ITU‐T's Technical Reports and Specifications 699 (b) Quality management Provide resource management capabilities, service management capabilities, application management capabilities and interaction management capabilities; Resource management capabilities include resource exchange, resource synchronization, resource auditing, resource publishing, resource status monitor, and so on; Service management capabilities provide API interfaces for data resources so that developers can easily implement or attempt to access an external resource without download to local host. Under the premise of data update, it is possible to obtain the latest data resources; Application management capabilities mainly used to audit applications provided by developer, in addition to uniformly manage the on‐line application of unified management, to monitor the entire application environment, and to timely investigate the abnormal operation of APP application; Interaction management capabilities mainly used to review applications of users, to respond to comments, to create questionnaires, to investigate statistical data, to update common questions and so on. (c) Operation management Provide several operation patterns: include independent operation, cooperative operation, outsourcing operation, and so on; Provide supply chain coordination as well data flows both in and between links in the chain, which include government, enterprise, social groups and individuals. (d) Security management Anonymization technology is a part of security management in some studies; Anonymization technology is used for protecting original data. The main purpose of anonymization technology is to open data for everyone. The main point of anonymization for management is the level of anonymization. Although a strong anonymization makes it difficult to identify, it becomes difficult to use the data for services because it contains less information, vice versa. It is required to select best anonymization levels according to the target services. (4) Open data security system Security system provides operation and system level security protection and privacy preservation in the open data system. (5) Open data regularities Regularities provide top‐down institution level security protection and privacy preservation in the open data system. 4 Open data handling in SSC 4.1 Barriers and constraints in open data Data management is to do with managing the information life cycle which should include policies and processes for acquiring, validating, storing, protecting and processing data. The data infrastructure of smart sustainable city has to define the information and its expression as a clear format considering the interoperability with other standards. It also has to support the way to