Skip to main content

Enhancing Integrity Technique Using Distributed Query Operation

  • Chapter
  • First Online:
Recent Trends and Advances in Wireless and IoT-enabled Networks

Abstract

Database growth and storage problems are basically the main high concerns of globally large and small enterprises, which directly have negative impact on database application performance. But something more important is that majority of it is unused in these large volumes of databases. According to industry analysts, the growth rate of enterprise databases is 125% yearly, in which 80% of the information in use is inactive. Database archiving is one of the solutions among all the solutions that are available for management. With the use of archiving database, many issues have been highlighted including selection and removal of unused data from OLTP system, integrity management, and performance. This paper introduces a methodology for where OLTP and archiving data are kept in a distributed database environment. Integrity management is important, but more significant than that is the performance of the desired query which maintains that integrity between OLTP and archiving database. The main feature of the proposed methodology is that it not only maintains data integrity for primary and unique keys between OLTP and archive database but will also focus on enhancing the query performance for maintaining that integrity by introducing a query execution plan and parallel processing in it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ibrahim, H., Alwan, A. A., & Udzir, N. I. (2007). Checking integrity constraints with various types of integrity tests for distributed databases. In 2007 8th international conference on parallel and distributed computing, applications and technologies, PDCAT 2007 (PDCAT) (pp. 151–152). https://doi.org/10.1109/PDCAT.2007.14

  2. Hill, D. (2006). Database archiving: A necessity, not an option. Commentary, Mesabi Group. Available from https://www.mesabigroup.com/English/Collaterals/Whitepapers/20060511_Database_Archiving.pdf

  3. Lee, J. (2004). Database archiving: A critical component of information lifecycle management. Available from https://www.databasejournal.com/sqletc/article.php/3340301/Database-Archiving-A-Critical-Component-of-Information-Lifecycle-Management.htm

  4. Yuhanna, N. (2009). Enterprise database management systems. Cambridge: Forrester Research.

    Google Scholar 

  5. Pfleeger, C. P., & Pfleeger, S. L. (2003). Security in computing. Upper Saddle River: Prentice Hall Professional Technical Reference.

    MATH  Google Scholar 

  6. Özsu, M. T., & Valduriez, P. (2011). Distributed and parallel database systems. Boston: Springer.

    Google Scholar 

  7. Redman, T. C. (1998). The impact of poor data quality on the typical enterprise. Communications of the ACM, 41(2), 79–82.

    Article  Google Scholar 

  8. Norris, J. S. (2004). Mission-critical development with open source software: Lessons learned. IEEE Software, 21(1), 42–49.

    Article  Google Scholar 

  9. Lush, M. (2017). Getting to the bottom of data integrity Safeguarding quality systems requires understanding the thinking that drives human behaviour (pp. 12–13).

    Google Scholar 

  10. Eddolls, T. (2008). Database archiving for the future. Available from https://www.informationtechnologycrossing.com/article/370128/Database-Archiving-for-Tomorrow/

  11. Mullins, C. (2006) Database archiving: Managing data for long retention periods. Available from http://tdan.com/database-archiving-for-long-term-data-retention/4591

  12. Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2015). A sybil attack detection scheme for a centralized clustering-based hierarchical network. In Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA (Vol. 1, pp. 318–325). IEEE.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aida Mustapha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Khattak, U.F., Mustapha, A., Yaseen, M., Shah, M.A., Shahzad, A. (2019). Enhancing Integrity Technique Using Distributed Query Operation. In: Jan, M., Khan, F., Alam, M. (eds) Recent Trends and Advances in Wireless and IoT-enabled Networks. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-99966-1_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-99966-1_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-99965-4

  • Online ISBN: 978-3-319-99966-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics