芥菜什么时候种| 宫颈锥切术是什么意思| 咳黄痰是什么原因| 上当是什么意思| 奇花异草的异什么意思| 赊事勿取是什么意思| 冯巩什么军衔| 夏枯草有什么功效| 手上的三条线分别代表什么| 经常饿肚子会导致什么后果| 04属什么生肖| 黄金是什么药材| 回不到我们的从前是什么歌| 凤毛麟角什么意思| 6月2日是什么星座| 刚怀孕要吃些什么好| 11月6日什么星座| 毛泽东什么时候逝世| 粉色裤子配什么上衣好看| 人得了猫藓用什么药膏| 早上打碎碗是什么兆头| 流鼻血吃什么药效果好| 邓绥和阴丽华什么关系| 巨蟹座男和什么座最配对| 什么的交流| 5月20日什么星座| 喝牛奶就拉肚子是什么原因| 吃什么食物对肠胃好| 干贝是什么| 心有余而力不足什么意思| 一国两制什么时候提出的| 夏天肚子疼是什么原因| 腰酸是什么原因引起的| 没意思是什么意思| 香奶奶是什么牌子| 收尿干什么用的| 钯金是什么金| 嗓子疼咳嗽是什么原因| 眉毛旁边长痘痘是什么原因| 栉风沐雨是什么意思| 风林火山是什么意思| 嘴唇颜色深是什么原因| 收留是什么意思| experiment是什么意思| 马骝是什么意思| 结肠炎有什么症状| 腰胀是什么原因引起的| 2023年属兔的是什么命| 血晕症是什么病| 她将是你的新娘是什么歌| 慢性萎缩性胃炎伴糜烂吃什么药| vj是什么意思| 代表友谊的花是什么花| 太行山在什么地方| 脖子为什么会痒| 养肝护肝吃什么好| 湿热体质适合喝什么茶| 淋巴滤泡增生吃什么药| 什么眉什么眼| 脸上白了一小块是什么原因| laura是什么意思| 孕妇痔疮犯了能用什么药膏| 什么是otc| 御守是什么意思| 痛包是什么| 脸上发麻是什么原因| 中国的国花是什么| 干预是什么意思| 天降横财什么意思| 做梦梦见搬家是什么意思| 小确幸是什么意思| 肾阴虚是什么原因造成的| 唇炎挂什么科| 漂流是什么| 阴茎是什么| 3月是什么星座的| 孕期同房需要注意什么| 鸽子咳嗽吃什么药最好| 什么其不什么| 梦见朋友怀孕了是什么意思| 乙肝没有抗体是什么意思| 腋下异味看什么科| 999足金是什么意思| 脊灰疫苗是预防什么的| 质子泵抑制剂是什么药| 香蕉皮擦脸有什么作用与功效| 哈喽是什么意思| 锦衣卫是干什么的| 游车河什么意思| 十二生肖排第一是什么生肖| 神仙是什么生肖| 餐补是什么意思| 吃什么补充雌激素| 舟山念什么| 牙齿里面疼是什么原因| 风寒感冒用什么药| 蒙羞是什么意思| 什么是竖式计算| 独生子女证办理需要什么材料| 下午5点到7点是什么时辰| 1954年出生属什么| 骆驼是什么牌子| 四月27日是什么星座| 什么情况下吃速效救心丸| 烀是什么意思| 存是什么生肖| 候和侯有什么区别| 汗蒸有什么好处| 礼金是什么意思| 人大是干什么的| hpv11阳性是什么意思| 吃瓜群众是什么意思| 聪明绝顶是什么意思| 肌层回声欠均匀是什么意思| 肛门痒挂什么科| 5月17日是什么星座| 梦见豹子是什么预兆| 海市蜃楼为什么可怕| 胎儿胆囊偏小有什么影响| 退烧吃什么药好| 做梦梦到鬼是什么意思| 清热燥湿是什么意思| 轩尼诗是什么酒| 吃辣椒过敏是什么症状| 坏垣是什么意思| 浸润性癌是什么意思| 眉目传情什么意思| 流弹是什么意思| 产奶速度慢是什么原因| 拉肚子喝什么药| 甲状腺低回声什么意思| 旅行是什么意思| 阴枣是什么| 梦见土豆是什么意思| 五花八门什么意思| 一什么十什么的成语| 孕晚期缺铁对胎儿有什么影响| 统招生是什么意思| 汤姆猫是什么品种| 晕车药什么时候吃最好| 大殓是什么意思| 中校是什么级别| 可爱是什么意思| 且慢是什么意思| 草是什么意思| 放屁是什么意思| 骨膜炎是什么症状| 什么病需要透析| 甄是什么意思| 成都立冬吃什么| 什么是副乳| 劫煞是什么意思| 幼儿园报名需要什么资料| 桃花什么生肖| 头晕是什么感觉| 左耳疼痛什么原因引起| 阿司匹林治什么病| 中耳炎是什么| 健脾益气是什么意思| 念珠菌感染用什么药| 胎儿肾盂分离是什么意思| 3月14号是什么星座| 87年是什么年| 头晕耳鸣吃什么药| 西米是什么米| hi是什么酸| 怀孕后乳房有什么变化| 说话快的人什么性格| 甲流是什么病| 痔核是什么| 皮疹用什么药| 立春之后是什么节气| 气管炎的症状吃什么药好得快| 太平鸟属于什么档次| 跌倒摔伤用什么药| 比利时用什么货币| 男性尿道痒吃什么药| 前列腺炎吃什么药好| 男性手心热是什么原因| 9月21号是什么日子| 梦见种花生是什么意思| 女龙配什么属相最好| 岚字五行属什么| 小猫的尾巴有什么作用| aki是什么意思| 臭屁多是什么原因| 病毒性感冒吃什么药| 金骏眉是什么茶类| 宝宝手脚冰凉是什么原因| 异类是什么意思| 经常感冒发烧是什么原因| emoji什么意思| 异常是什么意思| 调理内分泌失调吃什么药效果好| 难过美人关是什么生肖| 痛风用什么药治疗最好| 67岁属什么生肖| 武夷岩茶是什么茶| 小孩感冒吃什么药| 中午吃什么不会胖| 便秘是什么原因引起的| 棠字五行属什么| 股长是什么职位| 早起眼皮肿是什么原因引起的| 母的第三笔是什么| 人肉什么意思| 硫酸镁注射有什么作用| 袁字五行属什么| 有机会是什么意思| 小白和兽神什么关系| 深柜是什么意思| 薄荷泡水喝有什么功效| 盆腔炎用什么药最好| 胎儿双顶径偏大是什么原因| 肺纤维化是什么症状| 戊肝是什么病| 左上腹是什么器官| 黄子韬爸爸是干什么的| pw是什么| 淋巴细胞百分比高是什么意思| 上课什么坐姿可以瘦腿| 石敢当是什么神| 吃燕窝有什么好处| 苏联是什么国家| 胎膜是什么| leg是什么意思| 月经不调是什么意思| 孩子拉肚子吃什么药| 骏五行属什么| 吃什么降肝火| 左什么右什么| 为什么脸突然肿了| 女生取什么名字好听| 为什么总是睡不着| 补肾壮阳吃什么| 紫字五行属什么| 生殖感染用什么消炎药效果好| 吃多种维生素有什么好处和坏处| 熊猫为什么吃竹子| 什么油最健康| 反驳是什么意思| 便溏是什么原因引起的| 乳腺增生结节吃什么药效果好| 戒烟吃什么药| 什么不可| 乳酸高是什么原因| zeesea是什么牌子| 一直咳嗽不好是什么原因| 营养科都检查什么项目| 什么情况下能吃脑络通| 叶酸买什么牌子的好| 突然暴瘦是什么原因| 离异什么意思| 渗析是什么意思| penguins是什么意思| 长鸡眼是什么原因| 西铁城是什么档次的表| 什么原因引起耳鸣| 构造是什么意思| 内分泌失调吃什么调理| 耳鸣吃什么药| 财大气粗是什么意思| 口腔科主要看什么| 碟中谍是什么意思| 百度Jump to content

“龙江风冰雪情”2018冰雪年会举行

From Wikipedia, the free encyclopedia
(Redirected from Database integrity)
百度 要研究精准扶贫政策,提高创新扶贫方式和实效,明确扶贫捐赠使用范围和相关标准,借鉴同业扶贫好的经验和做法,不断提升交行扶贫工作水平。

Data integrity is the maintenance of, and the assurance of, data accuracy and consistency over its entire life-cycle.[1] It is a critical aspect to the design, implementation, and usage of any system that stores, processes, or retrieves data. The term is broad in scope and may have widely different meanings depending on the specific context even under the same general umbrella of computing. It is at times used as a proxy term for data quality,[2] while data validation is a prerequisite for data integrity.[3]

Definition

[edit]

Data integrity is the opposite of data corruption.[4] The overall intent of any data integrity technique is the same: ensure data is recorded exactly as intended (such as a database correctly rejecting mutually exclusive possibilities). Moreover, upon later retrieval, ensure the data is the same as when it was originally recorded. In short, data integrity aims to prevent unintentional changes to information. Data integrity is not to be confused with data security, the discipline of protecting data from unauthorized parties.

Any unintended changes to data as the result of a storage, retrieval or processing operation, including malicious intent, unexpected hardware failure, and human error, is failure of data integrity. If the changes are the result of unauthorized access, it may also be a failure of data security. Depending on the data involved this could manifest itself as benign as a single pixel in an image appearing a different color than was originally recorded, to the loss of vacation pictures or a business-critical database, to even catastrophic loss of human life in a life-critical system.

Integrity types

[edit]

Physical integrity

[edit]

Physical integrity deals with challenges which are associated with correctly storing and fetching the data itself. Challenges with physical integrity may include electromechanical faults, design flaws, material fatigue, corrosion, power outages, natural disasters, and other special environmental hazards such as ionizing radiation, extreme temperatures, pressures and g-forces. Ensuring physical integrity includes methods such as redundant hardware, an uninterruptible power supply, certain types of RAID arrays, radiation hardened chips, error-correcting memory, use of a clustered file system, using file systems that employ block level checksums such as ZFS, storage arrays that compute parity calculations such as exclusive or or use a cryptographic hash function and even having a watchdog timer on critical subsystems.

Physical integrity often makes extensive use of error detecting algorithms known as error-correcting codes. Human-induced data integrity errors are often detected through the use of simpler checks and algorithms, such as the Damm algorithm or Luhn algorithm. These are used to maintain data integrity after manual transcription from one computer system to another by a human intermediary (e.g. credit card or bank routing numbers). Computer-induced transcription errors can be detected through hash functions.

In production systems, these techniques are used together to ensure various degrees of data integrity. For example, a computer file system may be configured on a fault-tolerant RAID array, but might not provide block-level checksums to detect and prevent silent data corruption. As another example, a database management system might be compliant with the ACID properties, but the RAID controller or hard disk drive's internal write cache might not be.

Logical integrity

[edit]

This type of integrity is concerned with the correctness or rationality of a piece of data, given a particular context. This includes topics such as referential integrity and entity integrity in a relational database or correctly ignoring impossible sensor data in robotic systems. These concerns involve ensuring that the data "makes sense" given its environment. Challenges include software bugs, design flaws, and human errors. Common methods of ensuring logical integrity include things such as check constraints, foreign key constraints, program assertions, and other run-time sanity checks.

Physical and logical integrity often share many challenges such as human errors and design flaws, and both must appropriately deal with concurrent requests to record and retrieve data, the latter of which is entirely a subject on its own.

If a data sector only has a logical error, it can be reused by overwriting it with new data. In case of a physical error, the affected data sector is permanently unusable.

Databases

[edit]

Data integrity contains guidelines for data retention, specifying or guaranteeing the length of time data can be retained in a particular database (typically a relational database). To achieve data integrity, these rules are consistently and routinely applied to all data entering the system, and any relaxation of enforcement could cause errors in the data. Implementing checks on the data as close as possible to the source of input (such as human data entry), causes less erroneous data to enter the system. Strict enforcement of data integrity rules results in lower error rates, and time saved troubleshooting and tracing erroneous data and the errors it causes to algorithms.

Data integrity also includes rules defining the relations a piece of data can have to other pieces of data, such as a Customer record being allowed to link to purchased Products, but not to unrelated data such as Corporate Assets. Data integrity often includes checks and correction for invalid data, based on a fixed schema or a predefined set of rules. An example being textual data entered where a date-time value is required. Rules for data derivation are also applicable, specifying how a data value is derived based on algorithm, contributors and conditions. It also specifies the conditions on how the data value could be re-derived.

Types of integrity constraints

[edit]

Data integrity is normally enforced in a database system by a series of integrity constraints or rules. Three types of integrity constraints are an inherent part of the relational data model: entity integrity, referential integrity and domain integrity.

  • Entity integrity concerns the concept of a primary key. Entity integrity is an integrity rule which states that every table must have a primary key and that the column or columns chosen to be the primary key should be unique and not null.
  • Referential integrity concerns the concept of a foreign key. The referential integrity rule states that any foreign-key value can only be in one of two states. The usual state of affairs is that the foreign-key value refers to a primary key value of some table in the database. Occasionally, and this will depend on the rules of the data owner, a foreign-key value can be null. In this case, we are explicitly saying that either there is no relationship between the objects represented in the database or that this relationship is unknown.
  • Domain integrity specifies that all columns in a relational database must be declared upon a defined domain. The primary unit of data in the relational data model is the data item. Such data items are said to be non-decomposable or atomic. A domain is a set of values of the same type. Domains are therefore pools of values from which actual values appearing in the columns of a table are drawn.
  • User-defined integrity refers to a set of rules specified by a user, which do not belong to the entity, domain and referential integrity categories.

If a database supports these features, it is the responsibility of the database to ensure data integrity as well as the consistency model for the data storage and retrieval. If a database does not support these features, it is the responsibility of the applications to ensure data integrity while the database supports the consistency model for the data storage and retrieval.

Having a single, well-controlled, and well-defined data-integrity system increases:

  • stability (one centralized system performs all data integrity operations)
  • performance (all data integrity operations are performed in the same tier as the consistency model)
  • re-usability (all applications benefit from a single centralized data integrity system)
  • maintainability (one centralized system for all data integrity administration).

Modern databases support these features (see Comparison of relational database management systems), and it has become the de facto responsibility of the database to ensure data integrity. Companies, and indeed many database systems, offer products and services to migrate legacy systems to modern databases.

Examples

[edit]

An example of a data-integrity mechanism is the parent-and-child relationship of related records. If a parent record owns one or more related child records all of the referential integrity processes are handled by the database itself, which automatically ensures the accuracy and integrity of the data so that no child record can exist without a parent (also called being orphaned) and that no parent loses their child records. It also ensures that no parent record can be deleted while the parent record owns any child records. All of this is handled at the database level and does not require coding integrity checks into each application.

File systems

[edit]

Various research results show that neither widespread filesystems (including UFS, Ext, XFS, JFS and NTFS) nor hardware RAID solutions provide sufficient protection against data integrity problems.[5][6][7][8][9]

Some filesystems (including Btrfs and ZFS) provide internal data and metadata checksumming that is used for detecting silent data corruption and improving data integrity. If a corruption is detected that way and internal RAID mechanisms provided by those filesystems are also used, such filesystems can additionally reconstruct corrupted data in a transparent way.[10] This approach allows improved data integrity protection covering the entire data paths, which is usually known as end-to-end data protection.[11]

Data integrity as applied to various industries

[edit]
  • The U.S. Food and Drug Administration has created draft guidance on data integrity for the pharmaceutical manufacturers required to adhere to U.S. Code of Federal Regulations 21 CFR Parts 210–212.[12] Outside the U.S., similar data integrity guidance has been issued by the United Kingdom (2015), Switzerland (2016), and Australia (2017).[13]
  • Various standards for the manufacture of medical devices address data integrity either directly or indirectly, including ISO 13485, ISO 14155, and ISO 5840.[14]
  • In early 2017, the Financial Industry Regulatory Authority (FINRA), noting data integrity problems with automated trading and money movement surveillance systems, stated it would make "the development of a data integrity program to monitor the accuracy of the submitted data" a priority.[15] In early 2018, FINRA said it would expand its approach on data integrity to firms' "technology change management policies and procedures" and Treasury securities reviews.[16]
  • Other sectors such as mining[17] and product manufacturing[18] are increasingly focusing on the importance of data integrity in associated automation and production monitoring assets.
  • Cloud storage providers have long faced significant challenges ensuring the integrity or provenance of customer data and tracking violations.[19][20][21]

See also

[edit]

References

[edit]
  1. ^ Boritz, J. "IS Practitioners' Views on Core Concepts of Information Integrity". International Journal of Accounting Information Systems. Elsevier. Archived from the original on 5 October 2011. Retrieved 12 August 2011.
  2. ^ What is Data Integrity? Learn How to Ensure Database Data Integrity via Checks, Tests, & Best Practices
  3. ^ What is Data Integrity? Data Protection 101
  4. ^ From the book: Uberveillance and the Social Implications of Microchip Implants: Emerging Page 40
  5. ^ Vijayan Prabhakaran (2006). "IRON FILE SYSTEMS" (PDF). Doctor of Philosophy in Computer Sciences. University of Wisconsin-Madison. Archived (PDF) from the original on 2025-08-06. Retrieved 9 June 2012.
  6. ^ "Parity Lost and Parity Regained".
  7. ^ "An Analysis of Data Corruption in the Storage Stack" (PDF). Archived (PDF) from the original on 2025-08-06.
  8. ^ "Impact of Disk Corruption on Open-Source DBMS" (PDF). Archived (PDF) from the original on 2025-08-06.
  9. ^ "Baarf.com". Baarf.com. Retrieved 4 November 2011.
  10. ^ Bierman, Margaret; Grimmer, Lenz (August 2012). "How I Use the Advanced Capabilities of Btrfs". Retrieved 2025-08-06.
  11. ^ Yupu Zhang; Abhishek Rajimwale; Andrea Arpaci-Dusseau; Remzi H. Arpaci-Dusseau (2010). "End-to-end data integrity for file systems: a ZFS case study" (PDF). USENIX Conference on File and Storage Technologies. CiteSeerX 10.1.1.154.3979. S2CID 5722163. Wikidata Q111972797. Retrieved 2025-08-06.
  12. ^ "Data Integrity and Compliance with CGMP: Guidance for Industry" (PDF). U.S. Food and Drug Administration. April 2016. Archived from the original (PDF) on 2025-08-06. Retrieved 20 January 2018.
  13. ^ Davidson, J. (18 July 2017). "Data Integrity Guidance Around the World". Contract Pharma. Rodman Media. Retrieved 20 January 2018.
  14. ^ Scannel, P. (12 May 2015). "Data Integrity: A perspective from the medical device regulatory and standards framework" (PDF). Data Integrity Seminar. Parenteral Drug Association. pp. 10–57. Archived from the original (PDF) on 20 January 2018. Retrieved 20 January 2018.
  15. ^ Cook, R. (4 January 2017). "2017 Regulatory and Examination Priorities Letter". Financial Industry Regulatory Authority. Retrieved 20 January 2018.
  16. ^ Cook, R. (8 January 2018). "2018 Regulatory and Examination Priorities Letter". Financial Industry Regulatory Authority. Retrieved 20 January 2018.
  17. ^ "Data Integrity: Enabling Effective Decisions in Mining Operations" (PDF). Accenture. 2016. Archived (PDF) from the original on 2025-08-06. Retrieved 20 January 2018.
  18. ^ "Industry 4.0 and Cyber-Physical Systems Raise the Data Integrity Imperative". Nymi Blog. Nymi, Inc. 24 October 2017. Archived from the original on January 20, 2018. Retrieved 20 January 2018.
  19. ^ Priyadharshini, B.; Parvathi, P. (2012). "Data integrity in cloud storage". Proceedings from the 2012 International Conference on Advances in Engineering, Science and Management. ISBN 9788190904223.
  20. ^ Zafar, F.; Khan, A.; Malik, S.U.R.; et al. (2017). "A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends". Computers & Security. 65 (3): 29–49. doi:10.1016/j.cose.2016.10.006.
  21. ^ Imran, M.; Hlavacs, H.; Haq, I.U.I.; et al. (2017). "Provenance based data integrity checking and verification in cloud environments". PLOS ONE. 12 (5): e0177576. Bibcode:2017PLoSO..1277576I. doi:10.1371/journal.pone.0177576. PMC 5435237. PMID 28545151.
女性长期缺维d会带来什么病 胃镜后吃什么 鼻鼽病是什么意思 什么是行政拘留 紫色芒果是什么品种
王八吃什么 鼓风机是干什么用的 扁桃体结石有什么危害 湿疹为什么晚上特别痒 附睾炎吃什么药最有效
fsa是什么意思 水杯什么材质的好 宫颈管短是什么意思 儿童语言迟缓挂什么科 呆板是什么意思
若无其事的若是什么意思 吃什么蔬菜能降血脂 卫冕冠军是什么意思 吃什么药升血小板最快 梦见摘桑葚是什么意思
回南天是什么意思zsyouku.com 牙周炎吃什么药最好hcv7jop4ns7r.cn 静脉曲张看什么科室hcv7jop9ns3r.cn 广义是什么意思hcv7jop9ns5r.cn 为什么会咳嗽hcv9jop6ns3r.cn
男人有美人尖代表什么hanqikai.com 2000年出生属什么hcv8jop7ns1r.cn 吃什么避孕药可以推迟月经hcv8jop2ns8r.cn 什么样的女人最吸引男人的心hcv9jop7ns3r.cn 髋关节在什么位置hcv9jop2ns6r.cn
孩子改姓需要什么手续hcv8jop9ns8r.cn 科目三为什么这么难hcv9jop1ns8r.cn 手被辣椒辣了用什么方法解辣hcv9jop0ns9r.cn 潮吹是什么感觉hcv7jop9ns3r.cn 军绿色裤子配什么上衣hcv7jop9ns6r.cn
火龙果是什么颜色hcv9jop0ns3r.cn 生酮是什么baiqunet.com 94年属什么今年多大hcv8jop4ns2r.cn 武汉大学校长是什么级别hcv8jop7ns9r.cn 肾阴亏虚吃什么药hcv7jop4ns8r.cn
百度