Enhancement of an Optimized Key for Database Sanitization to Ensure the Security and Privacy of an Autism Dataset
<p>The main architecture of the data security and privacy model.</p> "> Figure 2
<p>The architecture of the sanitization process.</p> "> Figure 3
<p>The architecture of the key generation process.</p> "> Figure 4
<p>Analysis of the performance of various algorithms using objective functions. (<b>a</b>) Performances based on the KCA attack; (<b>b</b>) Performances based on the KPA attack.</p> "> Figure 5
<p>Analysis of the performance of various algorithms for the autism at 24 months dataset. (<b>a</b>) Performances based on the CCA attack; (<b>b</b>) Performances based on the CPA attack.</p> "> Figure 6
<p>Analysis of the performance of various algorithms for the autism at 30 months dataset. (<b>a</b>) Performances based on the CCA attack; (<b>b</b>) Performances based on the CPA attack.</p> "> Figure 7
<p>Analysis of the performance of various algorithms for the autism at 36 months dataset. (<b>a</b>) Performances based on the CCA attack; (<b>b</b>) Performances based on the CPA attack.</p> "> Figure 8
<p>Analysis of the performance of various algorithms for the autism at 48 months dataset. (<b>a</b>) Performances based on the CCA attack; (<b>b</b>) Performances based on the CPA attack.</p> ">
Abstract
:1. Introduction
- For how long will the key value be updated during the key generation stage?
- The key length will be allocated based on which value?
- How are the values of the parameters defined?
- What is the key range value?
- First, to propose a data sanitization process.
- Secondly, to enhance an optimal key by considering the above issues, which is used in the data sanitization procedure for the security and privacy of ASD datasets.
- Finally, to compare the accuracy achieved by our optimal key with the accuracy of other existing security and privacy frameworks.
2. Related Works
2.1. Security and Privacy in Processing Medical Data
2.2. Features and Challenges of Privacy Preservation Models
3. Methodology and Architecture
- Original Database;
- Machine Learning;
- Processed Database;
- Optimization Algorithms;
- Sanitization Key;
- Sanitization Process;
- Sanitized Database;
- Restoration Process.
3.1. Sanitization Process
3.2. Sanitization Key Generation
Procedure of Proposed Optimal Key Extraction in Sanitization Process
- Key Encoding
- Key Transformation
- Fitness Evaluation
3.3. Both Traditional PSO and GWO Algorithms
3.3.1. Traditional PSO Algorithm
3.3.2. Traditional GWO Algorithm
3.4. The Proposed Enhanced Combined PSO-GWO Algorithm
Algorithm 1: Optimal Key Selection through Enhanced Combined PSO-GWO. |
M j is the Grey Wolf population where j = 1, 2, N. Here, Mα, Mβ, and Mδ denote the best searching agent, 2nd best searching agent, and 3rd best searching agent, respectively. Moreover, e is the components, and H, E are coefficients. The goal of this algorithm is to output the best searching agent, Mα. |
{ |
Set initial values to the M j |
Set initial values to e, H, and E also |
Measure the fitness values of each searching agent, Mα, Mβ, and Mδ. |
while (u < max) do |
{ |
for each searching agent, do |
{ |
Revise the present location of the searching agents using Equation (16) |
} |
Revise e, H, and E |
Assess fitness values for all searching agents |
Revise Mα, Mβ, and Mδ |
u: = u + 1 |
} |
returnMα |
} |
4. Experiment and Analysis
4.1. Configuration for Experiment
4.2. Simulation
5. Results and Discussions
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Nomenclature
Abbreviations | Explanations |
AAP-CSA | Adaptive Awareness Probability-based Crow Search Algorithm |
ABC | Artificial Bee Colony |
AES | Advanced Encryption Standard |
AI | Artificial Intelligence |
ANN | Artificial Neural Network |
ASD | Autism Spectrum Disorder |
BF | Beamforming |
BS-WOA | Brain Storm-based Whale Optimization |
CCA | Chosen Cipher Attack |
CI-LA | Crossover Improved-Lion Algorithm |
CloudDLP | Cloud Data Loss Prevention |
CPA | Chosen Plaintext Attack |
CP-ABE | Ciphertext-Policy Attribute-Based Encryption |
CSA | Crow Search Algorithm |
CSA | Cuckoo Search Algorithm |
DE | Differential Evolution |
DES | Data Encryption Standard |
DLP | Data Loss Prevention |
DM | Degree of Modification |
DSM-5 | Diagnostic and Statistical Manual of Mental Disorders 5th edition |
EPR | Electronic Patient Record |
FR | False Rule |
GA | Genetic Algorithm |
GMGW | Genetically Modified Glowworm Swarm Optimization |
GSA | Gravitational Search Algorithm |
GSO | Glowworm Swarm Optimization |
GWO | Grey Wolf Optimization |
HF | Hiding Failure |
IDEA | International Data Encryption Algorithm |
IEP | Individual Education Plan |
IFSP | Individualized Family Service Program |
IoT | Internet of Things |
IP | Information Preservation |
JA | Jaya Algorithm |
J-SSO | Jaya-based Shark Smell Optimization |
KCA | Known Cipher Attack |
KPA | Known Plaintext Attack |
LSB | Least Significant Bit |
OI-CSA | Opposition Intensity-based Cuckoo Search Algorithm |
PASH | Privacy-Aware Smart Health |
PGVIR | Parallelized Grouped Victim Item Removal |
PHCR | Parallelized Hiding Candidate Removal |
PSO | Particle Swarm Optimization |
PSO-GWO | Particle Swarm Optimization- Grey Wolf Optimization |
RC4 | Rivest Cipher 4 |
ROI | Region Of Interest |
RONI | Region Of Non-Interest |
RSMA | Rate-Splitting Multiple Access |
SAIN | Satellite and Aerial-Integrated Network |
SHRs | S-Health Records |
SSO | Shark Smell Optimization |
TripleDES | Triple Data Encryption Standard |
UAV | Unmanned Aerial Vehicle |
UKM | Universiti Kebangsaan Malaysia |
WNU | Whale with New Crosspoint-based Update |
WRS | Wilcoxon Rank Sum |
List of Mathematical Symbols
Symbols | Descriptions |
D | Processed (from original) database |
D′ | Sanitization database |
K1, K2, … KN | Number of keys |
K2 | Pruned key matrix |
⊕ | XOR operator |
+ | Binary Summation |
⌊ ⌋ | Floor function |
LD | Sanitization key length |
Key length | |
T1, T2, … T5 | Number of transactions |
Tmax | Maximum transaction |
⊗ | Kronecker product |
C1, C2, C3 | Objective functions |
fs | Frequency of sensitive itemset in sanitized data |
fm | Frequency of sensitive itemset in original data |
fns | Frequency of non-sensitive itemset in sanitized data |
w1, w2, w3 | Impact of a particular cost function |
f | Fitness function |
G | Minimum objective function |
Location of the particle | |
Velocity of the particle | |
ω | User-defined behavioral parameter (an inertia weight) |
Particle’s previous best position (pbest position) | |
Particle’s previous best position in the swarm (gbest position) | |
r1, r2 | Stochastic variables |
c1, c2 | Acceleration constants |
u | Current iteration |
, | Coefficient vectors |
References
- American Psychiatric Association. Diagnostic and Statistical Manual of Mental Disorders DSM-5®, 5th ed.; American Psychiatric Association: Arlington, VA, USA, 2013. [Google Scholar]
- Thabtah, F. Autism Spectrum Disorder Screening: Machine Learning Adaptation and DSM-5 Fulfillment. In Proceedings of the 1st International Conference on Medical and health Informatics, Taichung City, Taiwan, 20–22 May 2017; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
- Sahmim, S.; Gharsellaoui, H. Privacy and Security in Internet-based Computing: Cloud Computing, Internet of Things, Cloud of Things: A review. Procedia Comput. Sci. 2017, 112, 1516–1522. [Google Scholar] [CrossRef]
- Sivan, R.; Zukarnain, Z.A. Security and Privacy in Cloud-Based E-Health System. Symmetry 2021, 13, 742. [Google Scholar] [CrossRef]
- Mewada, S.; Gautam, S.S.; Sharma, P. Artificial Bee Colony-Based Approach for Privacy Preservation of Medical Data. Int. J. Inf. Syst. Modeling Des. 2020, 11, 22–39. [Google Scholar] [CrossRef]
- Mandala, J.; Rao, M.V.P.C.S. Privacy preservation of data using crow search with adaptive awareness probability. J. Inf. Secur. Appl. 2019, 44, 157–169. [Google Scholar] [CrossRef]
- Rahman, M.M.; Usman, O.L.; Muniyandi, R.C.; Sahran, S.; Mohamed, S.; Razak, R.A. A Review of Machine Learning Methods of Feature Selection and Classification for Autism Spectrum Disorder. Brain Sci. 2020, 10, 949. [Google Scholar] [CrossRef] [PubMed]
- The Lancet Neurology. Investing in autism: Better evidence for better care. Lancet Neurol. 2017, 16, 251. [Google Scholar] [CrossRef]
- Fein, D.; Helt, M. Facilitating Autism Research. J. Int. Neuropsychol. Soc. 2017, 23, 903–915. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Volkmar, F.R.; Reichow, B.; McPartland, J. Classification of autism and related conditions: Progress, challenges, and opportunities. Dialogues Clin. Neurosci. 2012, 14, 229–237. [Google Scholar] [CrossRef]
- Seh, A.H.; Zarour, M.; Alenezi, M.; Sarkar, A.K.; Agrawal, A.; Kumar, R.; Khan, R.A. Healthcare Data Breaches: Insights and Implications. Healthcare 2020, 8, 133. [Google Scholar] [CrossRef]
- Vezyridis, P.; Timmons, S. Resisting big data exploitations in public healthcare: Free riding or distributive justice? Sociol. Health Illn. 2019, 41, 1585–1599. [Google Scholar] [CrossRef]
- Coventry, L.; Branley, D. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas 2018, 113, 48–52. [Google Scholar] [CrossRef] [PubMed]
- Price, W.N.; Cohen, I.G. Privacy in the age of medical big data. Nat. Med. 2019, 25, 37–43. [Google Scholar] [CrossRef] [PubMed]
- Chernyshev, M.; Zeadally, S.; Baig, Z. Healthcare Data Breaches: Implications for Digital Forensic Readiness. J. Med. Syst. 2019, 43, 1–12. [Google Scholar] [CrossRef] [PubMed]
- Raspa, M.; Moultrie, R.; Wagner, L.; Edwards, A.; Andrews, S.; Frisch, M.K.; Turner-brown, L.; Wheeler, A. Ethical, Legal, and Social Issues Related to the Inclusion of Individuals With Intellectual Disabilities in Electronic Health Record Research: Scoping Review. J. Med. Internet Res. 2020, 22, e16734. [Google Scholar] [CrossRef] [PubMed]
- Trustwave. The Value of Data: A Cheap Commodity or a Priceless Asset? Final Report; UK, 2017; Unpublished work.
- Sulleyman, A. NHS cyber attack: Why stolen medical information is so much more valuable than financial data. The Independent. 12 May 2017. Available online: https://www.independent.co.uk/life-style/gadgets-and-tech/news/nhs-cyber-attack-medical-data-records-stolen-why-so-valuable-sell-financial-a7733171.html (accessed on 10 June 2021).
- Kangas, E. Why Are Hackers Targeting Your Medical Records? 2017. Available online: https://luxsci.com/blog/hackers-targeting-medical-records.html (accessed on 10 June 2021).
- Şenel, F.A.; Gökçe, F.; Yüksel, A.S.; Yiğit, T. A novel hybrid PSO–GWO algorithm for optimization problems. Eng. Comput. 2018, 35, 1359–1373. [Google Scholar] [CrossRef]
- Zolghadr-Asli, B.; Bozorg-Haddad, O.; Chu, X. Crow Search Algorithm (CSA). In Advanced Optimization by Nature-Inspired Algorithms. Studies in Computational Intelligence; Bozorg-Haddad, O., Ed.; Springer: Singapore, 2018; Volume 720. [Google Scholar] [CrossRef]
- Alphonsa, M.M.A.; Amudhavalli, P. Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector. Evol. Intell. 2018, 11, 101–116. [Google Scholar] [CrossRef]
- Panda, M.; Das, B. Grey Wolf Optimizer and Its Applications: A Survey. In Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems, ARTTC BSNL, Ranchi, India, 12–13 May 2018; Springer: Singapore; pp. 179–194. [Google Scholar] [CrossRef]
- Ahamad, D.; Hameed, S.A.; Akhtar, M. A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. J. King Saud. Univ.Comput. Inf. Sci. 2020. [Google Scholar] [CrossRef]
- Balashunmugaraja, B.; Ganeshbabu, T.R. Optimal Key Generation for Data Sanitization and Restoration of Cloud Data: Future of Financial Cyber Security. Int. J. Inf. Technol. Decis. Mak. 2020, 19, 987–1013. [Google Scholar] [CrossRef]
- Abidi, M.H.; Alkhalefah, H.; Umer, U.; Mohammed, M.K. Blockchain-based secure information sharing for supply chain management: Optimization assisted data sanitization process. Int. J. Intell. Syst. 2021, 36, 260–290. [Google Scholar] [CrossRef]
- Edgar, D. Data Sanitization Techniques. A Net 2000 Ltd. White Paper, 2003–2004. Available online: http://www.orafaq.com/papers/data_sanitization.pdf (accessed on 20 June 2021).
- Lekshmy, P.L.; Rahiman, M.A. A sanitization approach for privacy preserving data mining on social distributed environment. J. Ambient. Intell. Humaniz. Comput. 2019, 11, 2761–2777. [Google Scholar] [CrossRef]
- Ochôa, I.S.; Silva, L.A.; De Mello, G.; Garcia, N.M.; De Santana, J.F.P.; Leithardt, V.R.Q. A Cost Analysis of Implementing a Blockchain Architecture in a Smart Grid Scenario Using Sidechains. Sensors 2020, 20, 843. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Shailaja, G.K.; Rao, C.V.G. Opposition Intensity-Based Cuckoo Search Algorithm for Data Privacy Preservation. J. Intell. Syst. 2019, 29, 1441–1452. [Google Scholar] [CrossRef]
- Renuga, S.; Jagatheeshwari, S.S.K. Efficient Privacy-Preserving Data Sanitization over Cloud Using Optimal GSA Algorithm. Comput. J. 2018, 61, 1577–1588. [Google Scholar] [CrossRef]
- Han, P.; Liu, C.; Cao, J.; Duan, S.; Pan, H.; Cao, Z.; Fang, B. CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage. IEEE Access 2020, 8, 68449–68459. [Google Scholar] [CrossRef]
- Revathi, S.T.; Ramaraj, N.; Chithra, S. Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing. Clust. Comput. 2018, 22, 3521–3530. [Google Scholar] [CrossRef]
- Sahi, A.; Lai, D.; Li, Y. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan. Comput. Biol. Med. 2016, 78, 1–8. [Google Scholar] [CrossRef] [PubMed]
- Liu, Y.; Qu, X.; Xin, G. A ROI-based reversible data hiding scheme in encrypted medical images. J. Vis. Commun. Image Represent. 2016, 39, 51–57. [Google Scholar] [CrossRef]
- Zhang, Y.; Zheng, D.; Deng, R.H. Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control. IEEE Internet Things J. 2018, 3, 1–15. [Google Scholar] [CrossRef]
- Sharma, U.; Toshniwal, D.; Sharma, S. A sanitization approach for big data with improved data utility. Appl. Intell. 2020, 50, 2025–2039. [Google Scholar] [CrossRef]
- Sharma, S.; Toshniwal, D. MR-OVnTSA: A heuristics based sensitive pattern hiding approach for big data. Appl. Intell. 2020, 50, 4241–4260. [Google Scholar] [CrossRef]
- Lin, Z.; Lin, M.; Champagne, B.; Zhu, W.-P.; Al-Dhahir, N. Secure and Energy Efficient Transmission for RSMA-Based Cognitive Satellite-Terrestrial Networks. IEEE Wirel. Commun. Lett. 2021, 10, 251–255. [Google Scholar] [CrossRef]
- Lin, Z.; Lin, M.; De Cola, T.; Wang, J.-B.; Zhu, W.-P.; Cheng, J. Supporting IoT With Rate-Splitting Multiple Access in Satellite and Aerial-Integrated Networks. IEEE Internet Things J. 2021, 8, 11123–11134. [Google Scholar] [CrossRef]
- Lin, Z.; Lin, M.; Champagne, B.; Zhu, W.-P.; Al-Dhahir, N. Secrecy-Energy Efficient Hybrid Beamforming for Satellite-Terrestrial Integrated Networks. IEEE Trans. Commun. 2021, 69, 6345–6360. [Google Scholar] [CrossRef]
- Mottalib, M.M.; Rahman, M.M.; Habib, M.T.; Ahmed, F. Detection of the Onset of Diabetes Mellitus by Bayesian Classifier Based Medical Expert System. Trans. Mach. Learn. Artif. Intell. 2016, 4, 1–8. [Google Scholar] [CrossRef] [Green Version]
- Rahman, M.A.; Muniyandi, R.C.; Albashish, D.; Rahman, M.M.; Usman, O.L. Artificial neural network with Taguchi method for robust classification model to improve classification accuracy of breast cancer. PeerJ Comput. Sci. 2021, 7, 1–27. [Google Scholar] [CrossRef]
- Rahman, M.A.; Muniyandi, R.C.; Islam, K.T.; Rahman, M.M. Ovarian Cancer Classification Accuracy Analysis Using 15-Neuron Artificial Neural Networks Model. In Proceedings of the 2019 IEEE Student Conference on Research and Development (SCOReD), Perak, Malaysia, 15–17 October 2019; IEEE: Perak, Malaysia, 2019; pp. 33–38. [Google Scholar] [CrossRef]
- Alesawy, O.; Muniyandi, R.C. Elliptic Curve Diffie-Hellman Random Keys Using Artificial Neural Network and Genetic Algorithm for Secure Data over Private Cloud. Inf. Technol. J. 2016, 15, 77–83. [Google Scholar] [CrossRef] [Green Version]
- Usman, O.L.; Muniyandi, R.C. CryptoDL: Predicting Dyslexia Biomarkers from Encrypted Neuroimaging Dataset Using Energy-Effcient Residue Number System and Deep Convolutional Neural Network. Symmetry 2020, 12, 836. [Google Scholar] [CrossRef]
- Bostanoǧlu, B.E.; Öztürk, A.C. Minimizing information loss in shared data: Hiding frequent patterns with multiple sensitive support thresholds. Stat. Anal. Data Min. ASA Data Sci. J. 2020, 13, 309–323. [Google Scholar] [CrossRef]
- Iwendi, C.; Moqurrab, S.A.; Anjum, A.; Khan, S.; Mohan, S.; Srivastava, G. N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets. Comput. Commun. 2020, 161, 160–171. [Google Scholar] [CrossRef]
- Zaman, A.N.K.; Obimbo, C.; Dara, R.A. An Improved Data Sanitization Algorithm for Privacy Preserving Medical Data Publishing. In Advances in Artificial Intelligence, Proceedings of the Canadian AI 2017 Lecture Notes in Computer Science, Edmonton, AB, Canada, 16–19 May 2017; Mouhoub, M., Langlais, P., Eds.; Springer: Cham, Switzerland, 2017; pp. 64–70. [Google Scholar] [CrossRef]
- Liu, X.; Chen, G.; Wen, S.; Song, G. An Improved Sanitization Algorithm in Privacy-Preserving Utility Mining. Math. Probl. Eng. 2020, 2020, 1–14. [Google Scholar] [CrossRef]
- Freitas, W., Jr.; Favier, G.; De Almeida, A.L.F. Generalized Khatri-Rao and Kronecker Space-Time Coding for MIMO Relay Systems with Closed-Form Semi-Blind Receivers. Signal 2018, 151, 19–31. [Google Scholar] [CrossRef] [Green Version]
Authors/Year/References | Techniques/Methods | Attributes/Characteristics/Features | Challenges |
---|---|---|---|
Mewada et al. (2020) [5] | ABC algorithm |
|
|
Mandala et al. (2018) [6] | AAP-CSA algorithm |
|
|
Alphonsa et al. (2018) [22] | GMGW algorithm |
|
|
Ahamad et al. (2020) [24] | J-SSO algorithm |
|
|
Balashunmugaraja et al. (2020) [25] | CI-LA algorithm |
|
|
Abidi et al. (2021) [26] | WNU algorithm |
|
|
Lekshmy et al. (2019) [28] | ABC algorithm |
|
|
Shailaja et al. (2019) [30] | OI-CSA algorithm |
|
|
Renuga et al. (2018) [31] | GSA algorithm |
|
|
Han et al. (2020) [32] | CloudDLP |
|
|
Revathi et al. (2018) [33] | BS-WOA algorithm |
|
|
Transactions | Data |
---|---|
T1 | 1 2 |
T2 | 1 3 |
T3 | 2 3 4 |
T4 | 1 3 4 |
T5 | 3 4 |
PSO-GWO | PSO | GA | DE | CSA | AAP-CSA | Attacks |
---|---|---|---|---|---|---|
Superior to | 0.44% | 0.44% | 0.43% | 0.43% | x | KCA |
Higher than | 0.36% | 0.31% | 0.31% | 0.31% | 0.01% | KPA |
PSO-GWO | PSO | GA | DE | CSA | AAP-CSA | Attacks |
---|---|---|---|---|---|---|
Enhanced over | 0.37% | 0.33% | 0.32% | 0.32% | x | CCA |
Greater than | 0.34% | 0.32% | 0.31% | 0.30% | 0.10% | CPA |
PSO-GWO | PSO | GA | DE | CSA | AAP-CSA | Attacks |
---|---|---|---|---|---|---|
Superior to | 0.18% | 0.18% | 0.18% | 0.18% | 0.03% | CCA |
Higher than | 0.20% | 0.20% | 0.20% | 0.20% | x | CPA |
PSO-GWO | PSO | GA | DE | CSA | AAP-CSA | Attacks |
---|---|---|---|---|---|---|
Excellent over | 3.30% | 3.30% | 3.30% | 3.10% | 2.80% | CCA |
Greater than | 1.10% | 1% | 1% | 0.80% | 0.20% | CPA |
PSO-GWO | PSO | GA | DE | CSA | AAP-CSA | Attacks |
---|---|---|---|---|---|---|
Better than | 0.26% | 0.23% | 0.22% | 0.18% | x | CCA |
Superior to | 0.40% | 0.29% | 0.28% | 0.28% | 0.10% | CPA |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Rahman, M.M.; Muniyandi, R.C.; Sahran, S.; Mohamed, S. Enhancement of an Optimized Key for Database Sanitization to Ensure the Security and Privacy of an Autism Dataset. Symmetry 2021, 13, 1912. https://doi.org/10.3390/sym13101912
Rahman MM, Muniyandi RC, Sahran S, Mohamed S. Enhancement of an Optimized Key for Database Sanitization to Ensure the Security and Privacy of an Autism Dataset. Symmetry. 2021; 13(10):1912. https://doi.org/10.3390/sym13101912
Chicago/Turabian StyleRahman, Md. Mokhlesur, Ravie Chandren Muniyandi, Shahnorbanun Sahran, and Suziyani Mohamed. 2021. "Enhancement of an Optimized Key for Database Sanitization to Ensure the Security and Privacy of an Autism Dataset" Symmetry 13, no. 10: 1912. https://doi.org/10.3390/sym13101912
APA StyleRahman, M. M., Muniyandi, R. C., Sahran, S., & Mohamed, S. (2021). Enhancement of an Optimized Key for Database Sanitization to Ensure the Security and Privacy of an Autism Dataset. Symmetry, 13(10), 1912. https://doi.org/10.3390/sym13101912