Data Monetization Service Development Using Iterative Lifecycle Framework, Quality Assurance, and Open Web Application Security Project: A Case Study of a Utility Company in Indonesia

Authors

  • Wahyu Haris Kusuma Atmaja Bina Nusantara University
  • Harco Leslie Hendric Spits Warnars Bina Nusantara University
  • Ford Lumban Gaol Bina Nusantara University
  • Benfano Soewito Bina Nusantara University

DOI:

https://doi.org/10.21512/commit.v18i2.10293

Keywords:

Data Monetization, Service Development, Iterative Lifecycle Framework, Quality Assurance, Open Web Application Security Project (OWASP), Utility Company

Abstract

The research aims to provide Data Monetization (DM) services for an Indonesian utility company as a pilot to generate additional revenue beyond the primary operation. The service is built using an iterative development lifecycle framework and evaluated based on five Quality Goals (QGs), including application and security testing activities. The framework includes methods for processing and modeling electricity usage data, testing application quality, checking infrastructure quality, and ensuring access security for front-end and back-end applications using the Open Web Application Security Project (OWASP). For data modeling, Support Vector Regression (SVR) is used, and it outperforms Polynomial Regression (PR) and Multi-Layer Perception (MLP) Neural Networks. Furthermore, QG shows strong performance with an Relative Root Mean Squared Error (RRMSE) value < 10%, high forecasting ability with Mean Average Probability Error (MAPE) < 10%, and a near-zero average error rate (Mean Squared Error (MSE)) square using minimal data from four months. The services go through functional and integration test to ensure product quality and application performance, which results in a minimum of 95% service response in throughput, 0.128 seconds for processing 2,000 requests, stability at 300–500 in one second per hour, and 7–21 seconds during peak hours. Additionally, the service passes nine penetration tests and ten vulnerability assessments using the OWASP top 10:2021 category. Based on the comprehensive testing and evaluation results, both the application and the service are considered ready and secured for deployment.

Dimensions

Plum Analytics

Author Biographies

Wahyu Haris Kusuma Atmaja, Bina Nusantara University

Computer Science Department, BINUS Graduate Program – Doctor of Computer Science

Harco Leslie Hendric Spits Warnars, Bina Nusantara University

Computer Science Department, BINUS Graduate Program – Doctor of Computer Science

Ford Lumban Gaol, Bina Nusantara University

Computer Science Department, BINUS Graduate Program – Doctor of Computer Science

Benfano Soewito, Bina Nusantara University

Computer Science Department, BINUS Graduate Program – Master of Computer Science

References

A. Bleier, A. Goldfarb, and C. Tucker, “Consumer privacy and the future of data-based innovation and marketing,” International Journal of Research in Marketing, vol. 37, no. 3, pp. 466–480, 2020.

J. Baecker, M. Engert, M. Pfaff, and H. Krcmar, “Business strategies for data monetization: Deriving insights from practice,” in Wirtschaftsinformatik (Zentrale Tracks), 2020, pp. 972–987.

A. S. George and A. S. H. George, “Data sharing made easy by technology trends: New data sharing and privacy preserving technologies that bring in a new era of data monetization,” Partners Universal International Research Journal, vol. 1, no. 3, pp. 13–19, 2022.

P. Parvinen, E. P¨oyry, R. Gustafsson, M. Laitila, and M. Rossi, “Advancing data monetization and the creation of data-based business models,” Communications of the Association for Information Systems, vol. 47, pp. 25–49, 2020.

S. Mehta, M. Dawande, G. Janakiraman, and V. Mookerjee, “How to sell a data set? Pricing policies for data monetization,” Information Systems Research, vol. 32, no. 4, pp. 1281–1297, 2021.

H. Zhong, J. Wang, H. Jia, Y. Mu, and S. Lv, “Vector field-based support vector regression for building energy consumption prediction,” Applied Energy, vol. 242, pp. 403–414, 2019.

F. Kaytez, “A hybrid approach based on autoregressive integrated moving average and leastsquare support vector machine for long-term forecasting of net electricity consumption,” Energy, vol. 197, 2020.

I. Shah, H. Iftikhar, S. Ali, and D. Wang, “Shortterm electricity demand forecasting using components estimation technique,” Energies, vol. 12, no. 13, pp. 1–17, 2019.

M. Bilal, H. Kim, M. Fayaz, and P. Pawar, “Comparative analysis of time series forecasting approaches for household electricity consumption prediction,” 2022. [Online]. Available: https://arxiv.org/abs/2207.01019

S. Jung, J. Moon, S. Park, S. Rho, S. W. Baik, and E. Hwang, “Bagging ensemble of multilayer perceptrons for missing electricity consumption data imputation,” Sensors, vol. 20, no. 6, pp. 1–16, 2020.

J. S. Chou and D. S. Tran, “Forecasting energy consumption time series using machine learning techniques based on usage patterns of residential householders,” Energy, vol. 165, pp. 709–726, 2018.

G. Chitalia, M. Pipattanasomporn, V. Garg, and S. Rahman, “Robust short-term electrical load forecasting framework for commercial buildings using deep recurrent neural networks,” Applied Energy, vol. 278, 2020.

Y. Kim, H. G. Son, and S. Kim, “Short term electricity load forecasting for institutional buildings,” Energy Reports, vol. 5, pp. 1270–1280, 2019.

Y. Hong, Y. Zhou, Q. Li, W. Xu, and X. Zheng, “A deep learning method for short-term residential load forecasting in smart grid,” IEEE Access, vol. 8, pp. 55 785–55 797, 2020.

C. Rao, Y. Zhang, J. Wen, X. Xiao, and M. Goh, “Energy demand forecasting in China: A support vector regression-compositional data second exponential smoothing model,” Energy, vol. 263, 2023.

M. Atanasovski, M. Kostov, B. Arapinoski, and M. Spirovski, “K-nearest neighbor regression for forecasting electricity demand,” in 2020 55th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST). Serbia: IEEE, Sep. 10–12, 2020, pp. 110–113.

A. Stuke, M. Todorovi´c, M. Rupp, C. Kunkel, K. Ghosh, L. Himanen, and P. Rinke, “Chemical diversity in molecular orbital energy predictions with kernel ridge regression,” The Journal of Chemical Physics, vol. 150, no. 20, 2019.

J. B. Fiot and F. Dinuzzo, “Electricity demand forecasting by multi-task learning,” IEEE Transactions on Smart Grid, vol. 9, no. 2, pp. 544–551, 2016.

A. Rahman, V. Srikumar, and A. D. Smith, “Predicting electricity consumption for commercial and residential buildings using deep recurrent neural networks,” Applied Energy, vol. 212, pp. 372–385, 2018.

H. Hamedmoghadam, N. Joorabloo, and M. Jalili, “Australia’s long-term electricity demand forecasting using deep neural networks,” 2018. [Online]. Available: https://tinyurl.com/4xes2h99

A. Zendehboudi, M. A. Baseer, and R. Saidur, “Application of support vector machine models for forecasting solar and wind energy resources: A review,” Journal of Cleaner Production, vol. 199, pp. 272–285, 2018.

M. Sharifzadeh, A. Sikinioti-Lock, and N. Shah, “Machine-learning methods for integrated renewable power generation: A comparative study of artificial neural networks, support vector regression, and Gaussian process regression,” Renewable and Sustainable Energy Reviews, vol. 108, pp. 513–538, 2019.

D. Maulud and A. M. Abdulazeez, “A review on linear regression comprehensive in machine learning,” Journal of Applied Science and Technology Trends, vol. 1, no. 2, pp. 140–147, 2020.

C. Jin, X. Bai, C. Yang, W. Mao, and X. Xu, “A review of power consumption models of servers in data centers,” Applied Energy, vol. 265, 2020.

D. Chicco, M. J. Warrens, and G. Jurman, “The coefficient of determination R-squared is more informative than SMAPE, MAE, MAPE, MSE and RMSE in regression analysis evaluation,” PeerJ Computer Science, vol. 7, pp. 1–24, 2021.

A. De Myttenaere, B. Golden, B. Le Grand, and F. Rossi, “Mean absolute percentage error for regression models,” Neurocomputing, vol. 192, pp. 38–48, 2016.

A. Al Mamun, M. Sohel, N. Mohammad, M. S. H. Sunny, D. R. Dipta, and E. Hossain, “A comprehensive review of the load forecasting techniques using single and hybrid predictive models,” IEEE Access, vol. 8, pp. 134 911–134 939, 2020.

J. Qi, J. Du, S. M. Siniscalchi, X. Ma, and C. H. Lee, “On mean absolute error for deep neural network based vector-to-vector regression,” IEEE Signal Processing Letters, vol. 27, pp. 1485–1489, 2020.

A. Botchkarev, “Performance metrics (error measures) in machine learning regression, forecasting and prognostics: Properties and typology,” 2018. [Online]. Available: http://arxiv.org/abs/1809.03006

S. Chen and N. M. Luc, “RRMSE voting regressor: A weighting function based improvement to ensemble regression,” 2022. [Online]. Available: http://arxiv.org/abs/2207.04837

H. E. Niles, “Correlation, causation and Wright’s theory of “path coefficients”,” Genetics, vol. 7, no. 3, pp. 258–273, 1922.

C. C. Venters, R. Capilla, S. Betz, B. Penzenstadler, T. Crick, S. Crouch, E. Y. Nakagawa, C. Becker, and C. Carrillo, “Software sustainability: Research and practice from a software architecture viewpoint,” Journal of Systems and Software, vol. 138, pp. 174–188, 2018.

A. Mansoor, D. Streitferdt, E. Rozova, and Q. Abbas, “Goal based tailoring of quality models for quality requirements,” in Future Technologies Conference (FTC), Vancouver, Canada, Nov. 2017, pp. 681–686.

D. Galin, Software quality assurance: From theory to implementation. Pearson Education, 2004.

W. E. Perry, Effective methods for software testing. John Wiley & Sons, 2006.

S. Elder, N. Zahan, V. Kozarev, R. Shu, T. Menzies, and L. Williams, “Structuring a comprehensive software security course around the OWASP application security verification standard,” in 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET). Madrid, ES: IEEE, May 25–28, 2021, pp. 95–104.

O. B. Fredj, O. Cheikhrouhou, M. Krichen, H. Hamam, and A. Derhab, “An OWASP top ten driven survey on web application protection methods,” in Risks and Security of Internet and Systems: 15th International Conference, CRiSIS. Paris, France: Springer, 2021, pp. 235–252.

S. K. Lala, A. Kumar, and T. Subbulakshmi, “Secure web development using owasp guidelines,” in 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS). Madurai, India: IEEE, May 6–8, 2021, pp. 323–332.

PortSwigger, “Insecure Direct Object References (IDOR).” [Online]. Available: https://portswigger.net/web-security/access-control/idor

D. Johansson, “OWASP top 10 2017.” [Online]. Available: https://owasp.org/www-chapter-cambridge/presentations/prev/Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf

OWASP, “A2:2017-Broken Authentication.” [Online]. Available: https://owasp.org/www-project-top-ten/2017/A22017-Broken Authentication

——, “A3:2017-Sensitive Data Exposure.” [Online]. Available: https://owasp.org/www-project-top-ten/2017/A3 2017-Sensitive Data Exposure

Downloads

Published

2024-09-19
Abstract 184  .
PDF downloaded 42  .