volume":"25","author":"A Saidi","year":"2022","unstructured":"Saidi, A., Nouali, O., Amira, A.: Share-abe: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and fog computing. Clust. Comput. 25(1), 167\u2013185 (2022)","journal-title":"Clust. Comput."},{"issue":"7","key":"129_CR40","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1109\/TPDS.2013.253","volume":"25","author":"K Yang","year":"2013","unstructured":"Yang, K., Jia, X.: Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(7), 1735\u20131744 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"129_CR41","doi-asserted-by":"crossref","unstructured":"Lai, J., Deng, R.H., Li, Y.: Fully secure cipertext-policy hiding cp-abe. In: International Conference on Information Security Practice and Experience, pp. 24\u201339. Springer (2011)","DOI":"10.1007\/978-3-642-21031-0_3"},{"issue":"1","key":"129_CR42","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1109\/TC.2020.3043950","volume":"71","author":"N Chen","year":"2020","unstructured":"Chen, N., Li, J., Zhang, Y., Guo, Y.: Efficient cp-abe scheme with shared decryption in cloud storage. IEEE Trans. Comput. 71(1), 175\u2013184 (2020)","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"129_CR43","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s10586-020-03101-6","volume":"24","author":"T Yuanfei","year":"2021","unstructured":"Yuanfei, T., Yang, G., Wang, J., Qingjian, S.: A secure, efficient and verifiable multimedia data sharing scheme in fog networking system. Clust. Comput. 24(1), 225\u2013247 (2021)","journal-title":"Clust. Comput."},{"issue":"5","key":"129_CR44","doi-asserted-by":"crossref","first-page":"e3785","DOI":"10.1002\/ett.3785","volume":"33","author":"Y Zhao","year":"2022","unstructured":"Zhao, Y., Zhang, X., Xie, X., Ding, Y., Kumar, S.: A verifiable hidden policy cp-abe with decryption testing scheme and its application in vanet. Trans. Emerg. Telecommun. Technol. 33(5), e3785 (2022)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"129_CR45","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1016\/j.future.2016.10.028","volume":"78","author":"C Zuo","year":"2018","unstructured":"Zuo, C., Shao, J., Wei, G., Xie, M., Ji, M.: Cca-secure abe with outsourced decryption for fog computing. Future Gener. Comput. Syst. 78, 730\u2013738 (2018)","journal-title":"Future Gener. Comput. Syst."},{"issue":"10","key":"129_CR46","doi-asserted-by":"publisher","first-page":"2271","DOI":"10.1109\/TKDE.2011.78","volume":"25","author":"J Hur","year":"2011","unstructured":"Hur, J.: Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 25(10), 2271\u20132282 (2011)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Iran Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-022-00129-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42044-022-00129-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-022-00129-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,3]],"date-time":"2023-12-03T06:16:16Z","timestamp":1701584176000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42044-022-00129-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,19]]},"references-count":46,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["129"],"URL":"https:\/\/doi.org\/10.1007\/s42044-022-00129-2","relation":{},"ISSN":["2520-8438","2520-8446"],"issn-type":[{"value":"2520-8438","type":"print"},{"value":"2520-8446","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,19]]},"assertion":[{"value":"15 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Authors are responsible for correctness of the statements provided in the manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"Additional informed consent was obtained from all individual participants for whom identifying information is included in this article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human ethics"}}]}}