Reenactment for Read-Committed Snapshot Isolation

Provenance for transactional updates is critical for many applications such as auditing and debugging of transactions. Recently, we have introduced MV-semirings, an extension of the semiring provenance model that supports updates and transactions. Furthermore, we have proposed reenactment, a declarative form of replay with provenance capture, as an efficient and non-invasive method for computing this type of provenance. However, this approach is limited to the snapshot isolation (SI) concurrency control protocol while many real world applications apply the read committed version of snapshot isolation (RC-SI) to improve performance at the cost of consistency. We present non trivial extensions of the model and reenactment approach to be able to compute provenance of RC-SI transactions efficiently. In addition, we develop techniques for applying reenactment across multiple RC-SI transactions. Our experiments demonstrate that our implementation in the GProM system supports efficient re-construction and querying of provenance.

[1]  Daniel Deutch,et al.  Provenance for aggregate queries , 2011, PODS.

[2]  V. Vianu,et al.  Edinburgh Why and Where: A Characterization of Data Provenance , 2017 .

[3]  Todd J. Green,et al.  LogicBlox, Platform and Language: A Tutorial , 2012, Datalog.

[4]  Lois M. L. Delcambre,et al.  User Trust and Judgments in a Curated Database with Explicit Provenance , 2013, In Search of Elegance in the Theory and Practice of Computation.

[5]  Jakub Závodný,et al.  On Factorisation of Provenance Polynomials , 2011, TaPP.

[6]  Feifei Li,et al.  Improving Transaction-Time DBMS Performance and Functionality , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[7]  Dieter Gawlick,et al.  A Generic Provenance Middleware for Database Queries, Updates, and Transactions , 2014 .

[8]  Antonella Poggi,et al.  On database query languages for K-relations , 2010, J. Appl. Log..

[9]  Daniel Deutch,et al.  On provenance minimization , 2012, TODS.

[10]  Egor V. Kostylev,et al.  Combining dependent annotations for relational algebra , 2012, ICDT '12.

[11]  Jim Gray,et al.  A critique of ANSI SQL isolation levels , 1995, SIGMOD '95.

[12]  Wang Chiew Tan,et al.  An annotation management system for relational databases , 2004, The VLDB Journal.

[13]  James Cheney,et al.  On the expressiveness of implicit provenance in query and update languages , 2008, TODS.

[14]  James Cheney,et al.  Recording Provenance for SQL Queries and Updates , 2007, IEEE Data Eng. Bull..

[15]  Daniel Deutch,et al.  Putting Lipstick on Pig: Enabling Database-style Workflow Provenance , 2011, Proc. VLDB Endow..

[16]  Val Tannen,et al.  Provenance semirings , 2007, PODS.

[17]  Venkatesh Radhakrishnan,et al.  Formal Foundations of Reenactment and Transaction Provenance , 2016 .

[18]  Gustavo Alonso,et al.  Using SQL for Efficient Generation and Querying of Provenance Information , 2013, In Search of Elegance in the Theory and Practice of Computation.

[19]  Grigoris Karvounarakis,et al.  Semiring-annotated data: queries and provenance? , 2012, SGMD.

[20]  Bertram Ludäscher,et al.  First-Order Provenance Games , 2013, In Search of Elegance in the Theory and Practice of Computation.

[21]  Jennifer Widom,et al.  Tracing the lineage of view data in a warehousing environment , 2000, TODS.