Skip to main content

Formalization of Database Reverse Engineering

  • Conference paper
  • First Online:
  • 1053 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 767))

Abstract

During the life cycle of an Information System, the original design of the database may be difficult to acquire. The database schema may have been continuously modified and drifted away semantically from the intended design, or perhaps no conceptual modelling method was employed at all. A conceptual schema offers a much richer description of a domain than the database schema, this makes it important for, among other reasons, the maintenance of semantic consistency of the database at runtime. Database reverse engineering involves the retrieval of domain semantics from an existing set of database schemas into a conceptual schema. Though several research works exist on creating database reverse engineering methodologies, the process in itself has never been properly and fully formalised with an emphasis on its correctness. This paper introduces the ongoing research surrounding database reverse engineering and the goal of rendering a formal reverse engineering framework. The expected formalism will be valuable to database and domain experts as a sound foundation for implementing better reverse engineering tools.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Relations consist of typed attributes, with each attribute belonging to its own finite attribute domain.

References

  1. Alhajj, R.: Extracting the extended entity-relationship model from a legacy relational database. Inform. Syst. 28(6), 597–618 (2003)

    Article  MATH  Google Scholar 

  2. An, Y., Borgida, A., Miller, R.J., Mylopoulos, J.: A semantic approach to discovering schema mapping expressions. In: 2007 IEEE 23rd International Conference on Data Engineering, pp. 206–215, April 2007

    Google Scholar 

  3. Andersson, M.: Extracting an entity relationship schema from a relational database through reverse engineering. In: Loucopoulos, P. (ed.) ER 1994. LNCS, vol. 881, pp. 403–419. Springer, Heidelberg (1994). doi:10.1007/3-540-58786-1_93

    Chapter  Google Scholar 

  4. Astrova, I.: Reverse engineering of relational databases to ontologies. In: Bussler, C.J., Davies, J., Fensel, D., Studer, R. (eds.) ESWS 2004. LNCS, vol. 3053, pp. 327–341. Springer, Heidelberg (2004). doi:10.1007/978-3-540-25956-5_23

    Chapter  Google Scholar 

  5. Chiang, R.H.L., Barron, T.M.: Quality issues in database reverse engineering: an overview. In: Proceedings for Operating Research and the Management Sciences, pp. 185–189, June 1995

    Google Scholar 

  6. Chiang, R.H.L., Barron, T.M., Storey, V.C.: Reverse engineering of relational databases: extraction of an eer model from a relational database. Data Knowl. Eng. 12(2), 107–142 (1994)

    Article  Google Scholar 

  7. Hainaut, J.-L.: Introduction to database reverse engineering. LIBD Lecture Notes (2002)

    Google Scholar 

  8. Hainaut, J.-L.: Research in database engineering at the university of namur. ACM SIGMOD Rec. 32(4), 124–128 (2003)

    Article  Google Scholar 

  9. Hainaut, J.-L., Tonneau, C., Joris, M., Chandelon, M.: Schema transformation techniques for database reverse engineering. In: Proceedings of the 12th International Conference on ER Approach, pp. 353–372. Springer, Arlington-Dallas (1993)

    Google Scholar 

  10. Halpin, T.: Object-role modeling: principles and benefits. Int. J. Inform. Syst. Model. Des. 1(1), 33–57 (2010)

    Article  Google Scholar 

  11. Johannesson, P.: A method for transforming relational schemas into conceptual schemas. In: Proceedings of the 10th International Conference Data Engineering, 1994, pp. 190–201. IEEE (1994)

    Google Scholar 

  12. Lammari, N., Comyn-Wattiau, I., Akoka, J.: Extracting generalization hierarchies from relational databases: a reverse engineering approach. Data Knowl. Eng. 63(2), 568–589 (2007)

    Article  Google Scholar 

  13. Lin, L., Zhuoming, X., Ding, Y.: Owl ontology extraction from relational databases via database reverse engineering. JSW 8(11), 2749–2760 (2013)

    Article  Google Scholar 

  14. Lubyte, L., Tessaris, S.: Automatic extraction of ontologies wrapping relational data sources. In: Bhowmick, S.S., Küng, J., Wagner, R. (eds.) DEXA 2009. LNCS, vol. 5690, pp. 128–142. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03573-9_10

    Chapter  Google Scholar 

  15. Markowitz, V.M., Makowsky, J.A.: Identifying extended entity-relationship object structures in relational schemas. IEEE Trans. Softw. Eng. 16(8), 777–790 (1990)

    Article  Google Scholar 

  16. McBrien, P., Poulovassilis, A.: Data integration by bi-directional schema transformation rules. In: Proceedings of the 19th International Conference on Data Engineering, 2003, pp. 227–238. IEEE (2003)

    Google Scholar 

  17. A Müller, H., Jahnke, J.H., Smith, D.B., Storey, M.-A., Tilley, S.R., Wong, K.: Reverse engineering: a roadmap. In: Proceedings of the Conference on the Future of Software Engineering, pp. 47–60. ACM (2000)

    Google Scholar 

  18. Petit, J.-M., Toumani, F., Kouloumdjian, J.: Relational database reverse engineering: a method based on query analysis. Int. J. Coop. Inform. Syst. 4(02n03), 287–316 (1995)

    Google Scholar 

  19. Premerlani, W.J., Blaha, M.R.: An approach for reverse engineering of relational databases. In: Proceedings Working Conference on Reverse Engineering, pp. 151–160, May 1993

    Google Scholar 

  20. Qian, X.: Correct schema transformations. In: Apers, P., Bouzeghoub, M., Gardarin, G. (eds.) EDBT 1996. LNCS, vol. 1057, pp. 114–128. Springer, Heidelberg (1996). doi:10.1007/BFb0014146

    Chapter  Google Scholar 

  21. Signore, O., Loffredo, M., Gregori, M., Cima, M.: Reconstruction of ER schema from database applications: a cognitive approach. In: Loucopoulos, P. (ed.) ER 1994. LNCS, vol. 881, pp. 387–402. Springer, Heidelberg (1994). doi:10.1007/3-540-58786-1_92

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nonyelum Ndefo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Ndefo, N. (2017). Formalization of Database Reverse Engineering. In: Kirikova, M., et al. New Trends in Databases and Information Systems. ADBIS 2017. Communications in Computer and Information Science, vol 767. Springer, Cham. https://doi.org/10.1007/978-3-319-67162-8_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67162-8_40

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67161-1

  • Online ISBN: 978-3-319-67162-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics