{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T14:53:41Z","timestamp":1773759221959,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T00:00:00Z","timestamp":1683936000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T00:00:00Z","timestamp":1683936000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972124"],"award-info":[{"award-number":["61972124"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972124"],"award-info":[{"award-number":["61972124"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Personal health record (PHR) is a medical model in which patients can upload their medical records and define the access control by themselves. Since the limited local storage and the development of cloud computing, many PHR services have been outsourced to the cloud. In order to ensure the privacy of electronic medical records, patients intend to encrypt their health records before uploading them. However, encrypted PHR can not be accessed directly and not be retrieved by legitimate users. To solve these issues, in this article we propose a new searchable encryption scheme with ciphertext-policy attributes, which achieves fine-grained access control and exact keyword search over encrypted PHRs. Moreover, in our proposed scheme, the receiver can verify the integrity of the search result that the cloud server returns. Finally, we simulate our scheme, and the experiments show that our scheme has high practicability for cloud-based healthcare systems and has high efficiency in aspects of keyword search and results verification.<\/jats:p>","DOI":"10.1186\/s13677-023-00451-5","type":"journal-article","created":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T01:02:23Z","timestamp":1683939743000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud"],"prefix":"10.1186","volume":"12","author":[{"given":"Yuqin","family":"Sun","sequence":"first","affiliation":[]},{"given":"Lidong","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jingguo","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,13]]},"reference":[{"issue":"4","key":"451_CR1","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1136\/amiajnl-2011-000105","volume":"18","author":"N Archer","year":"2011","unstructured":"Archer N, Fevrier-Thomas U, Lokker C, McKibbon KA, Straus SE (2011) Personal health records: a scoping review. J Am Med Inform Assoc 18(4):515\u2013522","journal-title":"J Am Med Inform Assoc"},{"issue":"2","key":"451_CR2","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2015","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340\u2013352","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"4","key":"451_CR3","doi-asserted-by":"publisher","first-page":"3008","DOI":"10.1109\/JIOT.2017.2779124","volume":"5","author":"Y Miao","year":"2017","unstructured":"Miao Y, Ma J, Liu X, Li X, Liu Z, Li H (2017) Practical attribute-based multi-keyword search scheme in mobile crowdsourcing. IEEE Internet Things J 5(4):3008\u20133018","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"451_CR4","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1109\/TIFS.2018.2866321","volume":"14","author":"J Ning","year":"2018","unstructured":"Ning J, Xu J, Liang K, Zhang F, Chang EC (2018) Passive attacks against searchable encryption. IEEE Trans Inf Forensic Secur 14(3):789\u2013802","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"10","key":"451_CR5","doi-asserted-by":"publisher","first-page":"2365","DOI":"10.1109\/TIFS.2016.2581316","volume":"11","author":"K Liang","year":"2016","unstructured":"Liang K, Huang X, Guo F, Liu JK (2016) Privacy-preserving and regular language search over encrypted cloud data. IEEE Trans Inf Forensic Secur 11(10):2365\u20132376","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"451_CR6","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security. ACM New York, pp 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"451_CR7","doi-asserted-by":"publisher","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP \u201907). pp 321\u2013334. https:\/\/doi.org\/10.1109\/SP.2007.11","DOI":"10.1109\/SP.2007.11"},{"key":"451_CR8","doi-asserted-by":"crossref","unstructured":"Ibraimi L, Asim M, Petkovi\u0107 M (2009) Secure management of personal health records by applying attribute-based encryption. In: Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health. IEEE Piscataway, pp 71\u201374","DOI":"10.1109\/PHEALTH.2009.5754828"},{"key":"451_CR9","doi-asserted-by":"crossref","unstructured":"Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer-Verlarg Brelin, pp 62\u201391","DOI":"10.1007\/978-3-642-13190-5_4"},{"issue":"8","key":"451_CR10","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","volume":"8","author":"J Lai","year":"2013","unstructured":"Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensic Secur 8(8):1343\u20131354","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"451_CR11","doi-asserted-by":"publisher","unstructured":"Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International Conference on Communications (ICC). pp 917\u2013922. https:\/\/doi.org\/10.1109\/ICC.2012.6364125","DOI":"10.1109\/ICC.2012.6364125"},{"key":"451_CR12","doi-asserted-by":"crossref","unstructured":"Kurosawa K, Ohtaki Y (2012) Uc-secure searchable symmetric encryption. In: International conference on financial cryptography and data security. Springer Berlin, pp 285\u2013298","DOI":"10.1007\/978-3-642-32946-3_21"},{"issue":"1","key":"451_CR13","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1109\/TDSC.2019.2896258","volume":"18","author":"X Ge","year":"2019","unstructured":"Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, Hao R (2019) Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Trans Dependable Secure Comput 18(1):490\u2013504","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"16","key":"451_CR14","doi-asserted-by":"publisher","first-page":"12902","DOI":"10.1109\/JIOT.2021.3063855","volume":"8","author":"X Ge","year":"2021","unstructured":"Ge X, Yu J, Chen F, Kong F, Wang H (2021) Toward verifiable phrase search over encrypted cloud-based iot data. IEEE Internet Things J 8(16):12902\u201312918","journal-title":"IEEE Internet Things J"},{"key":"451_CR15","doi-asserted-by":"crossref","unstructured":"Liu X, Yang X, Luo Y, Zhang Q (2021) Verifiable multi-keyword search encryption scheme with anonymous key generation for medical internet of things. IEEE Internet Things Journal 9(22):22315\u201322326","DOI":"10.1109\/JIOT.2021.3056116"},{"key":"451_CR16","doi-asserted-by":"crossref","unstructured":"Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer Berlin, pp 506\u2013522","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"451_CR17","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer Berlin, pp 457\u2013473","DOI":"10.1007\/11426639_27"},{"key":"451_CR18","unstructured":"Gao J, Zeng K, Jin HZ, Zhou F-C (2015) Data access control scheme based on cp-abe in cloud storage. J Northeast Univ (Nat Sci) 36(10):1416"},{"key":"451_CR19","unstructured":"Su H, Zhu Z, Sun L, Pan N (2016) Practical searchable cp-abe in cloud storage. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC). IEEE Piscataway, pp 180\u2013185"},{"key":"451_CR20","doi-asserted-by":"publisher","first-page":"5682","DOI":"10.1109\/ACCESS.2018.2889754","volume":"7","author":"H Yin","year":"2019","unstructured":"Yin H, Zhang J, Xiong Y, Ou L, Li F, Liao S, Li K (2019) Cp-abse: A ciphertext-policy attribute-based searchable encryption scheme. IEEE Access 7:5682\u20135694","journal-title":"IEEE Access"},{"key":"451_CR21","doi-asserted-by":"crossref","unstructured":"Kaushik K, Varadharajan V, Nallusamy R (2013) Multi-user attribute based searchable encryption. In: 2013 IEEE 14th International Conference on Mobile Data Management, vol 2. IEEE Piscataway, pp 200\u2013205","DOI":"10.1109\/MDM.2013.94"},{"issue":"9","key":"451_CR22","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1109\/TIFS.2015.2442215","volume":"10","author":"K Liang","year":"2015","unstructured":"Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensic Secur 10(9):1981\u20131992","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"451_CR23","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/j.ins.2017.09.029","volume":"423","author":"J Cui","year":"2018","unstructured":"Cui J, Zhou H, Zhong H, Xu Y (2018) Akser: Attribute-based keyword search with efficient revocation in cloud computing. Inf Sci 423:343\u2013352","journal-title":"Inf Sci"},{"issue":"6","key":"451_CR24","doi-asserted-by":"publisher","first-page":"3206","DOI":"10.1109\/TII.2018.2877146","volume":"15","author":"Y Miao","year":"2018","unstructured":"Miao Y, Liu X, Deng RH, Wu H, Li H, Li J, Wu D (2018) Hybrid keyword-field search with efficient key management for industrial internet of things. IEEE Trans Ind Inform 15(6):3206\u20133217","journal-title":"IEEE Trans Ind Inform"},{"issue":"6","key":"451_CR25","doi-asserted-by":"publisher","first-page":"2875","DOI":"10.1109\/TDSC.2020.2968425","volume":"18","author":"K Zhang","year":"2020","unstructured":"Zhang K, Wen M, Lu R, Chen K (2020) Multi-client sub-linear boolean keyword searching for encrypted cloud storage with owner-enforced authorization. IEEE Trans Dependable Secure Comput 18(6):2875\u20132887","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"4","key":"451_CR26","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TPDS.2014.2355202","volume":"27","author":"W Sun","year":"2014","unstructured":"Sun W, Yu S, Lou W, Hou YT, Li H (2014) Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187\u20131198","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"451_CR27","doi-asserted-by":"crossref","unstructured":"Zheng Q, Xu S, Ateniese G (2014) Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014-IEEE conference on computer communications. IEEE Piscataway, pp 522\u2013530","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"451_CR28","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.ins.2018.06.066","volume":"465","author":"Y Miao","year":"2018","unstructured":"Miao Y, Weng J, Liu X, Choo KKR, Liu Z, Li H (2018) Enabling verifiable multiple keywords search over encrypted cloud data. Inf Sci 465:21\u201337","journal-title":"Inf Sci"},{"key":"451_CR29","doi-asserted-by":"crossref","unstructured":"Miao Y, Tong Q, Deng R, Choo KKR, Liu X, Li H (2020) Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage. IEEE Trans Cloud Computing 10(2):835\u2013848","DOI":"10.1109\/TCC.2020.2989296"},{"key":"451_CR30","first-page":"103101","volume":"65","author":"M Ali","year":"2022","unstructured":"Ali M, Sadeghi MR, Liu X, Miao Y, Vasilakos AV (2022) Verifiable online\/offline multi-keyword search for cloud-assisted industrial internet of things. J Inf Secur Appl 65:103101","journal-title":"J Inf Secur Appl"},{"issue":"9","key":"451_CR31","doi-asserted-by":"publisher","first-page":"6483","DOI":"10.1109\/TII.2021.3133345","volume":"18","author":"J Sun","year":"2021","unstructured":"Sun J, Yuan Y, Tang M, Cheng X, Nie X, Aftab MU (2021) Privacy-preserving bilateral fine-grained access control for cloud-enabled industrial iot healthcare. IEEE Trans Ind Inf 18(9):6483\u20136493","journal-title":"IEEE Trans Ind Inf"},{"key":"451_CR32","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/TIFS.2022.3226577","volume":"18","author":"J Sun","year":"2022","unstructured":"Sun J, Xu G, Zhang T, Yang X, Alazab M, Deng RH (2022) Verifiable, fair and privacy-preserving broadcast authorization for flexible data sharing in clouds. IEEE Trans Inf Forensic Secur 18:683\u2013698","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"451_CR33","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.ins.2020.05.041","volume":"536","author":"M Ali","year":"2020","unstructured":"Ali M, Mohajeri J, Sadeghi MR, Liu X (2020) Attribute-based fine-grained access control for outscored private set intersection computation. Inf Sci 536:222\u2013243","journal-title":"Inf Sci"},{"issue":"5","key":"451_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-015-5449-9","volume":"60","author":"S Qiu","year":"2017","unstructured":"Qiu S, Liu J, Shi Y, Zhang R (2017) Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack. Sci China Inf Sci 60(5):1\u201312","journal-title":"Sci China Inf Sci"},{"key":"451_CR35","doi-asserted-by":"crossref","unstructured":"Zhang Y, Zhu T, Guo R, Xu S, Cui H, Cao J (2021) Multi-keyword searchable and verifiable attribute-based encryption over cloud data. IEEE Trans Cloud Computing 11(1):971\u2013983","DOI":"10.1109\/TCC.2021.3119407"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00451-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00451-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00451-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T01:04:13Z","timestamp":1683939853000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00451-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,13]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["451"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00451-5","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2465443\/v1","asserted-by":"object"}]},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,13]]},"assertion":[{"value":"11 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"77"}}