Visible to the public Reenactment for Read-Committed Snapshot Isolation

TitleReenactment for Read-Committed Snapshot Isolation
Publication TypeConference Paper
Year of Publication2016
AuthorsArab, Bahareh Sadat, Gawlick, Dieter, Krishnaswamy, Vasudha, Radhakrishnan, Venkatesh, Glavic, Boris
Conference NameProceedings of the 25th ACM International on Conference on Information and Knowledge Management
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4073-1
Keywordscomposability, Human Behavior, Metrics, Provenance, pubcrawl, read-committed snapshot isolation, reenactment, Resiliency, transaction
Abstract

Provenance for transactional updates is critical for many applications such as auditing and debugging of transactions. Recently, we have introduced MV-semirings, an extension of the semiring provenance model that supports updates and transactions. Furthermore, we have proposed reenactment, a declarative form of replay with provenance capture, as an efficient and non-invasive method for computing this type of provenance. However, this approach is limited to the snapshot isolation (SI) concurrency control protocol while many real world applications apply the read committed version of snapshot isolation (RC-SI) to improve performance at the cost of consistency. We present non trivial extensions of the model and reenactment approach to be able to compute provenance of RC-SI transactions efficiently. In addition, we develop techniques for applying reenactment across multiple RC-SI transactions. Our experiments demonstrate that our implementation in the GProM system supports efficient re-construction and querying of provenance.

URLhttp://doi.acm.org/10.1145/2983323.2983825
DOI10.1145/2983323.2983825
Citation Keyarab_reenactment_2016