Skip to main content

Database Integrity Mechanism between OLTP and Offline Data

  • Conference paper
Intelligent Information and Database Systems (ACIIDS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7197))

Included in the following conference series:

Abstract

This paper describes integrity mechanism between OLTPs and offline data. Normally every RDBMS supports five Integrity Constraints (ICs) namely primary key or composite key, unique key, foreign key, not null and check constraints. Online database integrity is achieved through these five ICs. However, as per the retention period data is backed up and removed from the OLTPs for space and performance efficiency. But there is no standardized protocol on keeping integrity between offline data and data present in the OLTPs. Therefore, we present a solution to address the problem of offline data integrity by keeping a representative set of purged data & ICs in the online database to ensure data integrity between OLTPs and offline data. We further support our proposed solution with the help of two types of integrity tests i.e., sufficient and complete test.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The American Heritage Dictionary of the English Language, El-shaddai, p. 2000 (2009)

    Google Scholar 

  2. Eswaran, K., Chamberlin, D.: Functional Specifications of a Subsystem for Database Integrity. ACM (1975)

    Google Scholar 

  3. Türker, C.: Consistent Handling of Integrity Constraints and Extensional Assertions for Schema Integration. In: Eder, J., Rozman, I., Welzer, T. (eds.) ADBIS 1999. LNCS, vol. 1691, pp. 31–45. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  4. Caroprese, L., Greco, S., Zumpano, E.: Active Integrity Constraints for Database Consistency Maintenance. IEEE Transactions on Knowledge and Data Engineering, 1042–1058 (2009)

    Google Scholar 

  5. Mayol, E., Teniente, E.: A Survey of Current Methods for Integrity Constraint Maintenance and View Updating. Advances in Conceptual Modeling, 67–73 (1999)

    Google Scholar 

  6. Mircea Petrescu, A., Rotaru, O.P.: A Database Integrity Pattern Language. ACM (2008)

    Google Scholar 

  7. Uut de Haag, M., Sayre, J.: Terrain Database Integrity Monitoring for Synthetic Vision Systems. IEEE Transactions on Aerospace and Electronic Systems, 386–406 (2005)

    Google Scholar 

  8. Lin, Y., Kemme, B.: Snapshot Isolation and Integrity Constraints in replicated Databases. ACM (2009)

    Google Scholar 

  9. Batini, Carlo.: A Methodology for Data Schema Integration in the Entity Relationship Model. IEEE Transactions on Software Engineering, 650–664 (2009)

    Google Scholar 

  10. McCarroll, N.F.: Semantic Integrity Enforcement in Parallel Database Machines PhD Thesis, University of Sheffield, UK (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Salman, M., Rehman, N.U., Shahid, M. (2012). Database Integrity Mechanism between OLTP and Offline Data. In: Pan, JS., Chen, SM., Nguyen, N.T. (eds) Intelligent Information and Database Systems. ACIIDS 2012. Lecture Notes in Computer Science(), vol 7197. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28490-8_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28490-8_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28489-2

  • Online ISBN: 978-3-642-28490-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics