{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:10:24Z","timestamp":1759191024882,"version":"3.44.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Artif Intell"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The heterogeneity of Electronic Health Record (EHR) systems leads to significant differences in data formats and structures across different platforms. This issue becomes particularly prominent for specific populations requiring frequent cross-institutional medical services, such as professional athletes. As athletes often receive treatment from multiple healthcare providers, redundant data entry across systems is common, and data updates frequently fail to synchronize in a timely manner. This not only wastes storage resources but may also result in incomplete clinical decision-making references. Addressing the amplified effect of this universal architectural challenge in specific scenarios, this study proposes a cross-platform deduplication and backup method for athletes\u2019 medical records that considers data integrity. The distributed architecture is used to build the overall framework for cross platform deduplication backup of athletes\u2019 medical cases. The Doc2Vec model is used to quantify the high-dimensional features of athletes\u2019 medical case data on multiple platforms. The secure hash algorithm is used to generate the check code of athletes\u2019 medical case data blocks. The circular order method is used to verify the integrity of the high-dimensional feature data of athletes\u2019 medical cases, verify the integrity of the case file. Keccak algorithm is selected to calculate the fingerprint of the case data block. When the fingerprint block is matched successfully, it is determined that the new file and the stored file have the same data block, and the data is synchronized to all backup systems for deduplication to eliminate the risk of duplicate backup. The dual pointer directed acyclic graph of athletes\u2019 medical cases after deduplication processing is used to realize cross platform deduplication backup of athletes\u2019 medical cases. The experimental results show that the duplicate data deletion rate of multi platform athletes\u2019 medical case deduplication backup using this method is higher than 0.99, and the backup speed is higher than 300Mbps.<\/jats:p>","DOI":"10.1007\/s44163-025-00447-x","type":"journal-article","created":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T12:43:29Z","timestamp":1759149809000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cross-platform deduplication of athletes\u2019 medical cases considering data integrity"],"prefix":"10.1007","volume":"5","author":[{"given":"Tanwei","family":"Shang","sequence":"first","affiliation":[]},{"given":"Ziqing","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,29]]},"reference":[{"issue":"1","key":"447_CR1","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s11277-022-09752-5","volume":"126","author":"MS Yoosuf","year":"2022","unstructured":"Yoosuf MS, Anitha R. Low latency fog-centric deduplication approach to reduce IOT healthcare data redundancy. Wireless Pers Commun 2022, 126(1): 421\u2013443.","journal-title":"Wireless Pers Commun"},{"key":"447_CR2","first-page":"1.1","volume":"78","author":"M Banik","year":"2023","unstructured":"Banik M, Kumar S. Blockchain-based public key encryption with keyword search for medical data sharing in cloud environment. J Inform Secur Appl 2023, 78: 1.1-1.15.","journal-title":"J Inform Secur Appl"},{"issue":"6","key":"447_CR3","first-page":"e2249.1","volume":"33","author":"PJ Jabin","year":"2023","unstructured":"Jabin PJ, Ramesh K, Saravanan KPG. Blockchain-based data deduplication using novel content-defined chunking algorithm in cloud environment. Int J Netw Manag 2023, 33(6): e2249.1-e2249.22.","journal-title":"Int J Netw Manag"},{"issue":"3","key":"447_CR4","first-page":"1","volume":"116","author":"BR Begum","year":"2021","unstructured":"Begum BR, Chitra P. Ecc-crt: an elliptical curve cryptographic encryption and chinese remainder theorem based deduplication in cloud. Wireless Pers Commun 2021, 116(3): 1\u201320.","journal-title":"Wireless Pers Commun"},{"issue":"4","key":"447_CR5","doi-asserted-by":"publisher","first-page":"3159","DOI":"10.1007\/s11277-022-09507-2","volume":"124","author":"S Hammoudi","year":"2022","unstructured":"Hammoudi S, Ourzeddine H, Gueroui M, Harous S, Aliouat Z. A collision-free scheduling algorithm with minimum data redundancy transmission for TSCH. Wireless Pers Commun 2022, 124(4): 3159\u20133188.","journal-title":"Wireless Pers Commun"},{"issue":"4","key":"447_CR6","doi-asserted-by":"publisher","first-page":"2443","DOI":"10.1007\/s12083-020-00989-0","volume":"14","author":"SE Ebinazer","year":"2021","unstructured":"Ebinazer SE, Savarimuthu N, Bhanu SMS. An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment. Peer-to-Peer Netw Appl 2021, 14(4): 2443\u20132451.","journal-title":"Peer-to-Peer Netw Appl"},{"key":"447_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2023.06.013","volume":"209","author":"T Benil","year":"2023","unstructured":"Benil T, Jasper J. Blockchain based secure medical data outsourcing with data deduplication in cloud environment. Comput Commun 2023, 209: 1\u201313.","journal-title":"Comput Commun"},{"issue":"1","key":"447_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1177\/10943420231183697","volume":"38","author":"D Langr","year":"2024","unstructured":"Langr D, Tom\u00e1 D. Parallel multithreaded deduplication of data sequences in nuclear structure calculations. Int J High Perform Comput Appl 2024, 38(1): 5\u201316.","journal-title":"Int J High Perform Comput Appl"},{"issue":"13","key":"447_CR9","doi-asserted-by":"publisher","first-page":"14892","DOI":"10.1007\/s11227-022-04436-0","volume":"78","author":"N Mageshkumar","year":"2022","unstructured":"Mageshkumar N, Lakshmanan L. An improved secure file deduplication avoidance using ckho based deep learning model in a cloud environment. J Supercomput 2022, 78(13): 14892\u201314918.","journal-title":"J Supercomput"},{"issue":"2","key":"447_CR10","doi-asserted-by":"publisher","first-page":"2356","DOI":"10.1007\/s11227-022-04751-6","volume":"79","author":"M Gharib","year":"2023","unstructured":"Gharib M, Fazli MA. Secure cloud storage with anonymous deduplication using id-based key management. J Supercomput 2023, 79(2): 2356\u20132382.","journal-title":"J Supercomput"},{"issue":"2","key":"447_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3490234","volume":"55","author":"T Sarwar","year":"2023","unstructured":"Sarwar T, Seifollahi S, Chan J, Zhang X, Aksakalli V, Hudson I. The secondary use of electronic health records for data mining: data characteristics and challenges. ACM Comput Surv 2023, 55(2): 1\u201340.","journal-title":"ACM Comput Surv"},{"issue":"5","key":"447_CR12","first-page":"1","volume":"116","author":"CV Joe","year":"2021","unstructured":"Joe CV, Raj JS, Smys S. Mixed mode analytics architecture for data deduplication in wireless personal cloud computing. Wireless Pers Commun 2021, 116(5): 1\u201316.","journal-title":"Wireless Pers Commun"},{"issue":"7","key":"447_CR13","first-page":"471","volume":"19","author":"MM Khaing","year":"2023","unstructured":"Khaing MM, Jeyanthi N. Edocdedup: electronic document data deduplication towards storage optimization. Int J Perform Eng 2023, 19(7): 471\u2013480.","journal-title":"Int J Perform Eng"},{"issue":"4","key":"447_CR14","doi-asserted-by":"publisher","first-page":"3773","DOI":"10.1007\/s11277-022-09735-6","volume":"125","author":"AR Athira","year":"2022","unstructured":"Athira AR, Sasikala P. Secure data deduplication and data portability in distributed cloud server using hash chaining and LF-WDO. Wireless Pers Commun 2022, 125(4): 3773\u20133785.","journal-title":"Wireless Pers Commun"},{"issue":"5","key":"447_CR15","doi-asserted-by":"publisher","first-page":"3037","DOI":"10.1007\/s10586-021-03514-x","volume":"25","author":"R Fazal","year":"2022","unstructured":"Fazal R, Shah MA, Khattak HA, Rauf HT, Al-Turjman F. Achieving data privacy for decision support systems in times of massive data sharing. Clust Comput 2022, 25(5): 3037\u20133049.","journal-title":"Clust Comput"},{"key":"447_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comnet.2022.109316","volume":"217","author":"F Buccafurri","year":"2022","unstructured":"Buccafurri F, De Angelis V, Lax G. An integrity-preserving technique for range queries over data streams in two-tier sensor networks. Comput Netw 2022, 217: 1\u201317.","journal-title":"Comput Netw"},{"key":"447_CR17","first-page":"108470.1","volume":"199","author":"FA Velasco","year":"2021","unstructured":"Velasco FA, Palomares JM, Olivares J. Lightweight method of shuffling overlapped data-blocks for data integrity and security in WSNS. Comput Netw 2021, 199: 108470.1-108470.12.","journal-title":"Comput Netw"},{"issue":"1","key":"447_CR18","doi-asserted-by":"publisher","first-page":"326","DOI":"10.52783\/jes.685","volume":"20","author":"K Sravanthi","year":"2024","unstructured":"Sravanthi K, Chandrasekhar P. An efficient multi-user groupwise integrity CP-ABE(GI-CPABE) for homogeneous and heterogeneous cloud blockchain transactions. J Electr Syst 2024, 20(1): 326\u2013349.","journal-title":"J Electr Syst"},{"issue":"1","key":"447_CR19","first-page":"335","volume":"15","author":"DS Sahana","year":"2023","unstructured":"Sahana DS, Brahmananda SH. Secure authentication framework for SDN-IOT network using keccak-256 and bliss-b algorithms. Int J Inf Technol 2023, 15(1): 335\u2013244.","journal-title":"Int J Inf Technol"},{"key":"447_CR20","doi-asserted-by":"publisher","first-page":"4051","DOI":"10.32604\/cmc.2022.029794","volume":"73","author":"H Mestiri","year":"2022","unstructured":"Mestiri H, Barraj I, Machhout M. An aop-based security verification environment for keccak hash algorithm. Comput Mater Continua 2022, 73: 4051\u20134066.","journal-title":"Comput Mater Continua"}],"container-title":["Discover Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-025-00447-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44163-025-00447-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-025-00447-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T12:43:30Z","timestamp":1759149810000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44163-025-00447-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,29]]},"references-count":20,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["447"],"URL":"https:\/\/doi.org\/10.1007\/s44163-025-00447-x","relation":{},"ISSN":["2731-0809"],"issn-type":[{"value":"2731-0809","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,29]]},"assertion":[{"value":"8 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"I have no financial interests in this manuscript and no affiliations (relationships) to disclose.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"240"}}