Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage

Published: 20 April 2021 Publication History

Abstract

Searchable Encryption (SE) is a technique that allows Cloud Service Providers to search over encrypted datasets without learning the content of queries and records. In recent years, many SE schemes have been proposed to protect outsourced data. However, most of them leak sensitive information, from which attackers could still infer the content of queries and records by mounting leakage-based inference attacks, such as the count attack and file-injection attack.
In this work, first we define the leakage in searchable encrypted databases and analyse how the leakage is leveraged in existing leakage-based attacks. Second, we propose a <underline>P</underline>rivacy-preserving <underline>M</underline>ulti-<underline>c</underline>loud based dynamic symmetric SE scheme for relational <underline>D</underline>ata<underline>b</underline>ase (P-McDb). P-McDb has minimal leakage, which not only ensures confidentiality of queries and records but also protects the search, intersection, and size patterns. Moreover, P-McDb ensures both forward and backward privacy of the database. Thus, P-McDb could resist existing leakage-based attacks, e.g., active file/record-injection attacks. We give security definition and analysis to show how P-McDb hides the aforementioned patterns. Finally, we implemented a prototype of P-McDb and tested it using the TPC-H benchmark dataset. Our evaluation results show that users can get the required records in 2.16 s when searching over 4.1 million records.

References

[1]
Mohamed Ahmed Abdelraheem, Tobias Andersson, and Christian Gehrmann. 2017. Inference and record-injection attacks on searchable encrypted relational databases. IACR Cryptol. ePrint Arch. (2017), 24.
[2]
Mohamed Ahmed Abdelraheem, Tobias Andersson, and Christian Gehrmann. 2017. Searchable encrypted relational databases: Risks and countermeasures. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 70--85.
[3]
Ghous Amjad, Seny Kamara, and Tarik Moataz. 2019. Forward and backward private searchable encryption with SGX. In EuroSec 2019. ACM, 4:1--4:6.
[4]
Arvind Arasu, Spyros Blanas, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ravishankar Ramamurthy, and Ramarathnam Venkatesan. 2013. Orthogonal security with cipherbase. In CIDR.
[5]
Muhammad Rizwan Asghar. 2013. Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments. Ph.D. Dissertation. University of Trento.
[6]
Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, and Bruno Crispo. 2013. : Enforcing security policies in outsourced environments. Comput. Secur. (2013), 2--24.
[7]
Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo, and Mihaela Ion. 2013. Supporting complex queries and access policies for multi-user encrypted databases. In CCSW 2013. ACM, 77--88.
[8]
Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, and Vitaly Shmatikov. 2018. The Tao of inference in privacy-protected databases. Proc. VLDB 11, 11 (2018), 1715--1728.
[9]
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. 2004. Public key encryption with keyword search. In EUROCRYPT 2004. Springer, 506--522.
[10]
Christoph Bösch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Pieter H. Hartel, and Willem Jonker. 2014. Distributed searchable symmetric encryption. In PST 2014. IEEE Computer Society, 330--337.
[11]
Raphael Bost. 2016. oo: Forward secure searchable encryption. In SIGSAC 2016. ACM, 1143--1154.
[12]
Raphael Bost and Pierre-Alain Fouque. 2017. Thwarting leakage abuse attacks against searchable encryption - A formal approach and applications to database padding. IACR Cryptol. ePrint Arch. (2017), 1060.
[13]
Raphael Bost, Pierre-Alain Fouque, and David Pointcheval. 2016. Verifiable dynamic symmetric searchable encryption: Optimality and forward security. IACR Cryptol. ePrint Arch. (2016), 62.
[14]
Raphaël Bost, Brice Minaud, and Olga Ohrimenko. 2017. Forward and backward private searchable encryption from constrained cryptographic primitives. In CCS 2017. ACM, 1465--1482.
[15]
Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou. 2014. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25, 1 (2014), 222--233.
[16]
David Cash, Paul Grubbs, Jason Perry, and Thomas Ristenpart. 2015. Leakage-abuse attacks against searchable encryption. In SIGSAC 2015. ACM, 668--679.
[17]
David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner. 2014. Dynamic searchable encryption in very-large databases: Data structures and implementation. In NDSS 2014. The Internet Society.
[18]
Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, and Rasool Jalili. 2018. New constructions for forward and backward private symmetric searchable encryption. In CCS 2018. ACM, 1038--1055.
[19]
Konstantinos Chatzikokolakis, Miguel E. Andrés, Nicolás Emilio Bordenabe, and Catuscia Palamidessi. 2013. Broadening the scope of differential privacy using metrics. In PETS 2013Lecture Notes in Computer Science, Vol. 7981. Springer, 82--102.
[20]
Guoxing Chen, Ten-Hwang Lai, Michael K. Reiter, and Yinqian Zhang. 2018. Differentially private access patterns for searchable symmetric encryption. In INFOCOM 2018. IEEE, 810--818.
[21]
Victor Costan and Srinivas Devadas. 2016. Intel SGX explained. IACR Cryptol. ePrint Arch. 2016, 086 (2016), 1--118.
[22]
Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith, and Giovanni Russello. 2017. P-McDb: Privacy-preserving search using multi-cloud encrypted databases. In CLOUD 2017. IEEE Computer Society, 334--341.
[23]
Reza Curtmola, Juan A. Garay, Seny Kamara, and Rafail Ostrovsky. 2006. Searchable symmetric encryption: Improved definitions and efficient constructions. In CCS 2006. ACM, 79--88.
[24]
Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Saurabh Shintre. 2019. SEAL: Attack mitigation for encrypted databases via adjustable leakage. IACR Cryptol. ePrint Arch. 2019 (2019), 811.
[25]
F. Betül Durak, Thomas M. DuBuisson, and David Cash. 2016. What else is revealed by order-revealing encryption? In SIGSAC 2016. ACM, 1155--1166.
[26]
Jan-Erik Ekberg, Kari Kostiainen, and N. Asokan. 2013. Trusted execution environments on mobile devices. In CCS 2013. 1497--1498.
[27]
Enron Email. [n.d.]. Enron Email Dataset. Retrieved June 23, 2020 from http://www.enronemail.com.
[28]
Ben A. Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, and Steven M. Bellovin. 2015. Malicious-client security in Blind Seer: A scalable private DBMS. In SP 2015. IEEE Computer Society, 395--410.
[29]
Flexera. [n.d.]. Flexera 2020 State of the Cloud Report. Retrived June 23, 2020 from https://info.flexera.com/SLO-CM-REPORT-State-of-the-Cloud-2020.
[30]
Craig Gentry. 2009. Fully homomorphic encryption using ideal lattices. In STOC 2009. ACM, 169--178.
[31]
Oded Goldreich and Rafail Ostrovsky. 1996. Software protection and simulation on oblivious RAMs. J. ACM (1996), 431--473.
[32]
Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, and Kenneth G. Paterson. 2018. Pump up the volume: Practical database reconstruction from volume leakage on range queries. In CCS 2018. ACM, 315--331.
[33]
Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, and Kenneth G. Paterson. 2019. Learning to reconstruct: Statistical learning theory and encrypted database attacks. In SP 2019. IEEE, 1067--1083.
[34]
Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, and Thomas Ristenpart. 2017. Leakage-abuse attacks against order-revealing encryption. In SP 2017. IEEE Computer Society, 655--672.
[35]
Haryadi S. Gunawi, Mingzhe Hao, Tanakorn Leesatapornwongsa, Tiratat Patana-anake, Thanh Do, Jeffry Adityatama, Kurnia J. Eliazar, Agung Laksono, Jeffrey F. Lukman, Vincentius Martin, and Anang D. Satria. 2014. What bugs live in the cloud? A study of 3000+ issues in cloud systems. In SoCC 2014. ACM, 7:1--7:14.
[36]
Florian Hahn and Florian Kerschbaum. 2014. Searchable encryption with secure and efficient updates. In SIGSAC 2014. ACM, 310--320.
[37]
Thang Hoang, Attila A. Yavuz, F. Betül Durak, and Jorge Guajardo. 2018. Oblivious dynamic searchable encryption on distributed cloud systems. In DBSec 2018, Lecture Notes in Computer Science, Vol. 10980. Springer, 113--130.
[38]
Thang Hoang, Attila Altay Yavuz, and Jorge Guajardo. 2016. Practical and secure dynamic searchable encryption via oblivious access on distributed data structure. In ACSAC 2016. ACM, 302--313.
[39]
Yuval Ishai, Eyal Kushilevitz, Steve Lu, and Rafail Ostrovsky. 2016. Private large-scale databases with distributed searchable symmetric encryption. In CT-RSA 2016. Springer, 90--107.
[40]
Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In NDSS 2012. The Internet Society.
[41]
Seny Kamara, Charalampos Papamanthou, and Tom Roeder. 2012. Dynamic searchable symmetric encryption. In CCS 2012. ACM, 965--976.
[42]
Georgios Kellaris, George Kollios, Kobbi Nissim, and Adam O’Neill. 2016. Generic attacks on secure outsourced databases. In SIGSAC 2016. ACM, 1329--1340.
[43]
Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, and Woo-Hwan Kim. 2017. Forward secure dynamic searchable symmetric encryption with efficient updates. In CCS 2017. ACM, 1449--1463.
[44]
Scott Kirkpatrick, D. Gelatt Jr., and Mario P. Vecchi. 1983. Optimization by simmulated annealing. Science 220, 4598 (1983), 671--680.
[45]
Evgenios M. Kornaropoulos, Charalampos Papamanthou, and Roberto Tamassia. 2019. Data recovery on encrypted databases with k-nearest neighbor query leakage. In SP 2019. IEEE, 1033--1050.
[46]
Evgenios M. Kornaropoulos, Charalampos Papamanthou, and Roberto Tamassia. 2019. The state of the uniform: Attacks on encrypted databases beyond the uniform query distribution. IACR Cryptol. ePrint Arch. (2019), 441.
[47]
Kaoru Kurosawa and Yasuhiro Ohtaki. 2013. How to update documents verifiably in searchable symmetric encryption. In CANS 2013, Lecture Notes in Computer Science, Vol. 8257. Springer, 309--328.
[48]
Mehmet Kuzu, Mohammad Saiful Islam, and Murat Kantarcioglu. 2015. Distributed search over encrypted big data. In CODASPY 2015. ACM, 271--278.
[49]
Marie-Sarah Lacharité, Brice Minaud, and Kenneth G. Paterson. 2018. Improved reconstruction attacks on encrypted data using range query leakage. In SP 2018. IEEE Computer Society, 297--314.
[50]
Jin Li, Yanyu Huang, Yu Wei, Siyi Lv, Zheli Liu, Changyu Dong, and Wenjing Lou. 2019. Searchable symmetric encryption with forward search privacy. IEEE Trans. Depend. Sec. Comput. (2019).
[51]
Evangelia Anna Markatou and Roberto Tamassia. 2019. Full database reconstruction with access and search pattern leakage. In ISC 2019, Lecture Notes in Computer Science, Vol. 11723. Springer, 25--43.
[52]
Muhammad Naveed, Seny Kamara, and Charles V. Wright. 2015. Inference attacks on property-preserving encrypted databases. In SIGSAC 2015. ACM, 644--655.
[53]
Muhammad Naveed, Manoj Prabhakaran, and Carl A. Gunter. 2014. Dynamic searchable encryption via blind storage. In SP 2014. IEEE Computer Society, 639--654.
[54]
Cengiz Örencik, Ayse Selcuk, Erkay Savas, and Murat Kantarcioglu. 2016. Multi-keyword search over encrypted data with scoring and search pattern obfuscation. Int. J. Inf. Sec. 15, 3 (2016), 251--269.
[55]
Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT 1999. Springer, 223--238.
[56]
Antonis Papadimitriou, Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee, Andreas Haeberlen, Harmeet Singh, Abhishek Modi, and Saikrishna Badrinarayanan. 2016. Big data analytics over encrypted datasets with Seabed. In OSDI 2016. USENIX Association.
[57]
Vasilis Pappas, Fernando Krell, Binh Vo, Vladimir Kolesnikov, Tal Malkin, Seung Geol Choi, Wesley George, Angelos D. Keromytis, and Steve Bellovin. 2014. Blind Seer: A scalable private DBMS. In SP 2014. IEEE Computer Society, 359--374.
[58]
Rishabh Poddar, Tobias Boelter, and Raluca Ada Popa. 2016. Arx: A strongly encrypted database system. IACR Cryptol. ePrint Arch. (2016), 591.
[59]
Geong Sen Poh, Moesfa Soeheila Mohamad, and Ji-Jian Chin. 2018. Searchable symmetric encryption over multiple servers. Cryptogr. Commun. 10, 1 (2018), 139--158.
[60]
Raluca A. Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan. 2011. CryptDB: Protecting confidentiality with encrypted query processing. In SOSP 2011. ACM, 85--100.
[61]
Panagiotis Rizomiliotis and Stefanos Gritzalis. 2015. ORAM based forward privacy preserving dynamic searchable symmetric encryption schemes. In CCSW 2015. ACM, 65--76.
[62]
Bharath Kumar Samanthula, Wei Jiang, and Elisa Bertino. 2014. Privacy-preserving complex query evaluation over semantically secure encrypted data. In ESORICS 2014. Springer, 400--418.
[63]
Muhammad I. Sarfraz, Mohamed Nabeel, Jianneng Cao, and Elisa Bertino. 2015. DBMask: Fine-grained access control on encrypted relational databases. In CODASPY 2015. ACM, 1--11.
[64]
Dawn Xiaodong Song, David Wagner, and Adrian Perrig. 2000. Practical techniques for searches on encrypted data. In S&P 2000. IEEE Computer Society, 44--55.
[65]
Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, and Minghao Zhao. 2018. Forward private searchable symmetric encryption with optimized I/O efficiency. IACR Cryptol. ePrint Arch. 2018 (2018), 497.
[66]
Emil Stefanov, Charalampos Papamanthou, and Elaine Shi. 2014. Practical dynamic searchable encryption with small leakage. In NDSS 2013. 72--75.
[67]
Emil Stefanov and Elaine Shi. 2013. Multi-cloud oblivious storage. In SIGSAC 2013. ACM, 247--258.
[68]
Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas. 2013. Path ORAM: An extremely simple oblivious RAM protocol. In SIGSAC 2013. ACM, 299--310.
[69]
Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, and Surya Nepal. 2018. Practical backward-secure searchable encryption from symmetric puncturable encryption. In CCS 2018. ACM, 763--780.
[70]
Tech Republic. 2014. Dropbox and Box Leak Files in Security through Obscurity Nightmare. Retrieved June 23, 2020 from https://www.techrepublic.com/article/dropbox-and-box-leak-files-in-security-through-obscurity-nightmare.
[71]
TPC. [n.d.]. TPC-H. Retrieved June 23, 2020 from http://www.tpc.org/tpch.
[72]
Stephen Tu, M. Frans Kaashoek, Samuel Madden, and Nickolai Zeldovich. 2013. Processing analytical queries over encrypted data. Proc. VLDB (2013), 289--300.
[73]
Verrizon. 2020. 2020 Data Breach Investigations Report. Retrieved June 23, 2020 from https://enterprise.verizon.com/resources/reports/dbir.
[74]
Bing Wang, Wei Song, Wenjing Lou, and Y. Thomas Hou. 2015. Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. In INFOCOM 2015. IEEE, 2092--2100.
[75]
Jiafan Wang and Sherman S. M. Chow. 2019. Forward and backward-secure range-searchable symmetric encryption. IACR Cryptol. ePrint Arch. 2019 (2019), 497.
[76]
Liang Wang, Paul Grubbs, Jiahui Lu, Vincent Bindschaedler, David Cash, and Thomas Ristenpart. 2017. Side-channel attacks on shared search indexes. In SP 2017. IEEE Computer Society, 673--692.
[77]
Tianhao Wang and Yunlei Zhao. 2016. Secure dynamic SSE via access indistinguishable storage. In AsiaCCS 2016. ACM, 535--546.
[78]
Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2016. All your queries are belong to us: The power of file-injection attacks on searchable encryption. In USENIX Security 2016. USENIX Association, 707--720.
[79]
Zhongjun Zhang, Jianfeng Wang, Yunling Wang, Yaping Su, and Xiaofeng Chen. 2019. Towards efficient verifiable forward secure searchable symmetric encryption. In ESORICS 2019Lecture Notes in Computer Science, Vol. 11736. Springer, 304--321.
[80]
Wenting Zheng, Ankur Dave, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. 2017. Opaque: An oblivious and encrypted distributed analytics platform. In USENIX 2017. USENIX Association, 283--298.
[81]
Jie Zhu, Qi Li, Cong Wang, Xingliang Yuan, Qian Wang, and Kui Ren. 2018. Enabling generic, verifiable, and secure data search in cloud services. IEEE Trans. Parallel Distrib. Syst. 29, 8 (2018), 1721--1735.
[82]
Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, and Josef Pieprzyk. 2018. Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security. In ESORICS 2018. Springer, 228--246.
[83]
Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, and Josef Pieprzyk. 2019. Dynamic searchable symmetric encryption with forward and stronger backward privacy. In ESORICS 2019. Springer, 283--303.

Cited By

View all
  • (2024)Encrypted Video Search with Single/Multiple WritersACM Transactions on Multimedia Computing, Communications, and Applications10.1145/3643887Online publication date: 5-Feb-2024
  • (2024)Tutorial: Information Leakage from Cryptographic Techniques2024 IEEE 44th International Conference on Distributed Computing Systems Workshops (ICDCSW)10.1109/ICDCSW63686.2024.00007(9-12)Online publication date: 23-Jul-2024
  • (2024)Refined statistical attacks against searchable symmetric encryption using non-indexed documentsJournal of Information Security and Applications10.1016/j.jisa.2023.10365279:COnline publication date: 4-Mar-2024
  • Show More Cited By

Index Terms

  1. Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Privacy and Security
    ACM Transactions on Privacy and Security  Volume 24, Issue 3
    August 2021
    286 pages
    ISSN:2471-2566
    EISSN:2471-2574
    DOI:10.1145/3450360
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 April 2021
    Accepted: 01 January 2021
    Revised: 01 October 2020
    Received: 01 February 2020
    Published in TOPS Volume 24, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Searchable encryption
    2. controllable leakage
    3. dynamic
    4. multi-cloud

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)73
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 17 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Encrypted Video Search with Single/Multiple WritersACM Transactions on Multimedia Computing, Communications, and Applications10.1145/3643887Online publication date: 5-Feb-2024
    • (2024)Tutorial: Information Leakage from Cryptographic Techniques2024 IEEE 44th International Conference on Distributed Computing Systems Workshops (ICDCSW)10.1109/ICDCSW63686.2024.00007(9-12)Online publication date: 23-Jul-2024
    • (2024)Refined statistical attacks against searchable symmetric encryption using non-indexed documentsJournal of Information Security and Applications10.1016/j.jisa.2023.10365279:COnline publication date: 4-Mar-2024
    • (2024)TL-ABKS: Traceable and lightweight attribute-based keyword search in edge–cloud assisted IoT environmentAlexandria Engineering Journal10.1016/j.aej.2024.09.030107(757-769)Online publication date: Nov-2024
    • (2023)Multi-Client Dynamic Searchable Symmetric Encryption Scheme with Supporting Conjunction Query2023 9th International Conference on Computer and Communications (ICCC)10.1109/ICCC59590.2023.10507509(803-809)Online publication date: 8-Dec-2023
    • (2023)Block verifiable dynamic searchable encryption using redactable blockchainJournal of Information Security and Applications10.1016/j.jisa.2023.10350475:COnline publication date: 1-Jun-2023
    • (2023)A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environmentJournal of Information Security and Applications10.1016/j.jisa.2022.10337772:COnline publication date: 1-Feb-2023
    • (2023)A fog-assisted privacy preserving scheme for vehicular LBS queryTelecommunications Systems10.1007/s11235-023-01042-084:2(167-182)Online publication date: 27-Jul-2023
    • (2023)CRE: An Efficient Ciphertext Retrieval Scheme Based on EncoderNeural Information Processing10.1007/978-981-99-8148-9_10(117-130)Online publication date: 26-Nov-2023
    • (2022)A Blockchain-Based Framework for Secure Storage and Sharing of ResumesComputers, Materials & Continua10.32604/cmc.2022.02828472:3(5395-5413)Online publication date: 2022
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media