Abstract
Despite many years of research into mechanisms for checking integrity in databases, current commercial systems provide support for checking only the simplest forms of integrity constraints. However, both the users and developers of database applications are increasingly aware of the problems that can arise when poor quality data is allowed to enter, and remain within, large scale databases. Clearly, some form of integrity checking is required for such applications, but it must be packaged in a way that respects the business context in which the application is to operate. In particular, this means acknowledging that mission critical transaction processing cannot be delayed while integrity checks are made. In this paper, we propose an approach which makes use of periods of low database activity for integrity checking.We present a range of algorithms for scheduling integrity checks during these periods, and describe the results of our initial experiments with the system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
R. Barquin and H. Edelstein. Building, Using and Managing the Data Warehouse. Prentice Hall, 1997.
BBC Radio 4. File on Four. Broadcast on 10th December 2000.
A. Bischoff. Data Warehouse: Practical Advice from the Experts. Prentice Hall, 1997.
A. Borgida. Language Features for Flexible Handling of Exceptions in Information Systems. ACM Transactions on Database Systems, 10(4):565–603, December 1985.
I. Boydens, A. Pirotte, and E. Zimanyi. Managing Constraint Violations in Administrative Information Systems. In S. Spaccapietra and F. Maryanski, editors, Data Mining and Reengineering, pages 353–377. Chapman & Hall, 1998.
S.J. Cammarata, P. Ramachandra, and D. Shane. Extending a Relational Database with Deferred Referential Integrity Checking and Intelligent Joins. In J. Clifford, B. Lindsay, and D. Maier, editors, Proceedings of the 1989 ACM SIGMOD International Conference on Management of Data, pages 88–97, Portland, Oregon, June 1989. ACM Press.
S. Ceri and J. Widom. Deriving Production Rules for Constraint Maintenance. In D. McLeod, R. Sacks-Davis, and H. Schek, editors, Proceedings of 16th International Conference on Very Large Databases, pages 566–577, Brisbane, 1990. Morgan Kaufmann Publishers, Inc.
A.B. Cremers and G. Doman. AIM–An Integrity Monitor for the Database System INGRES. In M. Schkolnick and C. Thanos, editors, Proceedings of 9th International Conference on Very Large Databases, pages 167–170, Florence, Italy, 1983. Morgan Kaufmann Inc.
S.M. Embury and P.M.D. Gray. Compiling a Declarative, High-Level Language for Semantic Integrity Constraints. In R. Meersman and L. Mark, editors, Proceedings of 6th IFIP TC-2 Working Conference on Data Semantics, pages 188–226, Atlanta, USA, May 1997. Chapman and Hall.
S.M. Embury and P.M.D. Gray. Database Internal Applications. In N.W. Paton, editor, Active Rules in Database Systems, chapter 19, pages 339–366. Springer, New York, 1999.
L.P. English. Improving Data Warehouse and Business Information Quality. John Wiley & Sons, Inc., 1999.
H. Galhardas, D. Florescu, D. Shasha, and E. Simon. AJAX: An Extensible Data Cleaning Tool. Internal report, 2000. http://caravel.inria.fr/~galharda/ajax.html.
G.M.E. Lafue. Semantic Integrity Dependencies and Delayed Integrity Checking. In Proceedings of 8th International Conference on Very Large Databases, pages 292–299, Mexico City, 1982.
K.C. Laudon. Data Quality and Due Process in Large Interorganisational Record Systems. Communications of the ACM, 29(1):4–11, January 1986.
Migration Architect. http://www.evokesoft.com/products/ProdDSMA.html.
J.-M. Nicolas. Logic for Improving Integrity Checking in Relational Databases. Acta Informatica, 18:227–253, 1982.
V. Raman, A. Chou, and J.M. Hellerstein. Scalable Spreadsheets for Interactive Data Analysis. In K. Shim and Srikant R, editors, Proceedings of ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, Philadelphia, USA, May 1999.
V. Raman and J.M. Hellerstein. Potters Wheel: An Interactive Framework for Data Cleaning and Transformation. Working Draft. Available from: http://www.cs.berkeley.edu/rshankar/pwheel/pwheel5.pdf, 2000.
T.C. Redman. Data Quality for the Information Age. Artech House, Inc., 1996.
I. Sutherland. The course administration system: A legacy problem. Master’s thesis, Cardiff University, 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Caine, N.J., Embury, S.M. (2001). LOIS: The “Lights Out” Integrity Subsystem. In: Read, B. (eds) Advances in Databases. BNCOD 2001. Lecture Notes in Computer Science, vol 2097. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45754-2_5
Download citation
DOI: https://doi.org/10.1007/3-540-45754-2_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42265-5
Online ISBN: 978-3-540-45754-1
eBook Packages: Springer Book Archive