Abstract
This paper deals with distributed transactions that employ self-stabilization in the sense that the transaction is possibly extended by corrective actions (“stabilizers”) to repair violated integrity constraints. The implementation of such an extended distributed transaction is discussed in both macro (inter-transaction) and micro (intra-transaction) aspects. In the macro level we discuss the distributed stabilizers execution protocol, the relationship with the 2PC algorithm (“the reinfection problem”) and cooperative constraint evaluation and transaction termination. The Micro-level issues discussed relate to the interaction among different stabilizers. Three different alternative protocols are discussed: the basic S-Lock protocol, the extended S-Lock protocol, and the cluster graph based protocol. These protocols are compared and discussed. The paper concludes with discussion of some general properties such as:determinism and termination.
Similar content being viewed by others
References
A. Aiken, J. Widom, and J.M. Hellerstein, “Behavior of database production rules: Termination, confluence and observable determinism,” in Proceedings of ACM SIGMOD, June 1992, pp. 59–68.
D. Barbara-Mila and H. Garcia-Molina, “The demarcation protocol: A technique for maintaining constraints in distributed database systems,” VLDB Journal, vol. 3, pp. 325–353, 1994.
A. Bernstein, V. Hazdilacos, and N. Goodman, Concurrency Control and Recovery in Database Systems, Addison-Wesley: Reading, MA, 1987.
A. Bernstein and E. Newcomer, Principles on Transaction Processing, Morgan-Kaufmann: San Mateo, CA, 1997.
A. Borgida, “Language features for flexible handling of exceptions in information systems,” ACMTransactions on Databases Systems, vol. 10, no. 4, pp. 565–603, 1985.
A. Borgida, T. Mitchell, and K.E. Wiliamson, “Learning improved integrity constraints and schema from exceptions in data and knowledge bases,” in On Knowledge Base Management Systems, M.L. Brodie and J. Mylopoulos (Eds.), Springer-Verlag: Berlin, 1986, pp. 259–286.
D. Botzer and O. Etzion, “Optimization of materialization strategies of derived data-elements,” IEEE Transaction on Knowledge and Data Engineering, vol. 8, no. 2, pp. 260–272, 1996.
S. Ceri et al., “Constraint enforcement trough production rules: Putting active databases to work,” Data Engineering, vol. 15, pp. 10–14, 1992.
S. Ceri et al., “Automatic generation of production rules for integrity maintenance,” ACM Transactions on Database Systems, vol. 19, no. 3, pp. 367–422, 1994.
S. Ceri and G. Pelagatti, Distributed Databases: Principles and Systems, Mcgraw-Hill: New York, 1984.
S. Ceri and J. Widom, “Deriving production rules for constraint maintenance,” in Proceedings of the 16th VLDB Conference, Aug. 1990, pp. 566–577.
S. Ceri and J. Widom, “Production rules in parallel and distributed database systems,” in Proceedings of the 18th VLDB Conference, Aug. 1992, pp. 339–351.
B. Dahav, “Handling exceptional data in active homogenous database systems,” Master's thesis, Technion-- Israel Institute of Technology, July 1996.
C.J. Date, “Referential integrity,” in Proceedings of the International Conference on VLDB, 1981.
E.W. Dijkstra, “Self-stabilizing systems in spite of distributed control,” Communications of the ACM, vol. 17, pp. 643–633, 1974.
L. Do and P. Drew, “Active database management of global data integrity constraints in heterogeneous database environments,” in Proceedings ICDE'95, 1995, pp. 99–108.
O. Etzion, “Active handling of incomplete or exceptional information in database systems,” in Proceedings of the Workshop on Information Technologies & Systems (WITS), Dec. 1991, pp. 46–60.
O. Etzion, “Active interdatabase dependencies,” Information Sciences, vol. 75, pp. 133–163, 1993.
O. Etzion and B. Dahav, “Patterns of self-stabilization in database consistency maintenance,” Data and Knowledge Engineering, vol. 28, pp. 299–319, 1998.
P. Franternali and S. Paraboschi, “A review of repairing techniques for integrity maintenance,” in Proceedings of the Workshop on Rules in Databases (RIDS), Edinburgh, Scotland, Aug. 1993, pp. 333–346.
A. Gupta and J. Widom, “Local verification of global integrity constraints in distributed databases,” in Proceedings of ACM Sigmod, May 1993.
M. Hsu, M. Singhal, and M.T. Liu, “Distributed rule processing in active databases,” in Proceedings of the 8th IEEE Conference in Data Engineering, 1992.
G. Reznik, “Exception handling in active databases,” Master's thesis, Technion-Israel Institute of Technology, Sept. 1993.
Sapiens-Technologies, What is sapiens? 1990.
E. Teniente and A. Olive, “Updating knowledge-bases while maintaining their consistency,” The VLDB Journal, vol. 4, no. 2, pp. 193–241, 1995.
S. Urban and L. Delcambre, “Constraint analysis: A design process for specifying operations on objects,” IEEE Transactions on Knowledge and Data Engineering, vol. 2, no. 4, pp. 391–400, Feb. 1990.
B. Wuthrich, “On update and inconsistency repairing in knowledge-bases,” in Proceedings of the 9th IEEE International Conference on Data Engineering, 1993, pp. 608–615.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Dahav, B., Etzion, O. Distributed Enforcement of Integrity Constraints. Distributed and Parallel Databases 13, 227–249 (2003). https://doi.org/10.1023/A:1022851708554
Issue Date:
DOI: https://doi.org/10.1023/A:1022851708554