elering-9

Manage data logs

1. Description of the Use Case

1.1. Name of the Use Case

IDArea /Domain(s)/Zone(s)Name of the Use Case
1Access to data, Market for flexibilities, Operational planning and forecasting, Services related to end customers, Balance management,elering-9

1.2. Version Management

Version No.DateName of author(s)ChangesApproval status
12018-06-01T00:00:00Kalle Kukk (Elering),
22018-07-10T00:00:00Mandimby Ranaivo R. (AKKA),
32018-08-02T00:00:00Eric Suignard (EDF),
42018-09-21T00:00:00Eric Suignard (EDF),
52018-10-04T00:00:00Eric Suignard (EDF),Version post WP5&9 physical meeting in Tallinn
62018-10-17T00:00:00Eric Suignard (EDF),Version reviewed by WP5&9 partners
72019-05-07T00:00:00Eric Suignard (EDF),WP6-7-8 demos alignment and miscellaneous changes
82020-06-16T00:00:00Eric Suignard (EDF),innogy’s and Elering’s review

1.3. Scope and Objectives of Use Case

ScopeMaking available security logs including data access logs and authorization logs.
Objective(s)Ensure personal data protection.
Related business case(s)

1.4. Narrative of Use Case

Short description

Data Owner’s access to data logs contributes to personal data protection. The data logs include information about data access (e.g. who has accessed consumption data and when), authorizations (e.g. who has issued a new authorization and when) and authentication (e.g. who has identified himself/herself in Customer Portal and when).

Complete description

Via a Customer Portal, a Data Owner (e.g. electricity consumer is the owner of its consumption data) has access to data logs. They include two types of logs:

  • Data access logs: e.g. who has accessed data and when
  • Authorization logs: e.g. who has requested/received authorization to access data and when
  • Authentication logs: e.g. who has identified himself/herself in Customer Portal and when
The Customer Portal operator makes the data logs available in the Customer Portal. In addition, in case of cross border data exchange, the Customer Portal operators of the involved countries share information about data logs between them.

1.5. Key Performance Indicatiors (KPI)

IDNameDescriptionReference to mentioned use case objectives

1.6. Use case conditions

Assumptions
Private and/or commercially sensitive data needs to be exchanged.
Prerequisites
The data owner has successfully logged in the Customer Portal.

1.7. Further information to the use case for classification/mapping

Relation to other use cases
Level of depth
Prioritisation
Generic, regional or national relation
Nature of the use cases
SUC
Further keywords for classification

1.8. General remarks

General remarks

2. Diagrams of Use Case

Manage data logs - overview Manage security logs - scenarios flowchart

3. Technical Details

3.1. Actors

Actor NameActor TypeActor DescriptionFurther information specific to this Use Case
Data Exchange PlatformSystemData exchange platform (DEP) is a communication platform the basic functionality of which is to secure data transfer (routing) from data providers (e.g. data hubs, flexibility service providers, TSOs, DSOs) to the data users (e.g. TSOs, DSOs, consumers, suppliers, energy service providers). DEP stores data related to its services (e.g. cryptographic hash of the data requested). The DEP does not store core energy data (e.g. meter data, grid data, market data) while these data can be stored by data hubs. Several DEPs may exist in different countries and inside one country.
Foreign Customer PortalSystemCustomer Portal for another country.
Can also mean a separate portal in the same country.
Data OwnerBusinessAny person who owns data and can give authorization to other parties to access them. Can be, inter alia:
  • Flexibility Services Provider
  • Market Operator
  • Consumer
  • Generator
Customer PortalSystemCustomer Portal manages data users' authentication, access permissions and data logs. Customer Portals store data related to its services (e.g. authentication information, representation rights, access permissions, data logs).
DEP OperatorBusinessData exchange platform operator owns and operates a communication system which basic functionality is data transfer.

3.2. References

No.References TypeReferenceStatusImpact on Use CaseOrganistaor / OrganisationLink

4. Step by Step Analysis of Use Case

4.1. Overview of Scenarios

No.Scenario NameScenario DescriptionPrimary ActorTriggering EventPre-ConditionPost-Condition
1Data Owner accesses data logsThe Data Owner requests access to its data logs from the Customer Portal. In case of cross border data exchange, the later retrieves the data logs from the corresponding foreign Customer Portal. Finally, the Data Owner consults the requested data logs.

Notes

4.2. Steps – Scenarios

Scenario Name:
Data Owner accesses data logs
Step No.Event.Name of Process/ ActivityDescription of Process/ Activity.ServiceInformation Producer (Actor)Information Receiver (Actor)Information ExchangedRequirements, R-ID
1.1Request data logsThe Data Owner requests data logs to the Customer Portal. The request contains the desired log type:
  • Data access (e.g. who has accessed data and when)
  • Authorization (e.g. who has requested/received authorization to access data and when)
  • Authentication logs (e.g. who has identified himself/herself in Customer Portal and when)
It also contains selection criteria like dates, log level etc.
Modsarus Use Case::InstanceName=Data log request
Modsarus Use Case::InstanceDescription=
a17749ef-fb35-4331-9275-eaadfad82b365351ac19-9ec2-47b9-9ead-4a28907df045 baa61f8b-bde4-4008-820b-bfad5a7150f6 5351ac19-9ec2-47b9-9ead-4a28907df045 baa61f8b-bde4-4008-820b-bfad5a7150f62d790f31-c87f-4133-88ea-1a014cd10d9d2af6ad64-c90f-4bc9-aebd-7c01060f85c4 0b77ff6a-6c7b-4468-b248-a2a3be9b2916 8288215b-981b-464a-b352-195b019edec8
1.2Retrieve data access logsThe Customer Portal retrieves data access logs corresponding to the received selection criteria.
Modsarus Use Case::InstanceName=Data access log
Modsarus Use Case::InstanceDescription=
baa61f8b-bde4-4008-820b-bfad5a7150f6a17749ef-fb35-4331-9275-eaadfad82b36b1d9b26e-8b21-4225-88c3-bc86a46a851e2af6ad64-c90f-4bc9-aebd-7c01060f85c4 0b77ff6a-6c7b-4468-b248-a2a3be9b2916 8288215b-981b-464a-b352-195b019edec8
1.3Retrieve authorization logsThe Customer Portal retrieves authorization logs corresponding to the received selection criteria.
Modsarus Use Case::InstanceName=Authorization request log
Modsarus Use Case::InstanceDescription=
baa61f8b-bde4-4008-820b-bfad5a7150f6a17749ef-fb35-4331-9275-eaadfad82b36b1d9b26e-8b21-4225-88c3-bc86a46a851e2af6ad64-c90f-4bc9-aebd-7c01060f85c4 0b77ff6a-6c7b-4468-b248-a2a3be9b2916 8288215b-981b-464a-b352-195b019edec8
1.4Retrieve data access logsThe foreign Customer Portal retrieves data access logs corresponding to the received selection criteria and hands them over to the original Customer Portal.
Modsarus Use Case::InstanceName=Data access log
Modsarus Use Case::InstanceDescription=
5351ac19-9ec2-47b9-9ead-4a28907df045baa61f8b-bde4-4008-820b-bfad5a7150f6b1d9b26e-8b21-4225-88c3-bc86a46a851e2af6ad64-c90f-4bc9-aebd-7c01060f85c4 0b77ff6a-6c7b-4468-b248-a2a3be9b2916 8288215b-981b-464a-b352-195b019edec8
1.5Retrieve authorization logsThe foreign Customer Portal retrieves authorization request logs corresponding to the received selection criteria and hands them over to the original Customer Portal.
Modsarus Use Case::InstanceName=Authorization request log
Modsarus Use Case::InstanceDescription=
5351ac19-9ec2-47b9-9ead-4a28907df045baa61f8b-bde4-4008-820b-bfad5a7150f6b1d9b26e-8b21-4225-88c3-bc86a46a851e2af6ad64-c90f-4bc9-aebd-7c01060f85c4 0b77ff6a-6c7b-4468-b248-a2a3be9b2916 8288215b-981b-464a-b352-195b019edec8
1.6Consult data logsThe Data Owner receives the data log records he requested.a17749ef-fb35-4331-9275-eaadfad82b362af6ad64-c90f-4bc9-aebd-7c01060f85c4 0b77ff6a-6c7b-4468-b248-a2a3be9b2916 8288215b-981b-464a-b352-195b019edec8

5. Information Exchanged

Information exchanged IDName of InformationDescription of Information ExchangedRequirement
2d790f31-c87f-4133-88ea-1a014cd10d9dData log requestContains the type of the requested logs (data access logs or authorization request logs) and other criteria like dates, log level etc.—-
b1d9b26e-8b21-4225-88c3-bc86a46a851eData logContains the selected log records.—-

6. Requirements (optional)

Category IdentifierNameDescriptionmRID
Cat1Personal databd1580a2-20b8-41fa-a8df-2ae6041bf604
IdentifierNameDescriptionmRID
Req1Access Citizen RightRight to secure direct access of own personal data and to any processing, storage or sharing details2af6ad64-c90f-4bc9-aebd-7c01060f85c4
Req2Informed Citizen RightRight to be informed of any personal data held, of how it is used or processed, of any breach, and of any disclosure/usage to third parties0b77ff6a-6c7b-4468-b248-a2a3be9b2916
Category IdentifierNameDescriptionmRID
Cat2Task 5.3Requirements integrated from Task 5.3.1880e39c-7084-4785-8c02-297057abe312
IdentifierNameDescriptionmRID
Req3LOGS-REQ1Ability to share information related to data logs between data owners, concerned DEPs, applications and data sources8288215b-981b-464a-b352-195b019edec8

7. Common Terms and Definitions

8. Custom Information (optional)

KeyValueRefers to Section