{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:16:20Z","timestamp":1757312180382,"version":"3.41.0"},"reference-count":89,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T00:00:00Z","timestamp":1668124800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Storage"],"published-print":{"date-parts":[[2022,11,30]]},"abstract":"<jats:p>\n            Conventional encrypted deduplication approaches retain the deduplication capability on duplicate chunks after encryption by always deriving the key for encryption\/decryption from the chunk content, but such a deterministic nature causes information leakage due to frequency analysis. We present\n            <jats:sans-serif>TED<\/jats:sans-serif>\n            , a tunable encrypted deduplication primitive that provides a tunable mechanism for balancing the tradeoff between storage efficiency and data confidentiality. The core idea of\n            <jats:sans-serif>TED<\/jats:sans-serif>\n            is that its key derivation is based on not only the chunk content but also the number of duplicate chunk copies, such that duplicate chunks are encrypted by distinct keys in a controlled manner. In particular,\n            <jats:sans-serif>TED<\/jats:sans-serif>\n            allows users to configure a storage blowup factor, under which the information leakage quantified by an information-theoretic measure is minimized for any input workload. In addition, we extend\n            <jats:sans-serif>TED<\/jats:sans-serif>\n            with a distributed key management architecture and propose two attack-resilient key generation schemes that trade between performance and fault tolerance. We implement an encrypted deduplication prototype\n            <jats:sans-serif>TEDStore<\/jats:sans-serif>\n            to realize\n            <jats:sans-serif>TED<\/jats:sans-serif>\n            in networked environments. Evaluation on real-world file system snapshots shows that\n            <jats:sans-serif>TED<\/jats:sans-serif>\n            effectively balances the tradeoff between storage efficiency and data confidentiality, with small performance overhead.\n          <\/jats:p>","DOI":"10.1145\/3510614","type":"journal-article","created":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T11:25:22Z","timestamp":1664277922000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Tunable Encrypted Deduplication with Attack-resilient Key Management"],"prefix":"10.1145","volume":"18","author":[{"given":"Zuoru","family":"Yang","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong, Shatin, Hong Kong, China"}]},{"given":"Jingwei","family":"Li","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"given":"Yanjing","family":"Ren","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"given":"Patrick P. C.","family":"Lee","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shatin, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2022,11,11]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_21"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060291"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119291866801"},{"key":"e_1_3_1_5_2","first-page":"151","volume-title":"Proceedings of the 2014 USENIX Annual Technical Conference (USENIX ATC\u201915)","author":"Amvrosiadis George","year":"2015","unstructured":"George Amvrosiadis and Medha Bhadkamkar. 2015. Identifying trends in enterprise data protection systems. In Proceedings of the 2014 USENIX Annual Technical Conference (USENIX ATC\u201915). 151\u2013164."},{"key":"e_1_3_1_6_2","first-page":"1","volume-title":"Proceedings of the 24th USENIX International Conference on Large Installation System Administration (LISA\u201910)","author":"Anderson Paul","year":"2010","unstructured":"Paul Anderson and Le Zhang. 2010. Fast and secure laptop backups with encrypted de-duplication. In Proceedings of the 24th USENIX International Conference on Large Installation System Administration (LISA\u201910). 1\u20138."},{"key":"e_1_3_1_7_2","article-title":"SMHasher","author":"Appleby Austin","year":"2022","unstructured":"Austin Appleby. 2022. SMHasher. https:\/\/github.com\/aappleby\/smhasher.","journal-title":"https:\/\/github.com\/aappleby\/smhasher."},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813630"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053019"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30539-2_31"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_23"},{"key":"e_1_3_1_13_2","first-page":"179","volume-title":"Proceedings of the 22nd USENIX Security Symposium (Security\u201913)","author":"Bellare Mihir","year":"2013","unstructured":"Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart. 2013. DupLESS: Server-aided encryption for deduplicated storage. In Proceedings of the 22nd USENIX Security Symposium (Security\u201913). 179\u2013194."},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/2535929"},{"key":"e_1_3_1_16_2","first-page":"169","volume-title":"Proceedings of the 2014 USENIX Annual Technical Conference (USENIX ATC\u201914)","author":"Bessani Alysson Neves","year":"2014","unstructured":"Alysson Neves Bessani, Ricardo Mendes, Tiago Oliveira, Nuno Ferreira Neves, Miguel Correia, Marcelo Pasin, and Paulo Verissimo. 2014. SCFS: A shared cloud-backed file system. In Proceedings of the 2014 USENIX Annual Technical Conference (USENIX ATC\u201914). 169\u2013180."},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2009.5366623"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.14778\/3236187.3236217"},{"key":"e_1_3_1_19_2","first-page":"85","volume-title":"Proceedings of the 2006 USENIX Annual Technical Conference (USENIX ATC\u201906)","author":"Black John","year":"2006","unstructured":"John Black. 2006. Compare-by-hash: A reasoned analysis. In Proceedings of the 2006 USENIX Annual Technical Conference (USENIX ATC\u201906). 85\u201390."},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.5555\/993483"},{"key":"e_1_3_1_21_2","first-page":"21","volume-title":"Proceedings of the Conference on Compression and Complexity of Sequences (SEQUENCES\u201997)","author":"Broder Andrei Z.","year":"1997","unstructured":"Andrei Z. Broder. 1997. On the resemblance and containment of documents. In Proceedings of the Conference on Compression and Complexity of Sequences (SEQUENCES\u201997). 21\u201329."},{"key":"e_1_3_1_22_2","first-page":"309","volume-title":"Proceedings of the 16th USENIX Conference on File and Storage Technologies (FAST\u201918)","author":"Cao Zhichao","year":"2018","unstructured":"Zhichao Cao, Hao Wen, Fenggang Wu, and David H. C. Du. 2018. ALACC: Accelerating restore performance of data deduplication systems using adaptive look-ahead window assisted chunk caching. In Proceedings of the 16th USENIX Conference on File and Storage Technologies (FAST\u201918). 309\u2013324."},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060316"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2018.8625127"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022312"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/2664168.2664169"},{"key":"e_1_3_1_28_2","volume-title":"A Framework for Analyzing and Improving Content-based Chunking Algorithms","author":"Eshghi Kave","year":"2005","unstructured":"Kave Eshghi and Hsiu Khuern Tang. 2005. A Framework for Analyzing and Improving Content-based Chunking Algorithms. Technical Report HPL-2005-30(R.1). Hewlett-Packard Laboratories."},{"key":"e_1_3_1_29_2","article-title":"FSL Traces and Snapshots Public Archive.","author":"University File System and Storage Lab at Stony Brook","year":"2022","unstructured":"File System and Storage Lab at Stony Brook University. 2022. FSL Traces and Snapshots Public Archive. from http:\/\/ tracer.filesystems.org\/.","journal-title":"from http:\/\/ tracer.filesystems.org\/"},{"key":"e_1_3_1_30_2","article-title":"LevelDB","author":"Ghemawat Sanjay","year":"2022","unstructured":"Sanjay Ghemawat and Jeff Dean. 2022. LevelDB. https:\/\/github.com\/google\/leveldb.","journal-title":"https:\/\/github.com\/google\/leveldb."},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_1_32_2","article-title":"GNUMP: GNU multiple precision arithmetic library","author":"Granlund Torbj\u00f6rn","year":"2022","unstructured":"Torbj\u00f6rn Granlund. 2022. GNUMP: GNU multiple precision arithmetic library. Retrieved from https:\/\/gmplib.org\/.","journal-title":"Retrieved from https:\/\/gmplib.org\/."},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.44"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046765"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.187"},{"key":"e_1_3_1_36_2","article-title":"Hard Drive Theft Sees Data of 1 Million Individuals Exposed","author":"Journal HIPAA","year":"2022","unstructured":"HIPAA Journal. 2022. Hard Drive Theft Sees Data of 1 Million Individuals Exposed. https:\/\/www.hipaajournal.com\/hard-drive-theft-sees-data-1-million-indiv iduals-exposed-8859\/.","journal-title":"https:\/\/www.hipaajournal.com\/hard-drive-theft-sees-data-1-million-indiv iduals-exposed-8859\/"},{"key":"e_1_3_1_37_2","article-title":"Data Age 2025","year":"2022","unstructured":"IDC. 2022. Data Age 2025. https:\/\/www.seagate.com\/files\/www-content\/our-story\/trends\/files\/idc-se agate-dataage-whitepaper.pdf.","journal-title":"https:\/\/www.seagate.com\/files\/www-content\/our-story\/trends\/files\/idc-se agate-dataage-whitepaper.pdf."},{"key":"e_1_3_1_38_2","article-title":"Intel advanced encryption standard (AES) new instructions set.","author":"Corporation Intel","year":"2022","unstructured":"Intel Corporation. 2022. Intel advanced encryption standard (AES) new instructions set. https:\/\/www.intel.com.bo\/content\/dam\/doc\/white-paper\/advanced-encryptio n-standard-new-instructions-set-paper.pdf.","journal-title":"https:\/\/www.intel.com.bo\/content\/dam\/doc\/white-paper\/advanced-encryptio n-standard-new-instructions-set-paper.pdf."},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/1534530.1534540"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"e_1_3_1_41_2","first-page":"29","volume-title":"Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST\u201903)","author":"Kallahalla Mahesh","year":"2003","unstructured":"Mahesh Kallahalla, Erik Riedel, Ram Swaminathan, Qian Wang, and Kevin Fu. 2003. Plutus: Scalable secure file sharing on untrusted storage. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST\u201903). 29\u201342."},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1201\/b17668"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813629"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301326"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2018.i1.277-313"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978376"},{"key":"e_1_3_1_48_2","article-title":"Enabling secure and space-efficient metadata management in encrypted deduplication","author":"Li Jingwei","year":"2022","unstructured":"Jingwei Li, Suyu Huang, Yanjing Ren, Zuoru Yang, Patrick P. C. Lee, Xiao-song Zhang, and Yao Hao. 2022. Enabling secure and space-efficient metadata management in encrypted deduplication. IEEE Trans. Comput. 71, 4 (2022), 959\u2013970.","journal-title":"IEEE Trans. Comput."},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3365840"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.62"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.28"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387531"},{"key":"e_1_3_1_53_2","first-page":"111","volume-title":"Proceedings of the 2015 USENIX Annual Technical Conference (USENIX ATC\u201915)","author":"Li Mingqiang","year":"2015","unstructured":"Mingqiang Li, Chuan Qin, and Patrick P. C. Lee. 2015. CDStore: Toward reliable, secure, and cost-efficient cloud storage via convergent dispersal. In Proceedings of the 2015 USENIX Annual Technical Conference (USENIX ATC\u201915). 111\u2013124."},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.5555\/2591272.2591292"},{"key":"e_1_3_1_55_2","first-page":"111","volume-title":"Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST\u201909)","author":"Lillibridge Mark","year":"2009","unstructured":"Mark Lillibridge, Kave Eshghi, Deepavali Bhagwat, Vinay Deolalikar, Greg Trezis, and Peter Camble. 2009. Sparse indexing: Large scale, inline deduplication using sampling and locality. In Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST\u201909). 111\u2013123."},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813623"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76953-0_20"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.5555\/2591272.2591291"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2916856"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/2078861.2078864"},{"key":"e_1_3_1_61_2","first-page":"5","volume-title":"Proceedings of the 20th USENIX Conference on Security (Security\u201911)","author":"Mulazzani Martin","year":"2011","unstructured":"Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, and Edgar Weippl. 2011. Dark clouds on the horizon: Using cloud storage as attack vector and online slack space. In Proceedings of the 20th USENIX Conference on Security (Security\u201911). 5\u20135."},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/972639.972643"},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_3_1_64_2","article-title":"OpenSSL: Cryptography and SSL\/TLS Toolkit","year":"2022","unstructured":"OpenSSL. 2022. OpenSSL: Cryptography and SSL\/TLS Toolkit. https:\/\/www.openssl.org\/.","journal-title":"https:\/\/www.openssl.org\/."},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49162-7_18"},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/322276.322287"},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406888"},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.54"},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/3032966"},{"key":"e_1_3_1_70_2","unstructured":"Michael O. Rabin. 1981. Fingerprinting by random polynomials. Department of Computer Science Harvard University. Tech. Report TR-15-81. 1\u201312."},{"key":"e_1_3_1_71_2","first-page":"14","volume-title":"Proceedings of the 9th USENIX Conference on File and Storage Technologies (FAST\u201911)","author":"Resch Jason","year":"2011","unstructured":"Jason Resch and James Plank. 2011. AONT-RS: Blending security and performance in dispersed storage systems. In Proceedings of the 9th USENIX Conference on File and Storage Technologies (FAST\u201911). 14\u201314."},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/2996429.2996432"},{"key":"e_1_3_1_73_2","first-page":"333","volume-title":"Proceedings of the 2015 USENIX Annual Technical Conference (USENIX ATC\u201915)","author":"Shah Peter","year":"2015","unstructured":"Peter Shah and Won So. 2015. Lamassu: Storage-efficient host-side encryption. In Proceedings of the 2015 USENIX Annual Technical Conference (USENIX ATC\u201915). 333\u2013345."},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_8"},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456471"},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/1534912.1534914"},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2016.7897080"},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.5555\/2208461.2208465"},{"key":"e_1_3_1_80_2","article-title":"Drew Perttula and Attacks on Convergent Encryption","author":"Wilcox-O\u2019Hearn Zooko","year":"2022","unstructured":"Zooko Wilcox-O\u2019Hearn. 2022. Drew Perttula and Attacks on Convergent Encryption. https:\/\/tahoe-lafs.org\/hacktahoelafs\/drew_perttula.html.","journal-title":"https:\/\/tahoe-lafs.org\/hacktahoelafs\/drew_perttula.html."},{"key":"e_1_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456474"},{"key":"e_1_3_1_82_2","first-page":"26","volume-title":"Proceedings of the 2011 USENIX Annual Technical Conference (USENIX ATC\u201911)","author":"Xia Wen","year":"2011","unstructured":"Wen Xia, Hong Jiang, Dan Feng, and Yu Hua. 2011. SiLo: A similarity-locality based near-exact deduplication scheme with low RAM overhead and high throughput. In Proceedings of the 2011 USENIX Annual Technical Conference (USENIX ATC\u201911). 26\u201330."},{"key":"e_1_3_1_83_2","first-page":"101","volume-title":"Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC\u201916)","author":"Xia Wen","year":"2016","unstructured":"Wen Xia, Yukun Zhou, Hong Jiang, Dan Feng, Yu Hua, Yuchong Hu, Qing Liu, and Yucheng Zhang. 2016. FastCDC: A fast and efficient content-defined chunking approach for data deduplication. In Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC\u201916). 101\u2013114."},{"key":"e_1_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/2908557"},{"key":"e_1_3_1_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2015.7208294"},{"key":"e_1_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.78"},{"key":"e_1_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053012"},{"key":"e_1_3_1_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2015.7208297"},{"key":"e_1_3_1_89_2","first-page":"269","volume-title":"Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST\u201908)","author":"Zhu Benjamin","year":"2008","unstructured":"Benjamin Zhu, Kai Li, and R. Hugo Patterson. 2008. Avoiding the disk bottleneck in the data domain deduplication file system. In Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST\u201908). 269\u2013282."},{"key":"e_1_3_1_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2018.00124"}],"container-title":["ACM Transactions on Storage"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510614","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510614","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:20Z","timestamp":1750191140000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510614"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,11]]},"references-count":89,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,11,30]]}},"alternative-id":["10.1145\/3510614"],"URL":"https:\/\/doi.org\/10.1145\/3510614","relation":{},"ISSN":["1553-3077","1553-3093"],"issn-type":[{"type":"print","value":"1553-3077"},{"type":"electronic","value":"1553-3093"}],"subject":[],"published":{"date-parts":[[2022,11,11]]},"assertion":[{"value":"2021-06-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-01-06","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}