{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T10:15:18Z","timestamp":1778148918084,"version":"3.51.4"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T00:00:00Z","timestamp":1719446400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of King Saud University - Computer and Information Sciences"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1016\/j.jksuci.2024.102117","type":"journal-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T09:04:28Z","timestamp":1719911068000},"page":"102117","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":7,"title":["Study on data storage and verification methods based on improved Merkle mountain range in IoT scenarios"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5148-8392","authenticated-orcid":false,"given":"Chufeng","family":"Liang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8876-4192","authenticated-orcid":false,"given":"Junlang","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4744-2810","authenticated-orcid":false,"given":"Shansi","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5134-8865","authenticated-orcid":false,"given":"Yu","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9005-6670","authenticated-orcid":false,"given":"Zhicheng","family":"Hong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9346-7979","authenticated-orcid":false,"given":"Jiawen","family":"Fang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8572-5849","authenticated-orcid":false,"given":"Yongzhang","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9439-2687","authenticated-orcid":false,"given":"Hua","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10.1016\/j.jksuci.2024.102117_b1","series-title":"2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering","first-page":"1","article-title":"Efficient decentralized data storage based on public blockchain and IPFS","author":"Alizadeh","year":"2020"},{"key":"10.1016\/j.jksuci.2024.102117_b2","series-title":"2023 International Conference for Advancement in Technology","first-page":"1","article-title":"Survey on connecting to the decentralized storage using IPFS protocol with web 3 technology","author":"Anand","year":"2023"},{"key":"10.1016\/j.jksuci.2024.102117_b3","series-title":"Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings 11","first-page":"119","article-title":"BLAKE2: simpler, smaller, fast as MD5","author":"Aumasson","year":"2013"},{"key":"10.1016\/j.jksuci.2024.102117_b4","series-title":"Five takeaways from FlexBooker\u2019s data breach","author":"Avital","year":"2022"},{"key":"10.1016\/j.jksuci.2024.102117_b5","doi-asserted-by":"crossref","DOI":"10.1016\/j.comcom.2023.07.023","article-title":"Blockchain based resource allocation in cloud and distributed edge computing: A survey","author":"Baranwal","year":"2023","journal-title":"Comput. Commun."},{"key":"10.1016\/j.jksuci.2024.102117_b6","article-title":"Blockchain-based decentralized storage networks: A survey","volume":"162","author":"Benisi","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"10.1016\/j.jksuci.2024.102117_b7","article-title":"Comparative analysis of permissioned blockchain frameworks for industrial applications","volume":"4","author":"Capocasale","year":"2023","journal-title":"Blockchain: Res. Appl."},{"key":"10.1016\/j.jksuci.2024.102117_b8","first-page":"1","article-title":"Blockchain-based data integrity framework for Internet of Things","author":"Chanal","year":"2023","journal-title":"Int. J. Inf. Secur."},{"issue":"3","key":"10.1016\/j.jksuci.2024.102117_b9","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1109\/JSAC.2018.2815360","article-title":"Task offloading for mobile edge computing in software defined ultra-dense network","volume":"36","author":"Chen","year":"2018","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.jksuci.2024.102117_b10","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2022.102677","article-title":"A blockchain-based dynamic and traceable data integrity verification scheme for smart homes","volume":"130","author":"Chen","year":"2022","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.jksuci.2024.102117_b11","first-page":"1","article-title":"Data secure application: an application that allows developers to store user data securely using blockchain and IPFS","author":"Dewang","year":"2023","journal-title":"Multimedia Tools Appl."},{"key":"10.1016\/j.jksuci.2024.102117_b12","series-title":"Service-Oriented and Cloud Computing: 6th IFIP WG 2.14 European Conference, ESOCC 2017, Oslo, Norway, September 27-29, 2017, Proceedings 6","first-page":"3","article-title":"On or off the blockchain? Insights on off-chaining computation and data","author":"Eberhardt","year":"2017"},{"key":"10.1016\/j.jksuci.2024.102117_b13","doi-asserted-by":"crossref","unstructured":"Guidi, B., Michienzi, A., Ricci, L., 2022. Evaluating the decentralisation of filecoin. In: Proceedings of the 3rd International Workshop on Distributed Infrastructure for the Common Good. pp. 13\u201318.","DOI":"10.1145\/3565383.3566108"},{"key":"10.1016\/j.jksuci.2024.102117_b14","doi-asserted-by":"crossref","first-page":"17707","DOI":"10.1109\/ACCESS.2022.3149312","article-title":"Trustworthy IoT data streaming using blockchain and IPFS","volume":"10","author":"Hasan","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.jksuci.2024.102117_b15","doi-asserted-by":"crossref","unstructured":"Hasan, S.S., Sultan, N.H., Barbhuiya, F.A., 2019. Cloud data provenance using IPFS and blockchain technology. In: Proceedings of the Seventh International Workshop on Security in Cloud Computing. pp. 5\u201312.","DOI":"10.1145\/3327962.3331457"},{"key":"10.1016\/j.jksuci.2024.102117_b16","first-page":"1","article-title":"Enabling decentralized and dynamic data integrity verification for secure cloud storage via T-Merkle hash tree based blockchain","volume":"2021","author":"He","year":"2021","journal-title":"Mob. Inf. Syst."},{"key":"10.1016\/j.jksuci.2024.102117_b17","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2023.3240237","article-title":"A comprehensive survey on blockchain-based decentralized storage networks","author":"Khalid","year":"2023","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.jksuci.2024.102117_b18","doi-asserted-by":"crossref","first-page":"484","DOI":"10.3390\/electronics9030484","article-title":"A data verification system for CCTV surveillance cameras using blockchain technology in smart cities","volume":"9","author":"Khan","year":"2020","journal-title":"Electronics"},{"issue":"12","key":"10.1016\/j.jksuci.2024.102117_b19","doi-asserted-by":"crossref","first-page":"2532","DOI":"10.3390\/app8122532","article-title":"Improving security and reliability in Merkle tree-based online data authentication with leakage resilience","volume":"8","author":"Koo","year":"2018","journal-title":"Appl. Sci."},{"issue":"1","key":"10.1016\/j.jksuci.2024.102117_b20","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/TPDS.2022.3216614","article-title":"CIA: A collaborative integrity auditing scheme for cloud data with multi-replica on multi-cloud storage providers","volume":"34","author":"Li","year":"2022","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.jksuci.2024.102117_b21","doi-asserted-by":"crossref","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L., 2006. Dynamic authenticated index structures for outsourced databases. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data. pp. 121\u2013132.","DOI":"10.1145\/1142473.1142488"},{"key":"10.1016\/j.jksuci.2024.102117_b22","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2023.102854","article-title":"Blockchain-based auditing with data self-repair: From centralized system to distributed storage","volume":"137","author":"Li","year":"2023","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.jksuci.2024.102117_b23","article-title":"Algebraic signature-based public data integrity batch verification for cloud-IoT","author":"Li","year":"2023","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"5","key":"10.1016\/j.jksuci.2024.102117_b24","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1109\/TSC.2018.2853167","article-title":"Blockchain for large-scale internet of things data storage and protection","volume":"12","author":"Li","year":"2018","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.jksuci.2024.102117_b25","article-title":"Data integrity audit scheme based on quad merkle tree and blockchain","author":"Liu","year":"2023","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.jksuci.2024.102117_b26","doi-asserted-by":"crossref","first-page":"717","DOI":"10.3390\/electronics12030717","article-title":"Dynamic data integrity auditing based on hierarchical Merkle hash tree in cloud storage","volume":"12","author":"Liu","year":"2023","journal-title":"Electronics"},{"key":"10.1016\/j.jksuci.2024.102117_b27","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2019.100107","article-title":"Blockchain technology: A survey on applications and security privacy challenges","volume":"8","author":"Mohanta","year":"2019","journal-title":"Internet Things"},{"issue":"2","key":"10.1016\/j.jksuci.2024.102117_b28","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/MCE.2021.3140048","article-title":"Blockchain-based medical certificate generation and verification for IoT-based healthcare systems","volume":"12","author":"Namasudra","year":"2022","journal-title":"IEEE Consum. Electron. Mag."},{"key":"10.1016\/j.jksuci.2024.102117_b29","article-title":"On the (not so) surprising impact of multi-path payments on performance and privacy in the lightning network","author":"Ndolo","year":"2023","journal-title":"Cryptol. ePrint Arch."},{"key":"10.1016\/j.jksuci.2024.102117_b30","series-title":"Peer-to-peer databases for the decentralized web","author":"OrbitDB","year":"2015"},{"issue":"3","key":"10.1016\/j.jksuci.2024.102117_b31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3549542","article-title":"Is my transaction done yet? an empirical study of transaction processing times in the ethereum blockchain platform","volume":"32","author":"Pacheco","year":"2023","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/j.jksuci.2024.102117_b32","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1109\/TSC.2017.2708116","article-title":"Dynamic outsourced auditing services for cloud storage based on batch-leaves-authenticated Merkle hash tree","volume":"13","author":"Rao","year":"2020","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.jksuci.2024.102117_b33","first-page":"1","article-title":"An improved lattice based certificateless data integrity verification techniques for cloud computing","author":"Salvakkam","year":"2023","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"issue":"3","key":"10.1016\/j.jksuci.2024.102117_b34","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/s12046-018-1042-4","article-title":"Data integrity verification: a novel approach for cloud computing","volume":"44","author":"Saxena","year":"2019","journal-title":"S\u0101dhan\u0101"},{"key":"10.1016\/j.jksuci.2024.102117_b35","doi-asserted-by":"crossref","first-page":"7984","DOI":"10.1109\/ACCESS.2023.3238732","article-title":"Security and integrity attacks in named data networking: A survey","volume":"11","author":"Shah","year":"2023","journal-title":"IEEE Access"},{"issue":"6","key":"10.1016\/j.jksuci.2024.102117_b36","doi-asserted-by":"crossref","first-page":"143","DOI":"10.3390\/fi13060143","article-title":"Engravechain: A blockchain-based tamper-proof distributed log system","volume":"13","author":"Shekhtman","year":"2021","journal-title":"Future Internet"},{"key":"10.1016\/j.jksuci.2024.102117_b37","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/j.future.2020.05.047","article-title":"Iota Tangle: A cryptocurrency to communicate Internet-of-Things data","volume":"112","author":"Silvano","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"issue":"6","key":"10.1016\/j.jksuci.2024.102117_b38","doi-asserted-by":"crossref","first-page":"3523","DOI":"10.1007\/s10586-022-03745-6","article-title":"A blockchain-based IoT data marketplace","volume":"26","author":"Sober","year":"2023","journal-title":"Cluster Comput."},{"key":"10.1016\/j.jksuci.2024.102117_b39","series-title":"2021 2nd International Conference on Robotics, Electrical and Signal Processing Techniques","first-page":"732","article-title":"Increasing throughput and reducing storage bloating problem using IPFS and dual-blockchain method","author":"Sohan","year":"2021"},{"issue":"9","key":"10.1016\/j.jksuci.2024.102117_b40","doi-asserted-by":"crossref","first-page":"1489","DOI":"10.3390\/electronics11091489","article-title":"BSTProv: Blockchain-based secure and trustworthy data provenance sharing","volume":"11","author":"Sun","year":"2022","journal-title":"Electronics"},{"key":"10.1016\/j.jksuci.2024.102117_b41","series-title":"Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23","first-page":"541","article-title":"Merkle tree traversal in log space and time","author":"Szydlo","year":"2004"},{"key":"10.1016\/j.jksuci.2024.102117_b42","series-title":"2020 IEEE International Conference on Consumer Electronics","first-page":"1","article-title":"A distributed log management method using a blockchain scheme","author":"Taguchi","year":"2020"},{"key":"10.1016\/j.jksuci.2024.102117_b43","series-title":"Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19\u201323, 2021, Proceedings, Part II 7","first-page":"219","article-title":"A DAPP business data storage model based on blockchain and IPFS","author":"Tang","year":"2021"},{"key":"10.1016\/j.jksuci.2024.102117_b44","article-title":"A survey on efficient auditing scheme for secure data storage in fog-to-cloud computing","author":"Thenmozhi","year":"2023","journal-title":"Int. J. Eng. Technol. Manag. Sci."},{"key":"10.1016\/j.jksuci.2024.102117_b45","series-title":"Merkle mountain range","author":"Todd","year":"2012"},{"key":"10.1016\/j.jksuci.2024.102117_b46","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2023.3291618","article-title":"Performance and scalability analysis of Ethereum and Hyperledger fabric","author":"Ucbas","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.jksuci.2024.102117_b47","doi-asserted-by":"crossref","first-page":"36978","DOI":"10.1109\/ACCESS.2022.3164081","article-title":"Towards blockchain-based secure storage and trusted data sharing scheme for IoT environment","volume":"10","author":"Ullah","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.jksuci.2024.102117_b48","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpdc.2021.02.012","article-title":"RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks","volume":"152","author":"Wang","year":"2021","journal-title":"J. Parallel Distrib. Comput."},{"key":"10.1016\/j.jksuci.2024.102117_b49","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2020.101971","article-title":"Edge-based auditing method for data security in resource-constrained internet of things","volume":"114","author":"Wang","year":"2021","journal-title":"J. Syst. Archit."},{"key":"10.1016\/j.jksuci.2024.102117_b50","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1109\/JSAIT.2022.3177711","article-title":"Breaking blockchain\u2019s communication barrier with coded computation","volume":"3","author":"Wang","year":"2022","journal-title":"IEEE J. Sel. Areas Inf. Theory"},{"key":"10.1016\/j.jksuci.2024.102117_b51","doi-asserted-by":"crossref","first-page":"164996","DOI":"10.1109\/ACCESS.2019.2952635","article-title":"Blockchain based data integrity verification for large-scale IoT data","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.jksuci.2024.102117_b52","unstructured":"Wood, G., et al., 2014. Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum Project Yellow Paper, Vol. 151, (2014), pp. 1\u201332."},{"key":"10.1016\/j.jksuci.2024.102117_b53","doi-asserted-by":"crossref","first-page":"1393","DOI":"10.1109\/TPDS.2021.3113873","article-title":"VQL: Efficient and verifiable cloud query services for blockchain systems","volume":"33","author":"Wu","year":"2022","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"10.1016\/j.jksuci.2024.102117_b54","doi-asserted-by":"crossref","DOI":"10.1080\/09540091.2023.2213863","article-title":"A collaborative auditing scheme with dynamic data updates based on blockchain","volume":"35","author":"Xiao","year":"2023","journal-title":"Connect. Sci."},{"key":"10.1016\/j.jksuci.2024.102117_b55","first-page":"1","article-title":"Blockchain-based cloud data integrity verification scheme with high efficiency","volume":"2021","author":"Xie","year":"2021","journal-title":"Secur. Commun. Netw."},{"issue":"5","key":"10.1016\/j.jksuci.2024.102117_b56","doi-asserted-by":"crossref","first-page":"8770","DOI":"10.1109\/JIOT.2019.2923525","article-title":"Healthchain: A blockchain-based privacy preserving scheme for large-scale health data","volume":"6","author":"Xu","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.jksuci.2024.102117_b57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11432-018-9462-0","article-title":"Identity-based public auditing for cloud storage systems against malicious auditors via blockchain","volume":"62","author":"Xue","year":"2019","journal-title":"Sci. China Inf. Sci."},{"issue":"6","key":"10.1016\/j.jksuci.2024.102117_b58","doi-asserted-by":"crossref","first-page":"8509","DOI":"10.1007\/s11227-021-04193-6","article-title":"Identity-based public data integrity verification scheme in cloud storage system via blockchain","volume":"78","author":"Yuan","year":"2022","journal-title":"J. Supercomput."},{"key":"10.1016\/j.jksuci.2024.102117_b59","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpdc.2020.06.007","article-title":"Blockchain-based verification framework for data integrity in edge-cloud storage","volume":"146","author":"Yue","year":"2020","journal-title":"J. Parallel Distrib. Comput."},{"key":"10.1016\/j.jksuci.2024.102117_b60","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/j.future.2023.03.044","article-title":"A survey on the efficiency, reliability, and security of data query in blockchain systems","volume":"145","author":"Zhang","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jksuci.2024.102117_b61","series-title":"2021 IEEE 37th International Conference on Data Engineering","first-page":"996","article-title":"Authenticated keyword search in scalable hybrid-storage blockchains","author":"Zhang","year":"2021"},{"key":"10.1016\/j.jksuci.2024.102117_b62","series-title":"IFIP International Conference on Advances in Production Management Systems","first-page":"222","article-title":"Decentralized industrial IoT data management based on blockchain and IPFS","author":"Zheng","year":"2020"},{"key":"10.1016\/j.jksuci.2024.102117_b63","article-title":"A scalable blockchain-based integrity verification scheme","volume":"2022","author":"Zhou","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."}],"container-title":["Journal of King Saud University - Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1319157824002064?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1319157824002064?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T17:16:13Z","timestamp":1736183773000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1319157824002064"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":63,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["S1319157824002064"],"URL":"https:\/\/doi.org\/10.1016\/j.jksuci.2024.102117","relation":{},"ISSN":["1319-1578"],"issn-type":[{"value":"1319-1578","type":"print"}],"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Study on data storage and verification methods based on improved Merkle mountain range in IoT scenarios","name":"articletitle","label":"Article Title"},{"value":"Journal of King Saud University - Computer and Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jksuci.2024.102117","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 The Author(s). Published by Elsevier B.V. on behalf of King Saud University.","name":"copyright","label":"Copyright"}],"article-number":"102117"}}