Integrity Checking for Uncertain Data
نویسندگان
چکیده
The uncertainty associated to stored information can be put in direct correspondence to the extent to which these data violate conditions expressed as semantic integrity constraints. Thus, imposing and checking such constraints provides a better control over uncertain data. We present and discuss a condition which ensures the violation tolerance of methods for integrity checking. Usually, such methods are supposed to work correctly only if all constraints are satisfied before each update. Applied to express and check conditions about uncertain data, violation tolerance means that stored data the uncertainty of which violates integrity can be tolerated while updates can be safely checked for introducing violations of constraints about uncertainty. We also discuss the soundness and completeness of violation-tolerant integrity checking and assert it for several methods.
منابع مشابه
Remote Data Integrity Protection Enhancement in Cloud Storage
Cloud computing is the delivery of computing services over the Internet. Protecting all users’ data in the cloud is highly challenging. Since all our data stored in third party’s computer, security concerns arise. The main focus in cloud storage is data security and integrity. This paper works on securing cloud data from corruptions, checking for its integrity and recovering data during failure...
متن کاملA Model for Checking the Integrity Constraints of Mobile Databases
In this paper we propose a model for checking integrity constraints of mobile databases called Three-Level (3-L) model, wherein the process of constraint checking to maintain the consistent state of mobile databases is realized at three different levels. Sufficient and complete tests proposed in the previous works together with the idea of caching relevant data items for checking the integrity ...
متن کاملSemantic Integrity Dependencies and Delayed Integrity Checking
This paper’s approach to semantic integrity management is that in order to maintain an integrity constraint, some variables of the constraint may be operated on while others may not This defines integrity dependencies between vsiables. Various examples of integrity dependencies and their meanings are discussed. In addition to corresponding to real world practice, integrity dependencies can be u...
متن کاملA Framework for Localizing Integrity Constraints Checking in Distributed Database
The validity, accuracy, and semantic of data are significant requirements in modern database applications. Semantic data in database is normally represented under the form of integrity constraints. Integrity constraints are properties, typically depending on the nature of the application domain, which must always be satisfied for the data to be considered consistent. Maintaining obedience of da...
متن کاملIdentity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.dvi
More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity check...
متن کامل