Data Monetization Service Development Using Iterative Lifecycle Framework, Quality Assurance, and Open Web Application Security Project: A Case Study of a Utility Company in Indonesia
DOI:
https://doi.org/10.21512/commit.v18i2.10293Keywords:
Data Monetization, Service Development, Iterative Lifecycle Framework, Quality Assurance, Open Web Application Security Project (OWASP), Utility CompanyAbstract
The research aims to provide Data Monetization (DM) services for an Indonesian utility company as a pilot to generate additional revenue beyond the primary operation. The service is built using an iterative development lifecycle framework and evaluated based on five Quality Goals (QGs), including application and security testing activities. The framework includes methods for processing and modeling electricity usage data, testing application quality, checking infrastructure quality, and ensuring access security for front-end and back-end applications using the Open Web Application Security Project (OWASP). For data modeling, Support Vector Regression (SVR) is used, and it outperforms Polynomial Regression (PR) and Multi-Layer Perception (MLP) Neural Networks. Furthermore, QG shows strong performance with an Relative Root Mean Squared Error (RRMSE) value < 10%, high forecasting ability with Mean Average Probability Error (MAPE) < 10%, and a near-zero average error rate (Mean Squared Error (MSE)) square using minimal data from four months. The services go through functional and integration test to ensure product quality and application performance, which results in a minimum of 95% service response in throughput, 0.128 seconds for processing 2,000 requests, stability at 300–500 in one second per hour, and 7–21 seconds during peak hours. Additionally, the service passes nine penetration tests and ten vulnerability assessments using the OWASP top 10:2021 category. Based on the comprehensive testing and evaluation results, both the application and the service are considered ready and secured for deployment.
Plum Analytics
References
A. Bleier, A. Goldfarb, and C. Tucker, “Consumer privacy and the future of data-based innovation and marketing,” International Journal of Research in Marketing, vol. 37, no. 3, pp. 466–480, 2020.
J. Baecker, M. Engert, M. Pfaff, and H. Krcmar, “Business strategies for data monetization: Deriving insights from practice,” in Wirtschaftsinformatik (Zentrale Tracks), 2020, pp. 972–987.
A. S. George and A. S. H. George, “Data sharing made easy by technology trends: New data sharing and privacy preserving technologies that bring in a new era of data monetization,” Partners Universal International Research Journal, vol. 1, no. 3, pp. 13–19, 2022.
P. Parvinen, E. P¨oyry, R. Gustafsson, M. Laitila, and M. Rossi, “Advancing data monetization and the creation of data-based business models,” Communications of the Association for Information Systems, vol. 47, pp. 25–49, 2020.
S. Mehta, M. Dawande, G. Janakiraman, and V. Mookerjee, “How to sell a data set? Pricing policies for data monetization,” Information Systems Research, vol. 32, no. 4, pp. 1281–1297, 2021.
H. Zhong, J. Wang, H. Jia, Y. Mu, and S. Lv, “Vector field-based support vector regression for building energy consumption prediction,” Applied Energy, vol. 242, pp. 403–414, 2019.
F. Kaytez, “A hybrid approach based on autoregressive integrated moving average and leastsquare support vector machine for long-term forecasting of net electricity consumption,” Energy, vol. 197, 2020.
I. Shah, H. Iftikhar, S. Ali, and D. Wang, “Shortterm electricity demand forecasting using components estimation technique,” Energies, vol. 12, no. 13, pp. 1–17, 2019.
M. Bilal, H. Kim, M. Fayaz, and P. Pawar, “Comparative analysis of time series forecasting approaches for household electricity consumption prediction,” 2022. [Online]. Available: https://arxiv.org/abs/2207.01019
S. Jung, J. Moon, S. Park, S. Rho, S. W. Baik, and E. Hwang, “Bagging ensemble of multilayer perceptrons for missing electricity consumption data imputation,” Sensors, vol. 20, no. 6, pp. 1–16, 2020.
J. S. Chou and D. S. Tran, “Forecasting energy consumption time series using machine learning techniques based on usage patterns of residential householders,” Energy, vol. 165, pp. 709–726, 2018.
G. Chitalia, M. Pipattanasomporn, V. Garg, and S. Rahman, “Robust short-term electrical load forecasting framework for commercial buildings using deep recurrent neural networks,” Applied Energy, vol. 278, 2020.
Y. Kim, H. G. Son, and S. Kim, “Short term electricity load forecasting for institutional buildings,” Energy Reports, vol. 5, pp. 1270–1280, 2019.
Y. Hong, Y. Zhou, Q. Li, W. Xu, and X. Zheng, “A deep learning method for short-term residential load forecasting in smart grid,” IEEE Access, vol. 8, pp. 55 785–55 797, 2020.
C. Rao, Y. Zhang, J. Wen, X. Xiao, and M. Goh, “Energy demand forecasting in China: A support vector regression-compositional data second exponential smoothing model,” Energy, vol. 263, 2023.
M. Atanasovski, M. Kostov, B. Arapinoski, and M. Spirovski, “K-nearest neighbor regression for forecasting electricity demand,” in 2020 55th International Scientific Conference on Information, Communication and Energy Systems and Technologies (ICEST). Serbia: IEEE, Sep. 10–12, 2020, pp. 110–113.
A. Stuke, M. Todorovi´c, M. Rupp, C. Kunkel, K. Ghosh, L. Himanen, and P. Rinke, “Chemical diversity in molecular orbital energy predictions with kernel ridge regression,” The Journal of Chemical Physics, vol. 150, no. 20, 2019.
J. B. Fiot and F. Dinuzzo, “Electricity demand forecasting by multi-task learning,” IEEE Transactions on Smart Grid, vol. 9, no. 2, pp. 544–551, 2016.
A. Rahman, V. Srikumar, and A. D. Smith, “Predicting electricity consumption for commercial and residential buildings using deep recurrent neural networks,” Applied Energy, vol. 212, pp. 372–385, 2018.
H. Hamedmoghadam, N. Joorabloo, and M. Jalili, “Australia’s long-term electricity demand forecasting using deep neural networks,” 2018. [Online]. Available: https://tinyurl.com/4xes2h99
A. Zendehboudi, M. A. Baseer, and R. Saidur, “Application of support vector machine models for forecasting solar and wind energy resources: A review,” Journal of Cleaner Production, vol. 199, pp. 272–285, 2018.
M. Sharifzadeh, A. Sikinioti-Lock, and N. Shah, “Machine-learning methods for integrated renewable power generation: A comparative study of artificial neural networks, support vector regression, and Gaussian process regression,” Renewable and Sustainable Energy Reviews, vol. 108, pp. 513–538, 2019.
D. Maulud and A. M. Abdulazeez, “A review on linear regression comprehensive in machine learning,” Journal of Applied Science and Technology Trends, vol. 1, no. 2, pp. 140–147, 2020.
C. Jin, X. Bai, C. Yang, W. Mao, and X. Xu, “A review of power consumption models of servers in data centers,” Applied Energy, vol. 265, 2020.
D. Chicco, M. J. Warrens, and G. Jurman, “The coefficient of determination R-squared is more informative than SMAPE, MAE, MAPE, MSE and RMSE in regression analysis evaluation,” PeerJ Computer Science, vol. 7, pp. 1–24, 2021.
A. De Myttenaere, B. Golden, B. Le Grand, and F. Rossi, “Mean absolute percentage error for regression models,” Neurocomputing, vol. 192, pp. 38–48, 2016.
A. Al Mamun, M. Sohel, N. Mohammad, M. S. H. Sunny, D. R. Dipta, and E. Hossain, “A comprehensive review of the load forecasting techniques using single and hybrid predictive models,” IEEE Access, vol. 8, pp. 134 911–134 939, 2020.
J. Qi, J. Du, S. M. Siniscalchi, X. Ma, and C. H. Lee, “On mean absolute error for deep neural network based vector-to-vector regression,” IEEE Signal Processing Letters, vol. 27, pp. 1485–1489, 2020.
A. Botchkarev, “Performance metrics (error measures) in machine learning regression, forecasting and prognostics: Properties and typology,” 2018. [Online]. Available: http://arxiv.org/abs/1809.03006
S. Chen and N. M. Luc, “RRMSE voting regressor: A weighting function based improvement to ensemble regression,” 2022. [Online]. Available: http://arxiv.org/abs/2207.04837
H. E. Niles, “Correlation, causation and Wright’s theory of “path coefficients”,” Genetics, vol. 7, no. 3, pp. 258–273, 1922.
C. C. Venters, R. Capilla, S. Betz, B. Penzenstadler, T. Crick, S. Crouch, E. Y. Nakagawa, C. Becker, and C. Carrillo, “Software sustainability: Research and practice from a software architecture viewpoint,” Journal of Systems and Software, vol. 138, pp. 174–188, 2018.
A. Mansoor, D. Streitferdt, E. Rozova, and Q. Abbas, “Goal based tailoring of quality models for quality requirements,” in Future Technologies Conference (FTC), Vancouver, Canada, Nov. 2017, pp. 681–686.
D. Galin, Software quality assurance: From theory to implementation. Pearson Education, 2004.
W. E. Perry, Effective methods for software testing. John Wiley & Sons, 2006.
S. Elder, N. Zahan, V. Kozarev, R. Shu, T. Menzies, and L. Williams, “Structuring a comprehensive software security course around the OWASP application security verification standard,” in 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET). Madrid, ES: IEEE, May 25–28, 2021, pp. 95–104.
O. B. Fredj, O. Cheikhrouhou, M. Krichen, H. Hamam, and A. Derhab, “An OWASP top ten driven survey on web application protection methods,” in Risks and Security of Internet and Systems: 15th International Conference, CRiSIS. Paris, France: Springer, 2021, pp. 235–252.
S. K. Lala, A. Kumar, and T. Subbulakshmi, “Secure web development using owasp guidelines,” in 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS). Madurai, India: IEEE, May 6–8, 2021, pp. 323–332.
PortSwigger, “Insecure Direct Object References (IDOR).” [Online]. Available: https://portswigger.net/web-security/access-control/idor
D. Johansson, “OWASP top 10 2017.” [Online]. Available: https://owasp.org/www-chapter-cambridge/presentations/prev/Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf
OWASP, “A2:2017-Broken Authentication.” [Online]. Available: https://owasp.org/www-project-top-ten/2017/A22017-Broken Authentication
——, “A3:2017-Sensitive Data Exposure.” [Online]. Available: https://owasp.org/www-project-top-ten/2017/A3 2017-Sensitive Data Exposure
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Wahyu Haris Kusuma Atmaja, Harco Leslie Hendric Spits Warnars, Ford Lumban Gaol, Benfano Soewito
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License - Share Alike that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
USER RIGHTS
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: Creative Commons Attribution-Share Alike (CC BY-SA)