{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:07:17Z","timestamp":1776874037224,"version":"3.51.2"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T00:00:00Z","timestamp":1776816000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T00:00:00Z","timestamp":1776816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-026-04954-1","type":"journal-article","created":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T15:31:12Z","timestamp":1776871872000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced Secure Healthcare Data Sharing Using Blockchain with Attn_LSTM Access Control and Hybrid Encryption"],"prefix":"10.1007","volume":"7","author":[{"given":"M.","family":"Vargheese","sequence":"first","affiliation":[]},{"given":"C.","family":"Subhabackia","sequence":"additional","affiliation":[]},{"given":"R.","family":"Kannan","sequence":"additional","affiliation":[]},{"given":"K.","family":"Karthikeyan","sequence":"additional","affiliation":[]},{"given":"M.","family":"Muthuselvi","sequence":"additional","affiliation":[]},{"given":"Krishna Prakash","family":"Arunachalam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,22]]},"reference":[{"issue":"1","key":"4954_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.463","volume":"8","author":"N Rathore","year":"2025","unstructured":"Rathore N, Kumari A, Patel M, Chudasama A, Bhalani D, Tanwar S, et al. Synergy of AI and blockchain to secure electronic healthcare records. Secur Priv. 2025;8(1):e463. https:\/\/doi.org\/10.1002\/spy2.463.","journal-title":"Secur Priv"},{"key":"4954_CR2","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.procs.2024.12.023","volume":"252","author":"SP Panimalar","year":"2025","unstructured":"Panimalar SP, Gunasundari S. A novel privacy protection technique of electronic health records using decentralized federated learning with consortium blockchain. Procedia Comput Sci. 2025;252:212\u201321. https:\/\/doi.org\/10.1016\/j.procs.2024.12.023.","journal-title":"Procedia Comput Sci"},{"key":"4954_CR3","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.procs.2025.02.063","volume":"254","author":"D Ramesh","year":"2025","unstructured":"Ramesh D, Santosh T, Trivedi MC, Le CH. Ensuring digital sovereignty in cross-chain EHR sharing: a relay-as-a-service approach for secure healthcare interoperability. Procedia Comput Sci. 2025;254:48\u201357. https:\/\/doi.org\/10.1016\/j.procs.2025.02.063.","journal-title":"Procedia Comput Sci"},{"key":"4954_CR4","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-1226695\/v1","author":"S Wu","year":"2022","unstructured":"Wu S, Zhang A, Chen J, Peng G, Gao Y. A blockchain-assisted lightweight anonymous authentication scheme for medical services in internet of medical things. Wirel Pers Commun. 2022. https:\/\/doi.org\/10.21203\/rs.3.rs-1226695\/v1.","journal-title":"Wirel Pers Commun"},{"key":"4954_CR5","doi-asserted-by":"publisher","first-page":"14426","DOI":"10.1109\/access.2025.3531350","volume":"13","author":"K Tlem\u00e7ani","year":"2025","unstructured":"Tlem\u00e7ani K, Azbeg K, Saoudi E, Fetjah L, Ouchetto O, Andaloussi SJ. Empowering diabetes management through blockchain and edge computing: a systematic review of healthcare innovations and challenges. IEEE Access. 2025;13:14426\u201343. https:\/\/doi.org\/10.1109\/access.2025.3531350.","journal-title":"IEEE Access"},{"key":"4954_CR6","doi-asserted-by":"publisher","DOI":"10.3389\/fpubh.2022.938707","author":"A Amanat","year":"2022","unstructured":"Amanat A, Rizwan M, Maple C, Zikria YB, Almadhor AS, Kim SW. Blockchain and cloud computing-based secure electronic healthcare records storage and sharing. Front Public Health. 2022. https:\/\/doi.org\/10.3389\/fpubh.2022.938707.","journal-title":"Front Public Health"},{"key":"4954_CR7","doi-asserted-by":"publisher","first-page":"928","DOI":"10.11591\/ijeecs.v37.i2.pp928-936","volume":"37","author":"KS Kumaran","year":"2025","unstructured":"Kumaran KS, Khekare G, Athitya MT, Arulmozhivarman A, Pranav A, Chidambaram NH. Integrating blockchain, internet of things, and cloud for secure healthcare. Indones J Electr Eng Comput Sci. 2025;37:928\u201336. https:\/\/doi.org\/10.11591\/ijeecs.v37.i2.pp928-936.","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"4954_CR8","doi-asserted-by":"publisher","first-page":"45415","DOI":"10.1109\/access.2025.3547953","volume":"13","author":"UU Tariq","year":"2025","unstructured":"Tariq UU, Sabrina F, Rashid MM, Gordon S, Lin Y, Wang Z, et al. Blockchain-based secured data sharing in healthcare: a systematic literature review. IEEE Access. 2025;13:45415\u201335. https:\/\/doi.org\/10.1109\/access.2025.3547953.","journal-title":"IEEE Access"},{"issue":"1","key":"4954_CR9","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1080\/0952813x.2022.2135611","volume":"36","author":"G Verma","year":"2024","unstructured":"Verma G. Blockchain-based privacy preservation framework for healthcare data in cloud environment. J Exp Theor Artif Intell. 2024;36(1):147\u201360. https:\/\/doi.org\/10.1080\/0952813x.2022.2135611.","journal-title":"J Exp Theor Artif Intell"},{"issue":"1","key":"4954_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/ett.70049","volume":"36","author":"J Kaur","year":"2025","unstructured":"Kaur J, Rani R, Kalra N. Healthcare data security and privacy protection framework based on dual channel blockchain. Trans Emerg Telecommun Technol. 2025;36(1):e70049. https:\/\/doi.org\/10.1002\/ett.70049.","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"21","key":"4954_CR11","doi-asserted-by":"publisher","first-page":"60443","DOI":"10.1007\/s11042-023-17941-y","volume":"83","author":"I Masood","year":"2024","unstructured":"Masood I, Daud A, Wang Y, Banjar A, Alharbey R. A blockchain-based system for patient data privacy and security. Multimed Tools Appl. 2024;83(21):60443\u201367. https:\/\/doi.org\/10.1007\/s11042-023-17941-y.","journal-title":"Multimed Tools Appl"},{"key":"4954_CR12","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.aej.2024.05.023","volume":"99","author":"AA Alanazi","year":"2024","unstructured":"Alanazi AA, Karim FK, Ghorashi SA, Amoudi G, Hamza SHA. Blockchain with optimal deep learning assisted secure data sharing and classification on future healthcare systems. Alex Eng J. 2024;99:168\u201379. https:\/\/doi.org\/10.1016\/j.aej.2024.05.023.","journal-title":"Alex Eng J"},{"issue":"6","key":"4954_CR13","doi-asserted-by":"publisher","first-page":"7981","DOI":"10.1007\/s10586-024-04414-6","volume":"27","author":"H Bodur","year":"2024","unstructured":"Bodur H, Al Yaseen IFT. An improved blockchain-based secure medical record sharing scheme. Cluster Comput. 2024;27(6):7981\u20138000. https:\/\/doi.org\/10.1007\/s10586-024-04414-6.","journal-title":"Cluster Comput"},{"issue":"4","key":"4954_CR14","doi-asserted-by":"publisher","first-page":"5108","DOI":"10.1007\/s11227-023-05657-7","volume":"80","author":"S Shree","year":"2024","unstructured":"Shree S, Zhou C, Barati M. Data protection in internet of medical things using blockchain and secret sharing method. J Supercomput. 2024;80(4):5108\u201335. https:\/\/doi.org\/10.1007\/s11227-023-05657-7.","journal-title":"J Supercomput"},{"issue":"11","key":"4954_CR15","volume":"23","author":"G Han","year":"2025","unstructured":"Han G, Ma Y, Zhang Z, Wang Y. A hybrid blockchain-based solution for secure sharing of electronic medical record data. PeerJ Comput Sci. 2025;23(11):eerj-cs.","journal-title":"PeerJ Comput Sci"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04954-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-026-04954-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04954-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T15:31:13Z","timestamp":1776871873000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-026-04954-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,22]]},"references-count":15,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2026,6]]}},"alternative-id":["4954"],"URL":"https:\/\/doi.org\/10.1007\/s42979-026-04954-1","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,22]]},"assertion":[{"value":"9 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Permission to reproduce material from other sources"}}],"article-number":"380"}}