2019
DOI: 10.1007/978-3-030-31277-0_3
|View full text |Cite
|
Sign up to set email alerts
|

Checking Causal Consistency of Distributed Databases

Abstract: The CAP Theorem shows that (strong) Consistency, Availability, and Partition tolerance are impossible to be ensured together. Causal consistency is one of the weak consistency models that can be implemented to ensure availability and partition tolerance in distributed systems. In this work, we propose a tool to check automatically the conformance of distributed/concurrent systems executions to causal consistency models. Our approach consists in reducing the problem of checking if an execution is causally consi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 31 publications
0
0
0
Order By: Relevance
“…Database Schema. In our testing of production databases, we used a simple, yet effective, database schema adopted by most of blackbox checkers [6,38,47,48]: a two-column table storing key-value pairs. Extending it to multi-columns or even the column-family data model could be done by: (i) representing each cell in a table as a compound key, i.e., "TableName:PrimaryKey:ColumnName", and a single value, i.e., the content of the cell [7,29]; and (ii) utilizing the compiler in [7] to rewrite (more complex) SQL queries to key-value read/write operations.…”
Section: Discussionmentioning
confidence: 99%
“…Database Schema. In our testing of production databases, we used a simple, yet effective, database schema adopted by most of blackbox checkers [6,38,47,48]: a two-column table storing key-value pairs. Extending it to multi-columns or even the column-family data model could be done by: (i) representing each cell in a table as a compound key, i.e., "TableName:PrimaryKey:ColumnName", and a single value, i.e., the content of the cell [7,29]; and (ii) utilizing the compiler in [7] to rewrite (more complex) SQL queries to key-value read/write operations.…”
Section: Discussionmentioning
confidence: 99%