Formalization of Database Reverse Engineering

  • Nonyelum NdefoEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 767)


During the life cycle of an Information System, the original design of the database may be difficult to acquire. The database schema may have been continuously modified and drifted away semantically from the intended design, or perhaps no conceptual modelling method was employed at all. A conceptual schema offers a much richer description of a domain than the database schema, this makes it important for, among other reasons, the maintenance of semantic consistency of the database at runtime. Database reverse engineering involves the retrieval of domain semantics from an existing set of database schemas into a conceptual schema. Though several research works exist on creating database reverse engineering methodologies, the process in itself has never been properly and fully formalised with an emphasis on its correctness. This paper introduces the ongoing research surrounding database reverse engineering and the goal of rendering a formal reverse engineering framework. The expected formalism will be valuable to database and domain experts as a sound foundation for implementing better reverse engineering tools.


Reverse engineering Relational database Conceptual modelling Mapping Schema transformation 


  1. 1.
    Alhajj, R.: Extracting the extended entity-relationship model from a legacy relational database. Inform. Syst. 28(6), 597–618 (2003)CrossRefzbMATHGoogle Scholar
  2. 2.
    An, Y., Borgida, A., Miller, R.J., Mylopoulos, J.: A semantic approach to discovering schema mapping expressions. In: 2007 IEEE 23rd International Conference on Data Engineering, pp. 206–215, April 2007Google Scholar
  3. 3.
    Andersson, M.: Extracting an entity relationship schema from a relational database through reverse engineering. In: Loucopoulos, P. (ed.) ER 1994. LNCS, vol. 881, pp. 403–419. Springer, Heidelberg (1994). doi: 10.1007/3-540-58786-1_93 CrossRefGoogle Scholar
  4. 4.
    Astrova, I.: Reverse engineering of relational databases to ontologies. In: Bussler, C.J., Davies, J., Fensel, D., Studer, R. (eds.) ESWS 2004. LNCS, vol. 3053, pp. 327–341. Springer, Heidelberg (2004). doi: 10.1007/978-3-540-25956-5_23 CrossRefGoogle Scholar
  5. 5.
    Chiang, R.H.L., Barron, T.M.: Quality issues in database reverse engineering: an overview. In: Proceedings for Operating Research and the Management Sciences, pp. 185–189, June 1995Google Scholar
  6. 6.
    Chiang, R.H.L., Barron, T.M., Storey, V.C.: Reverse engineering of relational databases: extraction of an eer model from a relational database. Data Knowl. Eng. 12(2), 107–142 (1994)CrossRefGoogle Scholar
  7. 7.
    Hainaut, J.-L.: Introduction to database reverse engineering. LIBD Lecture Notes (2002)Google Scholar
  8. 8.
    Hainaut, J.-L.: Research in database engineering at the university of namur. ACM SIGMOD Rec. 32(4), 124–128 (2003)CrossRefGoogle Scholar
  9. 9.
    Hainaut, J.-L., Tonneau, C., Joris, M., Chandelon, M.: Schema transformation techniques for database reverse engineering. In: Proceedings of the 12th International Conference on ER Approach, pp. 353–372. Springer, Arlington-Dallas (1993)Google Scholar
  10. 10.
    Halpin, T.: Object-role modeling: principles and benefits. Int. J. Inform. Syst. Model. Des. 1(1), 33–57 (2010)CrossRefGoogle Scholar
  11. 11.
    Johannesson, P.: A method for transforming relational schemas into conceptual schemas. In: Proceedings of the 10th International Conference Data Engineering, 1994, pp. 190–201. IEEE (1994)Google Scholar
  12. 12.
    Lammari, N., Comyn-Wattiau, I., Akoka, J.: Extracting generalization hierarchies from relational databases: a reverse engineering approach. Data Knowl. Eng. 63(2), 568–589 (2007)CrossRefGoogle Scholar
  13. 13.
    Lin, L., Zhuoming, X., Ding, Y.: Owl ontology extraction from relational databases via database reverse engineering. JSW 8(11), 2749–2760 (2013)CrossRefGoogle Scholar
  14. 14.
    Lubyte, L., Tessaris, S.: Automatic extraction of ontologies wrapping relational data sources. In: Bhowmick, S.S., Küng, J., Wagner, R. (eds.) DEXA 2009. LNCS, vol. 5690, pp. 128–142. Springer, Heidelberg (2009). doi: 10.1007/978-3-642-03573-9_10 CrossRefGoogle Scholar
  15. 15.
    Markowitz, V.M., Makowsky, J.A.: Identifying extended entity-relationship object structures in relational schemas. IEEE Trans. Softw. Eng. 16(8), 777–790 (1990)CrossRefGoogle Scholar
  16. 16.
    McBrien, P., Poulovassilis, A.: Data integration by bi-directional schema transformation rules. In: Proceedings of the 19th International Conference on Data Engineering, 2003, pp. 227–238. IEEE (2003)Google Scholar
  17. 17.
    A Müller, H., Jahnke, J.H., Smith, D.B., Storey, M.-A., Tilley, S.R., Wong, K.: Reverse engineering: a roadmap. In: Proceedings of the Conference on the Future of Software Engineering, pp. 47–60. ACM (2000)Google Scholar
  18. 18.
    Petit, J.-M., Toumani, F., Kouloumdjian, J.: Relational database reverse engineering: a method based on query analysis. Int. J. Coop. Inform. Syst. 4(02n03), 287–316 (1995)Google Scholar
  19. 19.
    Premerlani, W.J., Blaha, M.R.: An approach for reverse engineering of relational databases. In: Proceedings Working Conference on Reverse Engineering, pp. 151–160, May 1993Google Scholar
  20. 20.
    Qian, X.: Correct schema transformations. In: Apers, P., Bouzeghoub, M., Gardarin, G. (eds.) EDBT 1996. LNCS, vol. 1057, pp. 114–128. Springer, Heidelberg (1996). doi: 10.1007/BFb0014146 CrossRefGoogle Scholar
  21. 21.
    Signore, O., Loffredo, M., Gregori, M., Cima, M.: Reconstruction of ER schema from database applications: a cognitive approach. In: Loucopoulos, P. (ed.) ER 1994. LNCS, vol. 881, pp. 387–402. Springer, Heidelberg (1994). doi: 10.1007/3-540-58786-1_92 CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Free University of Bozen-BolzanoBolzanoItaly

Personalised recommendations