{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T14:16:05Z","timestamp":1764080165953,"version":"3.40.5"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T00:00:00Z","timestamp":1747440000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T00:00:00Z","timestamp":1747440000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-03918-1","type":"journal-article","created":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T05:09:18Z","timestamp":1747458558000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure Electronic Health Records Distribution in a Blockchain Enabled H-IoT System"],"prefix":"10.1007","volume":"6","author":[{"given":"Anita","family":"Sahoo","sequence":"first","affiliation":[]},{"given":"Sanjukta","family":"Chatterjee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4560-7730","authenticated-orcid":false,"given":"Srichandan","family":"Sobhanayak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,17]]},"reference":[{"key":"3918_CR1","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.matpr.2021.05.067","volume":"51","author":"K Gulati","year":"2022","unstructured":"Gulati K, et al. A review paper on wireless sensor network techniques in internet of things (iot). Mater Today Proc. 2022;51:161\u20135.","journal-title":"Mater Today Proc"},{"issue":"3","key":"3918_CR2","doi-asserted-by":"publisher","first-page":"2235","DOI":"10.1007\/s11277-020-07474-0","volume":"114","author":"KT Kadhim","year":"2020","unstructured":"Kadhim KT, Alsahlany AM, Wadi SM, Kadhum HT. An overview of patient\u2019s health status monitoring system based on internet of things (iot). Wireless Pers Commun. 2020;114(3):2235\u201362.","journal-title":"Wireless Pers Commun"},{"issue":"3","key":"3918_CR3","doi-asserted-by":"publisher","first-page":"231","DOI":"10.62411\/jcta.9509","volume":"1","author":"JK Oladele","year":"2024","unstructured":"Oladele JK, et al. Behedas: a blockchain electronic health data system for secure medical records exchange. J Comput Theor Appl. 2024;1(3):231\u201342.","journal-title":"J Comput Theor Appl"},{"key":"3918_CR4","first-page":"1297","volume":"9471","author":"G Mehta","year":"2024","unstructured":"Mehta G, et al. Emerging cybersecurity architectures and methodologies for modern threat landscapes. Int J Comput Sci Inf Technol Res. 2024;9471:1297.","journal-title":"Int J Comput Sci Inf Technol Res"},{"issue":"2","key":"3918_CR5","doi-asserted-by":"publisher","first-page":"75","DOI":"10.62411\/faith.2024-15","volume":"1","author":"S Widiono","year":"2024","unstructured":"Widiono S, Safriandono AN, Budi S, et al. Phishing website detection using bidirectional gated recurrent unit model and feature selection. J Future Artif Intell Technol. 2024;1(2):75\u201383.","journal-title":"J Future Artif Intell Technol"},{"key":"3918_CR6","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.comcom.2020.02.018","volume":"153","author":"JJ Hathaliya","year":"2020","unstructured":"Hathaliya JJ, Tanwar S. An exhaustive survey on security and privacy issues in healthcare 4.0. Comput Commun. 2020;153:311\u201335.","journal-title":"Comput Commun"},{"issue":"4","key":"3918_CR7","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1093\/jamiaopen\/ooz036","volume":"2","author":"R Abdolkhani","year":"2019","unstructured":"Abdolkhani R, Gray K, Borda A, DeSouza R. Patient-generated health data management and quality challenges in remote patient monitoring. JAMIA open. 2019;2(4):471\u20138.","journal-title":"JAMIA open"},{"key":"3918_CR8","first-page":"1","volume-title":"Dual-encrypted privacy preservation in blockchain-enabled iot healthcare system","author":"A Sahoo","year":"2023","unstructured":"Sahoo A, et al. Dual-encrypted privacy preservation in blockchain-enabled iot healthcare system. IEEE; 2023. p. 1\u20136."},{"key":"3918_CR9","first-page":"594","volume-title":"Medbloc: a blockchain-based secure ehr system for sharing and accessing medical data","author":"J Huang","year":"2019","unstructured":"Huang J, Qi YW, Asghar MR, Meads A, Tu Y-C. Medbloc: a blockchain-based secure ehr system for sharing and accessing medical data. IEEE; 2019. p. 594\u2013601."},{"key":"3918_CR10","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.procs.2020.06.021","volume":"173","author":"Y Sharma","year":"2020","unstructured":"Sharma Y, Balamurugan B. Preserving the privacy of electronic health records using blockchain. Procedia Comput Sci. 2020;173:171\u201380.","journal-title":"Procedia Comput Sci"},{"key":"3918_CR11","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s10257-020-00476-2","volume":"19","author":"P Meier","year":"2021","unstructured":"Meier P, Beinke JH, Fitte C, Schulte To Brinke J, Teuteberg F. Generating design knowledge for blockchain-based access control to personal health records. Inf Syst e-Business Manag. 2021;19:13\u201341.","journal-title":"Inf Syst e-Business Manag"},{"issue":"1","key":"3918_CR12","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2017.1600267CM","volume":"55","author":"K Zhang","year":"2017","unstructured":"Zhang K, et al. Security and privacy in smart city applications: challenges and solutions. IEEE Commun Mag. 2017;55(1):122\u20139.","journal-title":"IEEE Commun Mag"},{"key":"3918_CR13","doi-asserted-by":"publisher","first-page":"46134","DOI":"10.1109\/ACCESS.2018.2853985","volume":"6","author":"L Cui","year":"2018","unstructured":"Cui L, Xie G, Qu Y, Gao L, Yang Y. Security and privacy in smart cities: challenges and opportunities. IEEE access. 2018;6:46134\u201345.","journal-title":"IEEE access"},{"key":"3918_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101653","volume":"88","author":"I Makhdoom","year":"2020","unstructured":"Makhdoom I, Zhou I, Abolhasan M, Lipman J, Ni W. Privysharing: a blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Comput Secur. 2020;88: 101653.","journal-title":"Comput Secur"},{"issue":"1","key":"3918_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.4258\/hir.2020.26.1.3","volume":"26","author":"D Tith","year":"2020","unstructured":"Tith D, et al. Application of blockchain to maintaining patient records in electronic health record for enhanced privacy, scalability, and availability. Healthc Inf Res. 2020;26(1):3.","journal-title":"Healthc Inf Res"},{"issue":"1","key":"3918_CR16","doi-asserted-by":"publisher","first-page":"102","DOI":"10.62411\/jcta.10486","volume":"2","author":"MD Nguyen","year":"2024","unstructured":"Nguyen MD, et al. A comprehensive study on applications of blockchain in wireless sensor networks for security purposes. J Comput Theor Appl. 2024;2(1):102\u201317.","journal-title":"J Comput Theor Appl"},{"key":"3918_CR17","volume-title":"Blockchain authentication in smart home IoT devices. Ph.D thesis","author":"OS Ogunrayewa","year":"2022","unstructured":"Ogunrayewa OS. Blockchain authentication in smart home IoT devices. Ph.D thesis. Dublin: National College of Ireland; 2022."},{"key":"3918_CR18","doi-asserted-by":"crossref","unstructured":"Hou Y et al. Secure and privacy-preserving data computing scheme based on blockchain for double-loop governance of smart society. In: Proceedings of the 2020 3rd international conference on blockchain technology and applications. pp. 75\u201380, 2020.","DOI":"10.1145\/3446983.3446995"},{"issue":"15","key":"3918_CR19","doi-asserted-by":"publisher","first-page":"3034","DOI":"10.3390\/app9153034","volume":"9","author":"M Ben Haj Frej","year":"2019","unstructured":"Ben Haj Frej M, Dichter J, Gupta N. Lightweight accountable privacy-preserving protocol allowing the cloud client to audit the third-party auditor for malicious activities. Appl Sci. 2019;9(15):3034.","journal-title":"Appl Sci"},{"issue":"12","key":"3918_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3974","volume":"32","author":"A Ostad-Sharif","year":"2019","unstructured":"Ostad-Sharif A, Nikooghadam M, Abbasinezhad-Mood D. Design of a lightweight and anonymous authenticated key agreement protocol for wireless body area networks. Int J Commun Syst. 2019;32(12): e3974.","journal-title":"Int J Commun Syst"},{"issue":"17","key":"3918_CR21","doi-asserted-by":"publisher","first-page":"6960","DOI":"10.3390\/su12176960","volume":"12","author":"M Tahir","year":"2020","unstructured":"Tahir M, Sardaraz M, Muhammad S, SaudKhan M. A lightweight authentication and authorization framework for blockchain-enabled iot network in health-informatics. Sustainability. 2020;12(17):6960.","journal-title":"Sustainability"},{"key":"3918_CR22","doi-asserted-by":"publisher","first-page":"95956","DOI":"10.1109\/ACCESS.2020.2995917","volume":"8","author":"N Garg","year":"2020","unstructured":"Garg N, et al. Bakmp-iomt: design of blockchain enabled authenticated key management protocol for internet of medical things deployment. IEEE access. 2020;8:95956\u201377.","journal-title":"IEEE access"},{"issue":"5","key":"3918_CR23","doi-asserted-by":"publisher","first-page":"1389","DOI":"10.3390\/s20051389","volume":"20","author":"KP Satamraju","year":"2020","unstructured":"Satamraju KP. Proof of concept of scalable integration of internet of things and blockchain in healthcare. Sensors. 2020;20(5):1389.","journal-title":"Sensors"},{"issue":"14","key":"3918_CR24","doi-asserted-by":"publisher","first-page":"11717","DOI":"10.1109\/JIOT.2021.3058946","volume":"8","author":"BS Egala","year":"2021","unstructured":"Egala BS, Pradhan AK, Badarla V, Mohanty SP. Fortified-chain: a blockchain-based framework for security and privacy-assured internet of medical things with effective access control. IEEE Internet Things J. 2021;8(14):11717\u201331.","journal-title":"IEEE Internet Things J"},{"key":"3918_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100422","volume":"15","author":"S Shukla","year":"2021","unstructured":"Shukla S, Thakur S, Hussain S, Breslin JG, Jameel SM. Identification and authentication in healthcare internet-of-things using integrated fog computing based blockchain model. Internet Things. 2021;15: 100422.","journal-title":"Internet Things"},{"issue":"3","key":"3918_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3511898","volume":"23","author":"M Wazid","year":"2023","unstructured":"Wazid M, Gope P. Backm-eha: a novel blockchain-enabled security solution for iomt-based e-healthcare applications. ACM Trans Internet Technol. 2023;23(3):1\u201328.","journal-title":"ACM Trans Internet Technol"},{"key":"3918_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103512","volume":"207","author":"X Xiang","year":"2022","unstructured":"Xiang X, Cao J, Fan W. Decentralized authentication and access control protocol for blockchain-based e-health systems. J Netw Comput Appl. 2022;207: 103512.","journal-title":"J Netw Comput Appl"},{"issue":"5","key":"3918_CR28","doi-asserted-by":"publisher","first-page":"6622","DOI":"10.1007\/s11227-023-05649-7","volume":"80","author":"H Idrissi","year":"2024","unstructured":"Idrissi H, Palmieri P. Agent-based blockchain model for robust authentication and authorization in iot-based healthcare systems. J Supercomput. 2024;80(5):6622\u201360.","journal-title":"J Supercomput"},{"issue":"1","key":"3918_CR29","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1007\/s11227-023-05507-6","volume":"80","author":"N Singh","year":"2024","unstructured":"Singh N, Das AK. Tfas: two factor authentication scheme for blockchain enabled iomt using puf and fuzzy extractor. J Supercomput. 2024;80(1):865\u2013914.","journal-title":"J Supercomput"},{"key":"3918_CR30","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.iotcps.2023.07.004","volume":"4","author":"S Sutradhar","year":"2024","unstructured":"Sutradhar S, et al. Enhancing identity and access management using hyperledger fabric and oauth 2.0: a block-chain-based approach for security and scalability for healthcare industry. Internet Things Cyber-Physical Syst. 2024;4:49\u201367.","journal-title":"Internet Things Cyber-Physical Syst"},{"issue":"1","key":"3918_CR31","doi-asserted-by":"publisher","first-page":"100012","DOI":"10.1016\/j.bcra.2021.100012","volume":"2","author":"M Antwi","year":"2021","unstructured":"Antwi M, et al. The case of hyperledger fabric as a blockchain solution for healthcare applications. Blockchain Res Appl. 2021;2(1):100012.","journal-title":"Blockchain Res Appl"},{"key":"3918_CR32","first-page":"102407","volume":"50","author":"S Tanwar","year":"2020","unstructured":"Tanwar S, Parekh K, Evans R. Blockchain-based electronic healthcare record system for healthcare 4.0 applications. J Inf Security Appl. 2020;50:102407.","journal-title":"J Inf Security Appl"},{"key":"3918_CR33","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jpdc.2022.03.009","volume":"164","author":"J Jayabalan","year":"2022","unstructured":"Jayabalan J, Jeyanthi N. Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy. J Parallel Distrib Comput. 2022;164:152\u201367.","journal-title":"J Parallel Distrib Comput"},{"key":"3918_CR34","first-page":"200","volume-title":"Secure and privacy-aware blockchain-based remote patient monitoring system for internet of healthcare things","author":"B Zaabar","year":"2021","unstructured":"Zaabar B, Cheikhrouhou O, Ammi M, Awad AI, Abid M. Secure and privacy-aware blockchain-based remote patient monitoring system for internet of healthcare things. IEEE; 2021. p. 200\u20135."},{"issue":"8","key":"3918_CR35","doi-asserted-by":"publisher","first-page":"2195","DOI":"10.3390\/s20082195","volume":"20","author":"F Jamil","year":"2020","unstructured":"Jamil F, Ahmad S, Iqbal N, Kim D-H. Towards a remote monitoring of patient vital signs based on iot-based blockchain integrity management platforms in smart hospitals. Sensors. 2020;20(8):2195.","journal-title":"Sensors"},{"key":"3918_CR36","first-page":"186","volume-title":"A hyperledger fabric-based blockchain architecture to secure iot-based health monitoring systems","author":"FP Oikonomou","year":"2021","unstructured":"Oikonomou FP, Ribeiro J, Mantas G, Bastos JMC, Rodriguez J. A hyperledger fabric-based blockchain architecture to secure iot-based health monitoring systems. IEEE; 2021. p. 186\u201390."},{"key":"3918_CR37","doi-asserted-by":"publisher","first-page":"122723","DOI":"10.1109\/ACCESS.2021.3109822","volume":"9","author":"AH Mayer","year":"2021","unstructured":"Mayer AH, et al. Fogchain: a fog computing architecture integrating blockchain and internet of things for personal health records. IEEE Access. 2021;9:122723\u201337.","journal-title":"IEEE Access"},{"key":"3918_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108500","volume":"200","author":"B Zaabar","year":"2021","unstructured":"Zaabar B, Cheikhrouhou O, Jamil F, Ammi M, Abid M. Healthblock: a secure blockchain-based healthcare data management system. Comput Netw. 2021;200: 108500.","journal-title":"Comput Netw"},{"key":"3918_CR39","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-2048551\/v1","author":"AK Jakhar","year":"2024","unstructured":"Jakhar AK, et al. A blockchain-based privacy-preserving and access-control framework for electronic health records management. Multim Tools Appl. 2024. https:\/\/doi.org\/10.21203\/rs.3.rs-2048551\/v1.","journal-title":"Multim Tools Appl"},{"key":"3918_CR40","doi-asserted-by":"publisher","first-page":"171771","DOI":"10.1109\/ACCESS.2020.3022429","volume":"8","author":"X Xiang","year":"2020","unstructured":"Xiang X, Wang M, Fan W. A permissioned blockchain-based identity management and user authentication scheme for e-health systems. IEEE access. 2020;8:171771\u201383.","journal-title":"IEEE access"},{"key":"3918_CR41","first-page":"1","volume":"28","author":"A Panwar","year":"2021","unstructured":"Panwar A, Bhatnagar V. A cognitive approach for blockchain-based cryptographic curve hash signature (bc-cchs) technique to secure healthcare data in data lake. Soft Comput. 2021;28:1\u201315.","journal-title":"Soft Comput"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03918-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-03918-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03918-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T05:09:22Z","timestamp":1747458562000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-03918-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,17]]},"references-count":41,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["3918"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-03918-1","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,17]]},"assertion":[{"value":"2 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors certify that he has no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"NA.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human and\/or Animals"}},{"value":"Participation in this study is voluntary. All authors provided informed consent before inclusion in the study. They were informed about the study\u2019s purpose, procedures, potential risks, and benefits. Authors had the right to withdraw at any time without consequences.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"474"}}