Enhancing Integrity Technique Using Distributed Query Operation

  • Umar Farooq Khattak
  • Aida MustaphaEmail author
  • Muhammad Yaseen
  • Muhammad Arif Shah
  • Asim Shahzad
Part of the EAI/Springer Innovations in Communication and Computing book series (EAISICC)


Database growth and storage problems are basically the main high concerns of globally large and small enterprises, which directly have negative impact on database application performance. But something more important is that majority of it is unused in these large volumes of databases. According to industry analysts, the growth rate of enterprise databases is 125% yearly, in which 80% of the information in use is inactive. Database archiving is one of the solutions among all the solutions that are available for management. With the use of archiving database, many issues have been highlighted including selection and removal of unused data from OLTP system, integrity management, and performance. This paper introduces a methodology for where OLTP and archiving data are kept in a distributed database environment. Integrity management is important, but more significant than that is the performance of the desired query which maintains that integrity between OLTP and archiving database. The main feature of the proposed methodology is that it not only maintains data integrity for primary and unique keys between OLTP and archive database but will also focus on enhancing the query performance for maintaining that integrity by introducing a query execution plan and parallel processing in it.


OLTP Databases Query Load management Life cycle management 


  1. 1.
    Ibrahim, H., Alwan, A. A., & Udzir, N. I. (2007). Checking integrity constraints with various types of integrity tests for distributed databases. In 2007 8th international conference on parallel and distributed computing, applications and technologies, PDCAT 2007 (PDCAT) (pp. 151–152).
  2. 2.
    Hill, D. (2006). Database archiving: A necessity, not an option. Commentary, Mesabi Group. Available from
  3. 3.
    Lee, J. (2004). Database archiving: A critical component of information lifecycle management. Available from
  4. 4.
    Yuhanna, N. (2009). Enterprise database management systems. Cambridge: Forrester Research.Google Scholar
  5. 5.
    Pfleeger, C. P., & Pfleeger, S. L. (2003). Security in computing. Upper Saddle River: Prentice Hall Professional Technical Reference.zbMATHGoogle Scholar
  6. 6.
    Özsu, M. T., & Valduriez, P. (2011). Distributed and parallel database systems. Boston: Springer.Google Scholar
  7. 7.
    Redman, T. C. (1998). The impact of poor data quality on the typical enterprise. Communications of the ACM, 41(2), 79–82.CrossRefGoogle Scholar
  8. 8.
    Norris, J. S. (2004). Mission-critical development with open source software: Lessons learned. IEEE Software, 21(1), 42–49.CrossRefGoogle Scholar
  9. 9.
    Lush, M. (2017). Getting to the bottom of data integrity Safeguarding quality systems requires understanding the thinking that drives human behaviour (pp. 12–13).Google Scholar
  10. 10.
    Eddolls, T. (2008). Database archiving for the future. Available from
  11. 11.
    Mullins, C. (2006) Database archiving: Managing data for long retention periods. Available from
  12. 12.
    Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2015). A sybil attack detection scheme for a centralized clustering-based hierarchical network. In Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA (Vol. 1, pp. 318–325). IEEE.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Umar Farooq Khattak
    • 1
  • Aida Mustapha
    • 1
    Email author
  • Muhammad Yaseen
    • 1
  • Muhammad Arif Shah
    • 2
  • Asim Shahzad
    • 1
  1. 1.Faculty of Computer Science & Information TechnologyUniversiti Tun Hussein Onn Malaysia (UTHM)Parit RajaMalaysia
  2. 2.Faculty of ComputingUniversiti Technology Malaysia (UTM)SkudaiMalaysia

Personalised recommendations