{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T06:44:51Z","timestamp":1775976291487,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Hunan Provincial Natural Science Regional Joint Fund","award":["2024JJ7237"],"award-info":[{"award-number":["2024JJ7237"]}]},{"name":"Key Scientific Research Project of Hunan Provincial Department of Education","award":["22A0617"],"award-info":[{"award-number":["22A0617"]}]},{"DOI":"10.13039\/501100010083","name":"Hunan Provincial Innovation Foundation For Postgraduate","doi-asserted-by":"crossref","award":["CXCX20231276"],"award-info":[{"award-number":["CXCX20231276"]}],"id":[{"id":"10.13039\/501100010083","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102223"],"award-info":[{"award-number":["62102223"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2021M691785"],"award-info":[{"award-number":["2021M691785"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01856-y","type":"journal-article","created":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T03:52:45Z","timestamp":1732938765000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A data encryption and file sharing framework among microservices-based edge nodes with blockchain"],"prefix":"10.1007","volume":"18","author":[{"given":"Weimin","family":"Li","sequence":"first","affiliation":[]},{"given":"ZiTong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhengmao","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Detian","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Haoyang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Wenxiong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,30]]},"reference":[{"issue":"11n12","key":"1856_CR1","doi-asserted-by":"publisher","first-page":"1661","DOI":"10.1142\/S0218194021400167","volume":"31","author":"Z Zhang","year":"2021","unstructured":"Zhang Z, Li B, Wang J, Liu Y (2021) An Approach of Automated Anomalous Microservice Ranking in Cloud-Native Environments. Int J Softw Eng Knowl Eng 31(11n12):1661\u20131681","journal-title":"Int J Softw Eng Knowl Eng"},{"key":"1856_CR2","doi-asserted-by":"crossref","unstructured":"Yu G, Huang Z, Chen P (2023) TraceRank: Abnormal service localization with dis-aggregated end-to-end tracing data in cloud native systems. J Softw Evol Process 35(10)","DOI":"10.1002\/smr.2413"},{"key":"1856_CR3","doi-asserted-by":"publisher","first-page":"107230","DOI":"10.1016\/j.infsof.2023.107230","volume":"160","author":"ET Nordli","year":"2023","unstructured":"Nordli ET, Haugeland SG, Nguyen PH, Song H, Chauvel F (2023) Migrating monoliths to cloud-native microservices for customizable SaaS. Inf Softw Technol 160:107230","journal-title":"Inf Softw Technol"},{"key":"1856_CR4","doi-asserted-by":"crossref","unstructured":"Throner S, H\u00fctter H, S\u00e4nger N, Schneider M, Hanselmann S, Petrovic P et\u00a0al (2021) An advanced DevOps environment for microservice-based applications. In: 2021 IEEE international conference on Service-Oriented System Engineering (SOSE). IEEE, pp 134\u2013143","DOI":"10.1109\/SOSE52839.2021.00020"},{"key":"1856_CR5","doi-asserted-by":"publisher","first-page":"110798","DOI":"10.1016\/j.jss.2020.110798","volume":"170","author":"M Waseem","year":"2020","unstructured":"Waseem M, Liang P, Shahin M (2020) A systematic mapping study on microservices architecture in devops. J Syst Softw 170:110798","journal-title":"J Syst Softw"},{"key":"1856_CR6","doi-asserted-by":"crossref","unstructured":"Utomo MTA, Hartanto R, Sulistyo S (2022) Smart City Service System Design Based On Microservice Architecture: Case Study in Magelang City. In: 2022 International Symposium on Information Technology and Digital Innovation (ISITDI). IEEE, 181\u2013187","DOI":"10.1109\/ISITDI55734.2022.9944498"},{"key":"1856_CR7","doi-asserted-by":"crossref","unstructured":"Singh J, Warraich J, Singh P (2021) A survey on load balancing techniques in fog computing. In: 2021 International Conference on Computing Sciences (ICCS). IEEE, pp 47\u201352","DOI":"10.1109\/ICCS54944.2021.00018"},{"key":"1856_CR8","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s00607-020-00896-5","volume":"103","author":"G Carvalho","year":"2021","unstructured":"Carvalho G, Cabral B, Pereira V, Bernardino J (2021) Edge computing: Current trends, research challenges and future directions. Computing 103:993\u20131023","journal-title":"Computing"},{"issue":"4","key":"1856_CR9","doi-asserted-by":"publisher","first-page":"2131","DOI":"10.1109\/COMST.2021.3106401","volume":"23","author":"Q Luo","year":"2021","unstructured":"Luo Q, Hu S, Li C, Li G, Shi W (2021) Resource Scheduling in Edge Computing: A Survey. IEEE Commun Surv Tutorials 23(4):2131\u20132165","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"5","key":"1856_CR10","doi-asserted-by":"publisher","first-page":"2840","DOI":"10.1007\/s12083-021-01107-4","volume":"14","author":"MA Gawas","year":"2021","unstructured":"Gawas MA, Patil HY, Govekar SS (2021) An integrative approach for secure data sharing in vehicular edge computing using Blockchain. Peer-to-Peer Netw Appl 14(5):2840\u20132857","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1856_CR11","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.future.2022.03.027","volume":"134","author":"A Das","year":"2022","unstructured":"Das A, Chakraborty S, Chakraborty S (2022) Where do all my smart home data go? Context-aware data generation and forwarding for edge-based microservices over shared IoT infrastructure. Future Gener Comput Syst 134:204\u2013218","journal-title":"Future Gener Comput Syst"},{"key":"1856_CR12","doi-asserted-by":"crossref","unstructured":"Zeng D, Geng H, Gu L, Li Z (2023) Layered Structure Aware Dependent Microservice Placement Toward Cost Efficient Edge Clouds. In: IEEE INFOCOM 2023 - IEEE Conference on Computer Communications. IEEE, pp. 1\u20139","DOI":"10.1109\/INFOCOM53939.2023.10229030"},{"key":"1856_CR13","unstructured":"Nakamoto S (2008) Bitcoin: A Peer-to-Peer Electronic Cash System. Consulted"},{"key":"1856_CR14","doi-asserted-by":"crossref","unstructured":"Gupta R, Gupta I, Singh AK, Saxena D, Lee CN (2022) An iot-centric data protection method for preserving security and privacy in cloud. IEEE Syst J","DOI":"10.1109\/JSYST.2022.3218894"},{"issue":"1","key":"1856_CR15","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/COMST.2022.3143147","volume":"24","author":"E Daniel","year":"2022","unstructured":"Daniel E, Tschorsch F (2022) IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks. IEEE Commun Surv Tutorials 24(1):31\u201352","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1856_CR16","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1007\/s11036-020-01624-1","volume":"26","author":"L Liu","year":"2021","unstructured":"Liu L, Chen C, Pei Q, Maharjan S, Zhang Y (2021) Vehicular edge computing and networking: A survey. Mob Netw Appl 26:1145\u20131168","journal-title":"Mob Netw Appl"},{"issue":"10","key":"1856_CR17","doi-asserted-by":"publisher","first-page":"6564","DOI":"10.1109\/TII.2020.2974537","volume":"16","author":"M Li","year":"2020","unstructured":"Li M, Hu D, Lal C, Conti M, Zhang Z (2020) Blockchain-enabled secure energy trading with verifiable fairness in industrial Internet of Things. IEEE Trans Ind Inf 16(10):6564\u20136574","journal-title":"IEEE Trans Ind Inf"},{"issue":"2","key":"1856_CR18","first-page":"100067","volume":"3","author":"H Guo","year":"2022","unstructured":"Guo H, Yu X (2022) A survey on blockchain technology and its security. Blockchain: Res Appl 3(2):100067","journal-title":"Blockchain: Res Appl"},{"key":"1856_CR19","doi-asserted-by":"crossref","unstructured":"Al-Doghman F, Moustafa N, Khalil I, Tari Z, Zomaya A (2022) AI-enabled secure microservices in edge computing: Opportunities and challenges. IEEE Trans Serv Comput","DOI":"10.1109\/TSC.2022.3155447"},{"key":"1856_CR20","doi-asserted-by":"publisher","first-page":"106449","DOI":"10.1016\/j.infsof.2020.106449","volume":"131","author":"S Li","year":"2021","unstructured":"Li S, Zhang H, Jia Z, Zhong C, Zhang C, Shan Z et al (2021) Understanding and addressing quality attributes of microservices architecture: A Systematic literature review. Inf Softw Technol 131:106449","journal-title":"Inf Softw Technol"},{"issue":"10","key":"1856_CR21","doi-asserted-by":"publisher","first-page":"3716","DOI":"10.1109\/TSE.2021.3102982","volume":"48","author":"D L\u00f3pez-Fern\u00e1ndez","year":"2022","unstructured":"L\u00f3pez-Fern\u00e1ndez D, D\u00edaz J, Garcia J, P\u00e9rez J, Gonz\u00e1lez-Prieto \u00c1 (2022) DevOps Team Structures: Characterization and Implications. IEEE Trans Software Eng 48(10):3716\u20133736","journal-title":"IEEE Trans Software Eng"},{"key":"1856_CR22","doi-asserted-by":"crossref","unstructured":"Zhou X, Huang H, Zhang H, Huang X, Shao D, Zhong C (2022) A Cross-Company Ethnographic Study on Software Teams for DevOps and Microservices: Organization, Benefits, and Issues. In: 44th IEEE\/ACM International Conference on Software Engineering: Software Engineering in Practice, ICSE (SEIP). IEEE, pp. 1\u201310","DOI":"10.1145\/3510457.3513054"},{"issue":"1","key":"1856_CR23","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/COMST.2022.3143147","volume":"24","author":"E Daniel","year":"2022","unstructured":"Daniel E, Tschorsch F (2022) IPFS and friends: A qualitative comparison of next generation peer-to-peer data networks. IEEE Commun Surv Tutorials 24(1):31\u201352","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"2","key":"1856_CR24","doi-asserted-by":"publisher","first-page":"154","DOI":"10.26599\/BDMA.2022.9020014","volume":"6","author":"X Sun","year":"2023","unstructured":"Sun X, He Y, Wu D, Huang JZ (2023) Survey of distributed computing frameworks for supporting big data analysis. Big Data Min Anal 6(2):154\u2013169","journal-title":"Big Data Min Anal"},{"issue":"5","key":"1856_CR25","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.3390\/electronics12051145","volume":"12","author":"Z Chen","year":"2023","unstructured":"Chen Z, Jiang Y, Song X, Chen L (2023) A survey on zero-knowledge authentication for internet of things. Electronics 12(5):1145","journal-title":"Electronics"},{"issue":"1","key":"1856_CR26","first-page":"14","volume":"2015","author":"M Fowler","year":"2015","unstructured":"Fowler M, Lewis J (2015) Microservices: Nur ein weiteres Konzept in der Softwarearchitektur oder mehr. Objektspektrum 2015(1):14\u201320","journal-title":"Objektspektrum"},{"key":"1856_CR27","doi-asserted-by":"publisher","first-page":"111061","DOI":"10.1016\/j.jss.2021.111061","volume":"182","author":"M Waseem","year":"2021","unstructured":"Waseem M, Liang P, Shahin M, Salle AD, M\u00e1rquez G (2021) Design, monitoring, and testing of microservices systems: The practitioners\u2019 perspective. J Syst Softw 182:111061","journal-title":"J Syst Softw"},{"key":"1856_CR28","doi-asserted-by":"crossref","unstructured":"Cern\u00fd T, Abdelfattah AS, Bushong V, Maruf AA, Taibi D (2022) Microservice Architecture Reconstruction and Visualization Techniques: A Review. In: IEEE international conference on Service-Oriented System Engineering, SOSE. IEEE, pp 39\u201348","DOI":"10.1109\/SOSE55356.2022.00011"},{"issue":"11","key":"1856_CR29","doi-asserted-by":"publisher","first-page":"5507","DOI":"10.3390\/app12115507","volume":"12","author":"M S\u00f6ylemez","year":"2022","unstructured":"S\u00f6ylemez M, Tekinerdogan B, Koluk\u0131sa Tarhan A (2022) Challenges and solution directions of microservice architectures: A systematic literature review. Appl Sci 12(11):5507","journal-title":"Appl Sci"},{"key":"1856_CR30","doi-asserted-by":"crossref","unstructured":"Son SC, Ko S, Lee H, Lee S, Lee BT (2023) SIMA: Scalable IoT microservice architecture with users and things joint load balancing. IEEE Internet Things J","DOI":"10.1109\/JIOT.2023.3317430"},{"key":"1856_CR31","unstructured":"Khan MG, Taheri J, Al-Dulaimy A, Kassler A (2021) PerfSim: A performance simulator for cloud native microservice chains. IEEE Trans Cloud Comput"},{"issue":"3","key":"1856_CR32","doi-asserted-by":"publisher","first-page":"3119","DOI":"10.1109\/TNSM.2022.3232503","volume":"20","author":"B Tang","year":"2023","unstructured":"Tang B, Guo F, Cao B, Tang M, Li K (2023) Cost-Aware Deployment of Microservices for IoT Applications in Mobile Edge Computing Environment. IEEE Trans Netw Serv Manag 20(3):3119\u20133134","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"5","key":"1856_CR33","doi-asserted-by":"publisher","first-page":"3523","DOI":"10.1109\/TSC.2023.3292362","volume":"16","author":"A Samanta","year":"2023","unstructured":"Samanta A, Pham Q, Dao N, Muthanna A, Cho S (2023) mISO: Incentivizing Demand-Agnostic Microservices for Edge-Enabled IoT Networks. IEEE Trans Serv Comput 16(5):3523\u20133536","journal-title":"IEEE Trans Serv Comput"},{"key":"1856_CR34","doi-asserted-by":"crossref","unstructured":"Rahmanian A, Ali-Eldin A, Skubic B, Elmroth E (2022) MicroSplit: Efficient Splitting of Microservices on Edge Clouds. In: 7th IEEE\/ACM Symposium on Edge Computing, SEC 2022. IEEE, pp 252\u2013264","DOI":"10.1109\/SEC54971.2022.00027"},{"key":"1856_CR35","unstructured":"Sheldon R (2021) A timeline and history of blockchain technology. https:\/\/www.techtarget.com\/whatis\/feature\/A-timeline-and-history-of-blockchain-technology"},{"issue":"37","key":"1856_CR36","first-page":"2","volume":"3","author":"V Buterin","year":"2014","unstructured":"Buterin V et al (2014) A next-generation smart contract and decentralized application platform. White Paper 3(37):2\u20131","journal-title":"White Paper"},{"key":"1856_CR37","doi-asserted-by":"crossref","unstructured":"Aggarwal S, Kumar N (2021) Hyperledger. In: Advances in computers, vol. 121. Elsevier, pp 323\u2013343","DOI":"10.1016\/bs.adcom.2020.08.016"},{"key":"1856_CR38","unstructured":"Cachin C et\u00a0al (2016) Architecture of the hyperledger blockchain fabric. In: Workshop on distributed cryptocurrencies and consensus ledgers, vol. 310. Chicago, IL, pp 1\u20134"},{"key":"1856_CR39","first-page":"102559","volume":"54","author":"K Sowjanya","year":"2020","unstructured":"Sowjanya K, Dasgupta M (2020) A ciphertext-policy Attribute based encryption scheme for wireless body area networks based on ECC. J Inf Secur Appl 54:102559","journal-title":"J Inf Secur Appl"},{"key":"1856_CR40","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.future.2022.01.017","volume":"131","author":"N Deepa","year":"2022","unstructured":"Deepa N, Pham QV, Nguyen DC, Bhattacharya S, Prabadevi B, Gadekallu TR et al (2022) A survey on blockchain for big data: Approaches, opportunities, and future directions. Future Gener Comput Syst 131:209\u2013226","journal-title":"Future Gener Comput Syst"},{"key":"1856_CR41","doi-asserted-by":"crossref","unstructured":"Chen F, Wang J, Jiang C, Xiang T, Yang Y (2022) Blockchain based non-repudiable iot data trading: Simpler, faster, and cheaper. In: IEEE INFOCOM 2022-IEEE Conference on Computer Communications. IEEE. pp 1958\u20131967","DOI":"10.1109\/INFOCOM48880.2022.9796857"},{"issue":"13","key":"1856_CR42","doi-asserted-by":"publisher","first-page":"10434","DOI":"10.1109\/JIOT.2021.3121678","volume":"9","author":"Y Yang","year":"2021","unstructured":"Yang Y, Chen Y, Chen F, Chen J (2021) Identity-based cloud storage auditing for data sharing with access control of sensitive information. IEEE Internet Things J 9(13):10434\u201310445","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"1856_CR43","doi-asserted-by":"publisher","first-page":"1416","DOI":"10.1109\/TII.2020.2982942","volume":"17","author":"C Huang","year":"2020","unstructured":"Huang C, Liu D, Ni J, Lu R, Shen X (2020) Achieving accountable and efficient data sharing in industrial internet of things. IEEE Trans Ind Inf 17(2):1416\u20131427","journal-title":"IEEE Trans Ind Inf"},{"key":"1856_CR44","doi-asserted-by":"crossref","unstructured":"Fiege U, Fiat A, Shamir A (1987) Zero knowledge proofs of identity. In: Proceedings of the nineteenth annual ACM symposium on Theory of computing, pp 210\u2013217","DOI":"10.1145\/28395.28419"},{"key":"1856_CR45","doi-asserted-by":"crossref","unstructured":"Kouicem DE, Bouabdallah A, Lakhlef H (2020) An efficient and anonymous blockchain-based data sharing scheme for vehicular networks. In: 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE, pp 1\u20136","DOI":"10.1109\/ISCC50000.2020.9219641"},{"key":"1856_CR46","doi-asserted-by":"crossref","unstructured":"Manzoor A, Braeken A, Kanhere SS, Ylianttila M, Liyanage M (2021) Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain. J Netw Comput Appl 176:102917","DOI":"10.1016\/j.jnca.2020.102917"},{"key":"1856_CR47","doi-asserted-by":"publisher","first-page":"102318","DOI":"10.1016\/j.cose.2021.102318","volume":"107","author":"E Chen","year":"2021","unstructured":"Chen E, Zhu Y, Zhu G, Liang K, Feng R (2021) How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors. Comput Secur 107:102318","journal-title":"Comput Secur"},{"key":"1856_CR48","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.future.2022.11.010","volume":"141","author":"S Peng","year":"2023","unstructured":"Peng S, Bao W, Liu H, Xiao X, Shang J, Han L et al (2023) A peer-to-peer file storage and sharing system based on consortium blockchain. Future Gener Comput Syst 141:197\u2013204","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"1856_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3372136","volume":"53","author":"L Lao","year":"2020","unstructured":"Lao L, Li Z, Hou S, Xiao B, Guo S, Yang Y (2020) A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling. ACM Comput Surv (CSUR) 53(1):1\u201332","journal-title":"ACM Comput Surv (CSUR)"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01856-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01856-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01856-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:32:47Z","timestamp":1747474367000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01856-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,30]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1856"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01856-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,30]]},"assertion":[{"value":"3 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"This work does not involve any work related to ethics.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All authors consent to publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"24"}}