702 ITU‐T's Technical Reports and Specifications Generalization and deletion of the data are necessary to prevent privacy infringements. However, they reduce the value of the data. As a result, there is a trade‐off relationship between privacy protection and the utilization of the data. Although techniques such as PPDM and PPDP have been investigated in numerous studies, a method of securely publishing the data to enable secondary use has not been definitively established. This secondary use is the essential way of data to make interaction between different infrastructures. As shown in IEEE SMART GIRD VISION FOR VEHICULAR TECHNOLOGY: 2030 AND BEYOND, the future infrastructure exchanges data to use for inter‐infrastructure smart services. PPDM and PPDP are an indispensable technique to maximize the distribution range of data. The anonymization method is the key of PPDM and PPDP. Anonymization enables the publication of private data by changing public data by omitting sensitive information. However, from the viewpoint of security of anonymization, there is a possibility of privacy leak. After calculating and publishing anonymized data from a data source, another anonymized data set, calculated and published from the same source may cause a privacy information leak if an unauthorized person can access both sets of anonymized data. When calculating and publishing anonymized data, it is necessary to consider all of the previously published data from the same source. This leak will become larger when the data transaction in smart sustainable city becomes more active. To provide a way to protect the leak, new architecture of data management is required. Considering these issues, it is crucial to establish a clear suggestion of technological guidance, an infrastructure, and a technical standard of protocols for the secondary use of data. The development of the protocol and infrastructure is especially important for the data infrastructure of smart sustainable city. It will facilitate collaboration between organizations that produce the data and the companies that require the data for secondary use, and thus increase their data publishing activity. It will develop new service and market for secondary uses of data in conjunction with advanced services such as market research, estimation of a route of infection, and traffic pattern analysis. Moreover, it will reduce the utilization costs for both providers and consumers of secondary use data, owing to the unification of data processing procedures. 4.3 Policy and regulation The Open Data policies are driven by a push for economic growth and job creation. President Obama made this clear when he announced his administration's new Open Data Policy in May 2013. This policy, which will make unprecedented amounts of federal data available in highly usable forms, has a business agenda first and foremost. Significantly, the President didn't make his announcement at a Washington press conference or in the Rose Garden but on a visit to a technology center in Austin, Texas. There he promised that governmental open data is going to help launch new businesses of all kinds in ways \"that we haven't even imagined yet\". The Open Data Policy includes a detailed description of the criteria for government data to be released as Open Data, drawing on work done by the Open Knowledge Foundation in the United Kingdom, the Washington‐basedSunlight Foundation, and others. Technology of security protection and privacy preservation is the one wheel of a vehicle and the other wheel is political support by government. Open data and privacy issue conflict with each other. To publish open data, private information has to be removed from the open data. Meanwhile, the value of open data will be degraded when private information is removed significantly. Although this trace‐off problem can be ease by using technology, it cannot be perfectly solved only by using technology.