Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields

To achieve security and privacy for data stored on the cloud, we need the ability to secure data in compute. Equality comparisons, "x=y, x\ne y x=y,x≠y ", have been widely studied with many proposals but there is much room for improvement for order comparisons, "x < y,~x \leq y,~x...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on dependable and secure computing 2021-11, Vol.18 (6), p.2861-2874
Hauptverfasser: Tan, Benjamin Hong Meng, Lee, Hyung Tae, Wang, Huaxiong, Ren, Shuqin, Aung, Khin Mi Mi
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2874
container_issue 6
container_start_page 2861
container_title IEEE transactions on dependable and secure computing
container_volume 18
creator Tan, Benjamin Hong Meng
Lee, Hyung Tae
Wang, Huaxiong
Ren, Shuqin
Aung, Khin Mi Mi
description To achieve security and privacy for data stored on the cloud, we need the ability to secure data in compute. Equality comparisons, "x=y, x\ne y x=y,x≠y ", have been widely studied with many proposals but there is much room for improvement for order comparisons, "x < y,~x \leq y,~x > y \text{ and } x \geq y xyandx≥y ". Most protocols for order comparisons have some limitation, either leaking some information about the data or requiring several rounds of communication between client and server. In addition, little work has been done on retrieving with compound conditions, mixing several equality and order comparisons. Fully homomorphic encryption (FHE) promises the ability to compute arbitrary functions on encrypted data without sacrificing privacy and without communication, but its potential has yet to be fulfilled. Particularly, private comparisons for database queries using FHE are expensive to compute. In this article, we design an efficient private database query (PDQ) protocol which supports compound conditions with equality and order comparisons. To this end, we first present a private comparison algorithm on encrypted integers using FHE, which scales efficiently for the length of input integers, by applying techniques from finite field theory. Then, we consider a scenario for PDQ protocols, querying for values based on a conjunction of one order and four equality conditions on key columns. The proposed algorithm and protocol are implemented and tested to determine their performance in practice. The proposed comparison algorithm takes about 25.259 25
doi_str_mv 10.1109/TDSC.2020.2967740
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2595718050</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8962262</ieee_id><sourcerecordid>2595718050</sourcerecordid><originalsourceid>FETCH-LOGICAL-c336t-3eb85d12f0ae01a4f676c77050fc85a798b47f5719e37737a257fa203a92ee593</originalsourceid><addsrcrecordid>eNo9kF1LwzAUhoMoOKc_QLwJeN2Zj6ZpLmWuThhMccPLkHUnLqNra9IO9u_N2JRzkQN53ufAi9A9JSNKiXpavHyOR4wwMmIqkzIlF2hAVUoTQmh-GXeRikQoSa_RTQhbQliaq3SAwsRaVzqoO_zu3d50gMfNrjXehabGHz14BwHP9-DxpC79oe1gjV9MZ1YmxI9lcPU3LvqqOuBps4vj240r_1gXHV-u2-DC1S6qCwfVOtyiK2uqAHfnd4iWxWQxniaz-evb-HmWlJxnXcJhlYs1ZZYYINSkNpNZKSURxJa5MFLlq1RaIakCLiWXhglpDSPcKAYgFB-ix5O39c1PD6HT26b3dTypmVAxmEdXpOiJKn0TggerW-92xh80JfrYrT52q4_d6nO3MfNwyjgA-OdzlTGWMf4LKXl2Hg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2595718050</pqid></control><display><type>article</type><title>Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields</title><source>IEEE Electronic Library (IEL)</source><creator>Tan, Benjamin Hong Meng ; Lee, Hyung Tae ; Wang, Huaxiong ; Ren, Shuqin ; Aung, Khin Mi Mi</creator><creatorcontrib>Tan, Benjamin Hong Meng ; Lee, Hyung Tae ; Wang, Huaxiong ; Ren, Shuqin ; Aung, Khin Mi Mi</creatorcontrib><description><![CDATA[To achieve security and privacy for data stored on the cloud, we need the ability to secure data in compute. Equality comparisons, "<inline-formula><tex-math notation="LaTeX">x=y, x\ne y</tex-math> <mml:math><mml:mrow><mml:mi>x</mml:mi><mml:mo>=</mml:mo><mml:mi>y</mml:mi><mml:mo>,</mml:mo><mml:mi>x</mml:mi><mml:mo>≠</mml:mo><mml:mi>y</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href="lee-ieq1-2967740.gif"/> </inline-formula>", have been widely studied with many proposals but there is much room for improvement for order comparisons, "<inline-formula><tex-math notation="LaTeX">x < y,~x \leq y,~x > y \text{ and } x \geq y</tex-math> <mml:math><mml:mrow><mml:mi>x</mml:mi><mml:mo><</mml:mo><mml:mi>y</mml:mi><mml:mo>,</mml:mo><mml:mspace width="3.33333pt"/><mml:mi>x</mml:mi><mml:mo>≤</mml:mo><mml:mi>y</mml:mi><mml:mo>,</mml:mo><mml:mspace width="3.33333pt"/><mml:mi>x</mml:mi><mml:mo>></mml:mo><mml:mi>y</mml:mi><mml:mspace width="4.pt"/><mml:mtext>and</mml:mtext><mml:mspace width="4.pt"/><mml:mi>x</mml:mi><mml:mo>≥</mml:mo><mml:mi>y</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href="lee-ieq2-2967740.gif"/> </inline-formula>". Most protocols for order comparisons have some limitation, either leaking some information about the data or requiring several rounds of communication between client and server. In addition, little work has been done on retrieving with compound conditions, mixing several equality and order comparisons. Fully homomorphic encryption (FHE) promises the ability to compute arbitrary functions on encrypted data without sacrificing privacy and without communication, but its potential has yet to be fulfilled. Particularly, private comparisons for database queries using FHE are expensive to compute. In this article, we design an efficient private database query (PDQ) protocol which supports compound conditions with equality and order comparisons. To this end, we first present a private comparison algorithm on encrypted integers using FHE, which scales efficiently for the length of input integers, by applying techniques from finite field theory. Then, we consider a scenario for PDQ protocols, querying for values based on a conjunction of one order and four equality conditions on key columns. The proposed algorithm and protocol are implemented and tested to determine their performance in practice. The proposed comparison algorithm takes about <inline-formula><tex-math notation="LaTeX">25.259</tex-math> <mml:math><mml:mrow><mml:mn>25</mml:mn><mml:mo>.</mml:mo><mml:mn>259</mml:mn></mml:mrow></mml:math><inline-graphic xlink:href="lee-ieq3-2967740.gif"/> </inline-formula> seconds to compare 697 pairs of 64-bit integers using Brakerski-Gentry-Vaikuntanathan's leveled FHE scheme with single instruction multiple data (SIMD) techniques at more than 138 bits of security. This yields an amortized rate of just 36 milliseconds per comparison. On top of that, we show that our techniques achieve an efficient PDQ protocol for one order and four equality comparisons, achieving an amortized time and communication cost of 57 milliseconds and 448 bytes per database element.]]></description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2020.2967740</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Algorithms ; Blogs ; Cloud computing ; Columns (structural) ; Communication ; Cybersecurity ; Encoding ; Encryption ; Field theory ; Fields (mathematics) ; fully homomorphic encryption ; Homomorphic encryption ; Integers ; Privacy ; Private database queries ; Protocol ; Protocols ; Queries ; Query processing ; secure comparison</subject><ispartof>IEEE transactions on dependable and secure computing, 2021-11, Vol.18 (6), p.2861-2874</ispartof><rights>Copyright IEEE Computer Society 2021</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c336t-3eb85d12f0ae01a4f676c77050fc85a798b47f5719e37737a257fa203a92ee593</citedby><cites>FETCH-LOGICAL-c336t-3eb85d12f0ae01a4f676c77050fc85a798b47f5719e37737a257fa203a92ee593</cites><orcidid>0000-0002-5652-3455 ; 0000-0002-0920-2026 ; 0000-0002-8629-9052 ; 0000-0002-7669-8922</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8962262$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8962262$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Tan, Benjamin Hong Meng</creatorcontrib><creatorcontrib>Lee, Hyung Tae</creatorcontrib><creatorcontrib>Wang, Huaxiong</creatorcontrib><creatorcontrib>Ren, Shuqin</creatorcontrib><creatorcontrib>Aung, Khin Mi Mi</creatorcontrib><title>Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description><![CDATA[To achieve security and privacy for data stored on the cloud, we need the ability to secure data in compute. Equality comparisons, "<inline-formula><tex-math notation="LaTeX">x=y, x\ne y</tex-math> <mml:math><mml:mrow><mml:mi>x</mml:mi><mml:mo>=</mml:mo><mml:mi>y</mml:mi><mml:mo>,</mml:mo><mml:mi>x</mml:mi><mml:mo>≠</mml:mo><mml:mi>y</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href="lee-ieq1-2967740.gif"/> </inline-formula>", have been widely studied with many proposals but there is much room for improvement for order comparisons, "<inline-formula><tex-math notation="LaTeX">x < y,~x \leq y,~x > y \text{ and } x \geq y</tex-math> <mml:math><mml:mrow><mml:mi>x</mml:mi><mml:mo><</mml:mo><mml:mi>y</mml:mi><mml:mo>,</mml:mo><mml:mspace width="3.33333pt"/><mml:mi>x</mml:mi><mml:mo>≤</mml:mo><mml:mi>y</mml:mi><mml:mo>,</mml:mo><mml:mspace width="3.33333pt"/><mml:mi>x</mml:mi><mml:mo>></mml:mo><mml:mi>y</mml:mi><mml:mspace width="4.pt"/><mml:mtext>and</mml:mtext><mml:mspace width="4.pt"/><mml:mi>x</mml:mi><mml:mo>≥</mml:mo><mml:mi>y</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href="lee-ieq2-2967740.gif"/> </inline-formula>". Most protocols for order comparisons have some limitation, either leaking some information about the data or requiring several rounds of communication between client and server. In addition, little work has been done on retrieving with compound conditions, mixing several equality and order comparisons. Fully homomorphic encryption (FHE) promises the ability to compute arbitrary functions on encrypted data without sacrificing privacy and without communication, but its potential has yet to be fulfilled. Particularly, private comparisons for database queries using FHE are expensive to compute. In this article, we design an efficient private database query (PDQ) protocol which supports compound conditions with equality and order comparisons. To this end, we first present a private comparison algorithm on encrypted integers using FHE, which scales efficiently for the length of input integers, by applying techniques from finite field theory. Then, we consider a scenario for PDQ protocols, querying for values based on a conjunction of one order and four equality conditions on key columns. The proposed algorithm and protocol are implemented and tested to determine their performance in practice. The proposed comparison algorithm takes about <inline-formula><tex-math notation="LaTeX">25.259</tex-math> <mml:math><mml:mrow><mml:mn>25</mml:mn><mml:mo>.</mml:mo><mml:mn>259</mml:mn></mml:mrow></mml:math><inline-graphic xlink:href="lee-ieq3-2967740.gif"/> </inline-formula> seconds to compare 697 pairs of 64-bit integers using Brakerski-Gentry-Vaikuntanathan's leveled FHE scheme with single instruction multiple data (SIMD) techniques at more than 138 bits of security. This yields an amortized rate of just 36 milliseconds per comparison. On top of that, we show that our techniques achieve an efficient PDQ protocol for one order and four equality comparisons, achieving an amortized time and communication cost of 57 milliseconds and 448 bytes per database element.]]></description><subject>Algorithms</subject><subject>Blogs</subject><subject>Cloud computing</subject><subject>Columns (structural)</subject><subject>Communication</subject><subject>Cybersecurity</subject><subject>Encoding</subject><subject>Encryption</subject><subject>Field theory</subject><subject>Fields (mathematics)</subject><subject>fully homomorphic encryption</subject><subject>Homomorphic encryption</subject><subject>Integers</subject><subject>Privacy</subject><subject>Private database queries</subject><subject>Protocol</subject><subject>Protocols</subject><subject>Queries</subject><subject>Query processing</subject><subject>secure comparison</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kF1LwzAUhoMoOKc_QLwJeN2Zj6ZpLmWuThhMccPLkHUnLqNra9IO9u_N2JRzkQN53ufAi9A9JSNKiXpavHyOR4wwMmIqkzIlF2hAVUoTQmh-GXeRikQoSa_RTQhbQliaq3SAwsRaVzqoO_zu3d50gMfNrjXehabGHz14BwHP9-DxpC79oe1gjV9MZ1YmxI9lcPU3LvqqOuBps4vj240r_1gXHV-u2-DC1S6qCwfVOtyiK2uqAHfnd4iWxWQxniaz-evb-HmWlJxnXcJhlYs1ZZYYINSkNpNZKSURxJa5MFLlq1RaIakCLiWXhglpDSPcKAYgFB-ix5O39c1PD6HT26b3dTypmVAxmEdXpOiJKn0TggerW-92xh80JfrYrT52q4_d6nO3MfNwyjgA-OdzlTGWMf4LKXl2Hg</recordid><startdate>20211101</startdate><enddate>20211101</enddate><creator>Tan, Benjamin Hong Meng</creator><creator>Lee, Hyung Tae</creator><creator>Wang, Huaxiong</creator><creator>Ren, Shuqin</creator><creator>Aung, Khin Mi Mi</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope><orcidid>https://orcid.org/0000-0002-5652-3455</orcidid><orcidid>https://orcid.org/0000-0002-0920-2026</orcidid><orcidid>https://orcid.org/0000-0002-8629-9052</orcidid><orcidid>https://orcid.org/0000-0002-7669-8922</orcidid></search><sort><creationdate>20211101</creationdate><title>Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields</title><author>Tan, Benjamin Hong Meng ; Lee, Hyung Tae ; Wang, Huaxiong ; Ren, Shuqin ; Aung, Khin Mi Mi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c336t-3eb85d12f0ae01a4f676c77050fc85a798b47f5719e37737a257fa203a92ee593</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Blogs</topic><topic>Cloud computing</topic><topic>Columns (structural)</topic><topic>Communication</topic><topic>Cybersecurity</topic><topic>Encoding</topic><topic>Encryption</topic><topic>Field theory</topic><topic>Fields (mathematics)</topic><topic>fully homomorphic encryption</topic><topic>Homomorphic encryption</topic><topic>Integers</topic><topic>Privacy</topic><topic>Private database queries</topic><topic>Protocol</topic><topic>Protocols</topic><topic>Queries</topic><topic>Query processing</topic><topic>secure comparison</topic><toplevel>online_resources</toplevel><creatorcontrib>Tan, Benjamin Hong Meng</creatorcontrib><creatorcontrib>Lee, Hyung Tae</creatorcontrib><creatorcontrib>Wang, Huaxiong</creatorcontrib><creatorcontrib>Ren, Shuqin</creatorcontrib><creatorcontrib>Aung, Khin Mi Mi</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Tan, Benjamin Hong Meng</au><au>Lee, Hyung Tae</au><au>Wang, Huaxiong</au><au>Ren, Shuqin</au><au>Aung, Khin Mi Mi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2021-11-01</date><risdate>2021</risdate><volume>18</volume><issue>6</issue><spage>2861</spage><epage>2874</epage><pages>2861-2874</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract><![CDATA[To achieve security and privacy for data stored on the cloud, we need the ability to secure data in compute. Equality comparisons, "<inline-formula><tex-math notation="LaTeX">x=y, x\ne y</tex-math> <mml:math><mml:mrow><mml:mi>x</mml:mi><mml:mo>=</mml:mo><mml:mi>y</mml:mi><mml:mo>,</mml:mo><mml:mi>x</mml:mi><mml:mo>≠</mml:mo><mml:mi>y</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href="lee-ieq1-2967740.gif"/> </inline-formula>", have been widely studied with many proposals but there is much room for improvement for order comparisons, "<inline-formula><tex-math notation="LaTeX">x < y,~x \leq y,~x > y \text{ and } x \geq y</tex-math> <mml:math><mml:mrow><mml:mi>x</mml:mi><mml:mo><</mml:mo><mml:mi>y</mml:mi><mml:mo>,</mml:mo><mml:mspace width="3.33333pt"/><mml:mi>x</mml:mi><mml:mo>≤</mml:mo><mml:mi>y</mml:mi><mml:mo>,</mml:mo><mml:mspace width="3.33333pt"/><mml:mi>x</mml:mi><mml:mo>></mml:mo><mml:mi>y</mml:mi><mml:mspace width="4.pt"/><mml:mtext>and</mml:mtext><mml:mspace width="4.pt"/><mml:mi>x</mml:mi><mml:mo>≥</mml:mo><mml:mi>y</mml:mi></mml:mrow></mml:math><inline-graphic xlink:href="lee-ieq2-2967740.gif"/> </inline-formula>". Most protocols for order comparisons have some limitation, either leaking some information about the data or requiring several rounds of communication between client and server. In addition, little work has been done on retrieving with compound conditions, mixing several equality and order comparisons. Fully homomorphic encryption (FHE) promises the ability to compute arbitrary functions on encrypted data without sacrificing privacy and without communication, but its potential has yet to be fulfilled. Particularly, private comparisons for database queries using FHE are expensive to compute. In this article, we design an efficient private database query (PDQ) protocol which supports compound conditions with equality and order comparisons. To this end, we first present a private comparison algorithm on encrypted integers using FHE, which scales efficiently for the length of input integers, by applying techniques from finite field theory. Then, we consider a scenario for PDQ protocols, querying for values based on a conjunction of one order and four equality conditions on key columns. The proposed algorithm and protocol are implemented and tested to determine their performance in practice. The proposed comparison algorithm takes about <inline-formula><tex-math notation="LaTeX">25.259</tex-math> <mml:math><mml:mrow><mml:mn>25</mml:mn><mml:mo>.</mml:mo><mml:mn>259</mml:mn></mml:mrow></mml:math><inline-graphic xlink:href="lee-ieq3-2967740.gif"/> </inline-formula> seconds to compare 697 pairs of 64-bit integers using Brakerski-Gentry-Vaikuntanathan's leveled FHE scheme with single instruction multiple data (SIMD) techniques at more than 138 bits of security. This yields an amortized rate of just 36 milliseconds per comparison. On top of that, we show that our techniques achieve an efficient PDQ protocol for one order and four equality comparisons, achieving an amortized time and communication cost of 57 milliseconds and 448 bytes per database element.]]></abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2020.2967740</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-5652-3455</orcidid><orcidid>https://orcid.org/0000-0002-0920-2026</orcidid><orcidid>https://orcid.org/0000-0002-8629-9052</orcidid><orcidid>https://orcid.org/0000-0002-7669-8922</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1545-5971
ispartof IEEE transactions on dependable and secure computing, 2021-11, Vol.18 (6), p.2861-2874
issn 1545-5971
1941-0018
language eng
recordid cdi_proquest_journals_2595718050
source IEEE Electronic Library (IEL)
subjects Algorithms
Blogs
Cloud computing
Columns (structural)
Communication
Cybersecurity
Encoding
Encryption
Field theory
Fields (mathematics)
fully homomorphic encryption
Homomorphic encryption
Integers
Privacy
Private database queries
Protocol
Protocols
Queries
Query processing
secure comparison
title Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T02%3A49%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Efficient%20Private%20Comparison%20Queries%20Over%20Encrypted%20Databases%20Using%20Fully%20Homomorphic%20Encryption%20With%20Finite%20Fields&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Tan,%20Benjamin%20Hong%20Meng&rft.date=2021-11-01&rft.volume=18&rft.issue=6&rft.spage=2861&rft.epage=2874&rft.pages=2861-2874&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2020.2967740&rft_dat=%3Cproquest_RIE%3E2595718050%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2595718050&rft_id=info:pmid/&rft_ieee_id=8962262&rfr_iscdi=true