{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:28:36Z","timestamp":1772252916932,"version":"3.50.1"},"reference-count":62,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2022,10,29]],"date-time":"2022-10-29T00:00:00Z","timestamp":1667001600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia, I.P. (Portuguese Foundation for Science and Technology)","award":["UIDB\/05064\/2020"],"award-info":[{"award-number":["UIDB\/05064\/2020"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia, I.P. (Portuguese Foundation for Science and Technology)","award":["UIDB\/04111\/2020"],"award-info":[{"award-number":["UIDB\/04111\/2020"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia, I.P. (Portuguese Foundation for Science and Technology)","award":["COFAC\/ILIND\/COPELABS\/3\/2020"],"award-info":[{"award-number":["COFAC\/ILIND\/COPELABS\/3\/2020"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["UIDB\/05064\/2020"],"award-info":[{"award-number":["UIDB\/05064\/2020"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["UIDB\/04111\/2020"],"award-info":[{"award-number":["UIDB\/04111\/2020"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["COFAC\/ILIND\/COPELABS\/3\/2020"],"award-info":[{"award-number":["COFAC\/ILIND\/COPELABS\/3\/2020"]}]},{"name":"ILIND\u2013Instituto Lus\u00f3fono de Investiga\u00e7\u00e3o e Desenvolvimento","award":["UIDB\/05064\/2020"],"award-info":[{"award-number":["UIDB\/05064\/2020"]}]},{"name":"ILIND\u2013Instituto Lus\u00f3fono de Investiga\u00e7\u00e3o e Desenvolvimento","award":["UIDB\/04111\/2020"],"award-info":[{"award-number":["UIDB\/04111\/2020"]}]},{"name":"ILIND\u2013Instituto Lus\u00f3fono de Investiga\u00e7\u00e3o e Desenvolvimento","award":["COFAC\/ILIND\/COPELABS\/3\/2020"],"award-info":[{"award-number":["COFAC\/ILIND\/COPELABS\/3\/2020"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the fast development of blockchain technology in the latest years, its application in scenarios that require privacy, such as health area, have become encouraged and widely discussed. This paper presents an architecture to ensure the privacy of health-related data, which are stored and shared within a blockchain network in a decentralized manner, through the use of encryption with the RSA, ECC, and AES algorithms. Evaluation tests were performed to verify the impact of cryptography on the proposed architecture in terms of computational effort, memory usage, and execution time. The results demonstrate an impact mainly on the execution time and on the increase in the computational effort for sending data to the blockchain, which is justifiable considering the privacy and security provided with the architecture and encryption.<\/jats:p>","DOI":"10.3390\/s22218292","type":"journal-article","created":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T10:47:57Z","timestamp":1667126877000},"page":"8292","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["An Architecture for Managing Data Privacy in Healthcare with Blockchain"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8657-2816","authenticated-orcid":false,"given":"Anubis Graciela","family":"de Moraes Rossetto","sequence":"first","affiliation":[{"name":"Federal Institute of Education, Science and Technology Sul-rio-Grandense, Passo Fundo 99064-440, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1482-1497","authenticated-orcid":false,"given":"Christofer","family":"Sega","sequence":"additional","affiliation":[{"name":"Federal Institute of Education, Science and Technology Sul-rio-Grandense, Passo Fundo 99064-440, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0446-9271","authenticated-orcid":false,"given":"Valderi Reis Quietinho","family":"Leithardt","sequence":"additional","affiliation":[{"name":"COPELABS, Lus\u00f3fona University of Humanities and Technologies, Campo Grande 376, 1749-024 Lisboa, Portugal"},{"name":"VALORIZA, Research Center for Endogenous Resources Valorization, Instituto Polit\u00e9cnico de Portalegre, 7300-555 Portalegre, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2022,10,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"3975","DOI":"10.1007\/s11042-019-7584-6","article-title":"Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm","volume":"79","author":"Shanthakumari","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3390\/fintech1020015","article-title":"Blockchain Technology for Supply Chain Management: A Comprehensive Review","volume":"1","author":"Chang","year":"2022","journal-title":"FinTech"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Sega, C.L., Rossetto, A.G.d.M., Correia, S.D., and Leithardt, V.R.Q. (2022, January 22\u201325). An architectural proposal to protect the privacy of health data stored in the Blockchain. Proceedings of the 2022 17th Iberian Conference on Information Systems and Technologies (CISTI), Madrid, Spain.","DOI":"10.23919\/CISTI54924.2022.9820597"},{"key":"ref_4","unstructured":"Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev., 9."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3158369","article-title":"Security and Privacy on Blockchain","volume":"52","author":"Zhang","year":"2019","journal-title":"ACM Comput. Surv."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"101966","DOI":"10.1016\/j.cose.2020.101966","article-title":"Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey","volume":"97","author":"Shi","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Tang, X., Guo, H., Li, H., Yuan, Y., Wang, J., and Cheng, J. (2021, January 22\u201326). A DAPP Business Data Storage Model Based on Blockchain and IPFS. Proceedings of the International Conference on Artificial Intelligence and Security, Qinghai, China.","DOI":"10.1007\/978-3-030-78612-0_18"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Sestrem Och\u00f4a, I., Silva, L.A., de Mello, G., Alves da Silva, B., de Paz, J.F., Villarrubia Gonz\u00e1lez, G., Garcia, N.M., and Reis Quietinho Leithardt, V. (2019). PRICHAIN: A Partially Decentralized Implementation of UbiPri Middleware Using Blockchain. Sensors, 19.","DOI":"10.3390\/s19204483"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Cesconetto, J., Augusto Silva, L., Bortoluzzi, F., Navarro-C\u00e1ceres, M.A., Zeferino, C., and R. Q. Leithardt, V. (2020). PRIPRO\u2014Privacy Profiles: User Profiling Management for Smart Environments. Electronics, 9.","DOI":"10.3390\/electronics9091519"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Lopes, H., Pires, I.M., S\u00e1nchez San Blas, H., Garc\u00eda-Ovejero, R., and Leithardt, V. (2020). PriADA: Management and Adaptation of Information Based on Data Privacy in Public Environments. Computers, 9.","DOI":"10.3390\/computers9040077"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"100895","DOI":"10.1016\/j.softx.2021.100895","article-title":"PADRES: Tool for PrivAcy, Data REgulation and Security","volume":"17","author":"Pereira","year":"2022","journal-title":"SoftwareX"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42786-018-00002-6","article-title":"A survey of blockchain from security perspective","volume":"3","author":"Dasgupta","year":"2019","journal-title":"J. Bank. Financ. Technol."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","article-title":"A survey on privacy protection in blockchain system","volume":"126","author":"Feng","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1016\/j.future.2022.04.017","article-title":"A blockchain-based protocol for tracking user access to shared medical imaging","volume":"134","author":"Meneguette","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1016\/j.future.2018.12.044","article-title":"Privacy-friendly platform for healthcare data in cloud based on blockchain environment","volume":"95","author":"Omar","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"30605","DOI":"10.1007\/s11042-020-09322-6","article-title":"Blockchain-based access control scheme with incentive mechanism for eHealth systems: Patient as supervisor","volume":"80","author":"Gan","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_17","unstructured":"Liang, W., Yang, Y., Yang, C., Hu, Y., Xie, S., Li, K.C., and Cao, J. (2022). PDPChain: A Consortium Blockchain-Based Privacy Protection Scheme for Personal Data. IEEE Trans. Reliab., 1\u201313."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"10127","DOI":"10.1109\/ACCESS.2018.2890507","article-title":"Blockchain for AI: Review and Open Research Challenges","volume":"7","author":"Salah","year":"2019","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MC.2018.3620971","article-title":"AI and Blockchain: A Disruptive Integration","volume":"51","author":"Dinh","year":"2018","journal-title":"Computer"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Stefenon, S.F., Singh, G., Yow, K.C., and Cimatti, A. (2022). Semi-ProtoPNet Deep Neural Network for the Classification of Defective Power Grid Distribution Structures. Sensors, 22.","DOI":"10.3390\/s22134859"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Corso, M.P., Perez, F.L., Stefenon, S.F., Yow, K.C., Garc\u00eda Ovejero, R., and Leithardt, V.R.Q. (2021). Classification of Contaminated Insulators Using k-Nearest Neighbors Based on Computer Vision. Computers, 10.","DOI":"10.20944\/preprints202108.0282.v1"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1096","DOI":"10.1049\/gtd2.12353","article-title":"Classification of insulators using neural network based on computer vision","volume":"16","author":"Stefenon","year":"2021","journal-title":"IET Gener. Transm. Distrib."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"107584","DOI":"10.1016\/j.epsr.2021.107584","article-title":"Time series forecasting using ensemble learning methods for emergency prevention in hydroelectric power plants with dam","volume":"202","author":"Stefenon","year":"2022","journal-title":"Electr. Power Syst. Res."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3285","DOI":"10.3233\/JIFS-211126","article-title":"Comparison of artificial intelligence techniques to failure prediction in contaminated insulators based on leakage current","volume":"42","author":"Medeiros","year":"2022","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"6221","DOI":"10.3233\/JIFS-212788","article-title":"Long short-term memory stacking model to predict the number of cases and deaths caused by COVID-19","volume":"6","author":"Fernandes","year":"2022","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"33980","DOI":"10.1109\/ACCESS.2022.3161506","article-title":"Analysis of the Ultrasonic Signal in Polymeric Contaminated Insulators Through Ensemble Learning Methods","volume":"10","author":"Stefenon","year":"2022","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2013","DOI":"10.1109\/TLA.2019.9011546","article-title":"Deep Learning for Photovoltaic Generation Forecast in Active Solar Trackers","volume":"17","author":"Kasburg","year":"2019","journal-title":"IEEE Lat. Am. Trans."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"107336","DOI":"10.1016\/j.ijepes.2021.107336","article-title":"Echo state network applied for classification of medium voltage insulators","volume":"134","author":"Stefenon","year":"2022","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Sopelsa Neto, N.F., Stefenon, S.F., Meyer, L.H., Bruns, R., Nied, A., Seman, L.O., Gonzalez, G.V., Leithardt, V.R.Q., and Yow, K.C. (2021). A Study of Multilayer Perceptron Networks Applied to Classification of Ceramic Insulators Using Ultrasound. Appl. Sci., 11.","DOI":"10.3390\/app11041592"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1865","DOI":"10.1049\/gtd2.12425","article-title":"Optimal design of electrical power distribution grid spacers using finite element method","volume":"16","author":"Stefenon","year":"2022","journal-title":"IET Gener. Transm. Distrib."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Harris, J.D., and Waggoner, B. (2019, January 14\u201317). Decentralized and Collaborative AI on Blockchain. Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA.","DOI":"10.1109\/Blockchain.2019.00057"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Atlam, H.F., Azad, M.A., Alzahrani, A.G., and Wills, G. (2020). A Review of Blockchain in Internet of Things and AI. Big Data Cogn. Comput., 4.","DOI":"10.3390\/bdcc4040028"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Jiang, Y., Xu, X., and Xiao, F. (2022). Attribute-based Encryption with Blockchain Protection Scheme for Electronic Health Records. IEEE Trans. Netw. Serv. Manag.","DOI":"10.1109\/TNSM.2022.3193707"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"147782","DOI":"10.1109\/ACCESS.2019.2946373","article-title":"Using Blockchain for Electronic Health Records","volume":"7","author":"Shahnaz","year":"2019","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"102857","DOI":"10.1016\/j.jnca.2020.102857","article-title":"Survey on blockchain based smart contracts: Applications, opportunities and challenges","volume":"177","author":"Hewa","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Sestrem Och\u00f4a, I., Mello, G., Silva, L., Gomes, A., Fernandes, A., and Leithardt, V. (2019). FakeChain: A Blockchain Architecture to Ensure Trust in Social Media Networks. Quality of Information and Communications Technology, Springer International Publishing.","DOI":"10.1007\/978-3-030-29238-6_8"},{"key":"ref_37","unstructured":"Kalodner, H., Goldfeder, S., Chen, X., Weinberg, S.M., and Felten, E.W. (2018, January 15\u201317). Arbitrum: Scalable, private smart contracts. Proceedings of the 27th USENIX Security Symposium (USENIX Security 18), Baltimore, MD, USA."},{"key":"ref_38","unstructured":"Ethereum (2022, May 14). Introduction to Smart Contracts. Available online: https:\/\/docs.soliditylang.org\/en\/develop\/introduction-to-smart-contracts.html."},{"key":"ref_39","unstructured":"Ethereum (2022, May 14). Contract ABI Specification. Available online: https:\/\/docs.soliditylang.org\/en\/develop\/abi-spec.html."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1109\/TLA.2014.6894012","article-title":"Energy Consumption Analysis of the Cryptographic Key Generation Process of RSA and ECC Algorithms in Embedded Systems","volume":"12","year":"2014","journal-title":"IEEE Lat. Am. Trans."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Singh, S.R., Khan, A.K., and Singh, S.R. (2016, January 14\u201317). Performance evaluation of RSA and Elliptic Curve Cryptography. Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), Greater Noida, India.","DOI":"10.1109\/IC3I.2016.7917979"},{"key":"ref_42","first-page":"11","article-title":"Criptografia sim\u00e9trica e assim\u00e9trica: Os principais algoritmos de cifragem","volume":"5","author":"Oliveira","year":"2012","journal-title":"Rev. Seguran\u00e7A Digit."},{"key":"ref_43","first-page":"9053","article-title":"RSA and ECC: A comparative analysis","volume":"12","author":"Mahto","year":"2017","journal-title":"Int. J. Appl. Eng. Res."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1016\/j.procs.2016.02.108","article-title":"A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish","volume":"78","author":"Patil","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Saraiva, D.A., Leithardt, V.R.Q., de Paula, D., Sales Mendes, A., Gonz\u00e1lez, G.V., and Crocker, P. (2019). Prisec: Comparison of symmetric key algorithms for iot devices. Sensors, 19.","DOI":"10.3390\/s19194312"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Hirai, Y. (2017, January 3\u20137). Defining the ethereum virtual machine for interactive theorem provers. Proceedings of the International Conference on Financial Cryptography and Data Security, Sliema, Malta.","DOI":"10.1007\/978-3-319-70278-0_33"},{"key":"ref_47","unstructured":"(2022, May 14). TruffleSuite. Truffle. Available online: https:\/\/trufflesuite.com\/docs\/truffle\/index.html."},{"key":"ref_48","unstructured":"(2022, May 14). TruffleSuite. Ganache. Available online: https:\/\/trufflesuite.com\/docs\/ganache\/index.html."},{"key":"ref_49","unstructured":"(2022, May 14). MetaMask. Introduction. Available online: https:\/\/docs.metamask.io\/guide\/."},{"key":"ref_50","unstructured":"(2022, May 14). REACT. React. Available online: https:\/\/pt-br.reactjs.org\/."},{"key":"ref_51","unstructured":"(2022, May 14). Node.js. About Node.js. Available online: https:\/\/nodejs.org\/en\/about\/."},{"key":"ref_52","first-page":"72","article-title":"Node.js challenges in implementation","volume":"17","author":"Shah","year":"2017","journal-title":"Glob. J. Comput. Sci. Technol."},{"key":"ref_53","unstructured":"Dabit, N. (2022, May 14). What Is Web3?. The Decentralized Internet of the Future Explained. Available online: https:\/\/www.freecodecamp.org\/news\/what-is-web3\/."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Behal, P. (2022, May 14). Listen-To-Earn: How Web3 Can Change the Music Industry. Available at SSRN 4150998. Available online: https:\/\/doi.org\/10.2139\/ssrn.4150998.","DOI":"10.2139\/ssrn.4150998"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Panda, S.K., and Satapathy, S.C. (2021). An Investigation into Smart Contract Deployment on Ethereum Platform Using Web3.js and Solidity Using Blockchain. Data Engineering and Intelligent Computing, Springer.","DOI":"10.1007\/978-981-16-0171-2_52"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Naik, N., and Jenkins, P. (November, January 12). uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain. Proceedings of the 2020 IEEE International Symposium on Systems Engineering (ISSE), virtual.","DOI":"10.1109\/ISSE49799.2020.9272223"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Naik, N., and Jenkins, P. (2020, January 3\u20136). Self-Sovereign Identity Specifications: Govern Your Identity Through Your Digital Wallet using Blockchain Technology. Proceedings of the 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), Oxford, UK.","DOI":"10.1109\/MobileCloud48802.2020.00021"},{"key":"ref_58","unstructured":"(2022, May 14). Infura. The Infura Ethereum API. Available online: https:\/\/infura.io\/product\/ethereum."},{"key":"ref_59","unstructured":"McCubbin, G. (2022, May 14). DAPP University. Available online: https:\/\/github.com\/dappuniversity."},{"key":"ref_60","unstructured":"Sega, C.L., Rossetto, A.G.d.M., and Leithardt, V.R.Q. (2022). Design and implementation of a DApp to store health data. arXiv."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Suma, V., Bouhmala, N., and Wang, H. (2021). Evolutionary Computing and Mobile Sustainable Networks: Proceedings of ICECMSN 2020, Springer.","DOI":"10.1007\/978-981-15-5258-8"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Barker, E., and Roginsky, A. (2019). Transitioning the Use of Cryptographic Algorithms and Key Lengths, NIST Special Publication 800-131A Revision 2; National Institute of Standards and Technology.","DOI":"10.6028\/NIST.SP.800-131Ar2"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/21\/8292\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:05:28Z","timestamp":1760144728000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/21\/8292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,29]]},"references-count":62,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2022,11]]}},"alternative-id":["s22218292"],"URL":"https:\/\/doi.org\/10.3390\/s22218292","relation":{"has-preprint":[{"id-type":"doi","id":"10.20944\/preprints202209.0094.v1","asserted-by":"object"}]},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,29]]}}}