Skip to main content
Log in

Distributed Enforcement of Integrity Constraints

  • Published:
Distributed and Parallel Databases Aims and scope Submit manuscript

Abstract

This paper deals with distributed transactions that employ self-stabilization in the sense that the transaction is possibly extended by corrective actions (“stabilizers”) to repair violated integrity constraints. The implementation of such an extended distributed transaction is discussed in both macro (inter-transaction) and micro (intra-transaction) aspects. In the macro level we discuss the distributed stabilizers execution protocol, the relationship with the 2PC algorithm (“the reinfection problem”) and cooperative constraint evaluation and transaction termination. The Micro-level issues discussed relate to the interaction among different stabilizers. Three different alternative protocols are discussed: the basic S-Lock protocol, the extended S-Lock protocol, and the cluster graph based protocol. These protocols are compared and discussed. The paper concludes with discussion of some general properties such as:determinism and termination.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. A. Aiken, J. Widom, and J.M. Hellerstein, “Behavior of database production rules: Termination, confluence and observable determinism,” in Proceedings of ACM SIGMOD, June 1992, pp. 59–68.

  2. D. Barbara-Mila and H. Garcia-Molina, “The demarcation protocol: A technique for maintaining constraints in distributed database systems,” VLDB Journal, vol. 3, pp. 325–353, 1994.

    Google Scholar 

  3. A. Bernstein, V. Hazdilacos, and N. Goodman, Concurrency Control and Recovery in Database Systems, Addison-Wesley: Reading, MA, 1987.

    Google Scholar 

  4. A. Bernstein and E. Newcomer, Principles on Transaction Processing, Morgan-Kaufmann: San Mateo, CA, 1997.

    Google Scholar 

  5. A. Borgida, “Language features for flexible handling of exceptions in information systems,” ACMTransactions on Databases Systems, vol. 10, no. 4, pp. 565–603, 1985.

    Google Scholar 

  6. A. Borgida, T. Mitchell, and K.E. Wiliamson, “Learning improved integrity constraints and schema from exceptions in data and knowledge bases,” in On Knowledge Base Management Systems, M.L. Brodie and J. Mylopoulos (Eds.), Springer-Verlag: Berlin, 1986, pp. 259–286.

    Google Scholar 

  7. D. Botzer and O. Etzion, “Optimization of materialization strategies of derived data-elements,” IEEE Transaction on Knowledge and Data Engineering, vol. 8, no. 2, pp. 260–272, 1996.

    Google Scholar 

  8. S. Ceri et al., “Constraint enforcement trough production rules: Putting active databases to work,” Data Engineering, vol. 15, pp. 10–14, 1992.

    Google Scholar 

  9. S. Ceri et al., “Automatic generation of production rules for integrity maintenance,” ACM Transactions on Database Systems, vol. 19, no. 3, pp. 367–422, 1994.

    Google Scholar 

  10. S. Ceri and G. Pelagatti, Distributed Databases: Principles and Systems, Mcgraw-Hill: New York, 1984.

    Google Scholar 

  11. S. Ceri and J. Widom, “Deriving production rules for constraint maintenance,” in Proceedings of the 16th VLDB Conference, Aug. 1990, pp. 566–577.

  12. S. Ceri and J. Widom, “Production rules in parallel and distributed database systems,” in Proceedings of the 18th VLDB Conference, Aug. 1992, pp. 339–351.

  13. B. Dahav, “Handling exceptional data in active homogenous database systems,” Master's thesis, Technion-- Israel Institute of Technology, July 1996.

  14. C.J. Date, “Referential integrity,” in Proceedings of the International Conference on VLDB, 1981.

  15. E.W. Dijkstra, “Self-stabilizing systems in spite of distributed control,” Communications of the ACM, vol. 17, pp. 643–633, 1974.

    Google Scholar 

  16. L. Do and P. Drew, “Active database management of global data integrity constraints in heterogeneous database environments,” in Proceedings ICDE'95, 1995, pp. 99–108.

  17. O. Etzion, “Active handling of incomplete or exceptional information in database systems,” in Proceedings of the Workshop on Information Technologies & Systems (WITS), Dec. 1991, pp. 46–60.

  18. O. Etzion, “Active interdatabase dependencies,” Information Sciences, vol. 75, pp. 133–163, 1993.

    Google Scholar 

  19. O. Etzion and B. Dahav, “Patterns of self-stabilization in database consistency maintenance,” Data and Knowledge Engineering, vol. 28, pp. 299–319, 1998.

    Google Scholar 

  20. P. Franternali and S. Paraboschi, “A review of repairing techniques for integrity maintenance,” in Proceedings of the Workshop on Rules in Databases (RIDS), Edinburgh, Scotland, Aug. 1993, pp. 333–346.

  21. A. Gupta and J. Widom, “Local verification of global integrity constraints in distributed databases,” in Proceedings of ACM Sigmod, May 1993.

  22. M. Hsu, M. Singhal, and M.T. Liu, “Distributed rule processing in active databases,” in Proceedings of the 8th IEEE Conference in Data Engineering, 1992.

  23. G. Reznik, “Exception handling in active databases,” Master's thesis, Technion-Israel Institute of Technology, Sept. 1993.

  24. Sapiens-Technologies, What is sapiens? 1990.

  25. E. Teniente and A. Olive, “Updating knowledge-bases while maintaining their consistency,” The VLDB Journal, vol. 4, no. 2, pp. 193–241, 1995.

    Google Scholar 

  26. S. Urban and L. Delcambre, “Constraint analysis: A design process for specifying operations on objects,” IEEE Transactions on Knowledge and Data Engineering, vol. 2, no. 4, pp. 391–400, Feb. 1990.

    Google Scholar 

  27. B. Wuthrich, “On update and inconsistency repairing in knowledge-bases,” in Proceedings of the 9th IEEE International Conference on Data Engineering, 1993, pp. 608–615.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Dahav, B., Etzion, O. Distributed Enforcement of Integrity Constraints. Distributed and Parallel Databases 13, 227–249 (2003). https://doi.org/10.1023/A:1022851708554

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1022851708554

Navigation