{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:40:10Z","timestamp":1758987610633,"version":"3.44.0"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-01997-8","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T17:53:32Z","timestamp":1749491612000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deep learning and blockchain-based secure authentication protocol for privacy protection in cloud environments"],"prefix":"10.1007","volume":"18","author":[{"given":"Kalaiselvi","family":"Subbarayan","sequence":"first","affiliation":[]},{"given":"Bindu","family":"Garikapati","sequence":"additional","affiliation":[]},{"given":"Sivakumar","family":"Chinnavel","sequence":"additional","affiliation":[]},{"given":"Velliangiri","family":"Sarveshwaran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,9]]},"reference":[{"key":"1997_CR1","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1377\/hlthaff.2014.0041","volume":"33","author":"DW Bates","year":"2014","unstructured":"Bates DW, Saria S, Ohno-Machado L, Shah A, Escobar G (2014) Big data in health care: using analytics to identify and manage high-risk and high-cost patients. Health Affairs 33:1123\u20131131","journal-title":"Health Affairs"},{"key":"1997_CR2","doi-asserted-by":"crossref","first-page":"173904","DOI":"10.1109\/ACCESS.2020.3025898","volume":"8","author":"CT Li","year":"2020","unstructured":"Li CT, Shih DH, Wang CC, Chen CL, Lee CC (2020) A blockchain based data aggregation and group authentication scheme for electronic medical system. IEEE Access 8:173904\u2013173917","journal-title":"IEEE Access"},{"key":"1997_CR3","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/j.future.2021.05.023","volume":"124","author":"Z Chen","year":"2021","unstructured":"Chen Z, Xu W, Wang B, Yu H (2021) A blockchain-based preserving and sharing system for medical data privacy. Future Gen Comput Syst 124:338\u2013350","journal-title":"Future Gen Comput Syst"},{"key":"1997_CR4","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MC.2017.3571047","volume":"50","author":"P Treleaven","year":"2017","unstructured":"Treleaven P, Brown RG, Yang D (2017) Blockchain technology in finance. Computer 50:14\u201317","journal-title":"Computer"},{"key":"1997_CR5","first-page":"1","volume":"17","author":"H Wu","year":"2021","unstructured":"Wu H, Dwivedi AD, Srivastava G (2021) Security and privacy of patient information in medical systems based on blockchain technology. ACM Trans Multimed Comput Commun Appl (TOMM) 17:1\u201317","journal-title":"ACM Trans Multimed Comput Commun Appl (TOMM)"},{"key":"1997_CR6","first-page":"103787","volume":"83","author":"MM Mathews","year":"2024","unstructured":"Mathews MM, Panchami V (2024) QS-Auth: a quantum-secure mutual authentication protocol based on PUF and post-quantum signature for heterogeneous delay-tolerant networks. J Inf Secur Appl 83:103787","journal-title":"J Inf Secur Appl"},{"key":"1997_CR7","doi-asserted-by":"crossref","first-page":"41678","DOI":"10.1109\/ACCESS.2019.2904300","volume":"7","author":"F Tang","year":"2019","unstructured":"Tang F, Ma S, Xiang Y, Lin C (2019) An efficient authentication scheme for blockchain-based electronic health records. IEEE Access 7:41678\u201341689","journal-title":"IEEE Access"},{"key":"1997_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JSEN.2020.3014328","volume":"20","author":"M Kim","year":"2020","unstructured":"Kim M, Yu S, Lee J, Park Y, Park Y (2020) Design of secure protocol for cloud-assisted electronic health record system using blockchain. Sensors 20:1\u201321","journal-title":"Sensors"},{"key":"1997_CR9","first-page":"103806","volume":"84","author":"AK Roy","year":"2024","unstructured":"Roy AK, Varadaranjan V, Nath K (2024) Efficient handover authentication protocol with message integrity for mobile clients in wireless mesh networks. J Inf Secur Appl 84:103806","journal-title":"J Inf Secur Appl"},{"key":"1997_CR10","doi-asserted-by":"crossref","unstructured":"Chen CM, Deng X, Kumar S, Kumari S, Islam SH (2021) Blockchain-based medical data sharing schedule guaranteeing security of individual entities. J Ambient Intell Humaniz Comput 1-10","DOI":"10.1007\/s12652-021-03448-7"},{"issue":"3","key":"1997_CR11","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1007\/s11219-024-09669-1","volume":"32","author":"U \u015eener","year":"2024","unstructured":"\u015eener U, G\u00f6kalp E, Eren PE (2024) CLOUD-QM: a quality model for benchmarking cloud-based enterprise information systems. Softw Qual J 32(3):881\u2013920","journal-title":"Softw Qual J"},{"key":"1997_CR12","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1038\/548523c","volume":"548","author":"Z Baynham-Herd","year":"2017","unstructured":"Baynham-Herd Z (2017) Enlist blockchain to boost conservation. Nature 548:523\u2013523","journal-title":"Nature"},{"key":"1997_CR13","doi-asserted-by":"crossref","first-page":"102080","DOI":"10.1016\/j.scs.2020.102080","volume":"56","author":"I Al Ridhawi","year":"2020","unstructured":"Al Ridhawi I, Otoum S, Aloqaily M, Jararweh Y, Baker T (2020) Providing secure and reliable communication for next generation networks in smart cities. Sustain Cities Soc 56:102080","journal-title":"Sustain Cities Soc"},{"key":"1997_CR14","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/978-3-642-16161-2_6","volume-title":"Proceedings of Security and Privacy in Communication Networks: 6th International ICST Conference","author":"M Li","year":"2010","unstructured":"Li M, Yu S, Ren K, Lou W (2010) Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Proceedings of Security and Privacy in Communication Networks: 6th International ICST Conference. pp 89\u2013106"},{"key":"1997_CR15","doi-asserted-by":"crossref","first-page":"100568","DOI":"10.1016\/j.cosrev.2023.100568","volume":"49","author":"S Ahmad","year":"2023","unstructured":"Ahmad S, Shakeel I, Mehfuz S, Ahmad J (2023) Deep learning models for cloud, edge, fog, and IoT computing paradigms: survey, recent advances, and future directions. Comput Sci Rev 49:100568","journal-title":"Comput Sci Rev"},{"key":"1997_CR16","doi-asserted-by":"crossref","first-page":"192177","DOI":"10.1109\/ACCESS.2020.3032680","volume":"8","author":"S Son","year":"2020","unstructured":"Son S, Lee J, Kim M, Yu S, Das AK, Park Y (2020) Design of secure authentication protocol for cloud-assisted telecare medical information system using blockchain. IEEE Access 8:192177\u2013192191","journal-title":"IEEE Access"},{"key":"1997_CR17","doi-asserted-by":"crossref","first-page":"103190","DOI":"10.1016\/j.sysarc.2024.103190","volume":"153","author":"J Yan","year":"2024","unstructured":"Yan J, Chen J, Qian C, Fu A, Qian H (2024) Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing. J Syst Architect 153:103190","journal-title":"J Syst Architect"},{"issue":"4","key":"1997_CR18","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1007\/s11219-024-09691-3","volume":"32","author":"J Yin","year":"2024","unstructured":"Yin J, Fei Y (2024) FVF-BIoT: a formal verification framework for blockchain-based IoT authentication. Softw Qual J 32(4):1457\u20131480","journal-title":"Softw Qual J"},{"key":"1997_CR19","doi-asserted-by":"crossref","first-page":"103089","DOI":"10.1016\/j.sysarc.2024.103089","volume":"149","author":"F Wang","year":"2024","unstructured":"Wang F, Xiao H, Wang J, Wang Y, Cao C (2024) Efficient secure channel free identity-based searchable encryption schemes with privacy preserving for cloud storage service. J Syst Architect 149:103089","journal-title":"J Syst Architect"},{"key":"1997_CR20","first-page":"1","volume":"2","author":"CC Agbo","year":"2019","unstructured":"Agbo CC, Mahmoud QH (2019) Comparison of blockchain frameworks for healthcare applications. Internet Technol Lett 2:1\u20136","journal-title":"Internet Technol Lett"},{"key":"1997_CR21","first-page":"68","volume":"46","author":"MK Elghoul","year":"2022","unstructured":"Elghoul MK, Bahgat SF, Hussein AS, Hamad SH (2022) Secured Cloud-based Framework for Electronic Medical Records using Hyperledger Blockchain Network. Egypt Comput Sci J 46:68\u201377","journal-title":"Egypt Comput Sci J"},{"key":"1997_CR22","first-page":"100502","volume":"27","author":"AA Khan","year":"2024","unstructured":"Khan AA, Chen Y-L, Hajjej F, Shaikh AA, Yang J, Ku CS, Por LY (2024) Digital forensics for the socio-cyber world (DF-SCW): a novel framework for deepfake multimedia investigation on social media platforms. Egypt Inf J 27:100502","journal-title":"Egypt Inf J"},{"key":"1997_CR23","first-page":"1","volume":"21","author":"X Zhu","year":"2019","unstructured":"Zhu X, Shi J, Lu C (2019) Cloud health resource sharing based on consensus-oriented blockchain technology: Case study on a breast tumor diagnosis service. J Med Internet Res 21:1\u201315","journal-title":"J Med Internet Res"},{"key":"1997_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2019\/8315614","volume":"2019","author":"TT Thwin","year":"2019","unstructured":"Thwin TT, Vasupongayya S (2019) Blockchain-based access control model to preserve privacy for personal health record systems. Secur Commun Netw 2019:1\u201315","journal-title":"Secur Commun Netw"},{"key":"1997_CR25","first-page":"1","volume":"4","author":"S Nakamoto","year":"2008","unstructured":"Nakamoto S, Bitcoin A (2008) A peer-to-peer electronic cash system. Bitcoin 4:1\u20139. https:\/\/bitcoin.org\/bitcoin.Pdf","journal-title":"A peer-to-peer electronic cash system. Bitcoin"},{"key":"1997_CR26","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.future.2019.12.037","volume":"106","author":"H Ma","year":"2020","unstructured":"Ma H, Huang EX, Lam KY (2020) Blockchain-based mechanism for fine-grained authorization in data crowdsourcing. Future Gen Comput Syst 106:121\u2013134","journal-title":"Future Gen Comput Syst"},{"key":"1997_CR27","first-page":"1","volume":"81","author":"AA Khan","year":"2024","unstructured":"Khan AA, Laghari AA, Baqasah A, Bacarra R, Alroobaea R, Alsafyani M, Alsayaydeh J (2024) BDLT-IoMT\u2014a novel architecture: SVM machine learning for robust and secure data processing in Internet of Medical Things with blockchain cybersecurity. J Supercomput 81:1\u201322","journal-title":"J Supercomput"},{"key":"1997_CR28","doi-asserted-by":"crossref","first-page":"109838","DOI":"10.1016\/j.engappai.2024.109838","volume":"141","author":"AA Khan","year":"2024","unstructured":"Khan AA, Yang J, Laghari AA, Baqasah AM, Alroobaea R, Ku CS, Alizadehsani R, Acharya UR, Por LY (2024) BAIoT-EMS: consortium network for small-medium enterprises management system with blockchain and augmented intelligence of things. Eng Appl Artif Intell 141:109838","journal-title":"Eng Appl Artif Intell"},{"key":"1997_CR29","first-page":"e1933","volume":"10","author":"AA Khan\u200b","year":"2024","unstructured":"Khan\u200b AA, Laghari AA, Baqasah AM, Alroobaea R, Almadhor A, Sampedro GA, Kryvinska N (2024) Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing. PeerJ Comput Sci 10:e1933","journal-title":"PeerJ Comput Sci"},{"key":"1997_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-018-1007-5","volume":"42","author":"H Kaur","year":"2018","unstructured":"Kaur H, Alam MA, Jameel R, Mourya AK, Chang V (2018) A proposed solution and future direction for blockchain-based heterogeneous medicare data in cloud environment. J Med Syst 42:1\u201311","journal-title":"J Med Syst"},{"key":"1997_CR31","doi-asserted-by":"crossref","first-page":"3733","DOI":"10.1007\/s10586-022-03598-z","volume":"25","author":"S Ahmad","year":"2022","unstructured":"Ahmad S, Mehfuz S, Mebarek-Oudina F, Beg J (2022) RSM analysis based cloud access security broker: a systematic literature review. Clust Comput 25:3733\u20133763","journal-title":"Clust Comput"},{"key":"1997_CR32","doi-asserted-by":"crossref","first-page":"4828","DOI":"10.1016\/j.matpr.2022.03.420","volume":"62","author":"S Ahmad","year":"2022","unstructured":"Ahmad S, Mehfuz S, Beg J (2022) Cloud security framework and key management services collectively for implementing DLP and IRM. Mater Today Proc 62:4828\u20132836","journal-title":"Mater Today Proc"},{"key":"1997_CR33","first-page":"1","volume":"2020","author":"L Huang","year":"2020","unstructured":"Huang L, Lee HH (2020) A medical data privacy protection scheme based on blockchain and cloud computing. Wirel Commun Mob Comput 2020:1\u201311","journal-title":"Wirel Commun Mob Comput"},{"key":"1997_CR34","first-page":"1","volume":"36","author":"G Verma","year":"2022","unstructured":"Verma G (2022) Blockchain-based privacy preservation framework for healthcare data in cloud environment. J Exp Theor Artif Intell 36:1\u201314","journal-title":"J Exp Theor Artif Intell"},{"key":"1997_CR35","doi-asserted-by":"crossref","first-page":"7401","DOI":"10.3390\/app13137401","volume":"13","author":"F Alhaddadin","year":"2023","unstructured":"Alhaddadin F, Gutierrez J (2023) Privacy-aware cloud architecture for collaborative use of patients\u2019 health information. Appl Sci 13:7401","journal-title":"Appl Sci"},{"key":"1997_CR36","doi-asserted-by":"crossref","first-page":"3759","DOI":"10.1007\/s11276-021-02743-7","volume":"30","author":"CH Liu","year":"2024","unstructured":"Liu CH, Chen TL, Chang CY, Wu ZY (2024) A reliable authentication scheme of personal health records in cloud computing. Wirel Netw 30:3759\u20133769","journal-title":"Wirel Netw"},{"key":"1997_CR37","doi-asserted-by":"crossref","first-page":"101629","DOI":"10.1016\/j.jksuci.2023.101629","volume":"35","author":"BM Singh","year":"2023","unstructured":"Singh BM, Natarajan J (2023) A novel secure authentication protocol for ehealth records in cloud with a new key generation method and minimized key exchange. J King Saud Univ Comput Inf Sci 35:101629","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"12","key":"1997_CR38","doi-asserted-by":"crossref","first-page":"2646","DOI":"10.3390\/electronics12122646","volume":"12","author":"A Alabdulatif","year":"2023","unstructured":"Alabdulatif A, Thilakarathne NN, Kalinaki K (2023) A novel cloud enabled access control model for preserving the security and privacy of medical big data. Electronics 12(12):2646","journal-title":"Electronics"},{"key":"1997_CR39","doi-asserted-by":"crossref","unstructured":"Ahmad S, Arif M, Ahmad J, Nazim M, Mehfuz S (2024) Convergent encryption enabled secure data deduplication algorithm for cloud environment.\u00a0Concurr Comput Pract Exp","DOI":"10.1002\/cpe.8205"},{"key":"1997_CR40","doi-asserted-by":"crossref","first-page":"5953","DOI":"10.1007\/s10586-024-04288-8","volume":"27","author":"S Ahmad","year":"2024","unstructured":"Ahmad S, Shabana M, Urooj S, Alsubaie N (2024) Machine learning-based intelligent security framework for secure cloud key management. Clust Comput 27:5953\u20135979","journal-title":"Clust Comput"},{"key":"1997_CR41","doi-asserted-by":"crossref","unstructured":"Ahmad S, Mehfuz S, Beg J (2024) Service centric attribute based block level two step encryption scheme for improved cloud security. In AIP Conference Proceedings.\u00a0American Institute of Physics (AIP), Maryland, 2816(1)","DOI":"10.1063\/5.0177484"},{"key":"1997_CR42","doi-asserted-by":"crossref","first-page":"100027","DOI":"10.1016\/j.csa.2023.100027","volume":"2","author":"S Ahmad","year":"2023","unstructured":"Ahmad S, Mehfuz S (2023) Efficient time-oriented latency-based secure data encryption for cloud storage. Cyber Secur Appl 2:100027","journal-title":"Cyber Secur Appl"},{"issue":"1","key":"1997_CR43","doi-asserted-by":"crossref","first-page":"e7806","DOI":"10.1002\/cpe.7806","volume":"35","author":"S Ahmad","year":"2023","unstructured":"Ahmad S, Mehfuz S, Beg J (2023) An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage. Concurr Comput Pract Exp 35(1):e7806","journal-title":"Concurr Comput Pract Exp"},{"key":"1997_CR44","doi-asserted-by":"crossref","unstructured":"Dhasaratha C, Hasan MK, Islam S, Khapre S, Abdullah S, Ghazal TM, Alzahrani AI, Alalwan N, Vo N, Akhtaruzzaman Md (2024)\u00a0Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things. In: CAAI Transactions on Intelligence Technology. pp 1-16","DOI":"10.1049\/cit2.12287"},{"key":"1997_CR45","first-page":"34","volume":"278","author":"W Sun","year":"2018","unstructured":"Sun W, Su F, Wang L (2018) Improving deep neural networks with multi-layer maxout networks and a novel initialization method. Neuro Comput 278:34\u201340","journal-title":"Neuro Comput"},{"key":"1997_CR46","doi-asserted-by":"crossref","first-page":"57","DOI":"10.5121\/ijdms.2019.11104","volume":"11","author":"F Zhang","year":"2019","unstructured":"Zhang F, Chen Y, Meng W, Wu Q (2019) Hybrid encryption algorithms for medical data storage security in cloud database. Int J Database Manag Syst (IJDMS) 11:57\u201373","journal-title":"Int J Database Manag Syst (IJDMS)"},{"key":"1997_CR47","doi-asserted-by":"crossref","first-page":"4915","DOI":"10.1109\/TNNLS.2021.3062754","volume":"33","author":"Y Ding","year":"2021","unstructured":"Ding Y, Tan F, Qin Z, Cao M, Choo KKR, Qin Z (2021) DeepKeyGen: a deep learning-based stream cipher generator for medical image encryption and decryption. IEEE Trans Neural Netw Learn Syst 33:4915\u20134929","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"1997_CR48","unstructured":"Heart Disease Dataset is taken from \u201chttps:\/\/archive.ics.uci.edu\/ml\/datasets\/heart+Disease\u201d. Accessed on May 2023"},{"issue":"5","key":"1997_CR49","doi-asserted-by":"crossref","first-page":"1364","DOI":"10.3390\/s24051364","volume":"24","author":"C Zhu","year":"2024","unstructured":"Zhu C, Zhu X, Qin T (2024) An efficient privacy protection mechanism for blockchain-based federated learning system in UAV-MEC networks. Sensors 24(5):1364","journal-title":"Sensors"},{"issue":"4","key":"1997_CR50","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1049\/cmu2.12737","volume":"18","author":"J Lin","year":"2024","unstructured":"Lin J, Feng L, Wang J, Qiu F, Yu B, Cheng J, Yao S (2024) FGDB-MLPP: a fine-grained data-sharing scheme with blockchain based on multi-level privacy protection. IET Commun 18(4):309\u201321","journal-title":"IET Commun"},{"key":"1997_CR51","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1109\/TPDS.2014.2311791","volume":"26","author":"H Ning","year":"2015","unstructured":"Ning H, Liu H, Yang LT (2015) aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Trans Parallel Distrib Syst 26:657\u2013667","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1997_CR52","doi-asserted-by":"crossref","unstructured":"Hu T, Wang\u00a0 J, Zhao G, Long X (2012) An improved mutual authentication and key update scheme for multi-hop relay in internet of things. In: Proceedings of 7th IEEE Conference on Industrial Electronics and Applications (ICIEA).\u00a0IEEE, New Jersey, pp 1024-1029","DOI":"10.1109\/ICIEA.2012.6360873"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01997-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01997-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01997-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:41Z","timestamp":1758986561000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01997-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,9]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["1997"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01997-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,6,9]]},"assertion":[{"value":"9 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"209"}}