{"id":"https://openalex.org/W4313341600","doi":"https://doi.org/10.1186/s13677-022-00373-8","title":"PMHE: a wearable medical sensor assisted framework for health care based on blockchain and privacy computing","display_name":"PMHE: a wearable medical sensor assisted framework for health care based on blockchain and privacy computing","publication_year":2022,"publication_date":"2022-12-17","ids":{"openalex":"https://openalex.org/W4313341600","doi":"https://doi.org/10.1186/s13677-022-00373-8"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-022-00373-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00373-8","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00373-8","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00373-8","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027650848","display_name":"Jindong Zhao","orcid":"https://orcid.org/0000-0002-4782-6796"},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jindong Zhao","raw_affiliation_strings":["School of Computer and Control Engineering, Yantai University, Yantai, 264005, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Control Engineering, Yantai University, Yantai, 264005, China","institution_ids":["https://openalex.org/I18452120"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103052940","display_name":"Wenshuo Wang","orcid":"https://orcid.org/0000-0002-1645-1549"},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenshuo Wang","raw_affiliation_strings":["School of Computer and Control Engineering, Yantai University, Yantai, 264005, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Control Engineering, Yantai University, Yantai, 264005, China","institution_ids":["https://openalex.org/I18452120"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100411794","display_name":"Dan Wang","orcid":"https://orcid.org/0000-0002-0921-2726"},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dan Wang","raw_affiliation_strings":["School of Computer and Control Engineering, Yantai University, Yantai, 264005, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Control Engineering, Yantai University, Yantai, 264005, China","institution_ids":["https://openalex.org/I18452120"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049151787","display_name":"Xu An Wang","orcid":"https://orcid.org/0000-0003-2070-4913"},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuan Wang","raw_affiliation_strings":["School of Computer and Control Engineering, Yantai University, Yantai, 264005, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Control Engineering, Yantai University, Yantai, 264005, China","institution_ids":["https://openalex.org/I18452120"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012935743","display_name":"Chunxiao Mu","orcid":"https://orcid.org/0000-0001-7393-3475"},"institutions":[{"id":"https://openalex.org/I18452120","display_name":"Yantai University","ror":"https://ror.org/01rp41m56","country_code":"CN","type":"education","lineage":["https://openalex.org/I18452120"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunxiao Mu","raw_affiliation_strings":["School of Computer and Control Engineering, Yantai University, Yantai, 264005, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Control Engineering, Yantai University, Yantai, 264005, China","institution_ids":["https://openalex.org/I18452120"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5027650848"],"corresponding_institution_ids":["https://openalex.org/I18452120"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":1.5914,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.87671557,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8191505670547485},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7375258803367615},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7040820121765137},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6901815533638},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.537514865398407},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4824276864528656},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.4583430290222168},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.4350033700466156},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13485810160636902}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8191505670547485},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7375258803367615},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7040820121765137},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6901815533638},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.537514865398407},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4824276864528656},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.4583430290222168},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.4350033700466156},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13485810160636902}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-022-00373-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00373-8","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00373-8","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d1054d7921f04d89b4fef8c6e7f034fd","is_oa":true,"landing_page_url":"https://doaj.org/article/d1054d7921f04d89b4fef8c6e7f034fd","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 11, Iss 1, Pp 1-17 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-022-00373-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00373-8","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00373-8","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4399999976158142}],"awards":[],"funders":[{"id":"https://openalex.org/F4320337088","display_name":"University of Nottingham Ningbo China","ror":"https://ror.org/03y4dt428"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4313341600.pdf","grobid_xml":"https://content.openalex.org/works/W4313341600.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W2031533839","https://openalex.org/W2295292576","https://openalex.org/W2525221147","https://openalex.org/W2768174108","https://openalex.org/W2801958627","https://openalex.org/W2811248283","https://openalex.org/W2903777941","https://openalex.org/W2962871006","https://openalex.org/W3103207359","https://openalex.org/W3132330025"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W4386732777","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4304136894","https://openalex.org/W2989851257","https://openalex.org/W2799059781"],"abstract_inverted_index":{"Abstract":[0],"Nowadays,":[1],"smart":[2,37,104,137,213,256],"medical":[3,17,38,45,257],"cloud":[4,39,124,258],"platforms":[5],"have":[6],"become":[7],"a":[8,44,255],"new":[9],"direction":[10],"in":[11,25,35,151,217,260],"the":[12,16,36,70,82,114,123,127,141,148,179,194,200,209,212,220,223,233,237,248,251],"industry.":[13],"However,":[14],"because":[15],"system":[18,224],"involves":[19],"personal":[20,63],"physiological":[21,64],"data,":[22],"user":[23,155,241],"privacy":[24,47,131,159,242],"data":[26,46,65,77,83,108,119,156,166,262],"transmission":[27],"and":[28,55,73,111,117,147,160,188,219,253],"processing":[29],"is":[30,109,120,174,215,225,243],"also":[31,175],"easy":[32],"to":[33,79,97,122,177,197,231],"leak":[34],"platform.":[40],"This":[41],"paper":[42],"proposed":[43],"preserving":[48],"framework":[49,61],"named":[50],"PMHE":[51],"based":[52],"on":[53,69,113,140,193],"blockchain":[54,75,142],"fully":[56,93,182],"homomorphic":[57,94,183],"encryption":[58,95,184],"technology.":[59],"The":[60,170],"receives":[62],"from":[66],"wearable":[67],"devices":[68],"client":[71,115,195],"side,":[72,116,196],"uses":[74,92],"as":[76],"storage":[78],"ensure":[80,198],"that":[81,181,199,240],"cannot":[84,267],"be":[85,264,268],"tampered":[86],"with":[87],"or":[88],"forged;":[89],"Besides,":[90],"it":[91],"method":[96],"design":[98,210],"disease":[99,145],"prediction":[100,201],"models":[101],"implemented":[102],"by":[103,134,164,190],"contracts.":[105],"In":[106,207],"PMHE,":[107],"encoded":[110],"encrypted":[112,118,154],"uploaded":[121],"platform":[125,143,165,259],"via":[126],"public":[128],"Internet,":[129],"preventing":[130],"leakage":[132,167],"caused":[133,163],"channel":[135],"eavesdropping;":[136],"contracts":[138],"run":[139],"for":[144],"prediction,":[146],"operators":[149],"participating":[150],"computing":[152],"are":[153,168,229],"too.":[157],"So,":[158],"security":[161],"issues":[162],"avoided.":[169],"client-to-cloud":[171],"interaction":[172],"protocol":[173],"designed":[176],"overcome":[178],"defect":[180],"only":[185],"supports":[186],"addition":[187],"multiplication":[189],"submitting":[191],"tuples":[192],"model":[202],"can":[203,263],"perform":[204],"complex":[205],"computing.":[206],"addition,":[208],"of":[211,222,236,250],"contract":[214],"introduced":[216],"detail,":[218],"performance":[221],"analyzed.":[226],"Finally,":[227],"experiments":[228],"conducted":[230],"verify":[232],"operating":[234],"effect":[235],"system,":[238],"ensuring":[239],"not":[244],"leaked":[245],"without":[246],"affecting":[247],"accuracy":[249],"model,":[252],"realizing":[254],"which":[261],"used":[265],"but":[266],"borrowed.":[269]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
