698 ITU‐T's Technical Reports and Specifications Linked Data Technique The first step is ontology design, including vocabulary selection and vocabulary design; The second step is RDF structuration, including the type of data, data preparation, data storage, data publication and the type of publication; The third step is relationship establishment, including relationship links, links identification, vocabulary links and the type of relationship; The last step is data fusion, including crawling pattern, on‐the‐fly dereferencing pattern, query federation pattern and fusion mode. Data Visualization Data mining; Data presentation. Social Networks Mobile Sharing; RSS push technique. Anonymization Technique Suppression; Pseudonymization (hash function); Generalization – Top/bottom coding – K‐anonymity – l‐diversity – T‐closeness – Non‐intrusive Load Monitoring (NILM) – Homomorphic encryption – Randomization (Pk‐anonymization) – Perturbation – micro‐aggregation – noise injection – data swapping – synthetic microdata. (3) Open data management (a) User management Provide user Management capabilities, user group management capabilities, and role‐based (RBAC) permission management capabilities; User management capabilities include query, new‐built, account management, and so on; User group management capabilities include query, new‐built, permission modification, and so on; Permission lists include function module uses‐permission, data access permission, and so on.