Skip to main content
No Access

Checking the efficiency of integrity tests in distributed and parallel database

Published Online:pp 235-252https://doi.org/10.1504/IJBIS.2012.048892

With the increased use of the applications that deal with massive collections of data, integrity checking became a critical problem. Efficient checking could be achieved by deriving a simplified form of the integrity constraints against the new database state before the update operation is performed. Most of the research projects in this area are concentrated on deriving sufficient integrity tests for distributed databases. However, no attention has been given to validating the appropriateness of these integrity tests. In this paper, we provide a complete solution for checking constraints in the distributed database system. The proposed technique is not limited to generate sufficient and complete integrity tests but it also selects the suitable test from several alternative tests. Experimental results showed how the complete tests can significantly improve the performance of the constraint checking mechanisms with respect to the amount of data transferred across the network.

Keywords

distributed database, integrity maintenance, integrity constraints, integrity tests

References

  • 1. Alwan, A. , Ibrahim, H. , Udzir, N. (2010a). ‘A model for ranking and selecting integrity tests in a distributed database’. International Journal of Information Technology and Web Engineering (IJITWE). Italy:University of Milan , 65-84 Google Scholar
  • 2. Alwan, A. , Ibrahim, H. , Udzir, N. , Marius, C. (2010b). ‘A framework for localizing integrity constraints checking in distributed database’. Convergence and Hybrid Information Technologies. Croatia, 75-90 Google Scholar
  • 3. Christiansen, H. , Martinenghi, D. (2006). ‘On using simplification and correction tables for integrity maintenance in integrated databases’. in the 17th International Workshop on Database and Expert Systems Applications, Poland, 569-576 Google Scholar
  • 4. Garg, A. , Goyal, D. (2011). ‘Information system development approach: facts from IT SMEs in India’. International Journal of Business Information Systems. 8, 4, 361-379 AbstractGoogle Scholar
  • 5. Grefen, P. (1992). ‘Integrity control in parallel database systems’. Netherlands:University of Twente , unpublished PhD Thesis Google Scholar
  • 6. Hanandeh, F. (2006). ‘Integrity constraints maintenance for parallel databases’. Malaysia:University Putra Malaysia , unpublished PhD Thesis Google Scholar
  • 7. Hanandeh, F. , Ibrahim, H. , Mamat, A. , Johari, R. (2004). ‘Virtual rule partitioning method for maintaining database integrity’. The International Arab Journal of Information Technology. 1, 1, 103-108 Google Scholar
  • 8. Hannola, L. , Oinonen, P. , Nikula, U. (2011). ‘Assessing and improving the front end activities of software development’. International Journal of Business Information Systems. 7, 1, 41-59 AbstractGoogle Scholar
  • 9. Ibrahim, H. (1998). ‘Semantic integrity constraints enforcement for distributed databases’. Cardiff, UK:University of Wales College of Cardiff , unpublished PhD thesis Google Scholar
  • 10. Ibrahim, H. (2002a). ‘A strategy for semantic integrity checking in distributed databases’. Proceedings of the 9th International Conference on Parallel and Distributed Systems. Taiwan, 139-144 Google Scholar
  • 11. Ibrahim, H. (2002b). ‘Extending transactions with integrity rules for maintaining database integrity’. Proceedings of the International Conference on Information and Knowledge Engineering. Las Vegas, USA, 341-347 Google Scholar
  • 12. Ibrahim, H. (2006). ‘Checking integrity constraints how it differs in centralized, distributed and parallel databases’. Proceedings of the International Conference on Database and Expert Systems Applications. Krakow, Poland, 563-568 Google Scholar
  • 13. Madiraju, P. , Sunderraman, R. , Haibin, W. (2006). ‘A framework for global constraint checking involving aggregates in multidatabases using granular computing’. Proceedings of IEEE International Conference on Granular Computing. Atlanta, 506-509 Google Scholar
  • 14. Marthandan, G. , Tang, C. (2010). ‘Information systems evaluation: an ongoing measure’. International Journal of Business Information Systems. 6, 3, 336-353 AbstractGoogle Scholar
  • 15. Martinenghi, D. (2005). ‘Advanced techniques for efficient data integrity checking’. Denmark:Roskilde University , unpublished PhD Thesis Google Scholar
  • 16. Matsui, T. , Matsuo, H. (2010). ‘A constraint based formalization for distributed cooperative sensor resource allocation’. International Journal of Intelligent Information and Database Systems. 4, 4, 307-321 AbstractGoogle Scholar
  • 17. Mazumdar, S. (1993). ‘Optimizing distributed integrity constraints’. Proceedings of the 3rd International Symposium on Database Systems for Advanced Applications. Korea, 327-334 Google Scholar
  • 18. McCarroll, N. (1995). ‘Semantic integrity enforcement in parallel database machines’. Sheffield, UK:Department of Computer Science, University of Sheffield , unpublished PhD Thesis Google Scholar
  • 19. Savino, M. (2009). ‘Flow shop operator scheduling through constraint satisfaction and constraint optimization techniques’. International Journal of Productivity and Quality Management. 4, 5–6, 549-568 Google Scholar
  • 20. Nicolas, J. (1982). ‘Logic for improving integrity checking in relational databases’. Acta Informatica. 18, 3, 227-253 Google Scholar
  • 21. Papadakis, N. , Christodolou, Y. , Sartzetakis, P. , Papadakis, K. (2011). ‘Constraint satisfaction in XML temporal databases’. International Journal of Reasoning-based Intelligent Systems. 3, 1, 44-58 AbstractGoogle Scholar
  • 22. Sekhar, C. , Kumar, A. , Csendes, T. , Posfai, J. (2011). ‘An interval partitioning algorithm for constraint satisfaction problems’. International Journal of Modeling, Identification and Control. 14, 1–2, 133-140 Google Scholar
  • 23. Soumya, B. , Madiraju, P. , Ibrahim, H. (2008). ‘Constraint optimization for a system of relation databases’. Proceedings of the IEEE 8th International Conference on Computer and Information Technology. Sydney, 155-160 Google Scholar