Title: Checking the efficiency of integrity tests in distributed and parallel database
Authors: Feras Hanandeh; Emad E. Abdallah; Sahar Idwan; Izzat Alsmadi
Addresses: Department of Computer Information Systems, Faculty of Prince Al-Hussein Bin Abdallah II, for Information Technology, Hashemite University, P.O. Box 150459, Zarqa 13115, Jordan. ' Department of Computer Information Systems, Faculty of Prince Al-Hussein Bin Abdallah II, for Information Technology, Hashemite University, P.O. Box 150459, Zarqa 13115, Jordan. ' Department of Computer Science and Applications, Faculty of Prince Al-Hussein Bin Abdallah II, for Information Technology, Hashemite University, P.O. Box 150459, Zarqa 13115, Jordan. ' Department of Computer Information Systems, IT Faculty, Yarmouk University, University Street, P.O. Box 566, Irbid 21163, Jordan
Abstract: With the increased use of the applications that deal with massive collections of data, integrity checking became a critical problem. Efficient checking could be achieved by deriving a simplified form of the integrity constraints against the new database state before the update operation is performed. Most of the research projects in this area are concentrated on deriving sufficient integrity tests for distributed databases. However, no attention has been given to validating the appropriateness of these integrity tests. In this paper, we provide a complete solution for checking constraints in the distributed database system. The proposed technique is not limited to generate sufficient and complete integrity tests but it also selects the suitable test from several alternative tests. Experimental results showed how the complete tests can significantly improve the performance of the constraint checking mechanisms with respect to the amount of data transferred across the network.
Keywords: distributed databases; integrity maintenance; integrity constraints; integrity tests; parallel databases; integrity checking; constraint checking.
DOI: 10.1504/IJBIS.2012.048892
International Journal of Business Information Systems, 2012 Vol.11 No.2, pp.235 - 252
Published online: 16 Aug 2014 *
Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article