Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/170035.170048acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
Article
Free access

Local verification of global integrity constraints in distributed databases

Published: 01 June 1993 Publication History

Abstract

We present an optimization for integrity constraint verification in distributed databases. The optimization allows a global constraint, i.e. a constraint spanning multiple databases, to be verified by accessing data at a single database, eliminating the cost of accessing remote data. The optimization is based on an algorithm that takes as input a global constraint and data to be inserted into a local database. The algorithm produces a local condition such that if the local data satisfies this condition then, based on the previous satisfaction of the global constraint, the global constraint is still satisfied. If the local data does not satisfy the condition, then a conventional global verification procedure is required.

References

[1]
J. A. Blakeley, N. Coburn, and P. Larson. Updating Derived Relations: Detecting Irrelevant and Autonomously Computable Updates. A CM Transactions on Database Systems, 14(3):369-400, 1989.
[2]
P. A. Bernstein, B. T. Blaustein, and E. M. Clarke. Fast Maintenance of Semantic Integrity Assertions Using Redundant Aggregate Data. In Proceedings of the Sizth conference on Very Large Data Bases, pages 128-138, 1980.
[3]
P.A. Bernstein and B. T. Blaustein. Fast Methods for Testing Quantified Relational Calculus Assertions. In Proceedings of A CM SIGMOD 1982 International Conference on Management of Data, pages 39-50, 1982.
[4]
D. Barbara and H. Garcia-Molina. The Demarcation Protocol: A Technique for Maintaining Arithmetic Constraints in Distributed Database Systems. In Extending Database Technology Conference, LNCS 580, pages 373- 397, Vienna, March, 1992.
[5]
B.T. Blaustein. Enforcing Database Assertions: Techniques and Applications. PhD thesis, Harvard University, Cambridge, Massachusetts, Division of Applied Sciences, 1981.
[6]
F. Bry, R. Manthey, and B. Martens. Integrity Verification in Knowledge Bases. In Logic Programming, LNAI 592 (subseries of LNCS), pages 114-139, 1992.
[7]
S. Ceri and F. Garzotto. Specification and Management of Database integrity Constraints through Logic Programming. Technical Report 88-025, Dipartimento Di Elettronica- Politecnico Di Milano, 1992.
[8]
S. Ceri and G. Gottlob. Translating SQL into lq.elational Algebra: Optimization, Semantics and Equivalence of SQL Queries. IEEE Transaction of Software Engineering, 11(4):324-345, April 1985.
[9]
S. Ceri and G. Pelagatti. Distributed Databases: Principles and Systems. McGraw-Hill Book Company, New York, N.Y., 1984.
[10]
A.K. Chandra. Theory of Database Queries. In Proceedings of A CM SIGMOD 1988 International Conference on Management of Data, pages 1-9. ACM, 1988.
[11]
E. Davis. Constraint Propagation with interval Labels. Artificial Intelligence, (32):281-331, 1987.
[12]
C. Elkan. Independence of Logic Database Queries and Updates. In Proceedings of the Ninth Symposium on Principles of Database Systems (PODS), pages 154-160, Nashville, TN, 1990. ACM SIGACT-SIGMOD-SIGART.
[13]
It. Fagin. Horn Clauses and Database Dependencies. Journal of the A CM, 4(29):952-985, 1982.
[14]
A. Gupta and J. D. Ullman. Generalizing Conjunctive Query Containment for View Maintenance and Integrity Constraint Checking. In Workshop on Deductive Databases, JICLSP, 1992.
[15]
A. Gupta and J. Widom. Local Verification of Global Integrity Constraints in Distributed Databases. Technical Report, Stanford University, 1993.
[16]
R. Kowalski, F. Sadri, and P. Soper. Integrity Checking in Deductive Databases. In Proceedings of the Thirteenth international Conference on Very Large Databases (VLDB), pages 61-69, 1987.
[17]
V. Kuchenhoff. On the Efficient Computation of the Difference Between Consecutive Database States. in Second international Conference, Deductive and Object.Oriented Databases, LNCS 566, pages 478-502, 1991.
[18]
J.W. Lloyd, E. A. Sonenberg, and R. W. Topor. Integrity Constraint Checking in Stratified Databases. Journal of Logic Programming, 4(4):331-343, 1987.
[19]
J.M. Nicolas. Logic for Improving Integrity Checking in Relational Data Bases. Acta
[20]
T.M. Oszu and P. Valduriez. Principles of Distributed Database Systems. Prentice Hall, Englewood Cliffs, New Jersey, 1991.
[21]
J.D. Ullman. Principles of Database and Knowledge-Base Systems, Volumes 1 and 2. Computer Science Press, New York, 1989.
[22]
A.V. Gelder and 1# W. Topor. Safety and Translation of B.elational Calculus Queries. A CM Transactions on Database Systems, 16(3):235-278, June 1991.

Cited By

View all
  • (2015)Data integration in biological research: an overviewJournal of Biological Research-Thessaloniki10.1186/s40709-015-0032-522:1Online publication date: 2-Sep-2015
  • (2014)Coordination avoidance in database systemsProceedings of the VLDB Endowment10.14778/2735508.27355098:3(185-196)Online publication date: 1-Nov-2014
  • (2014)Incremental Detection of Inconsistencies in Distributed DataIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2012.13826:6(1367-1383)Online publication date: 1-Jun-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMOD '93: Proceedings of the 1993 ACM SIGMOD international conference on Management of data
June 1993
566 pages
ISBN:0897915925
DOI:10.1145/170035
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 1993

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

SIGMOD/PODS93

Acceptance Rates

Overall Acceptance Rate 785 of 4,003 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)95
  • Downloads (Last 6 weeks)23
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2015)Data integration in biological research: an overviewJournal of Biological Research-Thessaloniki10.1186/s40709-015-0032-522:1Online publication date: 2-Sep-2015
  • (2014)Coordination avoidance in database systemsProceedings of the VLDB Endowment10.14778/2735508.27355098:3(185-196)Online publication date: 1-Nov-2014
  • (2014)Incremental Detection of Inconsistencies in Distributed DataIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2012.13826:6(1367-1383)Online publication date: 1-Jun-2014
  • (2013)Reducing lookups for invariant checkingProceedings of the 27th European conference on Object-Oriented Programming10.1007/978-3-642-39038-8_18(426-450)Online publication date: 1-Jul-2013
  • (2013)Data Consistency Enforcement on Business Process TransactionsService-Oriented Computing10.1007/978-3-642-37804-1_40(394-399)Online publication date: 2013
  • (2012)Incremental Detection of Inconsistencies in Distributed DataProceedings of the 2012 IEEE 28th International Conference on Data Engineering10.1109/ICDE.2012.82(318-329)Online publication date: 1-Apr-2012
  • (2012)Proactive Enforcement of Data Consistency by Business ProcessesProceedings of the 2012 19th Asia-Pacific Software Engineering Conference - Volume 0110.1109/APSEC.2012.120(701-704)Online publication date: 4-Dec-2012
  • (2011)Preservation of integrity constraints by workflowProceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I10.5555/2074356.2074365(64-81)Online publication date: 17-Oct-2011
  • (2011)Preservation of Integrity Constraints by WorkflowOn the Move to Meaningful Internet Systems: OTM 201110.1007/978-3-642-25109-2_6(64-81)Online publication date: 2011
  • (2010)Trusted data in IBM's MDM: Accuracy dimensionProceedings of the International Multiconference on Computer Science and Information Technology10.1109/IMCSIT.2010.5680050(577-584)Online publication date: Oct-2010
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media