Page 721 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 721

(4)    Other techniques

                    (4.1)   Suppression or records
                            To delete records with a special attribute or value. For example, a record which has
                            a value of more than 120 is deleted.
                    (4.2)   Supression of cells
                            To delete sensitive attributes such as the attributes which should not be used for
                            analysis.
                    (4.3)   Sampling

                            To extract a value randomly from the entire original data at a constant rate or
                            number.
            (5)     Advanced anonymization methods

                    (5.1)   k‐anonymization, l‐diversity, l‐closeness
                            These PPDP method is described in the section of Use Cases.
                    (5.2)   Pk‐anonymization
                            A method of anonymization that guarantee the probability to point out a personal
                            record is less than 1/k in probability.

            (6)     Application specific anonymization methods
                    (6.1)   Battery‐load hiding

                            Battery‐load  hiding  (BLH)  techniques  were  proposed  to  ensure  household
                            privacy 4748 .  BLH  hides  or  obscures  real  electric  consumption  by  charging  and
                            discharging batteries, which are set with each household. This approach tries to
                            keep electric power consumption data constant value and make it impossible to
                            infer real usage of home appliances by NILM.
                    (6.2)   Others

                            The anonymization methods explained in section 11 belongs this category.


            6       The management of open data in SSC



            6.1  Executive institution management

            Open data is a valuable resource and a strategic asset to the government, its partners, and the public.
            Due  to  the  existence  of  institutional  mechanisms  there  are  more  barriers  between  information
            systems, data showing disorderly scattered islands situation, the actual utilization of data is very low.
            Scattered data means that the data from various agencies and institutions unable to form an open
            source browser‐based map that enable citizens and enterprise hardly to visualize open data from
            agencies, institutions and other  people.  Also,  a  thorough analysis helps  agencies and institutions
            pinpoint needs, priorities, and existing capabilities for open data. Before the analysis begins, however,


            ____________________
            47   McLaughlin, S., McDaniel, P., & Aiello, W, Protecting consumer privacy from electric load monitoring; In Proceedings
               of the 18th ACM conference on Computer and communications security CCS ’11 ,2011.
            48   Yang, L., Chen, X., Zhang, J., & Poor, H.; Optimal Privacy‐Preserving Energy Management for Smart Meters, IEEE
               INFOCOM, 2014,Page(s): 513‐521.

            ITU‐T's Technical Reports and Specifications                                                  711
   716   717   718   719   720   721   722   723   724   725   726