Abstract
A method for detecting potential violations of integrity constraints of concurrent transactions running under snapshot isolation (SI) is presented. In contrast to methods for ensuring full serializability under snapshot isolation, violations of integrity constraints may be detected by examining certain read-write interaction of only two transactions at a time. The method, called constraint-preserving snapshot isolation (CPSI), thus provides greater isolation than ordinary SI in that results do not violate any integrity constraints, while requiring substantially less overhead, and involving fewer false positives, than typical for enhancements to SI which guarantee full serializable isolation.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Adya, A., Liskov, B., O’Neil, P.E.: Generalized isolation level definitions. In: Lomet, D.B., Weikum, G. (eds.) Proceedings of the 16th International Conference on Data Engineering, San Diego, California, USA, February 28-March 3, pp. 67–78 (2000)
Berenson, H., Bernstein, P.A., Gray, J., Melton, J., O’Neil, E.J., O’Neil, P.E.: A critique of ANSI SQL isolation levels. In: Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, San Jose, California, May 22-25, pp. 1–10 (1995)
Bernstein, P., Newcomer, E.: Principles of Transaction Processing, 2nd edn. Morgan Kaufmann (2009)
Breitbart, Y., Georgakopoulos, D., Rusinkiewicz, M., Silberschatz, A.: On rigorous transaction scheduling. IEEE Trans. Software Eng. 17(9), 954–960 (1991)
Cahill, M.J., Röhm, U., Fekete, A.D.: Serializable isolation for snapshot databases. ACM Trans. Database Syst. 34(4) (2009)
Date, C.J.: A Guide to the SQL Standard. Addison-Wesley (1997); (with Hugh Darwen)
Davey, B.A., Priestly, H.A.: Introduction to Lattices and Order, 2nd edn. Cambridge University Press (2002)
Fekete, A., Liarokapis, D., O’Neil, E.J., O’Neil, P.E., Shasha, D.: Making snapshot isolation serializable. ACM Trans. Database Syst. 30(2), 492–528 (2005)
Hegner, S.J.: An order-based theory of updates for closed database views. Ann. Math. Art. Intell. 40, 63–125 (2004)
Hegner, S.J.: A model of independence and overlap for transactions on database schemata. In: Catania, B., Ivanović, M., Thalheim, B. (eds.) ADBIS 2010. LNCS, vol. 6295, pp. 204–218. Springer, Heidelberg (2010)
Hegner, S.J.: A simple model of negotiation for cooperative updates on database schema components. In: Kiyoki, Y., Tokuda, T., Heimbrger, A., Jaakkola, H., Yoshida, N. (eds.) Frontiers in Artificial Intelligence and Applications XX 2011, pp. 154–173. IOS Press (2011)
Hegner, S.J.: Invariance properties of the constant-complement view-update strategy. In: Schewe, K.-D., Thalheim, B. (eds.) SDKB 2011. LNCS, vol. 7693, pp. 118–148. Springer, Heidelberg (2013)
Hegner, S.J., Schmidt, P.: Update support for database views via cooperation. In: Ioannidis, Y., Novikov, B., Rachev, B. (eds.) ADBIS 2007. LNCS, vol. 4690, pp. 98–113. Springer, Heidelberg (2007)
Papadimitriou, C.: The Theory of Database Concurrency Control. Computer Science Press (1986)
Ports, D.R.K., Grittner, K.: Serializable snapshot isolation in PostgreSQL. Proc. VLDB Endowment 5(12), 1850–1861 (2012)
Revilak, S., O’Neil, P.E., O’Neil, E.J.: Precisely serializable snapshot isolation (PSSI). In: Proceedings of the 27th International Conference on Data Engineering, ICDE 2011, Hannover, Germany, April 11-16, pp. 482–493 (2011)
Silberschatz, A., Korth, H.F., Sudarshan, S.: Database System Concepts, 6th edn. McGraw Hill (2011)
Weikum, G., Vossen, G.: Transactional Information Systems. Morgan Kaufmann (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Hegner, S.J. (2014). Guard Independence and Constraint-Preserving Snapshot Isolation. In: Beierle, C., Meghini, C. (eds) Foundations of Information and Knowledge Systems. FoIKS 2014. Lecture Notes in Computer Science, vol 8367. Springer, Cham. https://doi.org/10.1007/978-3-319-04939-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-04939-7_11
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04938-0
Online ISBN: 978-3-319-04939-7
eBook Packages: Computer ScienceComputer Science (R0)