Page 721 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 721
(4) Other techniques
(4.1) Suppression or records
To delete records with a special attribute or value. For example, a record which has
a value of more than 120 is deleted.
(4.2) Supression of cells
To delete sensitive attributes such as the attributes which should not be used for
analysis.
(4.3) Sampling
To extract a value randomly from the entire original data at a constant rate or
number.
(5) Advanced anonymization methods
(5.1) k‐anonymization, l‐diversity, l‐closeness
These PPDP method is described in the section of Use Cases.
(5.2) Pk‐anonymization
A method of anonymization that guarantee the probability to point out a personal
record is less than 1/k in probability.
(6) Application specific anonymization methods
(6.1) Battery‐load hiding
Battery‐load hiding (BLH) techniques were proposed to ensure household
privacy 4748 . BLH hides or obscures real electric consumption by charging and
discharging batteries, which are set with each household. This approach tries to
keep electric power consumption data constant value and make it impossible to
infer real usage of home appliances by NILM.
(6.2) Others
The anonymization methods explained in section 11 belongs this category.
6 The management of open data in SSC
6.1 Executive institution management
Open data is a valuable resource and a strategic asset to the government, its partners, and the public.
Due to the existence of institutional mechanisms there are more barriers between information
systems, data showing disorderly scattered islands situation, the actual utilization of data is very low.
Scattered data means that the data from various agencies and institutions unable to form an open
source browser‐based map that enable citizens and enterprise hardly to visualize open data from
agencies, institutions and other people. Also, a thorough analysis helps agencies and institutions
pinpoint needs, priorities, and existing capabilities for open data. Before the analysis begins, however,
____________________
47 McLaughlin, S., McDaniel, P., & Aiello, W, Protecting consumer privacy from electric load monitoring; In Proceedings
of the 18th ACM conference on Computer and communications security CCS ’11 ,2011.
48 Yang, L., Chen, X., Zhang, J., & Poor, H.; Optimal Privacy‐Preserving Energy Management for Smart Meters, IEEE
INFOCOM, 2014,Page(s): 513‐521.
ITU‐T's Technical Reports and Specifications 711