Page 725 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 725

(1)     Data security and privacy

            Open data should focus on the application of information security standards and legal institutions
            of  network  security.  The  establishment  of  confidentiality  rules  and  regulations  for  information
            resources, not only to strengthen the protection of information security, but also to strengthen the
                                                    54
            protection of user's personal information . At the same time, the improvement of legal institutions
            can provide institutional safeguards.

            Government departments, enterprises, social groups should protectpersonal privacy when they
            collect personal information, each department and agencies shall not publish personally identifiable
            information on the platform, also shall not violate national laws and legal rules by any means. All
            published data should comply with all related security and privacy requirements.

            Privacy  protection  that  is  not  relevant  to  data  should  guarantee  the  feedback  provided  by  the
            platform is anonymous without recording trace information or identification information.
            (2)     Data auditing mechanism

            According  to  legal  requirements,  government  departments,  enterprises,  social  groups  and
                                                                                                  55
            individuals should review procedures involving data sets of national security and privacy .
            The establishment of data anonymization mechanisms to prevent linking attacks. Even if any single
            data set may not pose a threat to national security, or it may not cause a risk of leak privacy, it may
            increase this risk through a lot of published data sets. Therefore rigorous review procedures can
            help to reduce the risk, preventing sensitive information, personally identifiable information and
            national security‐sensitive information being leaked intentionally or unintentionally.
            The definition of secondary use of data is to permit the use the data for purposes not limited to the
            primary  and  original  use.  Secondary  use  of  data  by  interacting  data  generated  by  different
            infrastructures  is  expected  to  create  new  services  and  businesses  in  smart  sustainable  city.
            Secondary uses of data, including location information recorded by mobile phones and data from
            electricity smart meters, are under consideration for new services. The location data of mobile
            phones will reveal the daily travels of their users. For example, some car navigation systems utilize
            mobile phones to connect to datacenters, and, therefore, it can obtain the car's location and other
            relevant  data.  The  primary  purposes  of  these  data  are  to  track  the  requirements  of  car's
            maintenance and to facilitate road services for drivers. By analyzing the data, it is possible to obtain
            the driving speed and location of the car. In addition, analysis of this data can identify intersections
            where  drivers  frequently  brake  in  a  sudden  manner.  a  road  maintenance  squad  can  check  the
            intersection  by  utilizing  this  information,  where  they  may  identify  problems  such  as  hidden  or
            missing signs. Data from a smart meter can provide information about the daily activities of the
            household. Remote observation services that monitor elderly parents attract significant attention
            in an aging society.

            Moreover,  by  analyzing  household  electric  power  consumption  data,  security  companies  may
            provide a service that alerts by e‐mail when there is no consumption or when consumption is higher
            than  usual  when  residents  are  not  present  at  home.  In  addition,  cleaning  service  of  heating,
            ventilation,  and  air  conditioning  appliances  can  be  provided.  Such  a  service  can  use  the  air


            ____________________
            54   Raghuwanshi, D.S., Rajagopalan, M.R.MS2; Practical data privacy and security framework for data at rest in cloud.
               Computer Applications and Information Systems (WCCAIS), 2014 World Congress on. 2014, Page(s): 1‐ 8.
            55   Yu, Y., Ni, J., Au, M.H., Mu, Y., Wang, B., Li, H.; On the Security of a Public Auditing Mechanism for Shared Cloud Data
               Service. Services Computing, IEEE Transactions on. 2014 , Page(s): 1.

            ITU‐T's Technical Reports and Specifications                                                  715
   720   721   722   723   724   725   726   727   728   729   730