Page 746 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 746

8.4  Infrastructure of Secondary Use of Data

                                                                                         72
            This infrastructure can be divided into four organizations as follows (Figure 10) .



























                               Figure 10 – Overview of data anonymization infrastructure


            (i)     Original data storeroom organization (ODS)
                    This organization manages data provided by the data folder. The data folder is considered
                    the data provider when the data is managed by ODS. When providing data to ODS, the data
                    folder prepares data for publishing and provides an allowance rule by utilizing a specially
                    designed format. This format is termed XML‐based anonymization sheets (XAS). The details
                    of XAS are described in the following section. Publishing rule descriptions utilize a subset of
                    XAS, termed XML‐based anonymization rules (XAR). The data folder generates data as D‐
                    XAS, and the publishing rules (P‐XAR) correspond to the D‐XAS. D‐XAS should include the
                    link to the P‐XAR. ODS should be responsible for maintaining the original data written as D‐
                    XAS in a secure manner. This data registration process is based on the PUT method.
            (ii)    Anonymizing rules storeroom organization (ARS)

                    This organization manages P‐XAR. P‐XAR will be openly published for users who need to
                    access anonymized data based on the original data. P‐XARs stored in the ARS can exhibit
                    data when it is available for its secondary use. A P‐XAR is stored by utilizing a PUT method
                    issued by ODS.
            (iii)   Data anonymizing and publishing organization (DAP)

                    This organization anonymizes the original data (D‐XAS) based on a publishing rule (P‐XAR)
                    and  a  request  rule  (R‐XAR).  A  secondary  use  data  consumer  generates  an  R‐XAR  and
                    provides it to the DAP. An R‐XAR contains relevant information for D‐XASs such as a URL,
                    the requested anonymization method, its privacy level and anonymization range required
                    to obtain the data for secondary use. The DAP receives the header of the requested D‐XAS
                    to access the link of the R‐XAR. This header information does not include data. This header
                    information is also described by using an XAR termed H‐XAR; the DAP verifies its compliance

            ____________________
            72  J. ‐W.  Byun,  A.  kamura,  E.  Bertino,  N.  Li;  Efficient  k‐anonymization  using  clustering  techniques;  Advances  in
               Databases: Concepts, Systems and Applications, pp. 188–200, 2007.

            736                                                      ITU‐T's Technical Reports and Specifications
   741   742   743   744   745   746   747   748   749   750   751