Skip to main content

Guard Independence and Constraint-Preserving Snapshot Isolation

  • Conference paper
Foundations of Information and Knowledge Systems (FoIKS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8367))

Abstract

A method for detecting potential violations of integrity constraints of concurrent transactions running under snapshot isolation (SI) is presented. In contrast to methods for ensuring full serializability under snapshot isolation, violations of integrity constraints may be detected by examining certain read-write interaction of only two transactions at a time. The method, called constraint-preserving snapshot isolation (CPSI), thus provides greater isolation than ordinary SI in that results do not violate any integrity constraints, while requiring substantially less overhead, and involving fewer false positives, than typical for enhancements to SI which guarantee full serializable isolation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adya, A., Liskov, B., O’Neil, P.E.: Generalized isolation level definitions. In: Lomet, D.B., Weikum, G. (eds.) Proceedings of the 16th International Conference on Data Engineering, San Diego, California, USA, February 28-March 3, pp. 67–78 (2000)

    Google Scholar 

  2. Berenson, H., Bernstein, P.A., Gray, J., Melton, J., O’Neil, E.J., O’Neil, P.E.: A critique of ANSI SQL isolation levels. In: Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, San Jose, California, May 22-25, pp. 1–10 (1995)

    Google Scholar 

  3. Bernstein, P., Newcomer, E.: Principles of Transaction Processing, 2nd edn. Morgan Kaufmann (2009)

    Google Scholar 

  4. Breitbart, Y., Georgakopoulos, D., Rusinkiewicz, M., Silberschatz, A.: On rigorous transaction scheduling. IEEE Trans. Software Eng. 17(9), 954–960 (1991)

    Article  Google Scholar 

  5. Cahill, M.J., Röhm, U., Fekete, A.D.: Serializable isolation for snapshot databases. ACM Trans. Database Syst. 34(4) (2009)

    Google Scholar 

  6. Date, C.J.: A Guide to the SQL Standard. Addison-Wesley (1997); (with Hugh Darwen)

    Google Scholar 

  7. Davey, B.A., Priestly, H.A.: Introduction to Lattices and Order, 2nd edn. Cambridge University Press (2002)

    Google Scholar 

  8. Fekete, A., Liarokapis, D., O’Neil, E.J., O’Neil, P.E., Shasha, D.: Making snapshot isolation serializable. ACM Trans. Database Syst. 30(2), 492–528 (2005)

    Article  Google Scholar 

  9. Hegner, S.J.: An order-based theory of updates for closed database views. Ann. Math. Art. Intell. 40, 63–125 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  10. Hegner, S.J.: A model of independence and overlap for transactions on database schemata. In: Catania, B., Ivanović, M., Thalheim, B. (eds.) ADBIS 2010. LNCS, vol. 6295, pp. 204–218. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  11. Hegner, S.J.: A simple model of negotiation for cooperative updates on database schema components. In: Kiyoki, Y., Tokuda, T., Heimbrger, A., Jaakkola, H., Yoshida, N. (eds.) Frontiers in Artificial Intelligence and Applications XX 2011, pp. 154–173. IOS Press (2011)

    Google Scholar 

  12. Hegner, S.J.: Invariance properties of the constant-complement view-update strategy. In: Schewe, K.-D., Thalheim, B. (eds.) SDKB 2011. LNCS, vol. 7693, pp. 118–148. Springer, Heidelberg (2013)

    Google Scholar 

  13. Hegner, S.J., Schmidt, P.: Update support for database views via cooperation. In: Ioannidis, Y., Novikov, B., Rachev, B. (eds.) ADBIS 2007. LNCS, vol. 4690, pp. 98–113. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  14. Papadimitriou, C.: The Theory of Database Concurrency Control. Computer Science Press (1986)

    Google Scholar 

  15. Ports, D.R.K., Grittner, K.: Serializable snapshot isolation in PostgreSQL. Proc. VLDB Endowment 5(12), 1850–1861 (2012)

    Google Scholar 

  16. Revilak, S., O’Neil, P.E., O’Neil, E.J.: Precisely serializable snapshot isolation (PSSI). In: Proceedings of the 27th International Conference on Data Engineering, ICDE 2011, Hannover, Germany, April 11-16, pp. 482–493 (2011)

    Google Scholar 

  17. Silberschatz, A., Korth, H.F., Sudarshan, S.: Database System Concepts, 6th edn. McGraw Hill (2011)

    Google Scholar 

  18. Weikum, G., Vossen, G.: Transactional Information Systems. Morgan Kaufmann (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Hegner, S.J. (2014). Guard Independence and Constraint-Preserving Snapshot Isolation. In: Beierle, C., Meghini, C. (eds) Foundations of Information and Knowledge Systems. FoIKS 2014. Lecture Notes in Computer Science, vol 8367. Springer, Cham. https://doi.org/10.1007/978-3-319-04939-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04939-7_11

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04938-0

  • Online ISBN: 978-3-319-04939-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics