Page 725 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 725
(1) Data security and privacy
Open data should focus on the application of information security standards and legal institutions
of network security. The establishment of confidentiality rules and regulations for information
resources, not only to strengthen the protection of information security, but also to strengthen the
54
protection of user's personal information . At the same time, the improvement of legal institutions
can provide institutional safeguards.
Government departments, enterprises, social groups should protectpersonal privacy when they
collect personal information, each department and agencies shall not publish personally identifiable
information on the platform, also shall not violate national laws and legal rules by any means. All
published data should comply with all related security and privacy requirements.
Privacy protection that is not relevant to data should guarantee the feedback provided by the
platform is anonymous without recording trace information or identification information.
(2) Data auditing mechanism
According to legal requirements, government departments, enterprises, social groups and
55
individuals should review procedures involving data sets of national security and privacy .
The establishment of data anonymization mechanisms to prevent linking attacks. Even if any single
data set may not pose a threat to national security, or it may not cause a risk of leak privacy, it may
increase this risk through a lot of published data sets. Therefore rigorous review procedures can
help to reduce the risk, preventing sensitive information, personally identifiable information and
national security‐sensitive information being leaked intentionally or unintentionally.
The definition of secondary use of data is to permit the use the data for purposes not limited to the
primary and original use. Secondary use of data by interacting data generated by different
infrastructures is expected to create new services and businesses in smart sustainable city.
Secondary uses of data, including location information recorded by mobile phones and data from
electricity smart meters, are under consideration for new services. The location data of mobile
phones will reveal the daily travels of their users. For example, some car navigation systems utilize
mobile phones to connect to datacenters, and, therefore, it can obtain the car's location and other
relevant data. The primary purposes of these data are to track the requirements of car's
maintenance and to facilitate road services for drivers. By analyzing the data, it is possible to obtain
the driving speed and location of the car. In addition, analysis of this data can identify intersections
where drivers frequently brake in a sudden manner. a road maintenance squad can check the
intersection by utilizing this information, where they may identify problems such as hidden or
missing signs. Data from a smart meter can provide information about the daily activities of the
household. Remote observation services that monitor elderly parents attract significant attention
in an aging society.
Moreover, by analyzing household electric power consumption data, security companies may
provide a service that alerts by e‐mail when there is no consumption or when consumption is higher
than usual when residents are not present at home. In addition, cleaning service of heating,
ventilation, and air conditioning appliances can be provided. Such a service can use the air
____________________
54 Raghuwanshi, D.S., Rajagopalan, M.R.MS2; Practical data privacy and security framework for data at rest in cloud.
Computer Applications and Information Systems (WCCAIS), 2014 World Congress on. 2014, Page(s): 1‐ 8.
55 Yu, Y., Ni, J., Au, M.H., Mu, Y., Wang, B., Li, H.; On the Security of a Public Auditing Mechanism for Shared Cloud Data
Service. Services Computing, IEEE Transactions on. 2014 , Page(s): 1.
ITU‐T's Technical Reports and Specifications 715