A principal problem with integrity constraints' use for monitoring dynamically changing database integrity is evaluation cost. This cost associated with performance of checking mechanisms is the main quantitative measure which must be supervised carefully. Based on literature, evaluating an integrity constraint cost includes these main components: (i) data amount accessed; (ii) data amount transferred across network; and (iii) number of sites involved. In distributed databases, where many networked sites are involved, not only amount of data accessed must be minimized but also amount of data transferred across network and number of sites involved. In [Ibrahim H, Gray WA, Fiddian NJ. SICSDD: Techniques and implementation. In Proceedings of Constraint Databases and Applications, Second International Workshop on Constraint Database Systems (CDB'97), Delphi, Greece, January 1997, pp 187–207], we introduced an integrity constraint subsystem for a relational distributed database. The subsystem consists of several techniques necessary for efficient constraint checking, particularly in a distributed environment where data distribution is transparent to application domain. Here, we show how these techniques effectively reduce constraint checking cost in such a distributed environment. This is done by analyzing and comparing generated simplified forms to respective initial constraints respecting amount of data to be accessed, amount of data transferred across network, and number of sites involved during evaluation of constraints or simplified forms. Generally, our strategy reduces data amount needing to be accessed since only fragments of relations subject to update are evaluated. Data amount transferred across network and number of sites that are involved are minimized by evaluating simplified forms at target site, i.e., site where update is performed. © 2001 John Wiley & Sons, Inc.
[1]
Hector Garcia-Molina,et al.
The Demarcation Protocol: A Technique for Maintaining Linear Arithmetic Constraints in Distributed Database Systems
,
1992,
EDBT.
[2]
Lawrence J. Henschen,et al.
Maintaining state constraints in relational databases: a proof theoretic basis
,
1989,
JACM.
[3]
Jennifer Widom,et al.
Local verification of global integrity constraints in distributed databases
,
1993,
SIGMOD '93.
[4]
Xiaolei Qian.
An effective method for integrity constraint simplification
,
1988,
Proceedings. Fourth International Conference on Data Engineering.
[5]
Tomasz Imielinski,et al.
Integrity checking for multiple updates
,
1985,
SIGMOD '85.
[6]
Patrick Valduriez,et al.
Principles of Distributed Database Systems
,
1990
.
[7]
Paul W. P. J. Grefen.
Combining Theory and Practice in Integrity Control: A Declarative Approach to the Specification of a Transaction Modification Subsystem
,
1993,
VLDB.
[8]
Songchun Moon,et al.
Database systems for advanced applications '93 : proceedings of the Third International Symposium on Database Systems for Advanced Applications, Taejon, Korea, April 6-8, 1993
,
1993
.