Please use this identifier to cite or link to this item:
Title: Detection and recovery techniques for database corruption
Keywords: Database Management Systems
Software Fault Tolerance
Storage Management
System Recovery
Issue Date: 2003
Publisher: IEEE
Citation: IEEE Transactions on Knowledge and Data Engineering 15(5), 1120-1136
Abstract: Increasingly, for extensibility and performance, special purpose application code is being integrated with database system code. Such application code has direct access to database system buffers, and as a result, the danger of data being corrupted due to inadvertent application writes is increased. Previously proposed hardware techniques to protect from corruption require system calls, and their performance depends on details of the hardware architecture. We investigate an alternative approach which uses codewords associated with regions of data to detect corruption and to prevent corrupted data from being used by subsequent transactions. We develop several such techniques which vary in the level of protection, space overhead, performance, and impact on concurrency. These techniques are implemented in the Dali main-memory storage manager, and the performance impact of each on normal processing is evaluated. Novel techniques are developed to recover when a transaction has read corrupted data caused by a bad write and gone on to write other data in the database. These techniques use limited and relatively low-cost logging of transaction reads to trace the corruption and may also prove useful when resolving problems caused by incorrect data entry and other logical errors.
URI: 10.1109/TKDE.2003.1232268
ISSN: 1041-4347
Appears in Collections:Article

Files in This Item:
File Description SizeFormat 
27605.pdf1.28 MBAdobe PDFThumbnail

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.