{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T19:54:16Z","timestamp":1775678056975,"version":"3.50.1"},"reference-count":93,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Biomed. Health Inform."],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/jbhi.2014.2300846","type":"journal-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T17:47:32Z","timestamp":1391190452000},"page":"1431-1441","source":"Crossref","is-referenced-by-count":267,"title":["A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds"],"prefix":"10.1109","volume":"18","author":[{"given":"Assad","family":"Abbas","sequence":"first","affiliation":[]},{"given":"Samee U.","family":"Khan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref72","first-page":"457","article-title":"Fuzzy identity based encryption","volume":"3494","author":"sahai","year":"2005","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70241"},{"key":"ref70","first-page":"877","article-title":"A comparative survey on symmetric key encryption techniques","volume":"4","author":"agrawal","year":"2012","journal-title":"Int J Comput Sci Eng"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653678"},{"key":"ref77","first-page":"506","article-title":"Public key encryption with keyword search","author":"boneh","year":"2004","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2110363.2110410"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866420"},{"key":"ref38","year":"0"},{"key":"ref78","first-page":"2697","article-title":"A novel framework for securing medical records in cloud computing","volume":"3","author":"irfan","year":"2013","journal-title":"International Journal of Modern Engineering Research"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1145\/1755688.1755720","article-title":"Attribute based data sharing with attribute revocation","author":"yu","year":"2010","journal-title":"Proc ACM Symp Inf Comput Commun Security"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2009.08.014"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.225"},{"key":"ref31","first-page":"1","article-title":"Security and privacy in cloud computing","volume":"15","author":"xiao","year":"2012","journal-title":"IEEE Commun Surveys Tutorials"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/978-3-642-14992-4_13","article-title":"Cryptographic cloud storage","volume":"6054","author":"kamara","year":"2010","journal-title":"Financial Cryptography Data Security"},{"key":"ref37","year":"0"},{"key":"ref36","first-page":"1","article-title":"Privacy issues and challenges in cloud computing","volume":"5","author":"metri","year":"2011","journal-title":"International Journal of Advanced Science and Technology"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/978-3-642-32355-3_12","author":"dong","year":"2012","journal-title":"Foundations of Health Informatics Engineering and Systems"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2012.12.003"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2255593"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108650"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.55"},{"key":"ref63","first-page":"113","article-title":"Can homomorphic encryption be practical?","author":"lauter","year":"2011","journal-title":"Proceedings of the ACM Workshop on Cloud Computing Security Workshop"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/978-3-642-03549-4_5","article-title":"Data hemorrhages in the health-care sector","volume":"5628","author":"johnson","year":"2009","journal-title":"Financial Cryptography Data Security"},{"key":"ref64","first-page":"260","article-title":"RSA-OAEP is secure under the RSA assumption","author":"fujisaki","year":"2001","journal-title":"Proc Crypto"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2011.39"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"ref66","first-page":"255","article-title":"A practical and provably secure coalition-resistant group signature scheme","author":"ateniese","year":"2000","journal-title":"Proc Adv Cryptology"},{"key":"ref29","first-page":"29","article-title":"Plutus: Scalable secure file sharing on untrusted storage","volume":"3","author":"kallahalla","year":"2003","journal-title":"FAST"},{"key":"ref67","year":"0"},{"key":"ref68","first-page":"523","author":"steinfeld","year":"2003","journal-title":"Advances in Cryptology-Asiacrypt"},{"key":"ref69","first-page":"1","article-title":"Trusted virtual domains: Toward secure distributed services","author":"griffin","year":"2005","journal-title":"Proc 1st IEEE Workshop Hot Topics in Syst Dependability"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2547"},{"key":"ref1","first-page":"1226","article-title":"Privacy aspects of e-health","author":"slamanig","year":"2008","journal-title":"Proc 2nd Int Conf Availability Rel Security"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"621","DOI":"10.3390\/fi4030621","article-title":"E-health cloud: Opportunities and challenges","volume":"4","author":"abukhousa","year":"2012","journal-title":"Future Internet"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9830-6"},{"key":"ref21","first-page":"1","article-title":"Privacy engineering: Personal health records in cloud computing environments","author":"kaletsch","year":"2011","journal-title":"Proc 10th Int Conf Inf Syst"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.186"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2010.20"},{"key":"ref26","year":"0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4108\/icst.trustcol.2010.1"},{"key":"ref50","first-page":"727","article-title":"Flexible patient-controlled security for electronic health records","author":"thomas","year":"2012","journal-title":"Proc 2nd ACM SIGHIT Int Health Informat Symp"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866845"},{"key":"ref93","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1145\/1755688.1755723","article-title":"Secure provenance: the essential of bread and butter of data forensics in cloud computing","author":"lu","year":"2010","journal-title":"Proc ACM Symp Inf Comput Commun Security"},{"key":"ref92","first-page":"34","article-title":"Outsourcing the decryption of ABE ciphertexts","author":"green","year":"2011","journal-title":"Proc Usenix Security"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655024"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.11591\/telkomnika.v11i4.2406"},{"key":"ref57","author":"akinyele","year":"2010","journal-title":"Self-protecting Electronic Medical Records Using Attribute-based Encryption"},{"key":"ref56","year":"0"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/978-3-642-16161-2_6","article-title":"Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings","volume":"50","author":"li","year":"2010","journal-title":"Security Privacy in Commun Netw"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2012.92"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2011.043666"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/10580530601036786"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.62"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2010.10.001"},{"key":"ref12","first-page":"711","article-title":"Secure sharing of electronic health records in clouds","author":"wu","year":"2012","journal-title":"Proc 8th IEEE Int Conf Collaborative Comput Netw Appl Work-sharing"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5539\/nct.v1n2p12"},{"key":"ref14","year":"0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.115"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427582"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655020"},{"key":"ref81","first-page":"389","article-title":"Design and implementation of a secure cloud?based personal health record system using ciphertext?policy attribute?based encryption","volume":"7","author":"wang","year":"2013","journal-title":"Int J Intell Inf Database Syst"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"ref18","year":"0"},{"key":"ref83","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"song","year":"2000","journal-title":"Proc IEEE Sympo Security Privacy"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-13-35"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/PHEALTH.2009.5754828"},{"key":"ref89","first-page":"127","article-title":"Divertible protocols and atomic proxy cryptography","author":"blaze","year":"1998","journal-title":"Proc Advances in Cryptology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/eTELEMED.2009.51"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2009.06.004"},{"key":"ref6","year":"0"},{"key":"ref5","year":"0"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1007\/978-3-540-70583-3_46","author":"shi","year":"2008","journal-title":"Automata Languages and Programming"},{"key":"ref8","first-page":"219","article-title":"DACAR platform for e-health services cloud","author":"fan","year":"2011","journal-title":"Proc 1st Int Conf Cloud Comput"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref7","year":"0"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427488"},{"key":"ref87","first-page":"213","article-title":"Identity-based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"Proc Crypto"},{"key":"ref88","first-page":"548","article-title":"Hierarchical ID-based cryptography","author":"gentry","year":"2002","journal-title":"Proc Adv Cryptology"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1145\/1089107.1089141","article-title":"HIT and MIS: Implications of health information technology and medical information system","volume":"48","author":"goldschmidt","year":"2005","journal-title":"Commun ACM"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/sec.817"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9873-8"},{"key":"ref48","first-page":"220","article-title":"Securing the e-Health cloud","author":"hans","year":"2010","journal-title":"Proc 1st ACM Int Health Inf Symp"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2046631.2046637"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2011.12.019"},{"key":"ref41","year":"0"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2011.5973792"},{"key":"ref43","first-page":"1","article-title":"Lifelong personal health data and application software via virtual machines in the cloud","volume":"18","author":"gorp","year":"2012","journal-title":"IEEE J Biomed Health Informat"}],"container-title":["IEEE Journal of Biomedical and Health Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221020\/6846381\/06714376.pdf?arnumber=6714376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T04:59:50Z","timestamp":1688965190000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6714376\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":93,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jbhi.2014.2300846","relation":{},"ISSN":["2168-2194","2168-2208"],"issn-type":[{"value":"2168-2194","type":"print"},{"value":"2168-2208","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7]]}}}