{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:42:28Z","timestamp":1773247348302,"version":"3.50.1"},"reference-count":25,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2016YFB0800605"],"award-info":[{"award-number":["2016YFB0800605"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["61572080"],"award-info":[{"award-number":["61572080"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2016012"],"award-info":[{"award-number":["2016012"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2016YFB0800605"],"award-info":[{"award-number":["2016YFB0800605"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572080"],"award-info":[{"award-number":["61572080"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2016012"],"award-info":[{"award-number":["2016012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CCF and Venustech Research Program","award":["2016YFB0800605"],"award-info":[{"award-number":["2016YFB0800605"]}]},{"name":"CCF and Venustech Research Program","award":["61572080"],"award-info":[{"award-number":["61572080"]}]},{"name":"CCF and Venustech Research Program","award":["2016012"],"award-info":[{"award-number":["2016012"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>Mobile healthcare social networks (MHSN) integrated with connected medical sensors and cloud-based health data storage provide preventive and curative health services in smart cities. The fusion of social data together with real-time health data facilitates a novel paradigm of healthcare big data analysis. However, the collaboration of healthcare and social network service providers may pose a series of security and privacy issues. In this paper, we propose a secure health and social data sharing and collaboration scheme in MHSN. To preserve the data privacy, we realize secure and fine-grained health data and social data sharing with attribute-based encryption and identity-based broadcast encryption techniques, respectively, which allows patients to share their private personal data securely. In order to achieve enhanced data collaboration, we allow the healthcare analyzers to access both the reencrypted health data and the social data with authorization from the data owner based on proxy reencryption. Specifically, most of the health data encryption and decryption computations are outsourced from resource-constrained mobile devices to a health cloud, and the decryption of the healthcare analyzer incurs a low cost. The security and performance analysis results show the security and efficiency of our scheme.<\/jats:p>","DOI":"10.1155\/2017\/6426495","type":"journal-article","created":{"date-parts":[[2017,8,3]],"date-time":"2017-08-03T21:02:49Z","timestamp":1501794169000},"page":"1-12","source":"Crossref","is-referenced-by-count":46,"title":["Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0378-0941","authenticated-orcid":true,"given":"Qinlong","family":"Huang","sequence":"first","affiliation":[{"name":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China"},{"name":"National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8418-1897","authenticated-orcid":true,"given":"Licheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China"},{"name":"National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Yixian","family":"Yang","sequence":"additional","affiliation":[{"name":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China"},{"name":"National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.03.029"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2679740"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2013.6590046"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7224734"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2687618"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.01.009"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.09.003"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2013.84"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0429-4"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600267CM"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.01.009"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1387"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1556"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.09.021"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2017.03.002"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.027"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2485199"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.015"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.08.008"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/jcn.2011.6157409"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.3390\/s150922419"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.027"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-017-0462-0"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/6426495.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/6426495.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2017\/6426495.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T04:03:58Z","timestamp":1589774638000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2017\/6426495\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":25,"alternative-id":["6426495","6426495"],"URL":"https:\/\/doi.org\/10.1155\/2017\/6426495","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}