{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:28:49Z","timestamp":1760956129234,"version":"3.30.1"},"reference-count":35,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T00:00:00Z","timestamp":1653350400000},"content-version":"vor","delay-in-days":143,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.32604\/iasc.2022.018580","type":"journal-article","created":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T09:22:15Z","timestamp":1633857735000},"page":"1809-1823","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["TAR-AFT: A Framework to Secure Shared Cloud Data with Group Management"],"prefix":"10.32604","volume":"31","author":[{"given":"K.","family":"Ambika","sequence":"first","affiliation":[]},{"given":"M.","family":"Balasingh Moses","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.jnca.2016.11.027","article-title":"Cloud security issues and challenges: A survey","volume":"79","author":"Singh","year":"2017","journal-title":"Journal of Network and Computer Applications"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s40747-017-0040-1","article-title":"Big data for secure healthcare system: A conceptual design","volume":"3","author":"Sarkar","year":"2017","journal-title":"Complex and Intelligent Systems"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.comcom.2019.04.011","article-title":"Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges","volume":"140","author":"Ferrer","year":"2019","journal-title":"Computer Communications"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"165178","DOI":"10.1007\/s10916-014-0165-3","article-title":"Meeting the security requirements of electronic medical records in the ERA of high-speed computing","volume":"39","author":"Alanazi","year":"2015","journal-title":"Journal of Medical Systems"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-319-17272-9_4","article-title":"A new socio-technical model for studying health information technology in complex adaptive healthcare systems","volume":"14","author":"Sittig","year":"2015","journal-title":"Cognitive Informatics for Biomedicine"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"63","DOI":"10.3122\/jabfm.2015.S1.150133","article-title":"Electronic health record challenges, workarounds, and solutions observed in practices integrating behavioral health and primary care","volume":"28","author":"Cifuentes","year":"2015","journal-title":"The Journal of the American Board of Family Medicine"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/srep26094","article-title":"Deep patient: An unsupervised representation to predict the future of patients from the electronic health records","volume":"6","author":"Miotto","year":"2016","journal-title":"Scientific Reports"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1080","DOI":"10.1109\/TDSC.2019.2897675","article-title":"Privacy-preserving attribute-based keyword search in shared multi-owner setting","volume":"18","year":"2021","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1109\/ACCESS.2017.2767561","article-title":"Privacy preservation in e-healthcare environments: State of the art and future directions","volume":"6","author":"Sahi","year":"2017","journal-title":"IEEE Access"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1057\/s41303-016-0001-6","article-title":"Examining the intended and unintended consequences of organisational privacy safeguards","volume":"26","author":"Parks","year":"2017","journal-title":"European Journal of Information Systems"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1016\/j.future.2017.09.041","article-title":"Provably secure key-aggregate cryptosystems with auxiliary inputs for data sharing on the cloud","volume":"93","author":"Wang","year":"2019","journal-title":"Future Generation Computer Systems"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/978-3-030-02744-5_7","article-title":"Anonymous attribute-based conditional proxy re-encryption","volume":"12","author":"Mao","year":"2018","journal-title":"Lecture Notes in Computer Science"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1695","DOI":"10.3390\/s19071695","article-title":"Survey on revocation in ciphertext-policy attribute-based encryption","volume":"19","author":"Al-Dahhan","year":"2019","journal-title":"Sensors"},{"key":"ref14","first-page":"172","article-title":"Security and privacy of electronic health records: Concerns and challenges","volume":"22","author":"Keshta","year":"2020","journal-title":"Egyptian Informatics Journal"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-020-00246-4","article-title":"Privacy enforced access control model for secured data handling in cloud-based pervasive health care system","volume":"1","author":"Prince","year":"2020","journal-title":"SN Computer Science"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"106951","DOI":"10.1109\/ACCESS.2019.2931917","article-title":"Lightweight and privacy-preserving medical services access for healthcare cloud","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref17","first-page":"1","article-title":"Preserving confidentiality and privacy of the patient's EHR using the OrBAC and AES in cloud environment","volume":"12","author":"Babrahem","year":"2018","journal-title":"International Journal of Computers and Applications"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1016\/j.future.2018.12.044","article-title":"Privacy-friendly platform for healthcare data in cloud based on block chain environment","volume":"95","author":"Omar","year":"2019","journal-title":"Future Generation Computer Systems"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"8345","DOI":"10.1109\/JIOT.2019.2917186","article-title":"Achieving searchable and privacy-preserving data sharing for cloud-assisted E-healthcare system,\u201d","volume":"6","author":"Chang","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"37876","DOI":"10.1109\/ACCESS.2019.2906131","article-title":"A secure G-cloud-based framework for government healthcare services,","volume":"7","author":"Sharaf","year":"2017","journal-title":"IEEE Access"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.icte.2018.10.002","article-title":"An improved privacy preservation technique in health-cloud","volume":"5","author":"Kundalwal","year":"2019","journal-title":"ICT Express"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"3943","DOI":"10.1007\/s11042-019-7494-7","article-title":"Design an attribute based health record protection algorithm for healthcare services in cloud environment","volume":"79","author":"Mubarakali","year":"2020","journal-title":"Multimedia Tools and Applications"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.jksuci.2017.07.001","article-title":"BAMHealthcloud: A biometric authentication and data management system for healthcare data in cloud","volume":"32","author":"Shakil","year":"2020","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-981-13-0224-4_6","article-title":"Securing healthcare information over cloud using hybrid approach","volume":"12","author":"Modi","year":"2019","journal-title":"Progress in Advanced Computing and Intelligent Engineering"},{"key":"ref25","series-title":"Int. Conf. on Security, Privacy and Anonymity in Computation, Communication and Storage","first-page":"534","article-title":"Medibchain: A blockchain based privacy preserving platform for healthcare data","volume":"2","author":"Omar","year":"2017"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"5866","DOI":"10.1007\/s11227-019-02887-6","article-title":"Role-based policy to maintain privacy of patient health records in cloud","volume":"75","author":"Tembhare","year":"2019","journal-title":"The Journal of Supercomputing"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.jisa.2019.04.010","article-title":"A dual privacy-preservation scheme for cloud-based eHealth systems","volume":"47","author":"Wang","year":"2019","journal-title":"Journal of Information Security and Applications"},{"key":"ref28","first-page":"1","article-title":"Health care data privacy preserving efficient file retrieval from the cloud service provider using attribute based file encryption","volume":"1","author":"Deepa","year":"2020","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"ref29","first-page":"414","article-title":"Performance analysis of singularity and irregular detection in human health monitoring using lipchitz exponent function,\u201d","volume":"2","author":"Mathuvanesan","year":"2013","journal-title":"International Journal of Engineering Research and Technology"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"33552","DOI":"10.1109\/ACCESS.2018.2841972","article-title":"Anonymous authentication scheme for smart cloud based healthcare applications","volume":"6","author":"Mehmood","year":"2018","journal-title":"IEEE Access"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"342","DOI":"10.3103\/S0146411619040114","article-title":"Security protection of system sharing data with improved cp-abe encryption algorithm under cloud computing environment","volume":"53","author":"Shumin","year":"2019","journal-title":"Automation Control Computing, Science"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"372","DOI":"10.3390\/info11080372","article-title":"AES\u2013CP\u2013IDABE: A privacy protection framework against a dos attack in the cloud environment with the access control mechanism","volume":"11","author":"Chandel","year":"2020","journal-title":"Information"},{"key":"ref33","doi-asserted-by":"crossref","unstructured":"M. Li, S. Yu, Y. Zheng, K. Ren and W. Lou, \u201cScalable and secure sharing of personal health records in cloud computing using attribute-based encryption,\u201d IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131\u2013143, 2012.","DOI":"10.1109\/TPDS.2012.97"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"255","DOI":"10.18576\/amis\/120126","article-title":"Biometric encoding and biometric authentication (beba) protocol for secure cloud in m-commerce environment","volume":"12","author":"Arunprakash","year":"2018","journal-title":"Application of Mathematical Information Science"},{"key":"ref35","first-page":"161","article-title":"An expressive decentralizing kp-abe scheme with constant-size ciphertext","volume":"15","author":"Li","year":"2013","journal-title":"International Journal of Network Security"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/ueditor\/files\/iasc\/TSP_IASC-31-3\/TSP_IASC_18580\/TSP_IASC_18580.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T21:23:19Z","timestamp":1733520199000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/iasc\/v31n3\/44828"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022]]}},"URL":"https:\/\/doi.org\/10.32604\/iasc.2022.018580","relation":{},"ISSN":["1079-8587"],"issn-type":[{"type":"print","value":"1079-8587"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"2021-03-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-15","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-09","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}