甙是什么意思| 基因突变是什么意思| 婴儿呛奶是什么原因引起的| 类风湿是什么病| 车船税是什么意思每年都交吗| 今年26岁属什么生肖| 秋收冬藏是什么生肖| 甲状腺挂什么科| 女朋友过生日送什么最好| 什么是交感神经| 一个虫一个尧念什么| 反应性细胞改变是什么意思| 卫生纸属于什么垃圾| 为什么经常做梦| 什么是肥皂剧| 早泄吃什么药见效| 子宫平滑肌瘤什么意思| 封豕长蛇是什么意思| 气阴两虚是什么意思| 吃什么药能冲开宫腔粘连| 南瓜吃了有什么好处| 哺乳期感冒吃什么药| 正军级是什么级别| 苓是什么意思| 尿胆素1十是什么意思| 你什么我什么成语| 行政助理是干什么的| 游泳为什么要穿泳衣| salute什么意思| 扭捏是什么意思| 惊恐是什么意思| mi是什么| 8.8是什么星座| 胆囊炎要吃什么药| 吃芥末有什么好处| 烟头属于什么垃圾| 心血虚吃什么中成药| 白开水是什么意思| 湿温病是什么症状| 2月3号是什么星座| 冥王星是什么星| 全品类是什么意思| 中秋节为什么要吃月饼| 唐人是什么意思| 风流人物指什么生肖| 月经前尿频是什么原因| 6月8号是什么星座| 公开课是什么意思| 婚检有什么项目| 有容乃大是什么意思| qeelin是什么牌子| 狗狗流眼泪是什么原因| 胃灼热烧心吃什么药| 法学是干什么的| 遗尿是什么症状| 肆虐是什么意思| 狗狗哭了代表什么预兆| 尿血是什么病的征兆| 月经期间吃西瓜有什么影响| 适宜是什么意思| 坐飞机不能带什么| 血管紧张素是什么意思| 养囊是什么意思| 中性人是什么意思| 停车坐爱枫林晚中的坐是什么意思| 峦读什么| 解痉是什么意思| 尿胆素1十是什么意思| 叟是什么意思| 第二性征是什么意思| 溃疡吃什么药| 指甲上有竖纹是什么原因| 胃肠感冒什么症状| 咳血鲜红是什么病呢| 失信名单有什么影响| 吃什么可以淡斑| 悸动是什么意思| 孕妇吃什么利尿排羊水| 脂溢性脱发是什么意思| 迁坟有什么讲究和忌讳| rimowa是什么品牌| 33朵玫瑰花代表什么| 六月种什么菜| chd是什么意思| 外阴苔癣是一种什么病| 胃烧吃什么药| ny是什么牌子| hbo什么意思| 男性吃什么可以壮阳| 阿尔卑斯是什么意思| 肠胃炎吃什么食物| 湿气重不能吃什么食物| 来例假能吃什么水果| 邮电局是干什么的| 水可以做什么| 10月19号什么星座| SS是什么| 灯火葳蕤是什么意思| 散光是什么原因造成的| 酒不能和什么一起吃| 小狗感冒了吃什么药| 世界上最贵的狗是什么| 梦见喝酒是什么意思| 霖五行属性是什么| 省军区司令员是什么级别| 阿尼是什么意思| 风湿性心脏病是什么原因引起的| 健康状况填什么| 身无什么| 阳痿吃什么好| 玉树临风什么意思| 腋窝出汗是什么原因| 想吐头晕是什么原因| 痔疮是什么原因引起| 什么是放疗治疗| 木鱼花为什么会动| 形婚是什么| 片仔癀为什么这么贵| 一什么水缸| 什么叫心脏早搏| 玉竹有什么功效| 三个土是什么字| 六月十九是什么星座| 盆腔炎用什么药好| 什么样的闪电| 排卵期出血是什么原因造成的| 一直发烧不退是什么原因| 急性肠胃炎可以吃什么| 什么叫湿气| 一什么一什么| 骨加客读什么| 手心脚心热吃什么药| 烘培是什么意思| 褪黑素有什么副作用| 失眠吃什么药见效快| 反射弧是什么意思| 什么防晒霜好用| 猎奇是什么意思| 缩影是什么意思| 王大锤真名叫什么| 长歌怀采薇是什么意思| 出差什么意思| 肛门痛什么原因| 脚指甲变白是什么原因| 7月28日什么星座| 白噪音什么意思| 五七是什么意思有什么讲究| 惊奇的什么| 什么是高脂血症| 小孩反复发烧是什么原因引起的| 忌诸事不宜是什么意思| 鬼子红药店里叫什么药| 好嘛是什么意思| 牛瓦沟是什么部位| 磨玻璃结节是什么意思| 剧透什么意思| 云南白药草长什么样| 性格开朗是什么意思| 忠武路演员是什么意思| 狂犬疫苗挂什么科| 什么是应激反应| 儿童用什么洗发水好| 女人肾虚吃什么| 纯化水是什么水| 粒细胞低是什么原因| 230是什么意思| 阴茎是什么| 什么叫结节| 平血头晕吃什么药最好| 肝阳虚吃什么中成药| 胆汁为什么会反流到胃里面| 打嗝吃什么药效果好| 耍宝是什么意思| 夜卧早起是什么意思| 夫字五行属什么| 维生素c吃多了有什么危害| 七月十九是什么星座| 小便是红色的是什么原因男性| 什么首什么胸| 为什么会痛经| 皲裂是什么意思| 酵母样真菌是什么意思| 什么样的人容易低血糖| 韩五行属什么的| 指尖发麻是什么原因| 辟支佛是什么意思| 内瘘是什么意思| 送男教师什么礼物合适| mice是什么意思| 无名指戴戒指是什么意思| 夏天吹空调感冒吃什么药| 海南有什么水果| 夏至吃什么| 人参片泡水喝有什么功效和作用| 什么是爱呢| pgi是什么意思| 紫菜吃多了有什么坏处| 西米是什么东西做的| 水煮鱼用什么鱼做好吃| 葵水是什么| 天雨粟鬼夜哭什么意思| 梦见男朋友出轨了是什么意思| 妈妈吃什么帮宝宝排气| 什么时间喝牛奶最佳| manu是什么意思| 三头六臂是什么生肖| 鞭尸什么意思| 一个金字旁一个先读什么| 1206是什么星座| 驰骋沙场百战威是什么生肖| prep是什么药| 时间观念是什么意思| 蚂蚁属于什么动物| 跳什么舞减肥最快| 为什么会长白头发| 血象高是什么原因| 罹是什么意思| 十二生肖代表什么花| 兹禧属什么生肖| 狐臭挂什么科| 精明是什么意思| 清创手术是什么意思| 血是什么颜色| c3是什么| 日抛什么意思| 梅雨季节什么时候结束| 6月16是什么星座| 惢是什么意思| 猝死是什么原因造成的| 脑供血不足挂什么科室| 就坡下驴什么意思| 尿道流脓吃什么药| 人中之龙是什么意思| pm2.5是什么意思| 为什么同房后会出血| 什么是营养| 男人结扎有什么危害| 有胃火口臭怎么办吃什么药| 墙头草是什么意思| php是什么语言| 任性的女孩有什么特点| crp什么意思| 加号是什么意思| 老年人骨质疏松吃什么钙片好| 采耳是什么意思| 狗狗感冒了吃什么药| 北极熊是什么颜色的| 助听器什么品牌最好| 为什么水能灭火| 纳囊是什么| 做肉丸用什么淀粉最佳| 咽鼓管炎吃什么药| 伤寒病有什么症状| 秋葵什么时候种植最好| 甘油三酯高吃什么食物好| ch是什么牌子| 倒立对身体有什么好处| 精斑是什么| 什么直跳| 桃李满天下的桃李是什么意思| 狗狗拉肚子吃什么药| 女人什么时候绝经正常| baby什么意思| 脖子疼挂什么科| 百度Jump to content

全新“Get Away Lodge”度假产品上线 沃尔沃....

From Wikipedia, the free encyclopedia
(Redirected from Database integrity)
百度 不过这些并不意味着奔驰G500的公路性能的丧失,推动近三吨重车身的时候,从静止加速至100公里/小时仅需秒,等等!【销售0差价】京北会首创“零”差价平台,让每一位超跑爱好者都能低价格买到高品质车源!【信誉保证】郑重承诺:本公司所售车辆,手续齐全、车况

Data integrity is the maintenance of, and the assurance of, data accuracy and consistency over its entire life-cycle.[1] It is a critical aspect to the design, implementation, and usage of any system that stores, processes, or retrieves data. The term is broad in scope and may have widely different meanings depending on the specific context even under the same general umbrella of computing. It is at times used as a proxy term for data quality,[2] while data validation is a prerequisite for data integrity.[3]

Definition

[edit]

Data integrity is the opposite of data corruption.[4] The overall intent of any data integrity technique is the same: ensure data is recorded exactly as intended (such as a database correctly rejecting mutually exclusive possibilities). Moreover, upon later retrieval, ensure the data is the same as when it was originally recorded. In short, data integrity aims to prevent unintentional changes to information. Data integrity is not to be confused with data security, the discipline of protecting data from unauthorized parties.

Any unintended changes to data as the result of a storage, retrieval or processing operation, including malicious intent, unexpected hardware failure, and human error, is failure of data integrity. If the changes are the result of unauthorized access, it may also be a failure of data security. Depending on the data involved this could manifest itself as benign as a single pixel in an image appearing a different color than was originally recorded, to the loss of vacation pictures or a business-critical database, to even catastrophic loss of human life in a life-critical system.

Integrity types

[edit]

Physical integrity

[edit]

Physical integrity deals with challenges which are associated with correctly storing and fetching the data itself. Challenges with physical integrity may include electromechanical faults, design flaws, material fatigue, corrosion, power outages, natural disasters, and other special environmental hazards such as ionizing radiation, extreme temperatures, pressures and g-forces. Ensuring physical integrity includes methods such as redundant hardware, an uninterruptible power supply, certain types of RAID arrays, radiation hardened chips, error-correcting memory, use of a clustered file system, using file systems that employ block level checksums such as ZFS, storage arrays that compute parity calculations such as exclusive or or use a cryptographic hash function and even having a watchdog timer on critical subsystems.

Physical integrity often makes extensive use of error detecting algorithms known as error-correcting codes. Human-induced data integrity errors are often detected through the use of simpler checks and algorithms, such as the Damm algorithm or Luhn algorithm. These are used to maintain data integrity after manual transcription from one computer system to another by a human intermediary (e.g. credit card or bank routing numbers). Computer-induced transcription errors can be detected through hash functions.

In production systems, these techniques are used together to ensure various degrees of data integrity. For example, a computer file system may be configured on a fault-tolerant RAID array, but might not provide block-level checksums to detect and prevent silent data corruption. As another example, a database management system might be compliant with the ACID properties, but the RAID controller or hard disk drive's internal write cache might not be.

Logical integrity

[edit]

This type of integrity is concerned with the correctness or rationality of a piece of data, given a particular context. This includes topics such as referential integrity and entity integrity in a relational database or correctly ignoring impossible sensor data in robotic systems. These concerns involve ensuring that the data "makes sense" given its environment. Challenges include software bugs, design flaws, and human errors. Common methods of ensuring logical integrity include things such as check constraints, foreign key constraints, program assertions, and other run-time sanity checks.

Physical and logical integrity often share many challenges such as human errors and design flaws, and both must appropriately deal with concurrent requests to record and retrieve data, the latter of which is entirely a subject on its own.

If a data sector only has a logical error, it can be reused by overwriting it with new data. In case of a physical error, the affected data sector is permanently unusable.

Databases

[edit]

Data integrity contains guidelines for data retention, specifying or guaranteeing the length of time data can be retained in a particular database (typically a relational database). To achieve data integrity, these rules are consistently and routinely applied to all data entering the system, and any relaxation of enforcement could cause errors in the data. Implementing checks on the data as close as possible to the source of input (such as human data entry), causes less erroneous data to enter the system. Strict enforcement of data integrity rules results in lower error rates, and time saved troubleshooting and tracing erroneous data and the errors it causes to algorithms.

Data integrity also includes rules defining the relations a piece of data can have to other pieces of data, such as a Customer record being allowed to link to purchased Products, but not to unrelated data such as Corporate Assets. Data integrity often includes checks and correction for invalid data, based on a fixed schema or a predefined set of rules. An example being textual data entered where a date-time value is required. Rules for data derivation are also applicable, specifying how a data value is derived based on algorithm, contributors and conditions. It also specifies the conditions on how the data value could be re-derived.

Types of integrity constraints

[edit]

Data integrity is normally enforced in a database system by a series of integrity constraints or rules. Three types of integrity constraints are an inherent part of the relational data model: entity integrity, referential integrity and domain integrity.

  • Entity integrity concerns the concept of a primary key. Entity integrity is an integrity rule which states that every table must have a primary key and that the column or columns chosen to be the primary key should be unique and not null.
  • Referential integrity concerns the concept of a foreign key. The referential integrity rule states that any foreign-key value can only be in one of two states. The usual state of affairs is that the foreign-key value refers to a primary key value of some table in the database. Occasionally, and this will depend on the rules of the data owner, a foreign-key value can be null. In this case, we are explicitly saying that either there is no relationship between the objects represented in the database or that this relationship is unknown.
  • Domain integrity specifies that all columns in a relational database must be declared upon a defined domain. The primary unit of data in the relational data model is the data item. Such data items are said to be non-decomposable or atomic. A domain is a set of values of the same type. Domains are therefore pools of values from which actual values appearing in the columns of a table are drawn.
  • User-defined integrity refers to a set of rules specified by a user, which do not belong to the entity, domain and referential integrity categories.

If a database supports these features, it is the responsibility of the database to ensure data integrity as well as the consistency model for the data storage and retrieval. If a database does not support these features, it is the responsibility of the applications to ensure data integrity while the database supports the consistency model for the data storage and retrieval.

Having a single, well-controlled, and well-defined data-integrity system increases:

  • stability (one centralized system performs all data integrity operations)
  • performance (all data integrity operations are performed in the same tier as the consistency model)
  • re-usability (all applications benefit from a single centralized data integrity system)
  • maintainability (one centralized system for all data integrity administration).

Modern databases support these features (see Comparison of relational database management systems), and it has become the de facto responsibility of the database to ensure data integrity. Companies, and indeed many database systems, offer products and services to migrate legacy systems to modern databases.

Examples

[edit]

An example of a data-integrity mechanism is the parent-and-child relationship of related records. If a parent record owns one or more related child records all of the referential integrity processes are handled by the database itself, which automatically ensures the accuracy and integrity of the data so that no child record can exist without a parent (also called being orphaned) and that no parent loses their child records. It also ensures that no parent record can be deleted while the parent record owns any child records. All of this is handled at the database level and does not require coding integrity checks into each application.

File systems

[edit]

Various research results show that neither widespread filesystems (including UFS, Ext, XFS, JFS and NTFS) nor hardware RAID solutions provide sufficient protection against data integrity problems.[5][6][7][8][9]

Some filesystems (including Btrfs and ZFS) provide internal data and metadata checksumming that is used for detecting silent data corruption and improving data integrity. If a corruption is detected that way and internal RAID mechanisms provided by those filesystems are also used, such filesystems can additionally reconstruct corrupted data in a transparent way.[10] This approach allows improved data integrity protection covering the entire data paths, which is usually known as end-to-end data protection.[11]

Data integrity as applied to various industries

[edit]
  • The U.S. Food and Drug Administration has created draft guidance on data integrity for the pharmaceutical manufacturers required to adhere to U.S. Code of Federal Regulations 21 CFR Parts 210–212.[12] Outside the U.S., similar data integrity guidance has been issued by the United Kingdom (2015), Switzerland (2016), and Australia (2017).[13]
  • Various standards for the manufacture of medical devices address data integrity either directly or indirectly, including ISO 13485, ISO 14155, and ISO 5840.[14]
  • In early 2017, the Financial Industry Regulatory Authority (FINRA), noting data integrity problems with automated trading and money movement surveillance systems, stated it would make "the development of a data integrity program to monitor the accuracy of the submitted data" a priority.[15] In early 2018, FINRA said it would expand its approach on data integrity to firms' "technology change management policies and procedures" and Treasury securities reviews.[16]
  • Other sectors such as mining[17] and product manufacturing[18] are increasingly focusing on the importance of data integrity in associated automation and production monitoring assets.
  • Cloud storage providers have long faced significant challenges ensuring the integrity or provenance of customer data and tracking violations.[19][20][21]

See also

[edit]

References

[edit]
  1. ^ Boritz, J. "IS Practitioners' Views on Core Concepts of Information Integrity". International Journal of Accounting Information Systems. Elsevier. Archived from the original on 5 October 2011. Retrieved 12 August 2011.
  2. ^ What is Data Integrity? Learn How to Ensure Database Data Integrity via Checks, Tests, & Best Practices
  3. ^ What is Data Integrity? Data Protection 101
  4. ^ From the book: Uberveillance and the Social Implications of Microchip Implants: Emerging Page 40
  5. ^ Vijayan Prabhakaran (2006). "IRON FILE SYSTEMS" (PDF). Doctor of Philosophy in Computer Sciences. University of Wisconsin-Madison. Archived (PDF) from the original on 2025-08-06. Retrieved 9 June 2012.
  6. ^ "Parity Lost and Parity Regained".
  7. ^ "An Analysis of Data Corruption in the Storage Stack" (PDF). Archived (PDF) from the original on 2025-08-06.
  8. ^ "Impact of Disk Corruption on Open-Source DBMS" (PDF). Archived (PDF) from the original on 2025-08-06.
  9. ^ "Baarf.com". Baarf.com. Retrieved 4 November 2011.
  10. ^ Bierman, Margaret; Grimmer, Lenz (August 2012). "How I Use the Advanced Capabilities of Btrfs". Retrieved 2025-08-06.
  11. ^ Yupu Zhang; Abhishek Rajimwale; Andrea Arpaci-Dusseau; Remzi H. Arpaci-Dusseau (2010). "End-to-end data integrity for file systems: a ZFS case study" (PDF). USENIX Conference on File and Storage Technologies. CiteSeerX 10.1.1.154.3979. S2CID 5722163. Wikidata Q111972797. Retrieved 2025-08-06.
  12. ^ "Data Integrity and Compliance with CGMP: Guidance for Industry" (PDF). U.S. Food and Drug Administration. April 2016. Archived from the original (PDF) on 2025-08-06. Retrieved 20 January 2018.
  13. ^ Davidson, J. (18 July 2017). "Data Integrity Guidance Around the World". Contract Pharma. Rodman Media. Retrieved 20 January 2018.
  14. ^ Scannel, P. (12 May 2015). "Data Integrity: A perspective from the medical device regulatory and standards framework" (PDF). Data Integrity Seminar. Parenteral Drug Association. pp. 10–57. Archived from the original (PDF) on 20 January 2018. Retrieved 20 January 2018.
  15. ^ Cook, R. (4 January 2017). "2017 Regulatory and Examination Priorities Letter". Financial Industry Regulatory Authority. Retrieved 20 January 2018.
  16. ^ Cook, R. (8 January 2018). "2018 Regulatory and Examination Priorities Letter". Financial Industry Regulatory Authority. Retrieved 20 January 2018.
  17. ^ "Data Integrity: Enabling Effective Decisions in Mining Operations" (PDF). Accenture. 2016. Archived (PDF) from the original on 2025-08-06. Retrieved 20 January 2018.
  18. ^ "Industry 4.0 and Cyber-Physical Systems Raise the Data Integrity Imperative". Nymi Blog. Nymi, Inc. 24 October 2017. Archived from the original on January 20, 2018. Retrieved 20 January 2018.
  19. ^ Priyadharshini, B.; Parvathi, P. (2012). "Data integrity in cloud storage". Proceedings from the 2012 International Conference on Advances in Engineering, Science and Management. ISBN 9788190904223.
  20. ^ Zafar, F.; Khan, A.; Malik, S.U.R.; et al. (2017). "A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends". Computers & Security. 65 (3): 29–49. doi:10.1016/j.cose.2016.10.006.
  21. ^ Imran, M.; Hlavacs, H.; Haq, I.U.I.; et al. (2017). "Provenance based data integrity checking and verification in cloud environments". PLOS ONE. 12 (5): e0177576. Bibcode:2017PLoSO..1277576I. doi:10.1371/journal.pone.0177576. PMC 5435237. PMID 28545151.
疼痛科主要看什么病 孕妇梦见鱼是什么意思 掉钱了是什么预兆 拉肚子拉水是什么原因 什么是车震
喉咙发苦是什么原因造成的 罗可以组什么词 火牙是什么原因引起的 振幅是什么意思 6月30日什么星座
增加免疫力吃什么好 什么人需要做心脏造影 出汗太多是什么原因 盐酸莫西沙星主治什么 什么样的阳光填形容词
准生证是什么样子图片 78年属什么 眼晴干涩模糊用什么药 风凉话是什么意思 两手发麻是什么原因
中性粒细胞低说明什么tiangongnft.com 身体缺镁会有什么症状hcv8jop9ns3r.cn 心影增大是什么意思hcv9jop8ns1r.cn 双子和什么星座最配hcv9jop1ns0r.cn 娘子啊哈是什么歌hcv9jop4ns3r.cn
丁香花什么颜色hcv7jop9ns5r.cn 长白头发是什么原因hcv7jop5ns0r.cn 愚孝什么意思hcv9jop2ns2r.cn 吹空调咳嗽是什么原因hcv8jop0ns8r.cn 水印相机是什么意思imcecn.com
3月5日什么星座hcv8jop6ns4r.cn 06属什么生肖hcv9jop5ns7r.cn 吃什么增肥最快hcv8jop2ns0r.cn 术后血压低什么原因hcv9jop5ns8r.cn 前位子宫是什么意思clwhiglsz.com
中药七情指的是什么wzqsfys.com 对节木是什么树zhiyanzhang.com 尿常规挂什么科hcv7jop6ns4r.cn 两岁宝宝坐飞机需要什么证件hcv9jop5ns8r.cn 和包是什么hcv8jop2ns4r.cn
百度