skip to main content
research-article

Transaction Repair for Integrity Enforcement

Published: 01 November 2001 Publication History

Abstract

A transaction repair system detects erroneous transactions as they update the database, and for each erroneous transaction, it finds the necessary and sufficient changes to the transaction that would repair it. Detection and repair are the two essential components of semantic integrity maintenance since detection alone would leave the user with the difficult responsibility of manually correcting and reentering an erroneous transaction. Both detection and repair rely on incremental integrity maintenance techniques. The detection process takes advantage of the integrity of the database before the transaction, and detects only the new errors introduced by the transaction. The repair process takes advantage of the integrity before the transaction and integrity violation after the transaction but before the repair. Such a two-step incremental analysis produces the minimal repair necessary and sufficient to correct the transaction. All necessary and sufficient repairs are generated, for all first order constraints, and by using only substitution with no resolution search. Multiple constraints are repaired in parallel, with no sequencing of constraints, and no possibility of cycles. Extensions to recursive constraints and nondeterministic transactions are provided.

References

[1]
J.A. Blakely L.N. Coburn and P.A. Larson, “Updated Derived Relations: Detecting Autonomously Computable Updates,” ACM Trans. Database Systems, vol. 14, no. 3, pp. 369-400, 1989.
[2]
W. Chen, “Declarative Updates in Relational Databases,” ACM Trans. Database Systems, vol. 20, no. 1, pp. 42-70, 1995.
[3]
S. Ceri and J. Widom, “Deriving Production Rules for Constraint Maintenance,” Proc. Very Large Data Bases Conf., vol. 16, pp. 566-577, 1990.
[4]
S. Ceri P. Fraternali S. Paraborchi and L. Tanca, “Automatic Generation of Production Rules for Integrity Maintenance,” ACM Trans. Database Systems, vol. 19, no. 3, pp. 366-421, 1994.
[5]
C. Elkan, “Independence of Logic Database Queries and Updates,” Proc. Ninth ACM PODS Conf., pp. 154-160, 1990.
[6]
M. Gertz and U.W. Lipeck, “Deriving Integrity Maintenance Triggers from Transition Graphs,” Proc. Ninth IEEE Conf. Data Eng., pp. 22-30, 1993.
[7]
T. Griffin L. Libkin and H. Trickey, “An Incremental Algorithm for the Incremental Computation of Active Relational Expressions,” IEEE Trans. Knowledge and Data Eng., vol. 9, no. 3, pp. 508-511, May/June 1997.
[8]
J.A. Larson and A.S. Sheth, “Updating Relational Views using Knowledge at View Definition and View Update Time,” Information Systems, vol. 16, no. 2, pp. 145-168, 1991.
[9]
A.Y. Levy and Y. Sagiv, “Queries Independent of Updates,” Proc. Very Large Data Bases Conf., pp. 171-181, 1993.
[10]
W. Kim, Object Oriented Databases. Prentice Hall, 1991.
[11]
K.C. Laudon, “Data Quality and Due Process in Large Interorganizational Record Systems,” Comm. ACM, vol. 29, no. 1, pp. 4-11, 1986.
[12]
W. McCune and L. Henschen, “Maintaining State Constraints in Relational Databases,” J. ACM, vol. 36, no. 1, 1989.
[13]
G. Moerkotte and P.C. Lockemann, “Reactive Consistency Control in Deductive Databases,” ACM Trans. Database Systems, vol. 16, no. 4, pp. 670-702, 1991.
[14]
A. Motro, “Integrity=Validity+Completeness,” ACM Trans. Database Systems, vol. 14, no. 4, pp. 480-502, 1989.
[15]
L.V. Orman, “Database Constraints as Counterexamples,” Acta Informatica, vol. 34, pp. 167-189, 1997.
[16]
L.V. Orman, “Differential Relational Calculus for Integrity Maintenance,” IEEE Trans. Knowledge and Data Eng., vol. 10, no. 2, pp. 328-341, Mar./Apr. 1998.
[17]
X. Qian and G. Wiederhold, “Incremental Computation of Active Relational Expressions,” IEEE Trans. Knowledge and Data Eng., vol. 3, no. 3, pp. 337-341, 1991.
[18]
K.D. Schewe B. Thalheim J.W. Schmidt and I. Wetzel, “Integrity Enforcement in Object Oriented Database,” Modelling Database Dynamics, pp. 174-195, 1993.
[19]
M. Stonebraker A. Juingran J. Goh and S. Potamianos, “On Rules, Procedures, Caching, and Views in Database Systems,” Proc. ACM SIGMOD Conf. Management of Data, pp. 281-290, 1990.
[20]
J.D. Ullman and J. Widom, A First Course on Database Management Systems. Prentice Hall, 1997.
[21]
S.D. Urban and L.M. Delcambre, “Constraint Analysis: A Design Process for Specifying Operations on Objects,” IEEE Trans. Knowledge and Data Eng., vol. 2, no. 4, pp. 391-400, Apr. 1990.
[22]
S.D. Urban and B.B.L. Lim, “An Intelligent Framework for Active Support of Database Semantics,” Int'l J. Expert Systems, vol. 6, no. 1, pp. 1-37, 1993.
[23]
R.Y. Wang V.C. Storey and C.P. Firth, “A Framework for the Analysis of Data Quality Research,” IEEE Trans. Knowledge and Data Eng., vol. 7, no. 4, pp. 623-639, Aug. 1995.
[24]
B. Wuethrich, “On Updates and Inconsistency Repairing in Knowledge Bases,” Proc. IEEE Conf. Data Eng., 1993.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Knowledge and Data Engineering
IEEE Transactions on Knowledge and Data Engineering  Volume 13, Issue 6
November 2001
198 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 November 2001

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media