skip to main content
10.1145/800215.806565acmconferencesArticle/Chapter ViewAbstractPublication PagessospConference Proceedingsconference-collections
Article
Free access

A client-based transaction system to maintain data integrity

Published: 10 December 1979 Publication History

Abstract

This paper describes a technique for maintaining data integrity that can be implemented using capabilities typically found in existing file systems. Integrity is a property of a total collection of data. It cannot be maintained simply by using reliable primitives for reading and writing single units—the relations between the units are important also. The technique suggested in this paper ensures that data integrity will not be lost as a result of simultaneous access or as a result of crashes at inopportune times. The approach is attractive because of its relative simplicity and its modest demands on the underlying file system. The paper gives a detailed description of how consistent, atomic transactions can be implemented by client processes communicating with one or more file server computers. The discussion covers file structure, basic client operations, crash recovery, and includes an informal correctness proof.

References

[1]
R. M. Metcalfe and D. R. Boggs. Ethernet: distributed packet switching for local computer networks, CACM 19 (July 1976) pp. 395-404.
[2]
J. N. Gray. "Notes on data base operating systems," in Operating Systems, An Advanced Course, American Elsevier, 1978.
[3]
Butler Lampson and Howard Sturgis. Crash Recovery in A Distributed Data Storage System. unpublished paper, Xerox Palo Alto Research Center, 1977; revised version to appear in CACM.
[4]
Jay E. Israel, James G. Mitchell, and Howard E. Sturgis. Separating Data From Function in a Distributed File System. in the Proc. of Second International Colloq. on Operating Systems, IRIA, October 1978.
[5]
D. C. Swinchart, G. A. McDaniel, and D. R. Boggs. WFS: A Simple Centralized File System for a Distributed Environment, unpublished paper, Xerox Palo Alto Research Center, 1979.
[6]
K. P. Eswaran, J. N. Gray, R. A. Lorie, and I. L. Traiger. The Notions of Consistency and Predicate Locks in a Database System. CACM, Nov 1976, Vol 19, Num 11, pp. 624-633.

Cited By

View all
  • (2022)WFS: A Simple Shared File System for a Distributed EnvironmentClassic Operating Systems10.1007/978-1-4757-3510-9_22(493-510)Online publication date: 3-Aug-2022
  • (2018)Multi-datacenter cloud storage service selection strategy based on AHP and backward cloud generator modelNeural Computing and Applications10.5555/3184485.318450529:1(71-85)Online publication date: 1-Jan-2018
  • (2009)Run-Time Enforcement of Nonsafety PoliciesACM Transactions on Information and System Security10.1145/1455526.145553212:3(1-41)Online publication date: 1-Jan-2009
  • Show More Cited By

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SOSP '79: Proceedings of the seventh ACM symposium on Operating systems principles
December 1979
163 pages
ISBN:0897910095
DOI:10.1145/800215
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 December 1979

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 131 of 716 submissions, 18%

Upcoming Conference

SOSP '24

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)60
  • Downloads (Last 6 weeks)14
Reflects downloads up to 21 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2022)WFS: A Simple Shared File System for a Distributed EnvironmentClassic Operating Systems10.1007/978-1-4757-3510-9_22(493-510)Online publication date: 3-Aug-2022
  • (2018)Multi-datacenter cloud storage service selection strategy based on AHP and backward cloud generator modelNeural Computing and Applications10.5555/3184485.318450529:1(71-85)Online publication date: 1-Jan-2018
  • (2009)Run-Time Enforcement of Nonsafety PoliciesACM Transactions on Information and System Security10.1145/1455526.145553212:3(1-41)Online publication date: 1-Jan-2009
  • (2008)Rethink the syncACM Transactions on Computer Systems10.1145/1394441.139444226:3(1-26)Online publication date: 22-Sep-2008
  • (2006)Rethink the syncProceedings of the 7th symposium on Operating systems design and implementation10.5555/1298455.1298457(1-14)Online publication date: 6-Nov-2006
  • (2006)Rethink the syncProceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation - Volume 710.5555/1267308.1267309(1-1)Online publication date: 6-Nov-2006
  • (2006)Execution monitoring enforcement for limited-memory systemsProceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services10.1145/1501434.1501480(1-12)Online publication date: 30-Oct-2006
  • (2005)Microcomputer operating systemsMicrocomputer System Design10.1007/3-540-11172-7_8(273-302)Online publication date: 28-May-2005
  • (2005)Enforcing non-safety security policies with program monitorsProceedings of the 10th European conference on Research in Computer Security10.1007/11555827_21(355-373)Online publication date: 12-Sep-2005
  • (1991)Stability, Availability, and Response in Network File ServiceIEEE Transactions on Software Engineering10.1109/32.6759417:2(133-140)Online publication date: 1-Feb-1991
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media