Key Preserving P2P Data Transformation in XML

نویسندگان

  • Md. Sumon Shahriar
  • Jixue Liu
چکیده

Transformation of data with any data model is an important activity to the database community. Specially in peer to peer(P2P) system, data transformation between two peers is a necessary task when data management is an issue. With the advent of XML as an widely used and adopted data representation and exchange format over the web, transformation of data in XML P2P systems is getting much interest. In XML P2P data transformation, a source schema with its conforming document needs to be transformed to a target schema with its conforming document. In addition, a source schema can have integrity constraints for better semantics. Then the constraints needs to be transformed and may not be preserved after the transformation. In this research, we study how XML keys are transformed, and whether the transformed keys are valid and preserved to the target schema in XML P2P data transformation. Towards this problem, we firstly define XML keys over Document Type Definition (DTD) and their satisfactions. We then show how the XML keys are transformed using transformation operations. Finally, we study the key preservation property of important XML transformation operators. We show that the important XML transformation operations are key preserving with necessary and sufficient conditions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

XlPPX: A Lightweight Framework for Privacy Preserving P2P XML Databases in Very Large Publish-Subscribe Systems

The problem of supporting privacy preservation of XML databases within very large publish-subscribe systems is rapidly gaining interest for both academic and industrial research. It becomes even more challenging when XML data are managed and delivered according to the P2P paradigm, since malicious accesses and unpredictable attacks could take advantage from the totally-decentralized and untrust...

متن کامل

Towards the Preservation of Keys in XML Data Transformation for Integration

Transformation of a source schema with its conforming data to a target schema with its conforming data is an important activity in XML as two schemas in XML can represent same real world information. Specifically in XML data integration, transformation of a source to a target is regarded as an important task. An XML source schema can often be defined with XML key which is an important integrity...

متن کامل

XML Schema Mappings in the Presence of Key Constraints and Value Dependencies

Schema mappings play a central role in both data integration and data exchange, and are understood as high-level specifications describing the relationships between data schemas. Based on these specifications, data structured under a source schema can be transformed into data structured under a target schema. During the transformation some structural constraints, both context-free (the structur...

متن کامل

Management of Executable Schema Mappings for XML Data Exchange

Executable schema mappings between XML schemas are essential to support numerous data management tasks such as data exchange, data integration and schema evolution. The novelty of this paper consists in a method for automatic generation of automappings (automorphisms) from key constraints and value dependencies over XML schemas, and designing algebraic operations on mappings and schemas represe...

متن کامل

Using XML Compression to Increase Efficiency of P2P Messaging in JXTA-based Environments

P2P [Peer-to-Peer] systems use messaging for communication amongst peers, and therefore the efficiency of messaging is a key concern for any P2P environment; particularly environments with a potentially large number of peers. One of popular representations of a P2P system is JXTA, which uses XML-based messaging. In this paper, we describe how the use of XML compression can increase efficiency o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008