<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Configurable Anonymisation Service for Semantically Annotated Data: A Case Study on REC Data</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Paul Feichtenschlager</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Christoph Fabianek</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fajar J. Ekaputra</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sebastian Haas</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gabriel Unterholzer</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Hinterland Systems</institution>
          ,
          <addr-line>Hörlgasse 10, 1090 Vienna</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>OwnYourData.eu</institution>
          ,
          <addr-line>Michael Scherz-Straße 14, 2540 Bad Vöslau</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Vienna University of Economics and Business</institution>
          ,
          <addr-line>Welthandeltsplatz 1, 1020 Vienna</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Due to the increasing push for data sharing in Renewable Energy Communities (RECs)-driven by evolving regulations and energy transition goals-there is a growing need for trusted, privacy-preserving data-sharing infrastructures. One of the key challenges for RECs is enabling internal and external data sharing while minimizing privacy risks and preserving data value. In this work, we introduce a generic, configurable online anonymisation service for semantically annotated data as an extension to the Semantic Overlay Architecture (SOyA). Our approach employs an automated rule-based anonymisation pipeline that reduce re-identification risks while maintaining the utility of shared data. We demonstrated how this service can support compliant, secure, and practical data-sharing practices in real-world REC scenarios.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Data anonymisation</kwd>
        <kwd>Renewable Energy Communities</kwd>
        <kwd>Governance</kwd>
        <kwd>Semantic annotation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The digital transformation driven by decentralized energy resources and smart grids presents
opportunities and challenges. Renewable Energy Communities (RECs) enable joint renewable energy production,
consumption, and management, facilitated by smart meters capturing high-resolution household energy
data. Austria mandates smart meter installation for 95% of households by 2024 [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], collecting granular
consumption and production data at 15-minute intervals. Under §84 ElWOG, network operators must
provide daily data by default and quarter-hourly data upon consent [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. This raises critical privacy
concerns, as smart meter data qualifies as personal data under GDPR [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], potentially revealing sensitive
behavioural patterns. Hence, RECs face the challenge of sharing energy data without compromising
privacy. Efective privacy-preserving mechanisms are required to protect individual identities while
maintaining data utility for analysis.
      </p>
      <p>
        Currently, several tools and services are available for data anonymisation. For example the EU-funded
open-source tool Amnesia supports techniques such as masking, k-anonymity, km-anonymity, and the
computation of demographic statistics [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The ARX Data Anonymisation Tool ofers a wide range of
anonymisation capabilities, including generalization, suppression, and risk analysis [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. However, to the
best of our knowledge, none of these tools ofer an open, online service that enables the annotation of data
with a layer that explicitly defines and enforces its anonymisation requirements. Therefore, we developed
a freely accessible online service, enabling users to experiment with anonymisation features prior to
integrating them into their workflows. To ensure transparency, community engagement, and continuous
improvement, we released the entire service as open-source software, encouraging feedback and
contributions. Additionally, the implementation emphasizes open standards and semantic technologies,
aligning with best practices to enhance interoperability and adoption. This approach lowers the entry
barrier, allowing the service to be efortlessly deployed both publicly and privately, facilitated by an
MIT license and the availability of a ready-to-use Docker image. The service configuration can be
performed via a YAML file, without necessitating prior expertise in software engineering.
      </p>
      <p>
        This paper introduces a practical solution addressing what we consider—and others have also
highlighted [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ]—as one of the key open challenges in this regulatory and technical landscape: the
privacy-preserving sharing of high-resolution PV production data within energy communities. We
present the design and implementation of an anonymisation service initially motivated by the
requirements for anonymisation explicitly stated in the EU Data Governance Act (DGA) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], exemplified
through its integration into a DGA-compliant data intermediary to automatically anonymise REC data
prior to sharing. While this intermediary use case highlights the immediate relevance and practical
necessity of anonymisation under the DGA, our service aims to be a versatile, general-purpose tool,
lowering barriers to adoption by enabling organisations such as data intermediaries and data altruism
organisations to exchange data securely, without compromising individual privacy. Our contribution
lies in demonstrating how automated, rule-based anonymisation pipelines can reduce re-identification
risks while maintaining data utility, thus enabling compliant and trustworthy data sharing in real-world
Renewable Energy Communities (RECs) scenarios.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Background and Related Work</title>
      <p>This section outlines the background and related work relevant to this work. First, the foundations of
SOyA, as a core component of our service are explained. Afterwards, this sections gives an overview of
the most prominent anonymisation techniques.</p>
      <sec id="sec-2-1">
        <title>2.1. Semantic Overlay Architecture (SOyA)</title>
        <p>
          SOyA (Semantic Overlay Architecture) is an open-source framework designed to facilitate the authoring,
validation, and transformation of semantically annotated data models [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. It addresses the need for
lfexible yet rigorous data modeling in decentralized and privacy-sensitive environments—such as those
found in energy data ecosystems. SOyA introduces a modular architecture based on two primary
concepts: Bases, which define the core structure of a dataset, and Overlays, which semantically enrich
the base by specifying annotations, classifications, constraints, or transformations. These overlays
enable the separation of concerns by allowing diferent semantic layers (e.g., validation, encoding,
personal data classification) to be composed as needed.
        </p>
        <p>SOyA (data) structure are usually authored in YAML for ease of use and are ultimately translated into
an ontology, allowing compatibility with Semantic Web technologies and Linked Data tools. To this end,
we automatically generated an ontology in JSON-LD and Turtle serialization for each registered SOyA
structure1. SOyA also supports the handling of conventional flat JSON by converting it into JSON-LD
compliant to the ontology, enabling the subsequent application of semantic web operations and queries.
By incorporating these user-friendly features, SOyA aims to lower the barrier to entry, facilitating
broader adoption and easier integration of semantic web technologies into diverse workflows.</p>
        <p>For the use case of renewable energy communities, SOyA enables the explicit modeling of personal
data attributes (e.g., energy usage, timestamps) and facilitates the annotation of privacy-relevant
elements. This functionality ensures that data intermediaries can apply standardized anonymisation or
minimization logic before external sharing, in line with GDPR and Data Governance Act requirements.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Data Anonymisation</title>
        <p>
          As data volumes grow and data mining technologies become more prevalent, concerns regarding
data protection have also intensified. Personal data, in particular, is highly sensitive and demands
1For the AnonymizationDemo example used throughout this paper, the SOyA structure (YAML) and its respective TTL and
JSON-LD serializations can be accessed in the following links: YAML https://soya.ownyourdata.eu/AnonymisationDemo/yaml,
TTL https://soya.ownyourdata.eu/AnonymisationDemo/ttl, and JSON-LD: https://soya.ownyourdata.eu/AnonymisationDemo
careful handling [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. Anonymisation aims to protect the privacy of personal data while preserving
the structural integrity and utility of the underlying data [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. Fung et al. [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] identify three key
objectives in the anonymisation process: adherence to privacy constraints, preservation of data utility,
and retention of data truthfulness. To achieve this, direct identifiers and quasi-identifiers - attributes
that can be used to reidentify individuals alone or in combination - must be removed or transformed
appropriately [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
        <p>
          One of the primary threats that anonymisation techniques seek to address is the linking attack, in
which two datasets are combined using shared quasi-identifiers to reveal sensitive information. For
example, voter registration data can be linked to medical records using attributes such as ZIP code, age,
and gender, potentially making individuals’ medical histories identifiable [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. To mitigate this risk,
Samarati and Sweeney introduced the concept of k-anonymity, which requires that each record in a
dataset be indistinguishable from at least  − 1 other records with respect to a set of quasi-identifiers.
Data Anonymisation Techniques. To address the challenges inherent in the anonymisation process,
various approaches have been proposed in the literature. We introduce two of the most prominent
techniques in the following.
        </p>
        <p>
          • Generalization involves replacing specific attribute values with more abstract or less precise
representations, thereby grouping multiple records under a generalized value [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. This technique
is applicable for attributes that exhibit hierarchical or multi-level structures—such as geographic
locations or for numerical attributes, where values can be grouped into ranges or buckets [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
• Randomization adds a random salt to all values of an attribute. It is suitable only for attributes
with cardinal measurement scales, where value distances are defined [16].
        </p>
        <p>
          Data Governance. The governance of personal data within the European Union is shaped by a
comprehensive legal framework that seeks to balance data utility with fundamental rights to privacy
and data protection. Central to this framework is the General Data Protection Regulation (GDPR)
[
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], which has been in force since 2018 and applies to all organizations processing personal data of
EU citizens. The GDPR establishes key principles such as data minimization, purpose limitation, and
accountability, and it grants data subjects enforceable rights including access, rectification, and erasure
[17, 18].
        </p>
        <p>An important GDPR mechanism is anonymisation, the irreversible removal of personal identifiers
making data subjects unidentifiable. Such anonymised data is exempt from GDPR, enabling secondary
uses like research, analytics, or data sharing without additional constraints [19], making anonymisation
crucial for compliant data utilization [17]. Complementing GDPR, the Data Governance Act (DGA)
introduces further provisions promoting secure and trustworthy reuse of data—particularly from
public bodies, data shared altruistically, and exchanges via neutral intermediaries. The DGA outlines
registration, obligations, and neutrality rules for data intermediaries, extending regulatory oversight
from individual rights to ecosystem-level accountability and trust.</p>
        <p>Together, the GDPR and DGA form a layered governance model that simultaneously protects
individuals and facilitates responsible data innovation within the EU.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. The Data Anonymiser Service</title>
      <p>In this work, we developed a service that applies anonymisation techniques to datasets containing
personal data. The primary objective was to create a generic and configurable solution that ensures
compliance with the General Data Protection Regulation (GDPR). To reduce the entry barrier for users,
the service is designed to be easily configurable through SOyA using a simple YAML file.</p>
      <p>The degree of anonymisation dynamically adapts to the size of the dataset and the number of attributes
to be anonymised. This ensures that a suficient level of anonymisation is applied while preserving the
overall structure and utility of the original data set as much as possible.</p>
      <p>The anonymisation service is provided as a free-to-use, web-based portal2, which comprises of a
lightweight single-page application built with Rails ofers a responsive graphical user interface (GUI)
that abstracts all protocol details, so that domain experts without programming experience can execute
the same workflows that advanced users may invoke programmatically through the OpenAPI endpoint 3.
The front-end and back-end components are packaged as Docker images and are continuously deployed
on an OwnYourData Kubernetes cluster; nightly builds are published under an MIT licence to foster
reproducibility and community contributions. The open-source code is available in the accompanying
GitHub repositories4.</p>
      <p>To meet GDPR and DGA accountability requirements, every request is logged in an append-only
audit ledger, while raw input files are stored only for the duration of processing and deleted immediately
afterwards. Organisations with stricter data-sovereignty needs can deploy the service on-premises
via the provided Docker images, achieving functional parity with the managed Software-as-a-Service
instance but retaining full control over network boundaries and compliance monitoring. This dual
provisioning model—public SaaS and self-hosted container images—minimises the entry barrier for
exploratory usage while ensuring that production environments can satisfy sector-specific governance
constraints.</p>
      <sec id="sec-3-1">
        <title>3.1. Data Anonymisation Workflow</title>
        <p>The service accepts requests containing both the data to be anonymised and a URL pointing to a valid
anonymisation configuration. The process begins by fetching the configuration from the provided URL.
Once validated, an anonymiser object is created for each attribute based on the configuration. This is
enabled through an anonymiser interface, which is implemented by various anonymisation strategies
described in Section 3.2.</p>
        <p>To apply anonymisation, the input data is first converted into an attribute-oriented schema, and for
each attribute, the service aggregates values across all instances, while allowing attributes to remain
blank for instances where no value is provided. After the transformation, anonymisers are applied to
the aggregated attribute values. The number of values per attribute remains unchanged throughout
the process. If an instance lacks a value for a specific attribute, that attribute remains empty in the
anonymised dataset. Finally, the anonymised attributes are transformed back to an instance oriented
data structure (might require defining specific fields in SOyA, e.g. min/max), to produce the final output.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Data Anonymisation Implementation</title>
        <p>The anonymisation service is designed to allow the seamless integration of custom anonymisation
implementations. Each anonymiser must implement a service interface that accepts a list of attribute
values along with the total attribute count, and returns a corresponding list of anonymised values. This
work introduces two anonymiser implementations: (a) Generalisation and (b) Randomisation, each
tailored to diferent data types and anonymisation strategies.</p>
        <p>Both anonymisation techniques require the definition of a specific number of groups. To ensure a
suficient level of anonymity, the desired number of generalization groups  is calculated based on the
dataset size  and the number of anonymised attributes . The objective is to achieve a 99% probability
that no instance in the dataset remains unique after anonymisation.
2https://anonymiser.ownyourdata.eu
3https://anonymizer.go-data.at
4https://github.com/OwnYourData/anonymisation-service</p>
        <p>To determine the number of groups under this requirement, an approach by Jiang et al. [20] to
quantify re-identification risk, was adapted. Assuming that the attributes in the input data are statistically
independent and that all groups are of equal size, a formula was derived to guarantee that the probability
of any individual being uniquely identifiable is less than 1%. Given  as the number of individuals and
 as the number of anonymised attributes, the number of required groups  is computed as:
 = √︁
 1
−</p>
        <p>1
√︀1
−
√ 0.99
(1)
Generalization. In generalization, attribute values are grouped into categories, and the corresponding
group labels are written in the anonymised dataset. The number of groups  is defined in Equation 1.</p>
        <p>Values are assigned to buckets in such a way that each group contains the same number of values.
Outliers are not assigned to separate groups, avoiding easy re-identification. Instances are first sorted
by value and then assigned to groups on the basis of their position. Each group is then labeled on the
basis of the values it contains.</p>
        <p>Generalization also supports object-type attributes, assuming a hierarchical structure is defined in
the configuration. The algorithm traverses the hierarchy from the most specific level upward, reducing
each data point to a generalized value. A valid generalization is accepted when:
• The number of resulting groups is less than or equal to the calculated number of groups .
• Each group contains at least 2 elements, where  is the size of the dataset and  is the calculated
number of groups.</p>
        <p>These two requirements ensure that the resulting generalization maintains the desired level of
abstraction and prevents the formation of groups that consist only of outliers, which would otherwise
be easily identifiable.</p>
        <p>Randomization. In the randomization process, noise is added to attribute values based on a normal
distribution. The intensity of this noise depends on the distribution of the dataset: data points in sparse
regions receive increased noise to enhance their anonymity.</p>
        <p>The parameter  represents the number of instances that would be assigned to a bucket if generalization
were applied. It is calculated by dividing the dataset size  by the number of buckets . The salt applied
to a value  is then computed by multiplying a standard normal random variable with zero mean and
unit variance  (0, 1), by the distance between  and its -th closest value . The formula is defined as
follows:
 =  (0, 1) * distance(,  )
(2)</p>
        <p>To generate an anonymised value, the salt is added to the original value. If the resulting value falls
outside the range of values of the original dataset, the salt is instead subtracted from the original value.
Running Example. Figure 2 illustrates an anonymisation example with the data of an REC. The input
dataset contains the attributes entryDate, longitude, latitude, and energyProduction. anonymisation
is applied to the first three attributes, while energy production remains unchanged. As a result, the
energy data is no longer linkable to a specific individual.</p>
        <p>The anonymisation service is invoked with two primary components: the input data to be anonymised
and a reference URL pointing to the anonymisation configuration. The configuration defines the
anonymisation methods applied to each attribute. Despite the anonymisation, data mining remains
feasible; for example, the dataset can still be used to analyze energy production patterns across diferent
geographic locations. A sample dataset and detailed instructions for reproducing the example are
available in the public GitHub repository.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Feasibility Evaluation</title>
      <p>To assess the data security of the service, a series of tests was conducted using synthetic test datasets.
These datasets were generated to replicate the personal data of members of a Renewable Energy
Communities (RECs) in the Austrian state Burgenland. Both generalization and randomization techniques were
applied to these datasets, with varying sample sizes ranging from 100 to 10.000. This section explains
the synthetic test data generation process and outlines the method used to calculate a benchmark value.
Additionally, we present the test results and evaluate the compliance with existing regulatory standards.
Test Data Generation. Due to the limited availability of real personal data, synthetic data was
generated. The created data sets include three attributes: longitude, latitude, and the date of an
individual’s registration in the energy community. The geographic coordinates were selected to
approximate locations within the Austrian state of Burgenland. Registration dates were randomly
generated within the range from 2005 to 2025, with a higher probability assigned to more recent years,
reflecting the assumption that membership registrations have increased in recent years.
Benchmark Calculation. To evaluate the anonymisation service with respect to data confidentiality,
k-anonymity is employed as the metric for generalization-based techniques. For randomization-based
anonymisation, a modified approach is required, that assesses the similarity between original and
anonymised instances to establish an analogous notion of k-anonymity.</p>
      <p>Similarity in this context is defined as follows: an original instance  is considered similar
to an anonymised instance  if  ̸=  and all randomized attribute values in 
lie within an acceptable range of deviation from the corresponding values in . To determine
this acceptable range, the distribution of distances between original values and their anonymised
counterparts is analyzed. Since the randomization process adds normally distributed noise (salt),
a threshold of 2 (twice the standard deviation) is used as the similarity criterion. If the distance
between an anonymised value and the corresponding original value is below this threshold, the two are
considered similar for that attribute.</p>
      <p>An anonymised instance is considered similar to an original instance if it satisfies the similarity
condition for all attributes. The k-anonymity of the anonymised dataset is then defined as the minimum
number of original instances that are similar to any given anonymised instance.</p>
      <p>Evaluation Result. The test results are presented in Table 1. Both randomization and generalization
were evaluated using sample sizes of 100, 1.000, and 10.000. Each configuration was executed ten times
with diferent synthetic datasets. For each setup, the median and minimum k-anonymity values across
the ten runs are reported. In addition, the table includes the number of buckets (groups) used for each
sample size, calculated according to the method described in Section 3.2.</p>
      <p>Size: 100</p>
      <p>Groups: 2
Median Minimum</p>
      <p>Size: 1.000</p>
      <p>Groups: 4
Median Minimum</p>
      <p>Size: 10.000</p>
      <p>Groups: 8
Median Minimum
Generalization
Randomization</p>
      <p>Our experiment confirms the anonymised data complies with GDPR requirements, ensuring that
Data Intermediaries can share information in a legally compliant manner while maintaining the trust
of data subjects and ecosystem stakeholders. Across all tested sample sizes and techniques, no instance
was uniquely identifiable; each anonymised instance satisfied a minimum k-anonymity of 5. However,
the analytical utility varies with dataset size and the number of groups used. Figure 3 illustrates spatial
groupings by dataset size for generalization, e.g., a sample size of 100 results in only four spatial groups,
limiting analytical potential.</p>
      <p>Overall, randomization achieved greater anonymisation than generalization. The selected group
count represents a balanced trade-of between data confidentiality and analytical utility. For stronger
privacy guarantees, fewer groups can be used, albeit reducing analytical detail.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Summary and Future Work</title>
      <p>This paper presents a configurable and extensible anonymisation service for semantically annotated
datasets, addressing key compliance aspects of GDPR and the EU Data Governance Act (DGA). Through
integration into Renewable Energy Communities (RECs), we demonstrated automated, rule-based
anonymisation pipelines that efectively mitigate re-identification risks while preserving data utility.
The novelty lies in combining semantic annotation via SOyA with flexible anonymisation techniques,
notably generalization and randomization, to ensure broad regulatory alignment and ease of adoption.</p>
      <p>Our service supports diverse deployment scenarios, from public SaaS platforms to self-hosted
environments, catering to various data sovereignty requirements. Future developments will introduce
additional anonymisation techniques, enhance anonymisation outputs with Key Performance Indicators
(KPIs) and risk assessments, and improve the user interface based on systematic feedback to enhance
accessibility and usability. Additionally, assessing operational impacts on data intermediaries, including
scalability and performance, will guide practical implementations within real-world data governance
infrastructures.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>This work was conducted as part of the USEFLEDS project. This project has received funding in
the program “Datenökosysteme für die Energiewende” by the Federal Ministry for Climate Action,
Environment, Energy, Mobility, Innovation and Technology (BMK) under grant number 905128.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the author(s) used X-GPT-4 in order to: Grammar and spelling
check. After using these tool(s)/service(s), the author(s) reviewed and edited the content as needed and
take(s) full responsibility for the publication’s content.
Conference on Data Engineering (ICDE’05), 2005, pp. 217–228. URL: https://ieeexplore.ieee.org/
abstract/document/1410124. doi:10.1109/ICDE.2005.42, ISSN: 2375-026X.
[15] P. Samarati, L. Sweeney, Generalizing data to provide anonymity when disclosing information, in:</p>
      <p>PODS, volume 98, 1998, pp. 10–1145.
[16] Z. Teng, W. Du, Comparisons of k-anonymization and randomization schemes under linking
attacks, in: Sixth International Conference on Data Mining (ICDM’06), IEEE, 2006, pp. 1091–1096.
[17] H. Li, L. Yu, W. He, The impact of gdpr on global technology development, 2019.
[18] R. N. Zaeem, K. S. Barber, The efect of the gdpr on privacy policies: Recent progress and future
promise, ACM Transactions on Management Information Systems (TMIS) 12 (2020) 1–20.
[19] J. F. Marques, J. Bernardino, Analysis of data anonymization techniques., in: KEOD, 2020, pp.</p>
      <p>235–241.
[20] Y. Jiang, L. Mosquera, B. Jiang, L. Kong, K. El Emam, Measuring re-identification risk using a
synthetic estimator to enable data sharing, PLoS One 17 (2022) e0269097.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] Bundesministers für Wirtschaft, Familie und Jugend Österreich, Intelligente messgeräteeinführungsverordnung - ime-</article-title>
          <string-name>
            <surname>vo</surname>
          </string-name>
          ,
          <year>2012</year>
          . https://www.ris.bka.gv.at/eli/bgbl/II/
          <year>2012</year>
          /138.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Parlament</given-names>
            <surname>Österreich</surname>
          </string-name>
          , Elektrizitätswirtschafts- und -organisationsgesetz (eiwog
          <year>2010</year>
          ),
          <year>2010</year>
          . https: //www.parlament.gv.at/gegenstand/XXIV/I/
          <year>2067</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>EU</surname>
          </string-name>
          ,
          <article-title>General data protection regulation (GDPR) -</article-title>
          legal text,
          <year>2016</year>
          . URL: https://gdpr-info.eu/.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Dimakopoulos</surname>
          </string-name>
          , Dimitris Tsitsigkos {and} Nikolaos,
          <article-title>Amnesia anonymization tool - data anonymization made easy</article-title>
          ,
          <year>2025</year>
          . URL: https://amnesia.openaire.eu/index.html.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[5] ARX - data anonymization tool - a comprehensive software for privacy-preserving microdata publishing</article-title>
          ,
          <year>2025</year>
          . URL: https://arx.deidentifier.org/.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P.</given-names>
            <surname>Ponnaganti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sinha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pillai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Bak-Jensen</surname>
          </string-name>
          ,
          <article-title>Flexibility provisions through local energy communities: A review, Next Energy 1 (</article-title>
          <year>2023</year>
          )
          <article-title>100022</article-title>
          . URL: https://doi.org/10.1016/j.nxener.
          <year>2023</year>
          .
          <volume>100022</volume>
          . doi:
          <volume>10</volume>
          .1016/j.nxener.
          <year>2023</year>
          .
          <volume>100022</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Maharjan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Bygrave</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <article-title>Data sharing, privacy and security considerations in the energy sector: A review from technical landscape to regulatory specifications</article-title>
          ,
          <source>arXiv preprint arXiv:2503.03539</source>
          ,
          <year>2025</year>
          . URL: https://arxiv.org/abs/2503.03539v1.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>European</given-names>
            <surname>Parliament</surname>
          </string-name>
          and Council,
          <source>Regulation (eu)</source>
          <year>2022</year>
          /
          <article-title>868 of the european parliament and of the council on european data governance (data governance act)</article-title>
          ,
          <source>Oficial Journal of the European Union, L 152, Article</source>
          <volume>12</volume>
          (e),
          <year>2022</year>
          . URL: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%
          <fpage>3A32022R0868</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>F. J.</given-names>
            <surname>Ekaputra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Fabianek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Unterholzer</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Gringinger,</surname>
          </string-name>
          <article-title>The semantic overlay architecture for data interoperability and exchange</article-title>
          ,
          <source>in: 2023 IEEE International Conference on Data and Software Engineering (ICoDSE)</source>
          , IEEE,
          <year>2023</year>
          , pp.
          <fpage>232</fpage>
          -
          <lpage>237</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Murthy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. Abu</given-names>
            <surname>Bakar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Abdul</surname>
          </string-name>
          <string-name>
            <surname>Rahim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ramli</surname>
          </string-name>
          ,
          <article-title>A comparative study of data anonymization techniques</article-title>
          ,
          <source>in: 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity)</source>
          ,
          <source>IEEE Intl Conference on High Performance and Smart Computing</source>
          ,
          <source>(HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>306</fpage>
          -
          <lpage>309</lpage>
          . URL: https://ieeexplore.ieee.org/abstract/ document/8819477. doi:
          <volume>10</volume>
          .1109/
          <string-name>
            <surname>BigDataSecurity-HPSC-IDS</surname>
          </string-name>
          .
          <year>2019</year>
          .
          <volume>00063</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Majeed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <article-title>Anonymization techniques for privacy preserving data publishing: A comprehensive survey 9 (</article-title>
          <year>2021</year>
          )
          <fpage>8512</fpage>
          -
          <lpage>8545</lpage>
          . URL: https://ieeexplore.ieee.org/abstract/document/9298747. doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2020</year>
          .
          <volume>3045700</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>B. C.</given-names>
            <surname>Fung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. W.-C.</given-names>
            <surname>Fu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. S.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <article-title>Introduction to privacy-preserving data publishing: Concepts and techniques</article-title>
          , Chapman and Hall/CRC,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Olatunji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rauch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Katzensteiner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Khosla</surname>
          </string-name>
          ,
          <article-title>A review of anonymization for healthcare data 12 (</article-title>
          <year>2024</year>
          )
          <fpage>538</fpage>
          -
          <lpage>555</lpage>
          . URL: https://www.liebertpub.com/doi/abs/10.1089/big.
          <year>2021</year>
          .
          <volume>0169</volume>
          . doi:
          <volume>10</volume>
          . 1089/big.
          <year>2021</year>
          .
          <volume>0169</volume>
          , publisher: Mary Ann Liebert, Inc., publishers.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>R.</given-names>
            <surname>Bayardo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <article-title>Data privacy through optimal k-anonymization</article-title>
          , in: 21st International
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>