{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:05:01Z","timestamp":1773842701703,"version":"3.50.1"},"reference-count":163,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2022-03886"],"award-info":[{"award-number":["RGPIN-2022-03886"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"name":"IBM Centre for Advanced Studies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/tcc.2025.3578557","type":"journal-article","created":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T13:52:52Z","timestamp":1749563572000},"page":"935-952","source":"Crossref","is-referenced-by-count":5,"title":["A Reference Architecture for Governance of Cloud Native Applications"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8883-7061","authenticated-orcid":false,"given":"William","family":"Pourmajidi","sequence":"first","affiliation":[{"name":"Toronto Metropolitan University, Toronto, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9343-3654","authenticated-orcid":false,"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"John","family":"Steinbacher","sequence":"additional","affiliation":[{"name":"IBM Canada Lab, Toronto, ON, Canada"}]},{"given":"Tony","family":"Erwin","sequence":"additional","affiliation":[{"name":"IBM Cloud Platform, Austin, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7747-9043","authenticated-orcid":false,"given":"Andriy","family":"Miranskyy","sequence":"additional","affiliation":[{"name":"Toronto Metropolitan University, Toronto, ON, Canada"}]}],"member":"263","reference":[{"key":"ref1","article-title":"IDC-futurescape","year":"2020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2014.04.006"},{"issue":"4","key":"ref3","first-page":"733","article-title":"A comprehensive study on cloud computing","volume":"3","author":"Nandgaonkar","year":"2014","journal-title":"Int. J. Comput. Sci. Mobile Comput."},{"key":"ref4","article-title":"NIST cloud computing standards roadmap","year":"2024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.500-291v1"},{"key":"ref6","article-title":"What is cloud governance?","year":"2023"},{"key":"ref7","article-title":"Aws_cloudgovernance_ebook_driving-success-and-security-in-the-cloud.pdf","year":"2021"},{"key":"ref8","article-title":"Govern methodology for the cloud - cloud adoption framework| microsoft learn","year":"2025"},{"key":"ref9","article-title":"What is data governance? |Google cloud","year":"2025"},{"key":"ref10","article-title":"IBM cloud compliance overview page","year":"2025"},{"key":"ref11","article-title":"What is data governance? |IBM","year":"2024"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927822"},{"key":"ref14","article-title":"What is a container?","year":"2025"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C51114.2020.00107"},{"key":"ref16","article-title":"Kubernetes","year":"2025"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2018.053681358"},{"key":"ref18","article-title":"Cloud native apps; cloud native glossary","year":"2025"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1378\/3\/032092"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3358505.3358522"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-022-00367-6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD49709.2020.00025"},{"key":"ref23","article-title":"Terraform"},{"key":"ref24","article-title":"Chef software devops automation solutions","year":"2025"},{"key":"ref25","article-title":"Infrastructure automation with ansible","year":"2025"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62594-2_2"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.01.001"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33313-7_15"},{"key":"ref29","article-title":"Microservices","author":"Fowler","year":"2024"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2019.00014"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2017.8229914"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2015.49"},{"key":"ref33","article-title":"Managed Kubernetes service","year":"2025"},{"key":"ref34","article-title":"Managed Kubernetes service (AKS)","year":"2024"},{"key":"ref35","article-title":"Kubernetes - google Kubernetes engine (GKE)","year":"2025"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.84"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.32"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3368454"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.3028708"},{"key":"ref40","article-title":"What are cloud native applications?","year":"2025"},{"key":"ref41","article-title":"Serverless computing - AWS lambda","year":"2025"},{"key":"ref42","article-title":"Azure serverless","year":"2025"},{"key":"ref43","article-title":"Serverless computing","year":"2025"},{"key":"ref44","article-title":"IBM cloud code engine - Canada","year":"2025"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.5220\/0009571001710180"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-1568-8"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet51028.2020.9335808"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987264"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78637-7_9"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-6494-2_14"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3447545.3451173"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-6998-5_12"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1295014.1295035"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1463788.1463817"},{"key":"ref55","article-title":"Metrics, logs and traces: The golden triangle of observability in monitoring","year":"2018"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.33"},{"key":"ref57","first-page":"259","article-title":"On challenges of cloud monitoring","volume-title":"Proc. 27th Annu. Int. Conf. Comput. Sci. Softw. Eng.","author":"Pourmajidi"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD49709.2020.00008"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00024"},{"key":"ref60","first-page":"344","article-title":"Dogfooding: Using IBM cloud services to monitor IBM cloud infrastructure","volume-title":"Proc. 29th Annu. Int. Conf. Comput. Sci. Softw. Eng.","author":"Pourmajidi"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1201\/9781003001188-12"},{"key":"ref62","article-title":"Cloudheatmap: Heatmap-based monitoring for large-scale cloud systems","author":"Sohana","year":"2024","journal-title":"arXiv:2410.21092"},{"key":"ref63","article-title":"Anomaly detection in large-scale cloud systems: An industry case and dataset","author":"Saiful Islam","year":"2024","journal-title":"arXiv:2411.09047"},{"key":"ref64","article-title":"What is cloud native observability?","year":"2024"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.105"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2980024.2872407"},{"key":"ref67","article-title":"Summary of the Amazon S3 service disruption in the Northern Virginia (US-EAST-1) region","year":"2017"},{"key":"ref68","article-title":"Amazon and the 150 million typo : The two-way","year":"2017"},{"key":"ref69","article-title":"A call for the development of an international standard for the management of AIOps systems","volume-title":"Proc. ASPLOS Workshop Cloud Intell. AIOps","author":"Hamou-Lhadj"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.21136\/MB.2012.142861"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/S1474-6670(17)70094-8"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00134"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008964"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5269-7"},{"key":"ref75","volume-title":"Mastering Non-Functional Requirements","author":"Paradkar","year":"2017"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18344-2"},{"key":"ref77","article-title":"Cross-cloud management of sensitive data via blockchain: A payslip calculation use case","volume-title":"Proc. CEUR Workshop","author":"Nicoletti"},{"key":"ref78","article-title":"AWS auto scaling","year":"2025"},{"key":"ref79","article-title":"A. autoscale","year":"2025"},{"key":"ref80","article-title":"Autoscaling groups of instances| compute engine documentation"},{"key":"ref81","article-title":"Autoscaling"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.2174\/1874107X00701010001"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-018-0143-8"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2593861.2593862"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2018.00053"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA-C.2018.00026"},{"key":"ref87","article-title":"AWS well-architected - build secure, efficient cloud applications","year":"2024"},{"key":"ref88","article-title":"Reference architecture overview| IBM cloud docs"},{"key":"ref89","article-title":"The 6 pillars of the AWS well-architected framework | AWS partner network (APN) blog","year":"2022"},{"key":"ref90","article-title":"IBM cloud for financial services","year":"2025"},{"key":"ref91","article-title":"Banking industry architecture: Reference diagram - IBM cloud architecture center","year":"2025"},{"key":"ref92","article-title":"Cloud native architecture","year":"2025"},{"key":"ref93","article-title":"Enabling allianz direct\u2019s scaling through platform engineering| cloud native architecture","year":"2024"},{"key":"ref94","article-title":"Scaling adobe\u2019s service delivery foundation with a cell-based architecture| cloud native architecture","year":"2024"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-7226-8"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-017-9417-z"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/CSC.2011.6138542"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2011.59"},{"key":"ref99","article-title":"What is pub\/sub? The publish\/subscribe model explained","year":"2023"},{"key":"ref100","article-title":"Architecting cloud native. net applications for azure","year":"2024"},{"key":"ref101","article-title":"What is cloud-native? Is it hype or the future of software development?","year":"2021"},{"key":"ref102","article-title":"Infrastructure as code","year":"2022"},{"key":"ref103","article-title":"Real-time policy enforcement with governance as code - the new stack","year":"2022"},{"key":"ref104","volume-title":"Infrastructure as Code: Managing Servers in the Cloud","author":"Morris","year":"2016"},{"key":"ref105","article-title":"Github: Where the world builds software","year":"2025"},{"key":"ref106","article-title":"What is gitops?","year":"2025"},{"key":"ref107","article-title":"Guide to gitops","year":"2024"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2021.3119106"},{"key":"ref109","article-title":"Gitops is continuous deployment for cloud native applications","year":"2025"},{"key":"ref110","volume-title":"Cloud Native: Using Containers, Functions, and Data to Build Next-Generation Applications","author":"Scholl","year":"2019"},{"key":"ref111","article-title":"Kubernetes","year":"2022"},{"key":"ref112","article-title":"API management - amazon API gateway - AWS","year":"2025"},{"key":"ref113","article-title":"API management\u2013manage API gateways |microsoft azure","year":"2025"},{"key":"ref114","article-title":"API gateway| Google cloud","year":"2025"},{"key":"ref115","article-title":"API gateway - IBM API connect","year":"2025"},{"key":"ref116","article-title":"Fully managed message queuing\u2013amazon simple queue service","year":"2025"},{"key":"ref117","article-title":"Azure service bus\u2014cloud messaging service","year":"2025"},{"key":"ref118","article-title":"Pub\/sub for application & data integration","year":"2025"},{"key":"ref119","article-title":"Introduction to IBM MQ","year":"2021"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/1317379.1317382"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/1041680.1041681"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00114"},{"key":"ref123","first-page":"1","article-title":"Cloud computing: Forensic challenges for law enforcement","volume-title":"Proc. Int. Conf. Internet Technol. Secured Trans.","author":"Reilly"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00150"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps45667.2019.9024627"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3120690"},{"key":"ref127","article-title":"IBM 3363 optical worm drive","year":"1987"},{"key":"ref128","article-title":"Worm"},{"key":"ref129","article-title":"Overview of immutable storage for blob data - azure storage"},{"key":"ref130","article-title":"Protecting cloud storage with worm, key management and more updates"},{"key":"ref131","article-title":"IBM cloud object storage - immutable data"},{"key":"ref132","article-title":"Cloud storage: Advantages, disadvantages and enterprise solutions for business","volume-title":"Proc. Conf.: EIT New Zealand","author":"Obrutsky"},{"key":"ref133","article-title":"Amazon S3 - cloud object storage - AWS"},{"key":"ref134","article-title":"Free cloud computing services - AWS free tier","year":"2025"},{"key":"ref135","article-title":"Amazon s3 glacier storage classes","year":"2025"},{"key":"ref136","volume-title":"Software Architecture in Practice","author":"Bass","year":"2012"},{"key":"ref137","article-title":"What are resource groups? - AWS resource groups and tags","year":"2025"},{"key":"ref138","article-title":"Manage resource groups - azure portal - azure resource manager","year":"2025"},{"key":"ref139","article-title":"Using resource groups \u2014 cloud monitoring","year":"2025"},{"key":"ref140","article-title":"Managing resource groups","year":"2025"},{"key":"ref141","article-title":"Amazon kinesis - process & analyze streaming data","year":"2025"},{"key":"ref142","article-title":"Event streams","year":"2025"},{"key":"ref143","article-title":"IBM cloud object storage","year":"2025"},{"key":"ref144","article-title":"Fast noSQL key-value database\u2013amazon dynamoDB \u2013 AWS","year":"2025"},{"key":"ref145","article-title":"IBM cloudant"},{"key":"ref146","first-page":"8","article-title":"Data ingestion for the connected world","volume-title":"Proc. Conf. Innov. Data Syst. Res.","author":"Meehan"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-8387-7.ch005"},{"key":"ref148","first-page":"671","article-title":"A new cloud computing governance framework","volume-title":"Proc. CLOSER","author":"Saidah"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2019.2956257"},{"key":"ref150","article-title":"Elasticsearch: The official distributed search & analytics engine| elastic","year":"2025"},{"key":"ref151","article-title":"Logstash: Collect, parse, transform logs | elastic","year":"2025"},{"key":"ref152","article-title":"Kibana: Explore, visualize, discover data | elastic","year":"2025"},{"key":"ref153","article-title":"Telemetry data pipeline & log analysis solutions| mezmo","year":"2025"},{"key":"ref154","article-title":"Splunk| the key to enterprise resilience","year":"2025"},{"key":"ref155","article-title":"Sysdig| security for containers, kubernetes, and cloud","year":"2025"},{"key":"ref156","article-title":"Williampourmajidi\/cna_governance","year":"2024"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2015.87"},{"key":"ref158","article-title":"A cloud-native monitoring and analytics framework","author":"Oliveira","year":"2017"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/3147213.3147229"},{"key":"ref160","volume-title":"Cloud Native Architectures: Design High-Availability and Cost-Effective Applications for the Cloud","author":"Laszewski","year":"2018"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-020-09532-0"},{"key":"ref162","first-page":"842","article-title":"Predicting cloud-native application failures based on monitoring data of cloud infrastructure","volume-title":"Proc. 2021 IFIP\/IEEE Int. Symp. Integr. Netw. Manage.","author":"Toka"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2018.00076"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6245519\/11152304\/11029194.pdf?arnumber=11029194","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T05:18:50Z","timestamp":1757135930000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11029194\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":163,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2025.3578557","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"value":"2168-7161","type":"electronic"},{"value":"2372-0018","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}