{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:13:08Z","timestamp":1772903588754,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T00:00:00Z","timestamp":1603411200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T00:00:00Z","timestamp":1603411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772294"],"award-info":[{"award-number":["61772294"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2019LZH002"],"award-info":[{"award-number":["ZR2019LZH002"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the development of big data and cloud computing, more and more enterprises prefer to store their data in cloud and share the data among their authorized employees efficiently and securely. So far, many different data sharing schemes in different fields have been proposed. However, sharing sensitive data in cloud still faces some challenges such as achieving data privacy and lightweight operations at resource constrained mobile terminals. Furthermore, most data sharing schemes have no integrity verification mechanism, which would result in wrong computation results for users. To solve the problems, we propose an efficient and secure data sharing scheme for mobile devices in cloud computing. Firstly, the scheme guarantees security and authorized access of shared sensitive data. Secondly, the scheme realizes efficient integrity verification before users share the data to avoid incorrect computation. Finally, the scheme achieves lightweight operations of mobile terminals on both data owner and data requester sides.<\/jats:p>","DOI":"10.1186\/s13677-020-00207-5","type":"journal-article","created":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T07:02:53Z","timestamp":1603436573000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["An efficient and secure data sharing scheme for mobile devices in cloud computing"],"prefix":"10.1186","volume":"9","author":[{"given":"Xiuqing","family":"Lu","sequence":"first","affiliation":[]},{"given":"Zhenkuan","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Hequn","family":"Xian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,23]]},"reference":[{"key":"207_CR1","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.compeleceng.2018.10.009","volume":"72","author":"IS Farahat","year":"2018","unstructured":"Farahat IS, Tolba AS (2018) A secure real-time internet of medical smart things (IOMST). Comput Electrical Eng 72:455\u2013467","journal-title":"Comput Electrical Eng"},{"key":"207_CR2","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/j.future.2017.02.014","volume":"78","author":"AM Rahmani","year":"2018","unstructured":"Rahmani AM, Gia TN, Negash KB (2018) Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach. Futur Gener Comput Syst 78:641\u2013658","journal-title":"Futur Gener Comput Syst"},{"key":"207_CR3","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/JSYST.2015.2460747","volume":"11","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Qiu M, Tsai C, Hassan M, Alamri A (2017) Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst J 11:88\u201395","journal-title":"IEEE Syst J"},{"key":"207_CR4","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.protcy.2013.12.183","volume":"11","author":"A Ghazvini","year":"2013","unstructured":"Ghazvini A, Shukur Z (2013) Security challenges and success factors of electronic healthcare system. Proc Technol 11:212\u2013219","journal-title":"Proc Technol"},{"key":"207_CR5","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.future.2019.01.058","volume":"98","author":"Z Guan","year":"2019","unstructured":"Guan Z, Lv Z, Du X et al (2019) Achieving data utility-privacy tradeoff in internet of medical things: a machine learning approach. Futur Gener Comput Syst 98:60\u201368","journal-title":"Futur Gener Comput Syst"},{"key":"207_CR6","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1016\/j.future.2018.03.005","volume":"86","author":"M Elhoseny","year":"2018","unstructured":"Elhoseny M, Abdelaziz A (2018) A hybrid model of internet of things and cloud computing to manage big data in health services applications. Futur Gener Comput Syst 86:1383\u20131394","journal-title":"Futur Gener Comput Syst"},{"key":"207_CR7","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.chaos.2016.02.010","volume":"86","author":"K Han","year":"2016","unstructured":"Han K, Li Q, Deng Z (2016) Security and efficiency data sharing scheme for cloud storage. Chaos Solitons Fractals 86:107\u2013116","journal-title":"Chaos Solitons Fractals"},{"key":"207_CR8","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.ins.2020.05.054","volume":"535","author":"L Zhang","year":"2020","unstructured":"Zhang L, Zhang H, Jia Y (2020) Blockchain-based two-party fair contract signing scheme. Inf Sci 535:142\u2013155","journal-title":"Inf Sci"},{"key":"207_CR9","doi-asserted-by":"publisher","first-page":"5022","DOI":"10.1109\/ACCESS.2019.2962729","volume":"8","author":"X Lu","year":"2020","unstructured":"Lu X, Cheng X (2020) A secure and lightweight data sharing scheme for internet of medical things. IEEE Access 8:5022\u20135030. https:\/\/doi.org\/10.1109\/ACCESS.2019.2962729","journal-title":"IEEE Access"},{"issue":"5","key":"207_CR10","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1109\/JBHI.2013.2257818","volume":"17","author":"A Bahga","year":"2013","unstructured":"Bahga A, Madisetti VK (2013) A cloud-based approach for interoperable electronic health records (EHRs). IEEE J Biomed Health Inf 17(5):894\u2013906","journal-title":"IEEE J Biomed Health Inf"},{"key":"207_CR11","doi-asserted-by":"publisher","first-page":"6171","DOI":"10.1109\/ACCESS.2016.2613278","volume":"4","author":"LA Tawalbeh","year":"2016","unstructured":"Tawalbeh LA, Mehmood R, Benkhlifa E, Song H (2016) Mobile cloud computing model and big data analysis for healthcare applications. IEEE Access 4:6171\u20136180","journal-title":"IEEE Access"},{"key":"207_CR12","doi-asserted-by":"publisher","first-page":"66792","DOI":"10.1109\/ACCESS.2019.2917555","volume":"7","author":"DC Nguyen","year":"2019","unstructured":"Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2019) Blockchain for Secure EHRs Sharing of Mobile Cloud Based E-Health Systems. IEEE Access 7:66792\u201366806. https:\/\/doi.org\/10.1109\/ACCESS.2019.2917555","journal-title":"IEEE Access"},{"key":"207_CR13","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.knosys.2017.03.003","volume":"127","author":"V Chang","year":"2017","unstructured":"Chang V (2017) Towards data analysis for weather cloud computing. Knowl Based Syst 127:29\u201345","journal-title":"Knowl Based Syst"},{"key":"207_CR14","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.ijinfomgt.2019.02.002","volume":"48","author":"F Gao","year":"2019","unstructured":"Gao F, Sunyaev A et al (2019) Context matters: a review of the determinant factors in the decision to adopt cloud computing in healthcare. Int J Inf Manag 48:120\u2013138","journal-title":"Int J Inf Manag"},{"key":"207_CR15","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1145\/357369.357372","volume":"1","author":"SG Akl","year":"1983","unstructured":"Akl SG, Taylor PD (1983) Cryptographic solution to a problem of access control in a hierarchy. ACM Trans Comput Syst 1:239\u2013248","journal-title":"ACM Trans Comput Syst"},{"key":"207_CR16","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/1180405.1180418","volume-title":"Proceedings of the 13th ACM conference on Computer and communications security","author":"V Goyal","year":"2006","unstructured":"Goyal V, Pandy O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security, p 89"},{"key":"207_CR17","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"J Hur","year":"2011","unstructured":"Hur J, Noh CD (2011) Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distributed Syst 22:1214\u20131221","journal-title":"IEEE Trans Parallel Distributed Syst"},{"key":"207_CR18","first-page":"321","volume-title":"Proceedings of the IEEE symposium on security privacy","author":"J Bethencourt","year":"2007","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: Proceedings of the IEEE symposium on security privacy, p 321"},{"key":"207_CR19","first-page":"568","volume-title":"Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptolog","author":"A Lewko","year":"2011","unstructured":"Lewko A, Waters B (2011) Decentralizing attribute-based encryption. In: Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptolog, p 568"},{"key":"207_CR20","first-page":"53","volume-title":"Proceedings of the International Workshop on Public Key Cryptography","author":"B Waters","year":"2011","unstructured":"Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of the International Workshop on Public Key Cryptography, pp 53\u201370"},{"key":"207_CR21","first-page":"456","volume-title":"Proc. ACM Conf. Comput. Commun. Security (CCS)","author":"L Cheung","year":"2007","unstructured":"Cheung L, Newport C (2007) Provably secure ciphertext policy ABE. In: Proc. ACM Conf. Comput. Commun. Security (CCS), pp 456\u2013465"},{"key":"207_CR22","doi-asserted-by":"publisher","first-page":"2130","DOI":"10.1109\/JIOT.2018.2825289","volume":"5","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Zhen D, Deng R (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5:2130\u20132145","journal-title":"IEEE Internet Things J"},{"key":"207_CR23","doi-asserted-by":"crossref","unstructured":"Yang M, Zhang T (2018) Efficient Privacy-Preserving Access Control Scheme in Electronic Health Records System. Sensors 18:3520\u20133545.","DOI":"10.3390\/s18103520"},{"key":"207_CR24","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TIFS.2015.2475723","volume":"11","author":"T Phuong","year":"2016","unstructured":"Phuong T, Yang G, Susilo W (2016) Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Trans Inf Forensic Secur 11:35\u201345","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"207_CR25","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.ins.2016.04.015","volume":"379","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Chen F, Li J (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42\u201361","journal-title":"Inf Sci"},{"key":"207_CR26","first-page":"1","volume-title":"Proceedings of the 4th international conference on Security and privacy in communication networks","author":"G Ateniese","year":"2008","unstructured":"Ateniese G, PietroR D, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of the 4th international conference on Security and privacy in communication networks, pp 1\u201310"},{"key":"207_CR27","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/JIOT.2016.2571718","volume":"4","author":"K Yang","year":"2017","unstructured":"Yang K (2017) An efficient and fine-grained big data access control scheme with privacy-preserving policy. IEEE Internet Things Journal 4:563\u2013571","journal-title":"IEEE Internet Things Journal"},{"key":"207_CR28","doi-asserted-by":"crossref","unstructured":"Wang G, Liu Q, Wu J Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput Secur 30:320\u2013331","DOI":"10.1016\/j.cose.2011.05.006"},{"key":"207_CR29","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1002\/sec.614","volume":"6","author":"Z Guo","year":"2013","unstructured":"Guo Z, Li M, Fan X (2013) Attribute-based ring signcryption scheme. Secur Commun Netw 6:790\u2013796","journal-title":"Secur Commun Netw"},{"key":"207_CR30","doi-asserted-by":"publisher","first-page":"2302","DOI":"10.1002\/sec.940","volume":"7","author":"J Wei","year":"2014","unstructured":"Wei J, Hu X, Liu W (2014) Traceable attribute-based signcryption. Secur Commun Netw 7:2302\u20132317","journal-title":"Secur Commun Netw"},{"key":"207_CR31","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.future.2014.10.014","volume":"52","author":"J Liu","year":"2015","unstructured":"Liu J, Huang X, Liu JK (2015) Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption. Futur Gener Comput Syst 52:67\u201376","journal-title":"Futur Gener Comput Syst"},{"key":"207_CR32","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1109\/TBDATA.2016.2621106","volume":"4","author":"C Hu","year":"2017","unstructured":"Hu C, Li W (2017) A secure and verifiable access control scheme for big data storage in clouds. IEEE Trans Big Data 4:341\u2013355","journal-title":"IEEE Trans Big Data"},{"key":"207_CR33","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/JIOT.2016.2619369","volume":"4","author":"H Cai","year":"2017","unstructured":"Cai H, Xu B, Jiang L (2017) IoT-based big data storage systems in cloud computing: perspectives and challenges. IEEE Internet Things 4:75\u201387","journal-title":"IEEE Internet Things"},{"key":"207_CR34","first-page":"598","volume":"14","author":"G Ateniese","year":"2007","unstructured":"Ateniese G, Burns R, Curtmola R (2007) Provable data possession at untrusted stores. ACM Conf Comput Commun Secur 14:598\u2013609","journal-title":"ACM Conf Comput Commun Secur"},{"key":"207_CR35","first-page":"213","volume":"17","author":"C Erway","year":"2009","unstructured":"Erway C, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. ACM Conf Comput Commun Secur 17:213\u2013222","journal-title":"ACM Conf Comput Commun Secur"},{"key":"207_CR36","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TSC.2011.51","volume":"6","author":"Y Zhu","year":"2013","unstructured":"Zhu Y, Ahn GJ, Hu H, Yau SS (2013) Dynamic audit services for outsourced storages in clouds. IEEE Trans Serv Comput 6:227\u2013238","journal-title":"IEEE Trans Serv Comput"},{"key":"207_CR37","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/TPDS.2012.278","volume":"24","author":"K Yang","year":"2013","unstructured":"Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distributed Syst 24:1717\u20131726","journal-title":"IEEE Trans Parallel Distributed Syst"},{"key":"207_CR38","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1109\/TSC.2015.2512589","volume":"10","author":"H Tian","year":"2017","unstructured":"Tian H, Chen Y, Chang CC (2017) Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans Serv Comput 10:701\u2013714","journal-title":"IEEE Trans Serv Comput"},{"key":"207_CR39","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang Q, Wang C, Ren K, Lou W (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distributed Syst 22:847\u2013859","journal-title":"IEEE Trans Parallel Distributed Syst"},{"key":"207_CR40","doi-asserted-by":"publisher","first-page":"2234","DOI":"10.1109\/TPDS.2013.191","volume":"25","author":"C Liu","year":"2014","unstructured":"Liu C, Chen J, Yang LT, Zhang X (2014) Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Trans Parallel Distributed Syst 25:2234\u20132244","journal-title":"IEEE Trans Parallel Distributed Syst"},{"key":"207_CR41","first-page":"93","volume":"61","author":"Q Gan","year":"2018","unstructured":"Gan Q, Wang X, Fang X (2018) Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud. Inf Sci 61:93\u2013107","journal-title":"Inf Sci"},{"key":"207_CR42","first-page":"114","volume":"11","author":"Y Luo","year":"2014","unstructured":"Luo Y, Fu S, Xu M (2014) Enable data dynamics for algebraic signatures based remote data possession checking in the cloud storage. China Commun 11:114\u2013124","journal-title":"China Commun"},{"key":"207_CR43","first-page":"385","volume-title":"Cloud Engineering (IC2E), IEEE International Conference on IEEE","author":"K Bhaskaran","year":"2018","unstructured":"Bhaskaran K, Ilfrich P, Liffman D (2018) Double-blind consent-driven data sharing on blockchain. In: Cloud Engineering (IC2E), IEEE International Conference on IEEE, pp 385\u2013439"},{"key":"207_CR44","first-page":"650","volume":"18","author":"CW Liu","year":"2016","unstructured":"Liu CW, Hsien WF, Yang CC (2016) A survey of public auditing for shared data storage with DU revocation in cloud computing. Int J Netw Secur 18:650\u2013666","journal-title":"Int J Netw Secur"},{"key":"207_CR45","doi-asserted-by":"publisher","unstructured":"Shamir A (1985) Identity-Based Cryptosystems and Signature Schemes. In: Blakley GR, Chaum D (eds) Advances in Cryptology. CRYPTO 1984. Lecture Notes in Computer Science, vol 196. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/3-540-39568-7_5","DOI":"10.1007\/3-540-39568-7_5"},{"key":"207_CR46","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1007\/978-3-642-38027-3_111","volume-title":"Grid and Pervasive Computing (Lecture Notes in Computer Science)","author":"E-J Yoon","year":"2013","unstructured":"Yoon E-J, Choi Y, Kim C (2013) New ID-based proxy signature scheme with message recovery. In: Grid and Pervasive Computing (Lecture Notes in Computer Science), vol 7861. Springer-Verlag, Berlin, pp 945\u2013951"},{"key":"207_CR47","doi-asserted-by":"publisher","unstructured":"Yu J, Hao R (2019) Comments on SEPDP: secure and efficient privacy preserving provable data possession in cloud storage. IEEE Trans Serv Comput. https:\/\/doi.org\/10.1109\/TSC.2019.2912379","DOI":"10.1109\/TSC.2019.2912379"},{"key":"207_CR48","doi-asserted-by":"publisher","unstructured":"Lu XQ, Pan ZK, Xian HQ (2020) An integrity verification scheme of cloud storage for internet-of-things mobile terminal devices. Comput Secur 92. https:\/\/doi.org\/10.1016\/j.cose.2019.101686","DOI":"10.1016\/j.cose.2019.101686"},{"key":"207_CR49","unstructured":"Y. Zhang, J. Yu, R. Hao, C, Wang, K. Ren, \u201cEnabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data,\u201d IEEE Trans Dependable Secure Comput, vol. 17, pp. 608\u2013619, 2020"},{"key":"207_CR50","doi-asserted-by":"publisher","first-page":"44359","DOI":"10.1109\/ACCESS.2020.2977721","volume":"8","author":"W Shen","year":"2020","unstructured":"Shen W, Su Y, Hao R (2020) Lightweight cloud storage auditing with Deduplication supporting strong privacy protection. IEEE Access 8:44359\u201344372","journal-title":"IEEE Access"},{"key":"207_CR51","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/TIFS.2019.2922277","volume":"15","author":"P Zhao","year":"2020","unstructured":"Zhao P, Yu J, Zhang H (2020) How to securely outsource finding the min-cut of undirected edge-weighted graphs. IEEE Trans Inf Forensic Secur 15:315\u2013328","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"207_CR52","doi-asserted-by":"publisher","first-page":"2968","DOI":"10.1109\/JIOT.2020.2964015","volume":"7","author":"H Zhang","year":"2020","unstructured":"Zhang H, Jia Y, Cheng L (2020) Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things. IEEE Internet Things J 7:2968\u20132981","journal-title":"IEEE Internet Things J"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-020-00207-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-020-00207-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-020-00207-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T20:08:01Z","timestamp":1634933281000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-020-00207-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,23]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["207"],"URL":"https:\/\/doi.org\/10.1186\/s13677-020-00207-5","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,23]]},"assertion":[{"value":"16 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"60"}}