{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T12:58:23Z","timestamp":1771851503499,"version":"3.50.1"},"reference-count":27,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.32604\/iasc.2023.025719","type":"journal-article","created":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T05:57:26Z","timestamp":1654495046000},"page":"243-259","source":"Crossref","is-referenced-by-count":7,"title":["Novel Block Chain Technique for Data Privacy and Access Anonymity in Smart Healthcare"],"prefix":"10.32604","volume":"35","author":[{"given":"J.","family":"Priya","sequence":"first","affiliation":[]},{"given":"C.","family":"Palanisamy","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ipm.2021.102535","article-title":"hOCBS: A privacy-preserving blockchain framework for healthcare data leveraging an on-chain and off-chain system design","volume":"58","author":"Miyachi","year":"2021","journal-title":"Information Processing & Management"},{"key":"ref2","series-title":"Proc. IEEE Int. Conf. on Computational Performance Evaluation (ComPE)","first-page":"386","article-title":"A blockchain based secured healthcare framework","author":"Quasim","year":"2020"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11227-021-03637-3","article-title":"An intelligent internet of things-based secure healthcare framework using blockchain technology with an optimal deep learning model","volume":"77","author":"Veeramakali","year":"2021","journal-title":"The Journal of Supercomputing"},{"key":"ref4","series-title":"Proc. Int. Conf. on Telecommunications and Signal Processing (TSP)","first-page":"135","article-title":"Optimized blockchain model for internet of things based healthcare applications","author":"Dwivedi","year":"2019"},{"key":"ref5","series-title":"Proc. IEEE Canadian Conf. of Electrical and Computer Engineering (CCECE)","first-page":"1","article-title":"Blockchain-based privacy-preserving healthcare architecture","author":"Hossein","year":"2019"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/cpe.6369","article-title":"Blockchain-based framework for secured storage, sharing, and querying of electronic healthcare records","volume":"33","author":"Kaur","year":"2021","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"11717","DOI":"10.1109\/JIOT.2021.3058946","article-title":"Fortified-chain: A blockchain based framework for security and privacy assured internet of medical things with effective access control","volume":"8","author":"Egala","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref8","first-page":"1","article-title":"MedChain: Efficient healthcare data sharing via blockchain","volume":"9","author":"Shen","year":"2019","journal-title":"Applied Sciences"},{"key":"ref9","first-page":"421","article-title":"Healthcare information exchange using blockchain technology","volume":"10","author":"Murugan","year":"2020","journal-title":"International Journal of Electrical and Computer Engineering"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"11743","DOI":"10.1109\/JIOT.2021.3058953","article-title":"BEdgeHealth: A decentralized architecture for edge-based iomt networks using blockchain","volume":"8","author":"Nguyen","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2020\/4960964","article-title":"Preserving data privacy in the internet of medical things using dual signature ECDSA","volume":"2020","author":"Cano","year":"2020","journal-title":"Security and Communication Networks"},{"key":"ref12","first-page":"1","article-title":"Healthcare and fitness data management using the iot-based blockchain platform","volume":"2021","author":"Frikha","year":"2021","journal-title":"Journal of Healthcare Engineering"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/su12176960","article-title":"A lightweight authentication and authorization framework for blockchain-enabled IoT network in health-informatics","volume":"12","author":"Tahir","year":"2020","journal-title":"Sustainability"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/JSYST.2020.2963840","article-title":"Blockchain for IoT-based healthcare: Background, consensus, platforms, and use cases","volume":"15","author":"Ray","year":"2020","journal-title":"IEEE Systems Journal"},{"key":"ref15","series-title":"Proc. Int. Conf. on Advanced Information and Communication Technology (ICAICT)","first-page":"35","article-title":"Permission-based blockchain with proof of authority for secured healthcare data sharing","author":"Al Asad","year":"2020"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1016\/j.future.2019.09.028","article-title":"Blockchain data-based cloud data integrity protection mechanism","volume":"102","author":"Wei","year":"2020","journal-title":"Future Generation Computer Systems"},{"key":"ref17","series-title":"Proc. 5th Int. Conf. on Internet of Things, Big Data and Security (IoTBDS 2020)","first-page":"349","article-title":"A framework for data sharing between healthcare providers using blockchain","author":"Alzahrani","year":"2020"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2019\/8315614","article-title":"Blockchain-based access control model to preserve privacy for personal health record systems","volume":"2019","author":"Thwin","year":"2019","journal-title":"Security and Communication Networks"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1016\/j.future.2018.12.044","article-title":"Privacy-friendly platform for healthcare data in cloud based on blockchain environment","volume":"95","author":"Al Omar","year":"2019","journal-title":"Future Generation Computer Systems"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"8770","DOI":"10.1109\/JIOT.2019.2923525","article-title":"Healthchain: A blockchain-based privacy preserving scheme for large-scale health data","volume":"6","author":"Xu","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"241","DOI":"10.3233\/KES-190415","article-title":"Fine-grained k-anonymity for privacy preserving in cloud","volume":"23","author":"Arava","year":"2019","journal-title":"International Journal of Knowledge-Based and Intelligent Engineering Systems"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1007\/s00521-018-3915-1","article-title":"Securing e-health records using keyless signature infrastructure blockchain technology in the cloud","volume":"32","author":"Nagasubramanian","year":"2020","journal-title":"Neural Computing and Applications"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.comcom.2020.04.057","article-title":"Suppressed k-anonymity multi-factor authentication based schmidt-Samoa cryptography for privacy preserved data access in cloud computing","volume":"158","author":"Prabha","year":"2020","journal-title":"Computer Communications"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.compeleceng.2020.106782","article-title":"Seamless secure anonymous authentication for cloud-based mobile edge computing","volume":"87","author":"Deebak","year":"2020","journal-title":"Computers & Electrical Engineering"},{"key":"ref25","first-page":"3197","article-title":"Rider optimization algorithm (ROA): An optimization solution for engineering problem","volume":"12","author":"Rahul","year":"2021","journal-title":"Turkish Journal of Computer and Mathematics Education (TURCOMAT)"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.ins.2019.02.038","article-title":"Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain","volume":"485","author":"Cao","year":"2019","journal-title":"Information Sciences"},{"key":"ref27","series-title":"Proc. IEEE 23rd Int. Conf. on Data Engineering","first-page":"106","article-title":"T-Closeness: Privacy beyond k-anonymity and l-diversity","author":"Li","year":"2007"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/ueditor\/files\/iasc\/TSP_IASC-35-1\/TSP_IASC_25719\/TSP_IASC_25719.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T21:28:22Z","timestamp":1733520502000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/iasc\/v35n1\/48122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.32604\/iasc.2023.025719","relation":{},"ISSN":["1079-8587"],"issn-type":[{"value":"1079-8587","type":"print"}],"subject":[],"published":{"date-parts":[[2023]]}}}