{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T23:00:11Z","timestamp":1773097211885,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T00:00:00Z","timestamp":1770249600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T00:00:00Z","timestamp":1773014400000},"content-version":"vor","delay-in-days":32,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-026-00842-4","type":"journal-article","created":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T02:55:45Z","timestamp":1770260145000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing health data integrity using Distributed Ledger Technology"],"prefix":"10.1186","volume":"15","author":[{"given":"Joao","family":"Giao","sequence":"first","affiliation":[]},{"given":"Fernando","family":"Luis-Ferreira","sequence":"additional","affiliation":[]},{"given":"Joao","family":"Sarraipa","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Jardim-Gon\u00e7alves","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,5]]},"reference":[{"key":"842_CR1","doi-asserted-by":"publisher","unstructured":"Esposito C, De Santis A, Tortora G et al (2018) Blockchain: a panacea for healthcare cloud-based data security and privacy? IEEE Cloud Comput 5(1):31\u201337. https:\/\/doi.org\/10.1109\/mcc.2018.011791712","DOI":"10.1109\/mcc.2018.011791712"},{"key":"842_CR2","doi-asserted-by":"publisher","unstructured":"Liu C, Yang C, Zhang X et al (2015) External integrity verification for outsourced big data in cloud and IoT: a big picture. Future Gener Comput Syst 49:58\u201367. https:\/\/doi.org\/10.1016\/j.future.2014.08.007","DOI":"10.1016\/j.future.2014.08.007"},{"key":"842_CR3","doi-asserted-by":"publisher","unstructured":"Hathaliya JJ, Tanwar S (2020) An exhaustive survey on security and privacy issues in healthcare 4.0. Comput Commun 153:311\u2013335. https:\/\/doi.org\/10.1016\/j.comcom.2020.02.018","DOI":"10.1016\/j.comcom.2020.02.018"},{"key":"842_CR4","doi-asserted-by":"publisher","first-page":"40612","DOI":"10.1109\/access.2020.2976687","volume":"8","author":"AK Pandey","year":"2020","unstructured":"Pandey AK, Khan AI, Abushark YB et al (2020) Key issues in healthcare data integrity: analysis and recommendations. IEEE Access 8:40612\u201340628. https:\/\/doi.org\/10.1109\/access.2020.2976687","journal-title":"IEEE Access"},{"issue":"1","key":"842_CR5","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1109\/tnse.2018.2887236","volume":"7","author":"YJ Chen","year":"2020","unstructured":"Chen YJ, Wang LC, Wang S (2020) Stochastic blockchain for IoT data integrity. IEEE Trans on Network Sci Eng 7(1):373\u2013384. https:\/\/doi.org\/10.1109\/tnse.2018.2887236","journal-title":"IEEE Trans On Network Sci Eng"},{"key":"842_CR6","doi-asserted-by":"publisher","first-page":"164996","DOI":"10.1109\/access.2019.2952635","volume":"7","author":"H Wang","year":"2019","unstructured":"Wang H, Zhang J (2019) Blockchain based data integrity verification for large-scale IoT data. IEEE Access 7:164996\u2013165006. https:\/\/doi.org\/10.1109\/access.2019.2952635","journal-title":"IEEE Access"},{"key":"842_CR7","doi-asserted-by":"publisher","first-page":"19410","DOI":"10.1109\/access.2020.2968402","volume":"8","author":"MF Zia","year":"2020","unstructured":"Zia MF, Benbouzid M, Elbouchikhi E et al (2020) Microgrid Transactive energy: review, architectures, distributed ledger technologies, and market analysis. IEEE Access 8:19410\u201319432. https:\/\/doi.org\/10.1109\/access.2020.2968402","journal-title":"IEEE Access"},{"key":"842_CR8","unstructured":"European Commission (2020) Federated artificial intelligence solution for moniToring mental health status after cancer treatment. https:\/\/cordis.europa.eu\/project\/id\/875358"},{"issue":"2","key":"842_CR9","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.eij.2020.07.003","volume":"22","author":"I Keshta","year":"2021","unstructured":"Keshta I, Odeh A (2021) Security and privacy of electronic health records: concerns and challenges. Egypt Inf J 22(2):177\u2013183. https:\/\/doi.org\/10.1016\/j.eij.2020.07.003","journal-title":"Egypt Inf J"},{"issue":"7","key":"842_CR10","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1177\/14034948221083113","volume":"50","author":"AI Christensen","year":"2022","unstructured":"Christensen AI, Lau CJ, Kristensen PL et al (2022) 35 years of health surveys in Denmark: a backbone of public health practice and research. Scand J Public Health 50(7):914\u2013918. https:\/\/doi.org\/10.1177\/14034948221083113","journal-title":"Scand J Public Health"},{"key":"842_CR11","unstructured":"European Parliament and Council of European Union (2016 2016\/679) Regulation (EU). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/HTML\/?uri=CELEX:32016R0679%26from=EN"},{"key":"842_CR12","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-66r2","author":"J Marron","year":"2024","unstructured":"Marron J (2024) Implementing the health insurance portability and accountability act (HIPAA) security rule: a cybersecurity resource Guide. NIST Spec Publ (SP) NIST SP 800-66r2. https:\/\/doi.org\/10.6028\/nist.sp.800-66r2","journal-title":"NIST Spec Publ (SP) NIST SP 800-66r2"},{"key":"842_CR13","unstructured":"van Steen M, Tanenbaum A (2017) Distributed systems, 3rd edn edn. Maarten van Steen"},{"issue":"3","key":"842_CR14","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1049\/htl2.12008","volume":"8","author":"M Zarour","year":"2021","unstructured":"Zarour M, Alenezi M, Ansari MTJ et al (2021) Ensuring data integrity of healthcare information in the era of digital health. Healthcare Technol Lett 8(3):66\u201377. https:\/\/doi.org\/10.1049\/htl2.12008","journal-title":"Healthcare Technol Lett"},{"key":"842_CR15","doi-asserted-by":"publisher","unstructured":"Dhakal S, Jaafar F, Zavarsky P (2019) Private blockchain network for IoT device firmware integrity verification and update. In 2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE), IEEE, pp 164\u2013170). https:\/\/doi.org\/10.1109\/hase.2019.00033","DOI":"10.1109\/hase.2019.00033"},{"key":"842_CR16","doi-asserted-by":"crossref","unstructured":"Martin KM (2017) Everyday cryptography: fundamental principles and applications, 2nd edn edn. Oxford University Press. https:\/\/www.ebook.de\/de\/product\/28924485\/keith_m_martin_everyday_cryptography.html","DOI":"10.1093\/oso\/9780198788003.001.0001"},{"issue":"6","key":"842_CR17","doi-asserted-by":"publisher","first-page":"4729","DOI":"10.1109\/tsg.2023.3253723","volume":"14","author":"S Rath","year":"2023","unstructured":"Rath S, Nguyen LD, Sahoo S et al (2023) Self-healing secure blockchain framework in microgrids. IEEE Trans On Smart Grid 14(6):4729\u20134740. https:\/\/doi.org\/10.1109\/tsg.2023.3253723","journal-title":"IEEE Trans On Smart Grid"},{"key":"842_CR18","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3230013","volume-title":"Techreport, Cambridge Centre for alternative finance","author":"M Rauchs","year":"2018","unstructured":"Rauchs M, Glidden A, Gordon B et al (2018) Distributed ledger technology systems: a conceptual framework. In: Techreport, Cambridge Centre for alternative finance. University of Cambridge. https:\/\/doi.org\/10.2139\/ssrn.3230013"},{"issue":"14","key":"842_CR19","doi-asserted-by":"publisher","first-page":"11475","DOI":"10.1007\/s00521-020-05519-w","volume":"34","author":"I Yaqoob","year":"2021","unstructured":"Yaqoob I, Salah K, Jayaraman R et al (2021) Blockchain for healthcare data management: opportunities, challenges, and future recommendations. Neural Comput And Appl 34(14):11475\u201311490. https:\/\/doi.org\/10.1007\/s00521-020-05519-w","journal-title":"Neural Comput And Appl"},{"key":"842_CR20","doi-asserted-by":"publisher","unstructured":"Schnitzbauer M (2021) Smart contracts in healthcare. In: Glauner P, Plugmann P, Lerzynski G (eds) Digitalization in healthcare - implementing innovation and artificial intelligence, 1st edn. Springer Cham, pp 211\u2013223. https:\/\/doi.org\/10.1007\/978-3-030-65896-0_19","DOI":"10.1007\/978-3-030-65896-0_19"},{"key":"842_CR21","doi-asserted-by":"publisher","first-page":"51527","DOI":"10.1109\/access.2023.3279724","volume":"11","author":"MA Islam","year":"2023","unstructured":"Islam MA, Islam MA, Jacky MAH et al (2023) Distributed ledger technology based integrated healthcare solution for Bangladesh. IEEE Access 11:51527\u201351556. https:\/\/doi.org\/10.1109\/access.2023.3279724","journal-title":"IEEE Access"},{"issue":"1","key":"842_CR22","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/jsyst.2020.2963840","volume":"15","author":"PP Ray","year":"2021","unstructured":"Ray PP, Dash D, Salah K et al (2021) Blockchain for IoT-Based healthcare: background, consensus, platforms, and use cases. IEEE Syst J 15(1):85\u201394. https:\/\/doi.org\/10.1109\/jsyst.2020.2963840","journal-title":"IEEE Syst J"},{"issue":"12","key":"842_CR23","doi-asserted-by":"publisher","first-page":"3906","DOI":"10.14778\/3685800.3685815","volume":"17","author":"X Yang","year":"2024","unstructured":"Yang X, Yue C, Zhang W et al (2024) SecuDB: an In-enclave privacy-preserving and tamper-resistant relational database. Proc VLDB Endow 17(12):3906\u20133919. https:\/\/doi.org\/10.14778\/3685800.3685815","journal-title":"Proc VLDB Endow"},{"issue":"4","key":"842_CR24","doi-asserted-by":"publisher","first-page":"165","DOI":"10.3390\/bdcc7040165","volume":"7","author":"P Thantharate","year":"2023","unstructured":"Thantharate P, Thantharate A (2023) ZeroTrustBlock: enhancing security, privacy, and interoperability of sensitive data through ZeroTrust permissioned blockchain. Big Data and Cognit Comput 7(4):165. https:\/\/doi.org\/10.3390\/bdcc7040165","journal-title":"Big Data and Cognit Comput"},{"issue":"11","key":"842_CR25","doi-asserted-by":"publisher","first-page":"5174","DOI":"10.3390\/s23115174","volume":"23","author":"S Akbulut","year":"2023","unstructured":"Akbulut S, Semantha FH, Azam S et al (2023) Designing a private and secure personal health records access management system: a solution based on IOTA distributed ledger technology. Sensors 23(11):5174. https:\/\/doi.org\/10.3390\/s23115174","journal-title":"Sensors"},{"key":"842_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-023-03458-7","author":"F Moya","year":"2023","unstructured":"Moya F, Quesada FJ, Mart\u00ednez L et al (2023) Phonendo: a platform for publishing wearable data on distributed ledger technologies. Wireless Networks. https:\/\/doi.org\/10.1007\/s11276-023-03458-7","journal-title":"Wireless Networks"},{"key":"842_CR27","doi-asserted-by":"publisher","unstructured":"Jabbar R, Fetais N, Krichen M et al (2020) Blockchain technology for healthcare: enhancing shared electronic health record interoperability and integrity. In 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), IEEE, pp 310\u2013317). https:\/\/doi.org\/10.1109\/iciot48696.2020.9089570","DOI":"10.1109\/iciot48696.2020.9089570"},{"issue":"2","key":"842_CR28","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/mce.2021.3140048","volume":"12","author":"S Namasudra","year":"2023","unstructured":"Namasudra S, Sharma P, Crespo RG et al (2023) Blockchain-based medical certificate generation and verification for IoT-Based healthcare systems. IEEE Consum Electron Mag 12(2):83\u201393. https:\/\/doi.org\/10.1109\/mce.2021.3140048","journal-title":"IEEE Consum Electron Mag"},{"issue":"3","key":"842_CR29","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2753\/mis0742-1222240302","volume":"24","author":"K Peffers","year":"2007","unstructured":"Peffers K, Tuunanen T, Rothenberger MA et al (2007) A design Science research methodology for information systems research. J Manag Inf Syst 24(3):45\u201377. https:\/\/doi.org\/10.2753\/mis0742-1222240302","journal-title":"J Manag Inf Syst"},{"key":"842_CR30","doi-asserted-by":"publisher","unstructured":"Venable J, Pries-Heje J, Baskerville R (2016) FEDS: a framework for evaluation in design Science research. Eur J Inf Syst 25(1):77\u201389. https:\/\/doi.org\/10.1057\/ejis.2014.36","DOI":"10.1057\/ejis.2014.36"},{"key":"842_CR31","doi-asserted-by":"publisher","unstructured":"Herselman M, Botha A (2015) Evaluating an artifact in design Science research. In Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists. ACM, SAICSIT 15, pp 1\u201310). https:\/\/doi.org\/10.1145\/2815782.2815806","DOI":"10.1145\/2815782.2815806"},{"key":"842_CR32","doi-asserted-by":"publisher","unstructured":"Peffers K, Rothenberger M, Tuunanen T et al (2012) Design Science research evaluation. In: Chap design science research in information systems. Advances in theory and practice. Springer, Berlin Heidelberg, pp 398\u2013410. https:\/\/doi.org\/10.1007\/978-3-642-29863-9_29","DOI":"10.1007\/978-3-642-29863-9_29"},{"key":"842_CR33","doi-asserted-by":"publisher","unstructured":"Yang X, Zhang R, Yue C et al (2023) VeDB: a software and hardware enabled trusted relational database. Proc ACM on Manag Of Data 1(2):1\u201327. https:\/\/doi.org\/10.1145\/3589774","DOI":"10.1145\/3589774"},{"key":"842_CR34","doi-asserted-by":"publisher","unstructured":"Sim SH, Jeong YS (2021) Multi-blockchain-based IoT data processing techniques to ensure the integrity of IoT data in AIoT edge computing environments. Sensors 21(10):3515. https:\/\/doi.org\/10.3390\/s21103515","DOI":"10.3390\/s21103515"},{"key":"842_CR35","doi-asserted-by":"publisher","unstructured":"Yang X, Wang S, Li F et al (2022) Ubiquitous verification in centralized ledger database. In 2022 IEEE 38th International Conference on Data Engineering (ICDE), IEEE, pp 1808\u20131821). https:\/\/doi.org\/10.1109\/icde53745.2022.00181","DOI":"10.1109\/icde53745.2022.00181"},{"key":"842_CR36","unstructured":"go ethereum (2023) Clique signing. https:\/\/geth.ethereum.org\/docs\/tools\/clef\/clique-signing"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-026-00842-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00842-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00842-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T12:38:37Z","timestamp":1773059917000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13677-026-00842-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,5]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["842"],"URL":"https:\/\/doi.org\/10.1186\/s13677-026-00842-4","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,5]]},"assertion":[{"value":"9 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"34"}}