A Domain Driven Data Architecture for Data Governance Strategies in the Enterprise

Authors

  • Sarbaree Mishra Program Manager at Molina Healthcare Inc., USA. Author
  • Vineela Komandla Vice President - Product Manager, JP Morgan , USA. Author
  • Srikanth Bandi Software Engineer, JP Morgan Chase, USA. Author
  • Sairamesh Konidala Vice President, JP Morgan & Chase, USA. Author
  • Jeevan Manda Project Manager, Metanoia Solutions Inc, USA. Author

DOI:

https://doi.org/10.63282/3050-9246.IJETCSIT-V3I2P108

Keywords:

Data governance, domain-driven architecture, enterprise data management, data stewardship, data quality, compliance, business-aligned data strategy, metadata management, data lineage, data integration, master data management, data privacy, regulatory compliance, data democratization, data security, data protection, domain-oriented approach, data architecture, business objectives, collaboration between business and IT, data transparency, analytics, insights, innovation, data accountability, data stewardship roles, data cataloging, data ethics

Abstract

Managing data efficiently has become a major concern as the organizations are confronted with such a rapidly growing, diverse and complex data landscape. Enterprises have a daunting task to ensure that the data is of good quality, that it is compliant with the regulations and that the usage of data is in accordance with the business objectives. Domain-driven data architecture is a powerful method to address these challenges and allow businesses to unleash the full potential of their data. By utilizing domains as the basis for the technical construction of data systems, the companies become able to construct a structure that facilitates better collaboration between business and technical teams. Such alignment guarantees that data is not only managed in a systematized manner but also used in the most efficient way to enable decision-making and innovation. A domain-driven approach obliges the stakeholders to firmly assign ownership and stewardship of data in the respective business areas, thus resolving the ambiguity issue & improving data governance. This kind of architecture gives enterprises the ability to come up with data governance strategies that are not only scalable and flexible but also in line with the changing business needs, thus making them more trustworthy. Besides, it gives more importance to being transparent. Poor communication, unshared understanding, and inactive stakeholder collaboration are some of the reasons data governance is still being seen as a separate function rather than interwoven with other functions in an organization. Thus, by adopting such an approach, organizations can become more responsible and transparent, with data treated as a strategic asset rather than a mere operational resource. The article focuses on the basics of the domain-driven data architecture and outlines its principles that are the enablers of effective governance of large and complex enterprises

Downloads

Download data is not yet available.

References

[1] Khatri, V., & Brown, C. V. (2010). Designing data governance. Communications of the ACM, 53(1), 148-152.

[2] Paik, H. Y., Xu, X., Bandara, H. D., Lee, S. U., & Lo, S. K. (2019). Analysis of data management in blockchain-based systems: From architecture to governance. Ieee Access, 7, 186091-186107.

[3] Manda, Jeevan Kumar. "Cloud Security Best Practices for Telecom Providers: Developing comprehensive cloud security frameworks and best practices for telecom service delivery and operations, drawing on your cloud security expertise." Available at SSRN 5003526 (2020).

[4] Abraham, R., Schneider, J., & Vom Brocke, J. (2019). Data governance: A conceptual framework, structured review, and research agenda. International journal of information management, 49, 424-438.

[5] Frankel, D. S. (2003). Model driven architecture applying MDA. John Wiley & Sons.

[6] Datla, Lalith Sriram, and Rishi Krishna Thodupunuri. “Designing for Defense: How We Embedded Security Principles into Cloud-Native Web Application Architectures”. International Journal of Emerging Research in Engineering and Technology, vol. 2, no. 4, Dec. 2021, pp. 30-38

[7] Allam, Hitesh. "Security-Driven Pipelines: Embedding DevSecOps into CI/CD Workflows." International Journal of Emerging Trends in Computer Science and Information Technology 3.1 (2022): 86-97.

[8] Immaneni, J. (2021). Securing Fintech with DevSecOps: Scaling DevOps with Compliance in Mind. Journal of Big Data and Smart Systems, 2.

[9] Mohammad, Abdul Jabbar, and Waheed Mohammad A. Hadi. “Time-Bounded Knowledge Drift Tracker”. International Journal of Artificial Intelligence, Data Science, and Machine Learning, vol. 2, no. 2, June 2021, pp. 62-71

[10] Soley, R. (2000). Model driven architecture. OMG white paper, 308(308), 5.

[11] Nookala, G., Gade, K. R., Dulam, N., & Thumburu, S. K. R. (2021). Unified Data Architectures: Blending Data Lake, Data Warehouse, and Data Mart Architectures. MZ Computing Journal, 2(2).

[12] Arugula, Balkishan. “Implementing DevOps and CI CD Pipelines in Large-Scale Enterprises”. International Journal of Emerging Research in Engineering and Technology, vol. 2, no. 4, Dec. 2021, pp. 39-47

[13] Carney, D., Çetintemel, U., Cherniack, M., Convey, C., Lee, S., Seidman, G., ... & Stonebraker, M. (2002, January). Monitoring streams a new class of data management applications. In VLDB'02: Proceedings of the 28th International Conference on Very Large Databases (pp. 215-226). Morgan Kaufmann.

[14] Jani, Parth. “AI-Powered Eligibility Reconciliation for Dual Eligible Members Using AWS Glue”. American Journal of Data Science and Artificial Intelligence Innovations, vol. 1, June 2021, pp. 578-94

[15] Allan, C., Burel, J. M., Moore, J., Blackburn, C., Linkert, M., Loynton, S., ... & Swedlow, J. R. (2012). OMERO: flexible, model-driven data management for experimental biology. Nature methods, 9(3), 245-253.

[16] Patel, Piyushkumar, and Disha Patel. "Blockchain’s Potential for Real-Time Financial Auditing: Disrupting Traditional Assurance Practices." Distributed Learning and Broad Applications in Scientific Research 5 (2019): 1468-84.

[17] Veluru, Sai Prasad. "Threat Modeling in Large-Scale Distributed Systems." International Journal of Emerging Research in Engineering and Technology 1.4 (2020): 28-37

[18] Manda, J. K. "Cybersecurity Automation in Telecom: Implementing Automation Tools and Technologies to Enhance Cybersecurity Incident Response and Threat Detection in Telecom Operations." Advances in Computer Sciences 4.1 (2021).

[19] Hoschek, W., Jaen-Martinez, J., Samar, A., Stockinger, H., & Stockinger, K. (2000). Data management in an international data grid project. In Grid Computing—GRID 2000: First IEEE/ACM International Workshop Bangalore, India, December 17, 2000 Proceedings 1 (pp. 77-90). Springer Berlin Heidelberg.

[20] Immaneni, J. (2020). Building MLOps Pipelines in Fintech: Keeping Up with Continuous Machine Learning. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 1(2), 22-32

[21] Demchenko, Y., De Laat, C., & Membrey, P. (2014, May). Defining architecture components of the Big Data Ecosystem. In 2014 International conference on collaboration technologies and systems (CTS) (pp. 104-112). IEEE.

[22] Jani, Parth. “Integrating Snowflake and PEGA to Drive UM Case Resolution in State Medicaid”. American Journal of Autonomous Systems and Robotics Engineering, vol. 1, Apr. 2021, pp. 498-20.

[23] Nookala, Guruprasad. "End-to-End Encryption in Data Lakes: Ensuring Security and Compliance." Journal of Computing and Information Technology 1.1 (2021).

[24] Vasanta Kumar Tarra, and Arun Kumar Mittapelly. “Future of AI & Blockchain in Insurance CRM”. JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), vol. 10, no. 1, Mar. 2022, pp. 60-77

[25] Sakr, S., Liu, A., Batista, D. M., & Alomari, M. (2011). A survey of large scale data management approaches in cloud environments. IEEE communications surveys & tutorials, 13(3), 311-336.

[26] Datla, Lalith Sriram, and Rishi Krishna Thodupunuri. “Methodological Approach to Agile Development in Startups: Applying Software Engineering Best Practices”. International Journal of AI, BigData, Computational and Management Studies, vol. 2, no. 3, Oct. 2021, pp. 34-45

[27] Shaik, Babulal. "Developing Predictive Autoscaling Algorithms for Variable Traffic Patterns." Journal of Bioinformatics and Artificial Intelligence 1.2 (2021): 71-90.

[28] Arugula, Balkishan. “Change Management in IT: Navigating Organizational Transformation across Continents”. International Journal of AI, BigData, Computational and Management Studies, vol. 2, no. 1, Mar. 2021, pp. 47-56

[29] Ceri, S., Fraternali, P., Bongio, A., Brambilla, M., Comai, S., & Matera, M. (2003). Morgan Kaufmann series in data management systems: Designing data-intensive Web applications. Morgan Kaufmann.

[30] Abdul Jabbar Mohammad. “Cross-Platform Timekeeping Systems for a Multi-Generational Workforce”. American Journal of Cognitive Computing and AI Systems, vol. 5, Dec. 2021, pp. 1-22

[31] Talakola, Swetha. “The Importance of Mobile Apps in Scan and Go Point of Sale (POS) Solutions”. American Journal of Data Science and Artificial Intelligence Innovations, vol. 1, Sept. 2021, pp. 464-8

[32] Wang, Y., Kung, L., & Byrd, T. A. (2018). Big data analytics: Understanding its capabilities and potential benefits for healthcare organizations. Technological forecasting and social change, 126, 3-13.

[33] Shaik, Babulal. "Automating Compliance in Amazon EKS Clusters With Custom Policies." Journal of Artificial Intelligence Research and Applications 1.1 (2021): 587-10.

[34] Watson, H. J. (2014). Tutorial: Big data analytics: Concepts, technologies, and applications. Communications of the Association for Information Systems, 34(1), 65.

[35] Patel, Piyushkumar. "The Evolution of Revenue Recognition Under ASC 606: Lessons Learned and Industry-Specific Challenges." Distributed Learning and Broad Applications in Scientific Research 5 (2019): 1485-98

[36] Manda, J. K. "Blockchain Applications in Telecom Supply Chain Management: Utilizing Blockchain Technology to Enhance Transparency and Security in Telecom Supply Chain Operations." MZ Computing Journal 2.2 (2021).

[37] Weill, P., Subramani, M., & Broadbent, M. (2002). IT infrastructure for strategic agility. Available at SSRN 317307.

[38] Weiss, C., Karras, P., & Bernstein, A. (2008). Hexastore: sextuple indexing for semantic web data management. Proceedings of the VLDB Endowment, 1(1), 1008-1019.

[39] Sreejith Sreekandan Nair, Govindarajan Lakshmikanthan (2020). Beyond VPNs: Advanced Security Strategies for the Remote Work Revolution. International Journal of Multidisciplinary Research in Science, Engineering and Technology 3 (5):1283-129

Published

2022-06-30

Issue

Section

Articles

How to Cite

1.
Mishra S, Komandla V, Bandi S, Konidala S, Manda J. A Domain Driven Data Architecture for Data Governance Strategies in the Enterprise. IJETCSIT [Internet]. 2022 Jun. 30 [cited 2025 Sep. 12];3(2):75-86. Available from: https://ijetcsit.org/index.php/ijetcsit/article/view/319

Similar Articles

1-10 of 252

You may also start an advanced similarity search for this article.