Integrity Dangers in Certification-Based Replication Protocols

  • Authors:
  • M. I. Ruiz-Fuertes;F. D. Muñoz-Escoí;H. Decker;J. E. Armendáriz-Iñigo;J. R. Mendívil

  • Affiliations:
  • Instituto Tecnológico de Informática, Universidad Politécnica de Valencia, Valencia, Spain 46022;Instituto Tecnológico de Informática, Universidad Politécnica de Valencia, Valencia, Spain 46022;Instituto Tecnológico de Informática, Universidad Politécnica de Valencia, Valencia, Spain 46022;Depto. de Ing. Matemática e Informática, Universidad Pública de Navarra, Pamplona, Spain 31006;Depto. de Ing. Matemática e Informática, Universidad Pública de Navarra, Pamplona, Spain 31006

  • Venue:
  • OTM '08 Proceedings of the OTM Confederated International Workshops and Posters on On the Move to Meaningful Internet Systems: 2008 Workshops: ADI, AWeSoMe, COMBEK, EI2N, IWSSA, MONET, OnToContent + QSI, ORM, PerSys, RDDS, SEMELS, and SWWS
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Database replication protocols check read-write and/or write-write conflicts. If there are none, protocols propagate transactions to the database, assuming they will eventually commit. But commitment may fail due to integrity constraints violations. Also, the read actions of integrity checking may give raise to new conflicts. Thus, some more care must be taken if, in addition to the consistency of transactions and replicas, also the consistency of integrity constraints is to be maintained. In this paper, we investigate how certification-based replication protocols can be adapted to correctly and transparently deal with the built-in integrity support provided by the underlying DBMS. Also, we experimentally demonstrate the negative effects that an incorrect management of integrity constraints causes in a database replication distributed system.