A theoretical formulation for degrees of isolation in databases

https://doi.org/10.1016/0950-5849(96)01109-3Get rights and content

Abstract

Although isolation is one of the desirable properties, most commercial database management systems do not provide complete isolation to transactions. They offer different degrees — 0, 1, 2, or 3 — of isolation, to transactions. By providing lower degrees of isolation, response time of a database system can be improved, although at the expense of consistency. Originally different degrees of isolation were defined in terms of lock-based protocols. This paper formulates these different degrees of isolation in terms of histories, as in the case of the usual serialization theory and proposes timestamp-based protocols for different degrees of isolation.

References (9)

  • J.N. Gray et al.

    Granularity of locks and degrees of consistency in a shared data base

  • Jim Gray et al.

    Transaction Processing: Concepts and Techniques

    (1993)
  • Irving L. Traiger et al.

    Transactions and consistency in distributed database systems

    ACM Trans. on Database Systems

    (1982)
  • Philip A. Bernstein et al.

    Concurrency Control and Recovery in Database Systems

    (1987)
There are more references available in the full text version of this article.

Cited by (9)

  • Quantification of interacting runtime qualities in software architectures: Insights from transaction processing in client-server architectures

    2010, Information and Software Technology
    Citation Excerpt :

    Log-Manager – simulates the stable storage of a transactional server, i.e. the I/O costs for storage - retrieval of object states and the status of processed transactions. Concurrency Control – simulates the concurrency control and isolation guarantees [2]. As in [16], we do not consider resource consumption for concurrency control, since its CPU demands cannot be easily quantified.

  • Byshard: Sharding in a byzantine environment

    2021, Proceedings of the VLDB Endowment
  • Database replication using generalized snapshot isolation

    2005, Proceedings of the IEEE Symposium on Reliable Distributed Systems
  • Data integrity for concurrent engineering transactions

    2003, Proceedings of the 10th ISPE International Conference on Concurrent Engineering Research and Application, Enhanced Interoperable Systems
View all citing articles on Scopus
1

The work of E. Bertino was carried out while visiting George Mason University during summer 1994.

2

The work of S. Jajodia was partially supported by a grant from ARPA, administered by the Office of Naval Research under grant number N0014-92-J-4038, and by National Science Foundation under grant number IRI-9303416.

View full text