Page 709 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 709
(b) Quality management
Provide resource management capabilities, service management capabilities, application
management capabilities and interaction management capabilities;
Resource management capabilities include resource exchange, resource synchronization,
resource auditing, resource publishing, resource status monitor, and so on;
Service management capabilities provide API interfaces for data resources so that developers
can easily implement or attempt to access an external resource without download to local host.
Under the premise of data update, it is possible to obtain the latest data resources;
Application management capabilities mainly used to audit applications provided by developer,
in addition to uniformly manage the on‐line application of unified management, to monitor the
entire application environment, and to timely investigate the abnormal operation of APP
application;
Interaction management capabilities mainly used to review applications of users, to respond to
comments, to create questionnaires, to investigate statistical data, to update common questions
and so on.
(c) Operation management
Provide several operation patterns: include independent operation, cooperative operation,
outsourcing operation, and so on;
Provide supply chain coordination as well data flows both in and between links in the chain,
which include government, enterprise, social groups and individuals.
(d) Security management
Anonymization technology is a part of security management in some studies;
Anonymization technology is used for protecting original data. The main purpose of
anonymization technology is to open data for everyone. The main point of anonymization for
management is the level of anonymization. Although a strong anonymization makes it difficult
to identify, it becomes difficult to use the data for services because it contains less information,
vice versa. It is required to select best anonymization levels according to the target services.
(4) Open data security system
Security system provides operation and system level security protection and privacy
preservation in the open data system.
(5) Open data regularities
Regularities provide top‐down institution level security protection and privacy preservation in
the open data system.
4 Open data handling in SSC
4.1 Barriers and constraints in open data
Data management is to do with managing the information life cycle which should include policies
and processes for acquiring, validating, storing, protecting and processing data. The data
infrastructure of smart sustainable city has to define the information and its expression as a clear
format considering the interoperability with other standards. It also has to support the way to
ITU‐T's Technical Reports and Specifications 699