{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:52Z","timestamp":1773511252811,"version":"3.50.1"},"reference-count":52,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T00:00:00Z","timestamp":1687478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007488","name":"Indian Institute of Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007488","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Dhanbad, Govt. of India"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Manage. Inf. Syst."],"published-print":{"date-parts":[[2023,9,30]]},"abstract":"<jats:p>Public auditing and data deduplication are integral considerations in providing efficient and secure cloud storage services. Nevertheless, the traditional data deduplication models that support public auditing can endure the enormous waste of storage and computation resources induced through data redundancy and repeated audit work by multiple tenants on trusted third-party auditor (TPA). In this work, we introduce blockchain-based secure decentralized public auditing in a decentralized cloud storage with an efficient deduplication model. We employ blockchain to take on the task of centralized TPA, which also mitigates the implications of malicious blockchain miners by using the concept of a decentralized autonomous organization (DAO). Specifically, we employ the idea of redactability for blockchain to handle often neglected security issues that would adversely affect the integrity of stored auditing records on blockchain in decentralized auditing models. However, the proposed model also employs an efficient deduplication scheme to attain adequate storage savings while preserving the users from data loss due to duplicate faking attacks. Moreover, the detailed concrete security analysis demonstrates the computational infeasibility of the proposed model against proof-of-ownership, duplicate faking attack (DFA), collusion attack, storage free-riding attack, data privacy, and forgery attack with high efficiency. Finally, the comprehensive performance analysis shows the scalability and feasibility of the proposed model.<\/jats:p>","DOI":"10.1145\/3578555","type":"journal-article","created":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T11:52:22Z","timestamp":1675079542000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage: A Redactable Blockchain Approach"],"prefix":"10.1145","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7395-306X","authenticated-orcid":false,"given":"Rahul","family":"Mishra","sequence":"first","affiliation":[{"name":"Indian Institute of Technolgy (ISM), India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3338-6520","authenticated-orcid":false,"given":"Dharavath","family":"Ramesh","sequence":"additional","affiliation":[{"name":"Indian Institute of Technolgy (ISM), India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1835-3475","authenticated-orcid":false,"given":"Salil S.","family":"Kanhere","sequence":"additional","affiliation":[{"name":"University of New South Wales, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5040-0745","authenticated-orcid":false,"given":"Damodar Reddy","family":"Edla","sequence":"additional","affiliation":[{"name":"National Institute of Technology, India"}]}],"member":"320","published-online":{"date-parts":[[2023,6,23]]},"reference":[{"key":"e_1_3_3_2_2","article-title":"Security by design for big data frameworks over cloud computing","author":"Awaysheh F. M.","year":"2021","unstructured":"F. M. Awaysheh , M. N. Aladwan , M. Alazab , S. Alawadi , J. C. Cabaleiro , and T. F. Pena . 2021 . Security by design for big data frameworks over cloud computing . IEEE Trans. Eng. Manag. F. M. Awaysheh, M. N. Aladwan, M. Alazab, S. Alawadi, J. C. Cabaleiro, and T. F. Pena. 2021. Security by design for big data frameworks over cloud computing. IEEE Trans. Eng. Manag.","journal-title":"IEEE Trans. Eng. Manag."},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3241737"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102642"},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3058130"},{"key":"e_1_3_3_6_2","doi-asserted-by":"crossref","unstructured":"X. Li S. Liu R. Lu M. K. Khan K. Gu and X. Zhang. 2022. An efficient privacy-preserving public auditing protocol for cloud-based medical storage system. IEEE J. Biomed. Health Inform.  X. Li S. Liu R. Lu M. K. Khan K. Gu and X. Zhang. 2022. An efficient privacy-preserving public auditing protocol for cloud-based medical storage system. IEEE J. Biomed. Health Inform .","DOI":"10.1109\/JBHI.2022.3140831"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102245"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107531"},{"key":"e_1_3_3_9_2","article-title":"Secure and efficient data deduplication in jointcloud storage","author":"Zhang D.","year":"2021","unstructured":"D. Zhang , J. Le , N. Mu , J. Wu , and X. Liao . 2021 . Secure and efficient data deduplication in jointcloud storage . IEEE Trans. Cloud Comput. D. Zhang, J. Le, N. Mu, J. Wu, and X. Liao. 2021. Secure and efficient data deduplication in jointcloud storage. IEEE Trans. Cloud Comput.","journal-title":"IEEE Trans. Cloud Comput."},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103523"},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3021013"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.07.005"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.02.015"},{"key":"e_1_3_3_14_2","volume-title":"14th ACM Conference on Computer and Communications Security. 584\u2013597","author":"Juels A.","unstructured":"A. Juels and B. S. Kaliski Jr . 2007. PORs: Proofs of retrievability for large files . In 14th ACM Conference on Computer and Communications Security. 584\u2013597 . A. Juels and B. S. Kaliski Jr. 2007. PORs: Proofs of retrievability for large files. In 14th ACM Conference on Computer and Communications Security. 584\u2013597."},{"key":"e_1_3_3_15_2","volume-title":"4th International Conference on Security and Privacy in Communication Netowrks. (1\u201310)","author":"Ateniese G.","unstructured":"G. Ateniese , R. Di Pietro , L. V. Mancini , and G. Tsudik .2008. Scalable and efficient provable data possession . In 4th International Conference on Security and Privacy in Communication Netowrks. (1\u201310) . G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik .2008. Scalable and efficient provable data possession. In 4th International Conference on Security and Privacy in Communication Netowrks. (1\u201310)."},{"key":"e_1_3_3_16_2","volume-title":"International Conference on the Theory and Application of Cryptology and Information Security. 90\u2013107","author":"Shacham H.","unstructured":"H. Shacham and B. Waters . 2008. Compact proofs of retrievability . In International Conference on the Theory and Application of Cryptology and Information Security. 90\u2013107 . H. Shacham and B. Waters. 2008. Compact proofs of retrievability. In International Conference on the Theory and Application of Cryptology and Information Security. 90\u2013107."},{"key":"e_1_3_3_17_2","article-title":"SEPDP: Secure and efficient privacy preserving provable data possession in cloud storage","author":"Nayak S. K.","year":"2018","unstructured":"S. K. Nayak and S. Tripathy . 2018 . SEPDP: Secure and efficient privacy preserving provable data possession in cloud storage . IEEE Trans. Serv. Comput. S. K. Nayak and S. Tripathy. 2018. SEPDP: Secure and efficient privacy preserving provable data possession in cloud storage. IEEE Trans. Serv. Comput.","journal-title":"IEEE Trans. Serv. Comput."},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3386262"},{"key":"e_1_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103629"},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.09.009"},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.09.013"},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.080"},{"key":"e_1_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-018-9654-6"},{"key":"e_1_3_3_24_2","volume-title":"ACM SIGSAC Conference on Computer and Communications Security. 831\u2013843","author":"Armknecht F.","unstructured":"F. Armknecht , J. M. Bohli , G. O. Karame , Z. Liu , and C. A. Reuter . 2014. Outsourced proofs of retrievability . In ACM SIGSAC Conference on Computer and Communications Security. 831\u2013843 . F. Armknecht, J. M. Bohli, G. O. Karame, Z. Liu, and C. A. Reuter. 2014. Outsourced proofs of retrievability. In ACM SIGSAC Conference on Computer and Communications Security. 831\u2013843."},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2016.2517205"},{"key":"e_1_3_3_26_2","article-title":"Blockchain-based public integrity verification for cloud storage against procrastinating auditors","author":"Zhang Y.","year":"2019","unstructured":"Y. Zhang , C. Xu , X. Lin , and X. S. Shen . 2019 . Blockchain-based public integrity verification for cloud storage against procrastinating auditors . IEEE Trans. Cloud Comput. Y. Zhang, C. Xu, X. Lin, and X. S. Shen. 2019. Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans. Cloud Comput.","journal-title":"IEEE Trans. Cloud Comput."},{"key":"e_1_3_3_27_2","doi-asserted-by":"crossref","unstructured":"R. Mishra D. Ramesh D. R. Edla and M. C. Trivedi. 2022. Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation. Cluster Comput. (2022) 1\u201325.  R. Mishra D. Ramesh D. R. Edla and M. C. Trivedi. 2022. Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation. Cluster Comput. (2022) 1\u201325.","DOI":"10.1007\/s10586-021-03508-9"},{"key":"e_1_3_3_28_2","volume-title":"Filecoin: A decentralized storage network. Protoc. Labs. 1\u201336.","author":"Benet J.","year":"2018","unstructured":"J. Benet and N. Greco . 2018 . Filecoin: A decentralized storage network. Protoc. Labs. 1\u201336. J. Benet and N. Greco. 2018. Filecoin: A decentralized storage network. Protoc. Labs. 1\u201336."},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.3005610"},{"key":"e_1_3_3_30_2","volume-title":"IEEE Symposium on Security and Privacy (SP). IEEE, 944\u2013961","author":"Kosba A.","unstructured":"A. Kosba , C. Papamanthou , and E. Shi . 2018. xJsnark: A framework for efficient verifiable computation . In IEEE Symposium on Security and Privacy (SP). IEEE, 944\u2013961 . A. Kosba, C. Papamanthou, and E. Shi. 2018. xJsnark: A framework for efficient verifiable computation. In IEEE Symposium on Security and Privacy (SP). IEEE, 944\u2013961."},{"key":"e_1_3_3_31_2","article-title":"Enabling secure and efficient decentralized storage auditing with blockchain","author":"Du Y.","year":"2021","unstructured":"Y. Du , H. Duan , A. Zhou , C. Wang , M. H. Au , and Q. Wang . 2021 . Enabling secure and efficient decentralized storage auditing with blockchain . IEEE Trans. Depend. Sec. Comput. Y. Du, H. Duan, A. Zhou, C. Wang, M. H. Au, and Q. Wang. 2021. Enabling secure and efficient decentralized storage auditing with blockchain. IEEE Trans. Depend. Sec. Comput.","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"key":"e_1_3_3_32_2","article-title":"Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage","author":"Li S.","year":"2022","unstructured":"S. Li , C. Xu , Y. Zhang , Y. Du , and K. Chen . 2022 . Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage . IEEE Trans. Serv. Comput. S. Li, C. Xu, Y. Zhang, Y. Du, and K. Chen. 2022. Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage. IEEE Trans. Serv. Comput.","journal-title":"IEEE Trans. Serv. Comput."},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.2501\/IJMR-2017-050"},{"key":"e_1_3_3_34_2","article-title":"Towards practical auditing of dynamic data in decentralized storage","author":"Duan H.","year":"2022","unstructured":"H. Duan , Y. Du , L. Zheng , C. Wang , M. H. Au , and Q. Wang . 2022 . Towards practical auditing of dynamic data in decentralized storage . IEEE Trans. Depend. Sec. Comput. H. Duan, Y. Du, L. Zheng, C. Wang, M. H. Au, and Q. Wang. 2022. Towards practical auditing of dynamic data in decentralized storage. IEEE Trans. Depend. Sec. Comput.","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103628"},{"key":"e_1_3_3_36_2","unstructured":"J. Benet. 2014. IPFS-content addressed versioned P2P file system. arXiv preprint arXiv:1407.3561.  J. Benet. 2014. IPFS-content addressed versioned P2P file system. arXiv preprint arXiv:1407.3561."},{"key":"e_1_3_3_37_2","volume-title":"International Conference on Blockchain. 199\u2013212","author":"Nizamuddin N.","unstructured":"N. Nizamuddin , H. R. Hasan , and K. Salah . 2018. IPFS-blockchain-based authenticity of online publications . In International Conference on Blockchain. 199\u2013212 . N. Nizamuddin, H. R. Hasan, and K. Salah. 2018. IPFS-blockchain-based authenticity of online publications. In International Conference on Blockchain. 199\u2013212."},{"key":"e_1_3_3_38_2","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques. 296\u2013312","author":"Bellare M.","unstructured":"M. Bellare , S. Keelveedhi , and T. Ristenpart . 2013. Message-locked encryption and secure deduplication . In Annual International Conference on the Theory and Applications of Cryptographic Techniques. 296\u2013312 . M. Bellare, S. Keelveedhi, and T. Ristenpart. 2013. Message-locked encryption and secure deduplication. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. 296\u2013312."},{"key":"e_1_3_3_39_2","volume-title":"International Conference on Algorithms and Architectures for Parallel Processing. 393\u2013405","author":"Li J.","unstructured":"J. Li , J. Wu , L. Chen , and J. Li . 2018. Blockchain-based secure and reliable distributed deduplication scheme . In International Conference on Algorithms and Architectures for Parallel Processing. 393\u2013405 . J. Li, J. Wu, L. Chen, and J. Li. 2018. Blockchain-based secure and reliable distributed deduplication scheme. In International Conference on Algorithms and Architectures for Parallel Processing. 393\u2013405."},{"key":"e_1_3_3_40_2","volume-title":"18th ACM Conference on Computer and Communications Security. 491\u2013500","author":"Halevi S.","unstructured":"S. Halevi , D. Harnik , B. Pinkas , and A. Shulman-Peleg . 2011. Proofs of ownership in remote storage systems . In 18th ACM Conference on Computer and Communications Security. 491\u2013500 . S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. 2011. Proofs of ownership in remote storage systems. In 18th ACM Conference on Computer and Communications Security. 491\u2013500."},{"key":"e_1_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.17.0116.0039"},{"key":"e_1_3_3_42_2","volume-title":"22nd USENIX Security Symposium (USENIX Security\u201913)","author":"Keelveedhi S.","unstructured":"S. Keelveedhi , M. Bellare , and T. Ristenpart . 2013. DupLESS:Server-aided encryption for deduplicated storage . In 22nd USENIX Security Symposium (USENIX Security\u201913) . 179\u2013194. S. Keelveedhi, M. Bellare, and T. Ristenpart. 2013. DupLESS:Server-aided encryption for deduplicated storage. In 22nd USENIX Security Symposium (USENIX Security\u201913). 179\u2013194."},{"key":"e_1_3_3_43_2","article-title":"Blockchain-based secure deduplication and shared auditing in decentralized storage","author":"Tian G.","year":"2021","unstructured":"G. Tian , Y. Hu , J. Wei , Z. Liu , X. Huang , X. Chen , and W. Susilo . 2021 . Blockchain-based secure deduplication and shared auditing in decentralized storage . IEEE Trans. Depend. Sec. Comput. G. Tian, Y. Hu, J. Wei, Z. Liu, X. Huang, X. Chen, and W. Susilo. 2021. Blockchain-based secure deduplication and shared auditing in decentralized storage. IEEE Trans. Depend. Sec. Comput.","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"key":"e_1_3_3_44_2","doi-asserted-by":"crossref","unstructured":"Y. Lin Y. Mao Y. Zhang and S. Zhong. 2022. Secure deduplication schemes for content delivery in mobile edge computing. Comput. Secur. (2022) 102602.  Y. Lin Y. Mao Y. Zhang and S. Zhong. 2022. Secure deduplication schemes for content delivery in mobile edge computing. Comput. Secur. (2022) 102602.","DOI":"10.1016\/j.cose.2022.102602"},{"key":"e_1_3_3_45_2","unstructured":"J. Xu X. Li L. Yin B. Guo H. Feng and Z. Zhang. 2019. Redactable proof-of-stake blockchain with fast confirmation. Cryptology ePrint Archive.  J. Xu X. Li L. Yin B. Guo H. Feng and Z. Zhang. 2019. Redactable proof-of-stake blockchain with fast confirmation. Cryptology ePrint Archive ."},{"key":"e_1_3_3_46_2","unstructured":"J. Xu X. Li L. Yin Y. Lu Q. Tang and Z. Zhang. 2021. Redactable blockchain protocol with instant redaction. IACR Cryptol. ePrint Arch. (2021) 223.  J. Xu X. Li L. Yin Y. Lu Q. Tang and Z. Zhang. 2021. Redactable blockchain protocol with instant redaction. IACR Cryptol. ePrint Arch . (2021) 223."},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2938190"},{"key":"e_1_3_3_48_2","volume-title":"International Conference on the Theory and Application of Cryptology and Information Security. 177\u2013194","author":"Kate A.","unstructured":"A. Kate , G. M. Zaverucha , and I. Goldberg . 2010. Constant-size commitments to polynomials and their applications . In International Conference on the Theory and Application of Cryptology and Information Security. 177\u2013194 . A. Kate, G. M. Zaverucha, and I. Goldberg. 2010. Constant-size commitments to polynomials and their applications. In International Conference on the Theory and Application of Cryptology and Information Security. 177\u2013194."},{"key":"e_1_3_3_49_2","doi-asserted-by":"crossref","unstructured":"H. Chernoff. 1952. A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Statist. (1952) 493\u2013507.  H. Chernoff. 1952. A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Statist. (1952) 493\u2013507.","DOI":"10.1214\/aoms\/1177729330"},{"key":"e_1_3_3_50_2","unstructured":"A. Kiayias and G. Panagiotakos. 2015. Speed-security tradeoffs in blockchain protocols. Cryptology ePrint Archive.  A. Kiayias and G. Panagiotakos. 2015. Speed-security tradeoffs in blockchain protocols. Cryptology ePrint Archive ."},{"key":"e_1_3_3_51_2","volume-title":"International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 118\u2013125","author":"Albert E.","unstructured":"E. Albert , J. Correas , P. Gordillo , G. Rom\u00e1n-D\u00edez , and A. Rubio . 2020. GASOL: Gas analysis and optimization for ethereum smart contracts . In International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 118\u2013125 . E. Albert, J. Correas, P. Gordillo, G. Rom\u00e1n-D\u00edez, and A. Rubio. 2020. GASOL: Gas analysis and optimization for ethereum smart contracts. In International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 118\u2013125."},{"key":"e_1_3_3_52_2","unstructured":"L. Fairweather. 2020. The problems that Ethereum 2.0 proof-of-stake aims to solve. Better Programming. Retrieved from: https:\/\/betterprogramming.pub\/the-problems-thatethereum-2-0-proof-of-stake-aims-to-solve-5361c155461a.  L. Fairweather. 2020. The problems that Ethereum 2.0 proof-of-stake aims to solve. Better Programming . Retrieved from: https:\/\/betterprogramming.pub\/the-problems-thatethereum-2-0-proof-of-stake-aims-to-solve-5361c155461a."},{"key":"e_1_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1080\/00036846.2016.1200188"}],"container-title":["ACM Transactions on Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3578555","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3578555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:37Z","timestamp":1750183717000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3578555"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,23]]},"references-count":52,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9,30]]}},"alternative-id":["10.1145\/3578555"],"URL":"https:\/\/doi.org\/10.1145\/3578555","relation":{},"ISSN":["2158-656X","2158-6578"],"issn-type":[{"value":"2158-656X","type":"print"},{"value":"2158-6578","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,23]]},"assertion":[{"value":"2022-06-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-12-12","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}