{"id":"https://openalex.org/W3173486987","doi":"https://doi.org/10.1155/2021/6685762","title":"A Blockchain\u2010Based Medical Data Sharing Mechanism with Attribute\u2010Based Access Control and Privacy Protection","display_name":"A Blockchain\u2010Based Medical Data Sharing Mechanism with Attribute\u2010Based Access Control and Privacy Protection","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3173486987","doi":"https://doi.org/10.1155/2021/6685762","mag":"3173486987"},"language":"en","primary_location":{"id":"doi:10.1155/2021/6685762","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6685762","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/6685762.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/wcmc/2021/6685762.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101637287","display_name":"Yingwen Chen","orcid":"https://orcid.org/0000-0002-8171-1861"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingwen Chen","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha 410073, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha 410073, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102862973","display_name":"Linghang Meng","orcid":"https://orcid.org/0009-0000-7384-8529"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linghang Meng","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha 410073, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha 410073, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084727631","display_name":"Huan Zhou","orcid":"https://orcid.org/0000-0003-2319-4103"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huan Zhou","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha 410073, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha 410073, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101490654","display_name":"Guangtao Xue","orcid":"https://orcid.org/0000-0002-1617-3593"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangtao Xue","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5084727631"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":9.9374,"has_fulltext":true,"cited_by_count":90,"citation_normalized_percentile":{"value":0.98469812,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"2021","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9846000075340271,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9686993360519409},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8424973487854004},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7051560878753662},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.7036737203598022},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5772314667701721},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5475378036499023},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.478280633687973},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.4690896272659302},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.42309021949768066},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.42141464352607727},{"id":"https://openalex.org/keywords/protection-mechanism","display_name":"Protection mechanism","score":0.4178478419780731},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3839268386363983},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.24404460191726685}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9686993360519409},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8424973487854004},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7051560878753662},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.7036737203598022},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5772314667701721},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5475378036499023},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.478280633687973},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.4690896272659302},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.42309021949768066},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.42141464352607727},{"id":"https://openalex.org/C2778717966","wikidata":"https://www.wikidata.org/wiki/Q4189076","display_name":"Protection mechanism","level":3,"score":0.4178478419780731},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3839268386363983},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.24404460191726685},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/6685762","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6685762","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/6685762.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:25f9094f5b10442a8b3359be6f849bd1","is_oa":true,"landing_page_url":"https://doaj.org/article/25f9094f5b10442a8b3359be6f849bd1","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/6685762","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6685762","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/6685762.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.41999998688697815,"display_name":"Partnerships for the goals"}],"awards":[{"id":"https://openalex.org/G2908394428","display_name":null,"funder_award_id":"62072306","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3125108443","display_name":null,"funder_award_id":"04301","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4499023235","display_name":"TWC: Small: Collaborative: Computation and Access Control on Big Multiuser Data","funder_award_id":"1421102","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5214302469","display_name":null,"funder_award_id":"2018YFB0204301","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3173486987.pdf","grobid_xml":"https://content.openalex.org/works/W3173486987.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W56293434","https://openalex.org/W790410098","https://openalex.org/W1529983430","https://openalex.org/W1542399824","https://openalex.org/W1596404826","https://openalex.org/W1992286709","https://openalex.org/W2024668293","https://openalex.org/W2041800668","https://openalex.org/W2109426455","https://openalex.org/W2110526464","https://openalex.org/W2135581534","https://openalex.org/W2154448764","https://openalex.org/W2467620307","https://openalex.org/W2522448907","https://openalex.org/W2594328737","https://openalex.org/W2755569472","https://openalex.org/W2797888814","https://openalex.org/W2800806089","https://openalex.org/W2809143401","https://openalex.org/W2811112224","https://openalex.org/W2908026007","https://openalex.org/W2910369831","https://openalex.org/W2919781810","https://openalex.org/W2921386448","https://openalex.org/W2936436865","https://openalex.org/W2945262612","https://openalex.org/W2961396908","https://openalex.org/W2967272750","https://openalex.org/W2973889821","https://openalex.org/W2977127134","https://openalex.org/W2981195730","https://openalex.org/W3011487163","https://openalex.org/W3012539654","https://openalex.org/W3046129398","https://openalex.org/W3086610005","https://openalex.org/W3090069470","https://openalex.org/W3098163344","https://openalex.org/W3112586499","https://openalex.org/W6679943185"],"related_works":["https://openalex.org/W3120813729","https://openalex.org/W3196150687","https://openalex.org/W2414507368","https://openalex.org/W2166798126","https://openalex.org/W2782785798","https://openalex.org/W1476128744","https://openalex.org/W4389950265","https://openalex.org/W49712274","https://openalex.org/W2341175789","https://openalex.org/W2948073055"],"abstract_inverted_index":{"The":[0,71,204,231,296],"rapid":[1],"development":[2],"of":[3,39,68,97,148,262,293,305],"wearable":[4],"sensors":[5],"and":[6,24,32,49,95,100,142,163,167,180,233,279,303],"the":[7,15,28,89,104,123,129,135,138,145,149,161,186,208,211,219,226,238,260,266,273,283,301],"5G":[8],"network":[9],"empowers":[10],"traditional":[11,72],"medical":[12,40,52,75,174,178,201,239,294],"treatment":[13],"with":[14,228],"ability":[16],"to":[17,57,80,111,133,193,197,216],"collect":[18],"patients\u2019":[19],"information":[20],"remotely":[21],"for":[22,45,65,103,115,131,173,199],"monitoring":[23],"diagnosing":[25],"purposes.":[26],"Meanwhile,":[27],"health\u2010related":[29],"mobile":[30],"apps":[31],"devices":[33],"also":[34,61],"generate":[35],"a":[36,62,83,119,169,256],"large":[37],"amount":[38],"data,":[41],"which":[42,59,152],"is":[43,54,60,107,153,191,241],"critical":[44],"promoting":[46],"disease":[47],"research":[48],"diagnosis.":[50],"However,":[51],"data":[53,76,117,175,181,195,202,220,240],"too":[55],"sensitive":[56],"share,":[58],"common":[63],"issue":[64],"IoT":[66],"(Internet":[67],"Things)":[69],"data.":[70,105,136],"centralized":[73],"cloud\u2010based":[74],"sharing":[77,176],"schemes":[78,90],"have":[79],"rely":[81],"on":[82],"single":[84],"trusted":[85],"third":[86],"party.":[87],"Therefore,":[88],"suffer":[91],"from":[92,252],"single\u2010point":[93],"failure":[94],"lack":[96],"privacy":[98,244],"protection":[99],"access":[101,134,213],"control":[102,214],"Blockchain":[106],"an":[108,113,249],"emerging":[109],"technique":[110,127],"provide":[112],"approach":[114],"managing":[116],"in":[118],"decentralized":[120],"manner.":[121],"Especially,":[122],"blockchain\u2010based":[124,170],"smart":[125,205],"contract":[126],"enables":[128],"programmability":[130],"participants":[132,147],"All":[137],"interactions":[139],"are":[140,308],"authenticated":[141],"recorded":[143],"by":[144,225,289],"other":[146],"blockchain":[150],"network,":[151],"tamper":[154],"resistant.":[155],"In":[156],"this":[157],"paper,":[158],"we":[159,286],"leverage":[160],"K\u2010anonymity":[162,232],"searchable":[164,234],"encryption":[165,235],"techniques":[166],"propose":[168],"privacy\u2010preserving":[171],"scheme":[172,275,307],"among":[177],"institutions":[179],"users.":[182],"To":[183],"be":[184,223],"specific,":[185],"consortium":[187],"blockchain,":[188],"Hyperledger":[189,263],"Fabric,":[190],"adopted":[192],"allow":[194],"users":[196],"search":[198],"encrypted":[200],"records.":[203],"contract,":[206],"i.e.,":[207,246],"chaincode,":[209],"implements":[210],"attribute\u2010based":[212],"mechanisms":[215],"guarantee":[217],"that":[218,237,272,300],"can":[221],"only":[222],"accessed":[224],"user":[227],"proper":[229],"attributes.":[230],"ensure":[236],"shared":[242],"without":[243],"leaking,":[245],"figuring":[247],"out":[248],"individual":[250],"patient":[251],"queries.":[253],"We":[254],"implement":[255],"prototype":[257],"system":[258],"using":[259],"chaincode":[261],"Fabric.":[264],"From":[265,282],"functional":[267],"perspective,":[268,285],"security":[269,277],"analysis":[270],"shows":[271],"proposed":[274],"satisfies":[276],"goals":[278],"precedes":[280],"others.":[281],"performance":[284,304],"conduct":[287],"experiments":[288],"simulating":[290],"different":[291],"numbers":[292],"institutions.":[295],"experimental":[297],"results":[298],"demonstrate":[299],"scalability":[302],"our":[306],"practical.":[309]},"counts_by_year":[{"year":2025,"cited_by_count":19},{"year":2024,"cited_by_count":26},{"year":2023,"cited_by_count":27},{"year":2022,"cited_by_count":16},{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
