ITU‐T's Technical Reports and Specifications 715 (1) Data security and privacy Open data should focus on the application of information security standards and legal institutions of network security. The establishment of confidentiality rules and regulations for information resources, not only to strengthen the protection of information security, but also to strengthen the protection of user's personal information54. At the same time, the improvement of legal institutions can provide institutional safeguards. Government departments, enterprises, social groups should protectpersonal privacy when they collect personal information, each department and agencies shall not publish personally identifiable information on the platform, also shall not violate national laws and legal rules by any means. All published data should comply with all related security and privacy requirements. Privacy protection that is not relevant to data should guarantee the feedback provided by the platform is anonymous without recording trace information or identification information. (2) Data auditing mechanism According to legal requirements, government departments, enterprises, social groups and individuals should review procedures involving data sets of national security and privacy55. The establishment of data anonymization mechanisms to prevent linking attacks. Even if any single data set may not pose a threat to national security, or it may not cause a risk of leak privacy, it may increase this risk through a lot of published data sets. Therefore rigorous review procedures can help to reduce the risk, preventing sensitive information, personally identifiable information and national security‐sensitive information being leaked intentionally or unintentionally. The definition of secondary use of data is to permit the use the data for purposes not limited to the primary and original use. Secondary use of data by interacting data generated by different infrastructures is expected to create new services and businesses in smart sustainable city. Secondary uses of data, including location information recorded by mobile phones and data from electricity smart meters, are under consideration for new services. The location data of mobile phones will reveal the daily travels of their users. For example, some car navigation systems utilize mobile phones to connect to datacenters, and, therefore, it can obtain the car's location and other relevant data. The primary purposes of these data are to track the requirements of car's maintenance and to facilitate road services for drivers. By analyzing the data, it is possible to obtain the driving speed and location of the car. In addition, analysis of this data can identify intersections where drivers frequently brake in a sudden manner. a road maintenance squad can check the intersection by utilizing this information, where they may identify problems such as hidden or missing signs. Data from a smart meter can provide information about the daily activities of the household. Remote observation services that monitor elderly parents attract significant attention in an aging society. Moreover, by analyzing household electric power consumption data, security companies may provide a service that alerts by e‐mail when there is no consumption or when consumption is higher than usual when residents are not present at home. In addition, cleaning service of heating, ventilation, and air conditioning appliances can be provided. Such a service can use the air ____________________ 54 Raghuwanshi, D.S., Rajagopalan, M.R.MS2; Practical data privacy and security framework for data at rest in cloud. Computer Applications and Information Systems (WCCAIS), 2014 World Congress on. 2014, Page(s): 1‐ 8. 55 Yu, Y., Ni, J., Au, M.H., Mu, Y., Wang, B., Li, H.; On the Security of a Public Auditing Mechanism for Shared Cloud Data Service. Services Computing, IEEE Transactions on. 2014 , Page(s): 1.