{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:04:57Z","timestamp":1774541097761,"version":"3.50.1"},"reference-count":38,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":181,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072306"],"award-info":[{"award-number":["62072306"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>The rapid development of wearable sensors and the 5G network empowers traditional medical treatment with the ability to collect patients\u2019 information remotely for monitoring and diagnosing purposes. Meanwhile, the health\u2010related mobile apps and devices also generate a large amount of medical data, which is critical for promoting disease research and diagnosis. However, medical data is too sensitive to share, which is also a common issue for IoT (Internet of Things) data. The traditional centralized cloud\u2010based medical data sharing schemes have to rely on a single trusted third party. Therefore, the schemes suffer from single\u2010point failure and lack of privacy protection and access control for the data. Blockchain is an emerging technique to provide an approach for managing data in a decentralized manner. Especially, the blockchain\u2010based smart contract technique enables the programmability for participants to access the data. All the interactions are authenticated and recorded by the other participants of the blockchain network, which is tamper resistant. In this paper, we leverage the K\u2010anonymity and searchable encryption techniques and propose a blockchain\u2010based privacy\u2010preserving scheme for medical data sharing among medical institutions and data users. To be specific, the consortium blockchain, Hyperledger Fabric, is adopted to allow data users to search for encrypted medical data records. The smart contract, i.e., the chaincode, implements the attribute\u2010based access control mechanisms to guarantee that the data can only be accessed by the user with proper attributes. The K\u2010anonymity and searchable encryption ensure that the medical data is shared without privacy leaking, i.e., figuring out an individual patient from queries. We implement a prototype system using the chaincode of Hyperledger Fabric. From the functional perspective, security analysis shows that the proposed scheme satisfies security goals and precedes others. From the performance perspective, we conduct experiments by simulating different numbers of medical institutions. The experimental results demonstrate that the scalability and performance of our scheme are practical.<\/jats:p>","DOI":"10.1155\/2021\/6685762","type":"journal-article","created":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T12:23:53Z","timestamp":1625142233000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["A Blockchain\u2010Based Medical Data Sharing Mechanism with Attribute\u2010Based Access Control and Privacy Protection"],"prefix":"10.1155","volume":"2021","author":[{"given":"Yingwen","family":"Chen","sequence":"first","affiliation":[]},{"given":"Linghang","family":"Meng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2319-4103","authenticated-orcid":false,"given":"Huan","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Guangtao","family":"Xue","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,7]]},"reference":[{"key":"e_1_2_13_1_2","volume-title":"The HIPAA Privacy Rule: Lacks Patient Benefit, Impedes Research Growth","author":"Steinberg M. J.","year":"2009"},{"key":"e_1_2_13_2_2","volume-title":"Protecting Privacy when Disclosing Information: K-Anonymity and Its Enforcement through Generalization and Suppression","author":"Samarati P.","year":"1998"},{"key":"e_1_2_13_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"e_1_2_13_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-014-0351-4"},{"key":"e_1_2_13_5_2","doi-asserted-by":"crossref","unstructured":"WuY. SuJ. andLiB. Keyword search over shared cloud data without secure channel or authority 2015 IEEE 8th International Conference on Cloud Computing 2015 New York NY USA 580\u2013587 https:\/\/doi.org\/10.1109\/cloud.2015.83 2-s2.0-84960126155.","DOI":"10.1109\/CLOUD.2015.83"},{"key":"e_1_2_13_6_2","doi-asserted-by":"crossref","unstructured":"ShiE. BethencourtJ. ChanT. H. H. SongD. andPerrigA. Multi-dimensional range query over encrypted data 2007 IEEE Symposium on Security and Privacy (SP\u203207) 2007 Berkeley CA USA 350\u2013364 https:\/\/doi.org\/10.1109\/sp.2007.29 2-s2.0-34548774576.","DOI":"10.1109\/SP.2007.29"},{"key":"e_1_2_13_7_2","article-title":"Mondrian multidimensional k-anonymity","volume":"6","author":"LeFevre K.","year":"2006","journal-title":"ICDE"},{"key":"e_1_2_13_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/355744.355745"},{"key":"e_1_2_13_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.10.014"},{"key":"e_1_2_13_10_2","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3925"},{"key":"e_1_2_13_11_2","doi-asserted-by":"crossref","unstructured":"AzariaA. EkblawA. VieiraT. andLippmanA. Medrec: using blockchain for medical data access and permission management 2016 2nd International Conference on Open and Big Data (OBD) 2016 Vienna Austria 25\u201330 https:\/\/doi.org\/10.1109\/obd.2016.11 2-s2.0-84991717011.","DOI":"10.1109\/OBD.2016.11"},{"key":"e_1_2_13_12_2","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2741"},{"key":"e_1_2_13_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35576-9_12"},{"key":"e_1_2_13_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2018.2830307"},{"key":"e_1_2_13_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101971"},{"key":"e_1_2_13_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980802"},{"key":"e_1_2_13_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000445"},{"key":"e_1_2_13_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.009"},{"key":"e_1_2_13_19_2","doi-asserted-by":"crossref","unstructured":"UkilA. Privacy preserving data aggregation in wireless sensor networks 2010 6th International Conference on Wireless and Mobile Communications 2010 Valencia Spain 435\u2013440 https:\/\/doi.org\/10.1109\/icwmc.2010.77 2-s2.0-79952066616.","DOI":"10.1109\/ICWMC.2010.77"},{"key":"e_1_2_13_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2_6"},{"key":"e_1_2_13_21_2","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.322.7281.283"},{"key":"e_1_2_13_22_2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-2486-1.ch009"},{"key":"e_1_2_13_23_2","doi-asserted-by":"publisher","DOI":"10.1161\/circoutcomes.118.005122"},{"key":"e_1_2_13_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2911697"},{"key":"e_1_2_13_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947295"},{"key":"e_1_2_13_26_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18041189"},{"key":"e_1_2_13_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2917186"},{"key":"e_1_2_13_28_2","doi-asserted-by":"crossref","unstructured":"AltafF. AditiaM. SainiE. RakshitB. andMaityS. Privacy preserving lightweight searchable encryption for cloud assisted e-health system 2019 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET) 2019 Chennai India 310\u2013314 https:\/\/doi.org\/10.1109\/wispnet45539.2019.9032730.","DOI":"10.1109\/WiSPNET45539.2019.9032730"},{"key":"e_1_2_13_29_2","doi-asserted-by":"crossref","unstructured":"ZhouH. OuyangX. RenZ. SuJ. de LaatC. andZhaoZ. A blockchain based witness model for trustworthy cloud service level agreement enforcement IEEE INFOCOM 2019-IEEE Conference on Computer Communications 2019 Paris France 1567\u20131575 https:\/\/doi.org\/10.1109\/infocom.2019.8737580 2-s2.0-85068229435.","DOI":"10.1109\/INFOCOM.2019.8737580"},{"key":"e_1_2_13_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2941735"},{"key":"e_1_2_13_31_2","doi-asserted-by":"crossref","unstructured":"DoH. G.andNgW. K. Blockchain-based system for secure data storage with private keyword search 2017 IEEE World Congress on Services (SERVICES) 2017 Honolulu HI USA 90\u201393 https:\/\/doi.org\/10.1109\/services.2017.23 2-s2.0-85032351173.","DOI":"10.1109\/SERVICES.2017.23"},{"key":"e_1_2_13_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2943153"},{"key":"e_1_2_13_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.018"},{"key":"e_1_2_13_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1144-x"},{"key":"e_1_2_13_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0995-5"},{"key":"e_1_2_13_36_2","doi-asserted-by":"publisher","DOI":"10.3390\/app9061207"},{"key":"e_1_2_13_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0993-7"},{"key":"e_1_2_13_38_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59016-1_32"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/6685762.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/6685762.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/6685762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T09:24:38Z","timestamp":1723022678000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/6685762"}},"subtitle":[],"editor":[{"given":"Yaguang","family":"Lin","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/6685762"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6685762","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2020-12-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-10","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6685762"}}