{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T08:35:12Z","timestamp":1758702912082,"version":"3.41.2"},"reference-count":34,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T00:00:00Z","timestamp":1631491200000},"content-version":"vor","delay-in-days":255,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004607","name":"Natural Science Foundation of Guangxi Province","doi-asserted-by":"publisher","award":["2018GXNSFDA281040"],"award-info":[{"award-number":["2018GXNSFDA281040"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["CCNU19TS019"],"award-info":[{"award-number":["CCNU19TS019"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072133","62172181","61772224"],"award-info":[{"award-number":["62072133","62172181","61772224"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Internet of Medical Things (IoMT) is a kind of Internet of Things (IoT) that includes patients and medical sensors. Patients can share real\u2010time medical data collected in IoMT with medical professionals. This enables medical professionals to provide patients with efficient medical services. Due to the high efficiency of cloud computing, patients prefer to share gathering medical information using cloud servers. However, sharing medical data on the cloud server will cause security issues, because these data involve the privacy of patients. Although recently many researchers have designed data sharing schemes in medical domain for security purpose, most of them cannot guarantee the anonymity of patients and provide access control for shared health data, and further, they are not lightweight enough for IoMT. Due to these security and efficiency issues, a novel lightweight privacy\u2010preserving data sharing scheme is constructed in this paper for IoMT. This scheme can achieve the anonymity of patients and access control of shared medical data. At the same time, it satisfies all described security features. In addition, this scheme can achieve lightweight computations by using elliptic curve cryptography (ECC), XOR operations, and hash function. Furthermore, performance evaluation demonstrates that the proposed scheme takes less computation cost through comparison with similar solutions. Therefore, it is fairly an attractive solution for efficient and secure data sharing in IoMT.<\/jats:p>","DOI":"10.1155\/2021\/8402138","type":"journal-article","created":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T18:07:25Z","timestamp":1631556445000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Lightweight Privacy\u2010Preserving Data Sharing Scheme for Internet of Medical Things"],"prefix":"10.1155","volume":"2021","author":[{"given":"Zhuo","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3847-7659","authenticated-orcid":false,"given":"Chingfang","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Lein","family":"Harn","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Lulu","family":"Ke","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,9,13]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_14_1_2","DOI":"10.1016\/j.jksuci.2016.10.003"},{"doi-asserted-by":"publisher","key":"e_1_2_14_2_2","DOI":"10.1016\/j.comcom.2019.12.030"},{"doi-asserted-by":"publisher","key":"e_1_2_14_3_2","DOI":"10.1007\/s42979-020-00195-y"},{"doi-asserted-by":"publisher","key":"e_1_2_14_4_2","DOI":"10.1007\/s11276-010-0252-4"},{"doi-asserted-by":"publisher","key":"e_1_2_14_5_2","DOI":"10.1016\/j.jisa.2020.102499"},{"doi-asserted-by":"publisher","key":"e_1_2_14_6_2","DOI":"10.1007\/s10916-018-1129-9"},{"doi-asserted-by":"publisher","key":"e_1_2_14_7_2","DOI":"10.1016\/j.comnet.2017.03.013"},{"doi-asserted-by":"publisher","key":"e_1_2_14_8_2","DOI":"10.1016\/j.future.2019.01.058"},{"doi-asserted-by":"publisher","key":"e_1_2_14_9_2","DOI":"10.1145\/1721654.1721672"},{"doi-asserted-by":"crossref","unstructured":"WuJ. PingL. GeX. YaW. andFuJ. Cloud storage as the infrastructure of cloud computing 2010 International Conference on Intelligent Computing and Cognitive Informatics 2010 Kuala Lumpur Malaysia 380\u2013383 https:\/\/doi.org\/10.1109\/ICICCI.2010.119 2-s2.0-77958450169.","key":"e_1_2_14_10_2","DOI":"10.1109\/ICICCI.2010.119"},{"doi-asserted-by":"publisher","key":"e_1_2_14_11_2","DOI":"10.3390\/s18103520"},{"doi-asserted-by":"crossref","unstructured":"Schr\u00f6derD.andSchr\u00f6derH. Verifiable data streaming Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012 Raleigh North Carolina USA 953\u2013964 https:\/\/doi.org\/10.1145\/2382196.2382297 2-s2.0-84869465679.","key":"e_1_2_14_12_2","DOI":"10.1145\/2382196.2382297"},{"doi-asserted-by":"publisher","key":"e_1_2_14_13_2","DOI":"10.1109\/JIOT.2019.2917546"},{"doi-asserted-by":"publisher","key":"e_1_2_14_14_2","DOI":"10.1016\/j.tcs.2014.09.038"},{"doi-asserted-by":"publisher","key":"e_1_2_14_15_2","DOI":"10.1002\/sec.1587"},{"doi-asserted-by":"publisher","key":"e_1_2_14_16_2","DOI":"10.1109\/ACCESS.2018.2836350"},{"doi-asserted-by":"crossref","unstructured":"ItaniW. KayssiA. andChehabA. Energy-efficient incremental integrity for securing storage in mobile cloud computing 2010 International Conference on Energy Aware Computing 2010 Cairo Egypt 1\u20132 https:\/\/doi.org\/10.1109\/ICEAC.2010.5702296 2-s2.0-79952030338.","key":"e_1_2_14_17_2","DOI":"10.1109\/ICEAC.2010.5702296"},{"doi-asserted-by":"publisher","key":"e_1_2_14_18_2","DOI":"10.1109\/TC.2011.245"},{"doi-asserted-by":"publisher","key":"e_1_2_14_19_2","DOI":"10.1109\/TCC.2014.2299807"},{"doi-asserted-by":"publisher","key":"e_1_2_14_20_2","DOI":"10.1016\/j.jss.2015.11.044"},{"doi-asserted-by":"publisher","key":"e_1_2_14_21_2","DOI":"10.1109\/TIFS.2018.2850312"},{"doi-asserted-by":"crossref","unstructured":"WangW. LiZ. OwensR. andBhargavaB. Secure and efficient access to outsourced data Proceedings of the 2009 ACM workshop on Cloud Computing Security 2009 Chicago Illinois USA 55\u201366 https:\/\/doi.org\/10.1145\/1655008.1655016 2-s2.0-74049154660.","key":"e_1_2_14_22_2","DOI":"10.1145\/1655008.1655016"},{"doi-asserted-by":"crossref","unstructured":"XuL. WuX. andZhangX. CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud Proceedings of the 7th ACM symposium on Information Computer and Communications Security 2012 Seoul Korea 87\u201388 https:\/\/doi.org\/10.1145\/2414456.2414507 2-s2.0-84872004857.","key":"e_1_2_14_23_2","DOI":"10.1145\/2414456.2414507"},{"doi-asserted-by":"publisher","key":"e_1_2_14_24_2","DOI":"10.1007\/s11227-013-1055-z"},{"doi-asserted-by":"crossref","unstructured":"NayakS. K.andTripathyS. Privacy preserving provable data possession for cloud based electronic health record system 2016 IEEE Trustcom\/BigDataSE\/ISPA 2016 Tianjin China 860\u2013867 https:\/\/doi.org\/10.1109\/TrustCom.2016.0149 2-s2.0-85015187374.","key":"e_1_2_14_25_2","DOI":"10.1109\/TrustCom.2016.0149"},{"doi-asserted-by":"publisher","key":"e_1_2_14_26_2","DOI":"10.1007\/s13369-016-2357-2"},{"doi-asserted-by":"publisher","key":"e_1_2_14_27_2","DOI":"10.1016\/j.future.2016.08.008"},{"doi-asserted-by":"publisher","key":"e_1_2_14_28_2","DOI":"10.1109\/JSYST.2015.2428620"},{"doi-asserted-by":"publisher","key":"e_1_2_14_29_2","DOI":"10.3390\/s150922419"},{"doi-asserted-by":"publisher","key":"e_1_2_14_30_2","DOI":"10.1007\/s10207-019-00464-9"},{"doi-asserted-by":"publisher","key":"e_1_2_14_31_2","DOI":"10.1016\/j.jisa.2020.102568"},{"doi-asserted-by":"publisher","key":"e_1_2_14_32_2","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"doi-asserted-by":"crossref","unstructured":"MillerV. S. WilliamsH. C. Use of elliptic curves in cryptography Advances in Cryptology \u2014 CRYPTO \u201985 Proceedings. CRYPTO 1985 1985 218 Springer Berlin Heidelberg 417\u2013426 Lecture Notes in Computer Science https:\/\/doi.org\/10.1007\/3-540-39799-X_31 2-s2.0-85015402934.","key":"e_1_2_14_33_2","DOI":"10.1007\/3-540-39799-X_31"},{"doi-asserted-by":"publisher","key":"e_1_2_14_34_2","DOI":"10.1007\/s11277-016-3393-7"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/8402138.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/8402138.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/8402138","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T13:50:55Z","timestamp":1723038655000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/8402138"}},"subtitle":[],"editor":[{"given":"Pengfei","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/8402138"],"URL":"https:\/\/doi.org\/10.1155\/2021\/8402138","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-06-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-30","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8402138"}}