{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:38:15Z","timestamp":1769042295600,"version":"3.49.0"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,2,8]],"date-time":"2024-02-08T00:00:00Z","timestamp":1707350400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,2,8]],"date-time":"2024-02-08T00:00:00Z","timestamp":1707350400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Deanship of Scientific Research at Jouf University","award":["Fast-track Research Funding Program"],"award-info":[{"award-number":["Fast-track Research Funding Program"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Blockchain technologies (BCT) are utilized in healthcare to facilitate a smart and secure transmission of patient data. BCT solutions, however, are unable to store data produced by IoT devices in smart healthcare applications because these applications need a quick consensus process, meticulous key management, and enhanced eprivacy standards. In this work, a smart and secure eHealth framework SSEHCET (Smart and Secure EHealth Framework using Cutting-edge Technologies) is proposed that leverages the potentials of modern cutting-edge technologies (IoT, 5G, mobile edge computing, and BCT), which comprises six layers: 1) The sensing layer-WBAN consists of medical sensors that normally are on or within the bodies of patients and communicate data to smartphones. 2) The edge layer consists of elements that are near IoT devices to collect data. 3) The Communication layer leverages the potential of 5G technology to transmit patients' data between multiple layers efficiently. 4) The storage layer consists of cloud servers or other powerful computers. 5) Security layer, which uses BCT to transmit and store patients' data securely. 6) The healthcare community layer includes healthcare professionals and institutions. For the processing of medical data and to guarantee dependable, safe, and private communication, a Smart Agent (SA) program was duplicated on all layers. The SA leverages the potential of BCT to protect patients' privacy when outsourcing data. The contribution is substantiated through a meticulous evaluation, encompassing security, ease of use, user satisfaction, and SSEHCET structure. Results from an in-depth case study with a prominent healthcare provider underscore SSEHCET's exceptional performance, showcasing its pivotal role in advancing the security, usability, and user satisfaction paradigm in modern eHealth landscapes.<\/jats:p>","DOI":"10.1186\/s13677-024-00602-2","type":"journal-article","created":{"date-parts":[[2024,2,8]],"date-time":"2024-02-08T14:03:42Z","timestamp":1707401022000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Transformative synergy: SSEHCET\u2014bridging mobile edge computing and AI for enhanced eHealth security and efficiency"],"prefix":"10.1186","volume":"13","author":[{"given":"Mamoona","family":"Humayun","sequence":"first","affiliation":[]},{"given":"Amjad","family":"Alsirhani","sequence":"additional","affiliation":[]},{"given":"Faeiz","family":"Alserhani","sequence":"additional","affiliation":[]},{"given":"Momina","family":"Shaheen","sequence":"additional","affiliation":[]},{"given":"Ghadah","family":"Alwakid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,8]]},"reference":[{"key":"602_CR1","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.1007\/s10586-022-03717-w","volume":"26","author":"A Singh","year":"2023","unstructured":"Singh A, Chatterjee K (2023) Edge computing based secure health monitoring framework for electronic healthcare system. Cluster Comput 26:1205\u20131220","journal-title":"Cluster Comput"},{"key":"602_CR2","doi-asserted-by":"publisher","first-page":"e1553","DOI":"10.1016\/S2214-109X(21)00442-3","volume":"9","author":"H Yadav","year":"2021","unstructured":"Yadav H, Shah D, Sayed S, Horton S, Schroeder LF (2021) Availability of essential diagnostics in ten low-income and middle-income countries: results from national health facility surveys. Lancet Glob Health 9:e1553\u2013e1560","journal-title":"Lancet Glob Health"},{"key":"602_CR3","doi-asserted-by":"publisher","first-page":"750","DOI":"10.3390\/ijerph18020750","volume":"18","author":"B Zegeye","year":"2021","unstructured":"Zegeye B, El-Khatib Z, Ameyaw EK, Seidu A-A, Ahinkorah BO, Keetile M et al (2021) Breaking barriers to healthcare access: a multilevel analysis of individual-and community-level factors affecting women\u2019s access to healthcare services in Benin. Int J Environ Res Public Health 18:750","journal-title":"Int J Environ Res Public Health"},{"key":"602_CR4","doi-asserted-by":"publisher","first-page":"e240","DOI":"10.1016\/S1470-2045(20)30021-8","volume":"21","author":"FJ Penedo","year":"2020","unstructured":"Penedo FJ, Oswald LB, Kronenfeld JP, Garcia SF, Cella D, Yanez B (2020) The increasing value of eHealth in the delivery of patient-centred cancer care. Lancet Oncol 21:e240\u2013e251","journal-title":"Lancet Oncol"},{"key":"602_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ctrv.2019.01.003","volume":"74","author":"S Triberti","year":"2019","unstructured":"Triberti S, Savioni L, Sebri V, Pravettoni G (2019) eHealth for improving quality of life in breast cancer patients: a systematic review. Cancer Treat Rev 74:1\u201314","journal-title":"Cancer Treat Rev"},{"key":"602_CR6","doi-asserted-by":"publisher","DOI":"10.2196\/14197","volume":"21","author":"B Schreiweis","year":"2019","unstructured":"Schreiweis B, Pobiruchin M, Strotbaum V, Suleder J, Wiesner M, Bergh B (2019) Barriers and facilitators to the implementation of eHealth services: systematic literature analysis. J Med Internet Res 21:e14197","journal-title":"J Med Internet Res"},{"key":"602_CR7","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.ijmedinf.2019.03.018","volume":"126","author":"I Maramba","year":"2019","unstructured":"Maramba I, Chatterjee A, Newman C (2019) Methods of usability testing in the development of eHealth applications: a scoping review. Int J Med Informatics 126:95\u2013104","journal-title":"Int J Med Informatics"},{"issue":"11","key":"602_CR8","first-page":"1216","volume":"6","author":"R Bhagyoday","year":"2019","unstructured":"Bhagyoday R, Kamani C, Bhojani D, Parmar V (2019) Comprehensive study of E-Health security in cloud computing. Int Res J Eng Technol 6(11):1216\u20131228","journal-title":"Int Res J Eng Technol"},{"key":"602_CR9","doi-asserted-by":"publisher","first-page":"104127","DOI":"10.1109\/ACCESS.2021.3098708","volume":"9","author":"A Sahi","year":"2021","unstructured":"Sahi A, Lai D, Li Y (2021) A review of the state of the arts in privacy and security in the eHealth cloud. IEEE Access 9:104127\u2013104141. https:\/\/doi.org\/10.1109\/ACCESS.2021.3098708","journal-title":"IEEE Access"},{"key":"602_CR10","doi-asserted-by":"publisher","first-page":"7516035","DOI":"10.1155\/2019\/7516035","volume":"2019","author":"Y Al-Issa","year":"2019","unstructured":"Al-Issa Y, Ottom MA, Tamrawi A (2019) eHealth cloud security challenges: a survey. J Healthc Eng. 2019:7516035","journal-title":"J Healthc Eng."},{"key":"602_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100159","volume":"9","author":"MA Uddin","year":"2020","unstructured":"Uddin MA, Stranieri A, Gondal I, Balasubramanian V (2020) Blockchain leveraged decentralized IoT eHealth framework. Internet of Things 9:100159","journal-title":"Internet of Things"},{"key":"602_CR12","doi-asserted-by":"publisher","first-page":"13071","DOI":"10.3390\/ijerph192013071","volume":"19","author":"CO Alenoghena","year":"2022","unstructured":"Alenoghena CO, Onumanyi AJ, Ohize HO, Adejo AO, Oligbi M, Ali SI et al (2022) eHealth: A survey of architectures, developments in mHealth, security concerns and solutions. Int J Environ Res Public Health 19:13071","journal-title":"Int J Environ Res Public Health"},{"key":"602_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109004","volume":"211","author":"K Hasan","year":"2022","unstructured":"Hasan K, Chowdhury MJM, Biswas K, Ahmed K, Islam MS, Usman M (2022) A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks. Comput Netw 211:109004","journal-title":"Comput Netw"},{"key":"602_CR14","doi-asserted-by":"publisher","first-page":"146350","DOI":"10.1109\/ACCESS.2021.3123456","volume":"9","author":"M Morales-Sandoval","year":"2021","unstructured":"Morales-Sandoval M, De-La-Parra-Aguirre R, Galeana-Zapi\u00e9n H, Galaviz-Mosqueda A (2021) A three-tier approach for Lightweight data security of body area networks in E-health applications. IEEE Access 9:146350\u2013146365","journal-title":"IEEE Access"},{"key":"602_CR15","doi-asserted-by":"publisher","first-page":"1640","DOI":"10.11591\/eei.v10i3.1813","volume":"10","author":"JH Majeed","year":"2021","unstructured":"Majeed JH, Aish Q (2021) A remote patient monitoring based on WBAN implementation with internet of thing and cloud server. Bulletin of Electrical Engineering and Informatics 10:1640\u20131647","journal-title":"Bulletin of Electrical Engineering and Informatics"},{"key":"602_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-020-07702-7","volume":"116","author":"SJ Hussain","year":"2021","unstructured":"Hussain SJ, Irfan M, Jhanjhi N, Hussain K, Humayun M (2021) Performance enhancement in wireless body area networks with secure communication. Wireless Pers Commun 116:1\u201322","journal-title":"Wireless Pers Commun"},{"key":"602_CR17","doi-asserted-by":"publisher","first-page":"9841","DOI":"10.1007\/s12652-020-02728-y","volume":"12","author":"T Jabeen","year":"2021","unstructured":"Jabeen T, Ashraf H, Ullah A (2021) A survey on healthcare data security in wireless body area networks. J Ambient Intell Humaniz Comput 12:9841\u20139854","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"602_CR18","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.csbj.2018.07.004","volume":"16","author":"P Zhang","year":"2018","unstructured":"Zhang P, White J, Schmidt DC, Lenz G, Rosenbloom ST (2018) FHIRChain: applying blockchain to securely and scalably share clinical data. Comput Struct Biotechnol J 16:267\u2013278","journal-title":"Comput Struct Biotechnol J"},{"key":"602_CR19","doi-asserted-by":"publisher","unstructured":"Kitanov S, Janevski T (2019) Introduction to fog computing. In: The Rise of Fog Computing in the Digital Era. IGI Global, p 1\u201335. https:\/\/doi.org\/10.4018\/978-1-5225-6070-8.ch001","DOI":"10.4018\/978-1-5225-6070-8.ch001"},{"key":"602_CR20","doi-asserted-by":"publisher","first-page":"1236","DOI":"10.1007\/s12083-019-00728-0","volume":"12","author":"RZ Naeem","year":"2019","unstructured":"Naeem RZ, Bashir S, Amjad MF, Abbas H, Afzal H (2019) Fog computing in internet of things: Practical applications and future directions. Peer-to-Peer Networking and Applications 12:1236\u20131262","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"602_CR21","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MCE.2019.2893674","volume":"8","author":"D Puthal","year":"2019","unstructured":"Puthal D, Mohanty SP, Bhavake SA, Morgan G, Ranjan R (2019) Fog computing security challenges and future directions [energy and security]. IEEE Consumer Electronics Magazine 8:92\u201396","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"602_CR22","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/EDGE.2019.00035","volume":"2019","author":"M Caprolu","year":"2019","unstructured":"Caprolu M, Di Pietro R, Lombardi F, Raponi S (2019) \u201cEdge computing perspectives: architectures, technologies, and open security issues,\u201d in. IEEE International Conference on Edge Computing (EDGE) 2019:116\u2013123","journal-title":"IEEE International Conference on Edge Computing (EDGE)"},{"key":"602_CR23","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.icte.2021.05.007","volume":"7","author":"M Liyanage","year":"2021","unstructured":"Liyanage M, Porambage P, Ding AY, Kalla A (2021) Driving forces for multi-access edge computing (MEC) IoT integration in 5G. ICT Express 7:127\u2013137","journal-title":"ICT Express"},{"key":"602_CR24","doi-asserted-by":"publisher","unstructured":"Maray M, Shuja J (2022) Computation offloading in mobile cloud computing and mobile edge computing: survey, taxonomy, and open issues. Mob Inf Syst 2022:Article ID 1121822. https:\/\/doi.org\/10.1155\/2022\/1121822","DOI":"10.1155\/2022\/1121822"},{"key":"602_CR25","doi-asserted-by":"publisher","unstructured":"do Prado PF et al (2021) Mobile Edge Computing for Content Distribution and Mobility Support in Smart Cities. In: Mukherjee A, De D, Ghosh SK, Buyya R (eds) Mobile Edge Computing. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-69893-5_19","DOI":"10.1007\/978-3-030-69893-5_19"},{"key":"602_CR26","doi-asserted-by":"publisher","first-page":"9801","DOI":"10.1007\/s13369-021-06348-2","volume":"47","author":"A Singh","year":"2022","unstructured":"Singh A, Satapathy SC, Roy A, Gutub A (2022) Ai-based mobile edge computing for iot: applications, challenges, and future scope. Arab J Sci Eng 47:9801\u20139831","journal-title":"Arab J Sci Eng"},{"key":"602_CR27","doi-asserted-by":"publisher","first-page":"332","DOI":"10.3390\/iot3030019","volume":"3","author":"E Fazeldehkordi","year":"2022","unstructured":"Fazeldehkordi E, Gr\u00f8nli T-M (2022) A Survey of Security Architectures for Edge Computing-Based IoT. IoT 3:332\u2013365","journal-title":"IoT"},{"key":"602_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.53375\/ijecer.2022.302","volume":"2","author":"L Javed","year":"2022","unstructured":"Javed L, Yakubu BM, Waleed M, Khaliq Z, Suleiman AB, Mato NG (2022) BHC-IoT: A Survey on Healthcare IoT Security Issues and Blockchain-Based Solution. International Journal of Electrical and Computer Engineering Research 2:1\u20139","journal-title":"International Journal of Electrical and Computer Engineering Research"},{"key":"602_CR29","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.comnet.2019.03.006","volume":"153","author":"MM Dhanvijay","year":"2019","unstructured":"Dhanvijay MM, Patil SC (2019) Internet of Things: A survey of enabling technologies in healthcare and its applications. Comput Netw 153:113\u2013131","journal-title":"Comput Netw"},{"key":"602_CR30","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.3390\/s19071638","volume":"19","author":"Y Qu","year":"2019","unstructured":"Qu Y, Zheng G, Ma H, Wang X, Ji B, Wu H (2019) A survey of routing protocols in WBAN for healthcare applications. Sensors 19:1638","journal-title":"Sensors"},{"key":"602_CR31","doi-asserted-by":"publisher","unstructured":"Dutta Pramanik PK, Nayyar A, Pareek G (2019) Chapter 7 - WBAN: Driving e-healthcare Beyond Telemedicine to Remote Health Monitoring: Architecture and Protocols. In: Jude HD, Balas VE (eds) Telemedicine Technologies. Academic Press, p 89\u2013119. https:\/\/doi.org\/10.1016\/B978-0-12-816948-3.00007-6.\u00a0ISBN 9780128169483","DOI":"10.1016\/B978-0-12-816948-3.00007-6"},{"key":"602_CR32","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.3390\/s19102395","volume":"19","author":"Y Ren","year":"2019","unstructured":"Ren Y, Leng Y, Zhu F, Wang J, Kim H-J (2019) Data storage mechanism based on blockchain with privacy protection in wireless body area network. Sensors 19:2395","journal-title":"Sensors"},{"key":"602_CR33","doi-asserted-by":"publisher","unstructured":"Asam M, Jamal T, Ajaz A, Haider Z, Butt SA (2019) Security Issues in WBANs. arXiv preprint arXiv: 1911.04330. https:\/\/doi.org\/10.48550\/arXiv.1911.04330","DOI":"10.48550\/arXiv.1911.04330"},{"key":"602_CR34","doi-asserted-by":"crossref","unstructured":"Nandikanti A, Sahu KN, Panigrahi S (2023) Security issues and solutions for reliable WBAN-based e-Healthcare systems: a systematic review. The 1st International Conference on International Conference on Ambient Intelligence in Health Care (ICAIHC-2022)","DOI":"10.1007\/978-981-19-6068-0_3"},{"key":"602_CR35","doi-asserted-by":"publisher","first-page":"67","DOI":"10.3390\/jsan11040067","volume":"11","author":"M Yaghoubi","year":"2022","unstructured":"Yaghoubi M, Ahmed K, Miao Y (2022) Wireless Body Area Network (WBAN): A Survey on Architecture, Technologies, Energy Consumption, and Security Challenges. J Sens Actuator Netw 11:67","journal-title":"J Sens Actuator Netw"},{"key":"602_CR36","doi-asserted-by":"publisher","unstructured":"Dave R, Seliya N, Siddiqui N (2021) The benefits of edge computing in healthcare, smart cities, and IoT. arXiv preprint arXiv: 2112.01250. https:\/\/doi.org\/10.48550\/arXiv.2112.01250","DOI":"10.48550\/arXiv.2112.01250"},{"key":"602_CR37","doi-asserted-by":"publisher","first-page":"22011","DOI":"10.1109\/ACCESS.2019.2898265","volume":"7","author":"X Li","year":"2019","unstructured":"Li X, Huang X, Li C, Yu R, Shu L (2019) EdgeCare: Leveraging edge computing for collaborative data management in mobile healthcare systems. IEEE Access 7:22011\u201322025","journal-title":"IEEE Access"},{"key":"602_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2019.05.005","volume":"140","author":"PP Ray","year":"2019","unstructured":"Ray PP, Dash D, De D (2019) Edge computing for Internet of Things: A survey, e-healthcare case study and future direction. J Netw Comput Appl 140:1\u201322","journal-title":"J Netw Comput Appl"},{"key":"602_CR39","first-page":"191","volume":"20","author":"S Dash","year":"2019","unstructured":"Dash S, Biswas S, Banerjee D, Rahman AU (2019) Edge and fog computing in healthcare\u2013A review. Scalable Computing: Practice and Experience 20:191\u2013206","journal-title":"Scalable Computing: Practice and Experience"},{"key":"602_CR40","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/j.future.2017.02.014","volume":"78","author":"AM Rahmani","year":"2018","unstructured":"Rahmani AM, Gia TN, Negash B, Anzanpour A, Azimi I, Jiang M et al (2018) Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach. Futur Gener Comput Syst 78:641\u2013658","journal-title":"Futur Gener Comput Syst"},{"key":"602_CR41","doi-asserted-by":"publisher","unstructured":"Unal D, Bennbaia S, Catak FO (2022) Chapter 12 - Machine learning for the security of healthcare systems based on Internet of Things and edge computing. **Qatar National Research Fund. In: Moustafa AA (ed) Cybersecurity and Cognitive Science. Academic Press, p 299\u2013320. https:\/\/doi.org\/10.1016\/B978-0-323-90570-1.00007-3.\u00a0ISBN 9780323905701","DOI":"10.1016\/B978-0-323-90570-1.00007-3"},{"key":"602_CR42","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.3390\/electronics11081195","volume":"11","author":"M Humayun","year":"2022","unstructured":"Humayun M, Jhanjhi NZ, Niazi M, Amsaad F, Masood I (2022) Securing Drug Distribution Systems from Tampering Using Blockchain. Electronics 11:1195","journal-title":"Electronics"},{"key":"602_CR43","first-page":"55","volume":"20","author":"M Humayun","year":"2020","unstructured":"Humayun M, Jhanjhi N, Alamri M (2020) Smart secure and energy efficient scheme for e-health applications using IoT: a review. International Journal of Computer Science and Network Security 20:55\u201374","journal-title":"International Journal of Computer Science and Network Security"},{"key":"602_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0982-x","volume":"42","author":"KN Griggs","year":"2018","unstructured":"Griggs KN, Ossipova O, Kohlios CP, Baccarini AN, Howson EA, Hayajneh T (2018) Healthcare blockchain system using smart contracts for secure automated remote patient monitoring. J Med Syst 42:1\u20137","journal-title":"J Med Syst"},{"key":"602_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-1121-4","volume":"43","author":"Y Chen","year":"2019","unstructured":"Chen Y, Ding S, Xu Z, Zheng H, Yang S (2019) Blockchain-based medical records secure storage and medical service framework. J Med Syst 43:1\u20139","journal-title":"J Med Syst"},{"key":"602_CR46","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.csbj.2018.06.004","volume":"16","author":"J Brogan","year":"2018","unstructured":"Brogan J, Baskaran I, Ramachandran N (2018) Authenticating health activity data using distributed ledger technologies. Comput Struct Biotechnol J 16:257\u2013266","journal-title":"Comput Struct Biotechnol J"},{"key":"602_CR47","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.csbj.2018.06.003","volume":"16","author":"WJ Gordon","year":"2018","unstructured":"Gordon WJ, Catalini C (2018) Blockchain technology for healthcare: facilitating the transition to patient-driven interoperability. Comput Struct Biotechnol J 16:224\u2013230","journal-title":"Comput Struct Biotechnol J"},{"key":"602_CR48","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3390\/s19020326","volume":"19","author":"AD Dwivedi","year":"2019","unstructured":"Dwivedi AD, Srivastava G, Dhar S, Singh R (2019) A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 19:326","journal-title":"Sensors"},{"key":"602_CR49","unstructured":"Gaetani E, Aniello L, Baldoni R, Lombardi F, Margheri A, Sassone V (2017) Blockchain-based database to ensure data integrity in cloud computing environments. Italian Conference on Cybersecurity. Venice, 17\u201320 Jan 2017"},{"issue":"3","key":"602_CR50","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/s10916-019-1195-7","volume":"43","author":"SG Alonso","year":"2019","unstructured":"Alonso SG, Arambarri J, L\u00f3pez-Coronado M, de la Torre D\u00edez I (2019) Proposing new blockchain challenges in ehealth. J Med Syst 43(3):64","journal-title":"J Med Syst"},{"key":"602_CR51","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.jpdc.2020.10.002","volume":"148","author":"H Huang","year":"2021","unstructured":"Huang H, Sun X, Xiao F, Zhu P, Wang W (2021) Blockchain-based eHealth system for auditable EHRs manipulation in cloud environments. Journal of Parallel and Distributed Computing 148:46\u201357","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"602_CR52","doi-asserted-by":"publisher","unstructured":"Rifi N, Rachkidi E, Agoulmine N, Taher NC (2017) Towards using blockchain technology for eHealth data access management. 2017 Fourth International Conference on Advances in Biomedical Engineering (ICABME); 19\u201321 October 2017. Beirut, Lebanon. https:\/\/doi.org\/10.1109\/ICABME.2017.8167555","DOI":"10.1109\/ICABME.2017.8167555"},{"key":"602_CR53","doi-asserted-by":"publisher","first-page":"76","DOI":"10.3390\/fi11030076","volume":"11","author":"T Hyla","year":"2019","unstructured":"Hyla T, Peja\u015b J (2019) eHealth integrity model based on permissioned blockchain. Future Internet 11:76","journal-title":"Future Internet"},{"key":"602_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107344","volume":"178","author":"T Benil","year":"2020","unstructured":"Benil T, Jasper J (2020) Cloud based security on outsourcing using blockchain in E-health systems. Comput Netw 178:107344","journal-title":"Comput Netw"},{"key":"602_CR55","doi-asserted-by":"publisher","first-page":"66792","DOI":"10.1109\/ACCESS.2019.2917555","volume":"7","author":"DC Nguyen","year":"2019","unstructured":"Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2019) Blockchain for secure ehrs sharing of mobile cloud based e-health systems. IEEE access 7:66792\u201366806","journal-title":"IEEE access"},{"key":"602_CR56","doi-asserted-by":"publisher","unstructured":"Dakhel M, Hassan S (2020) A Secure Wireless Body Area Network for E-Health Application Using Blockchain. In: Khalaf M, Al-Jumeily D, Lisitsa A (eds) Applied Computing to Support Industry: Innovation and Technology. ACRIT 2019. Communications in Computer and Information Science, vol 1174. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-38752-5_31","DOI":"10.1007\/978-3-030-38752-5_31"},{"key":"602_CR57","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.aej.2023.04.037","volume":"73","author":"HN Alsuqaih","year":"2023","unstructured":"Alsuqaih HN, Hamdan W, Elmessiry H, Abulkasim H (2023) An efficient privacy-preserving control mechanism based on blockchain for E-health applications. Alexandria Engineering Journal 73:159\u2013172","journal-title":"Alexandria Engineering Journal"},{"key":"602_CR58","doi-asserted-by":"publisher","first-page":"7249","DOI":"10.1007\/s11042-023-15363-4","volume":"83","author":"C Dhasarathan","year":"2024","unstructured":"Dhasarathan C, Shanmugam M, Kumar M et al (2024) A nomadic multi-agent based privacy metrics for e-health care: a deep learning approach. Multimed Tools Appl 83:7249\u20137272. https:\/\/doi.org\/10.1007\/s11042-023-15363-4","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"602_CR59","doi-asserted-by":"publisher","first-page":"6337","DOI":"10.3390\/su15086337","volume":"15","author":"FA Reegu","year":"2023","unstructured":"Reegu FA, Abas H, Gulzar Y, Xin Q, Alwan AA, Jabbari A, Sonkamble RG, Dziyauddin RA (2023) Blockchain-Based Framework for Interoperable Electronic Health Records for an Improved Healthcare System. Sustainability 15(8):6337","journal-title":"Sustainability"},{"issue":"21","key":"602_CR60","doi-asserted-by":"publisher","first-page":"21398","DOI":"10.1109\/JIOT.2022.3181136","volume":"9","author":"L Qi","year":"2022","unstructured":"Qi L, Liu Y, Zhang Y, Xu X, Bilal M, Song H (2022) Privacy-Aware Point-of-Interest Category Recommendation in Internet of Things. IEEE Internet of Things Journal. 9(21):21398\u201321408. https:\/\/doi.org\/10.1109\/JIOT.2022.3181136","journal-title":"IEEE Internet of Things Journal."},{"key":"602_CR61","doi-asserted-by":"publisher","unstructured":"Liu Y, Zhou X, Kou H, Zhao Y, Xu X, Zhang X et al (2023) Privacy-preserving point-of-interest recommendation based on simplified graph convolutional network for geological traveling. AACM Transactions on Intelligent Systems and Technology. https:\/\/doi.org\/10.1145\/3620677.\u00a0Accepted on August 2023","DOI":"10.1145\/3620677"},{"key":"602_CR62","doi-asserted-by":"publisher","unstructured":"Hussain I, Tahir S, Humayun M, Almufareh MF, Jhanjhi\u00a0NZ, Qamar F (2022) Health Monitoring System Using Internet of Things (IoT) Sensing for Elderly People. 2022 14th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS). Karachi, p 1\u20135. https:\/\/doi.org\/10.1109\/MACS56771.2022.10023026","DOI":"10.1109\/MACS56771.2022.10023026"},{"key":"602_CR63","volume-title":"Applications of Case Study Research","author":"RK Yin","year":"2011","unstructured":"Yin RK (2011) Applications of Case Study Research. Sage, Newbury Park, CA, USA"},{"key":"602_CR64","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.jbi.2018.08.012","volume":"86","author":"H Cho","year":"2018","unstructured":"Cho H, Yen P-Y, Dowding D, Merrill JA, Schnall R (2018) A multi-level usability evaluation of mobile health applications: A case study. J Biomed Inform 86:79\u201389","journal-title":"J Biomed Inform"},{"key":"602_CR65","doi-asserted-by":"crossref","unstructured":"Mans RS, Schonenberg M, Song M, van der Aalst WM, Bakker PJ (2008) Application of process mining in healthcare\u2013a case study in a dutch hospital. International joint conference on biomedical engineering systems and technologies. p 425\u2013438. Virtual Event, February 9\u201311, 2022","DOI":"10.1007\/978-3-540-92219-3_32"},{"key":"602_CR66","doi-asserted-by":"crossref","unstructured":"Palos-S\u00e1nchez P, Saura JR, \u00c1lvarez-Garc\u00eda J (2019) Innovation and creativity in the mobile applications industry: a case study of mobile health applications (e-Health Apps) in Cultural and Creative Industries, ed: Springer 121\u2013135","DOI":"10.1007\/978-3-319-99590-8_7"},{"issue":"2","key":"602_CR67","doi-asserted-by":"publisher","first-page":"119","DOI":"10.4300\/JGME-D-11-00075.1","volume":"3","author":"GM Sullivan","year":"2011","unstructured":"Sullivan GM (2011) A primer on the validity of assessment instruments. J Grad Med Educ 3(2):119\u2013120","journal-title":"J Grad Med Educ"},{"key":"602_CR68","doi-asserted-by":"publisher","first-page":"400","DOI":"10.6007\/IJARBSS\/v7-i10\/3387","volume":"7","author":"LL Chan","year":"2017","unstructured":"Chan LL, Idris N (2017) Validity and reliability of the instrument using exploratory factor analysis and Cronbach\u2019s alpha. International Journal of Academic Research in Business and Social Sciences 7:400\u2013410","journal-title":"International Journal of Academic Research in Business and Social Sciences"},{"key":"602_CR69","doi-asserted-by":"publisher","unstructured":"Alhasan A, Audah L, Ibrahim I, Al-Sharaa A, Al-Ogaili AS, M. Mohammed, J (2022) A case-study to examine doctors\u2019 intentions to use IoT healthcare devices in Iraq during COVID-19 pandemic.\u00a0Int J Pervasive Comput Commun 18(5):527\u2013547. https:\/\/doi.org\/10.1108\/IJPCC-10-2020-0175","DOI":"10.1108\/IJPCC-10-2020-0175"},{"key":"602_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1478-4491-9-22","volume":"9","author":"F Vasset","year":"2011","unstructured":"Vasset F, Marnburg E, Furunes T (2011) The effects of performance appraisal in the Norwegian municipal health services: a case study. Hum Resour Health 9:1\u201312","journal-title":"Hum Resour Health"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00602-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00602-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00602-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,8]],"date-time":"2024-02-08T14:09:26Z","timestamp":1707401366000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00602-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,8]]},"references-count":70,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["602"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00602-2","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,8]]},"assertion":[{"value":"13 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"37"}}