度是什么意思| 规培生是什么意思| 二级以上医院是什么意思| 用什么泡水喝补肾| 牙齿像锯齿是什么原因| 精液是什么味道的| 九月28号是什么星座| 西安有什么玩的| 古代女子成年行什么礼| 头发大把大把的掉是什么原因| 成双成对是什么意思| 梦到点火是什么意思| 心跳太快吃什么药| 影像是什么意思| 木甚念什么| 粗粮是什么| 尿盐结晶是什么意思| 4月29号0点是什么时候| 乌龟吃什么水果| 起床气是什么意思| 黄鼻涕是什么原因| 人妖是什么| 梦见冥币是什么意思| 取环什么时候取最好| 胆囊息肉有什么症状| 欲言又止的欲什么意思| 女人左下眼皮跳是什么预兆| 孕妇建档需要什么资料| 夏天什么面料的衣服最舒服| 梦见自己请客吃饭是什么意思| 419是什么意思| 换身份证需要带什么| 画蛇添足的故事告诉我们什么道理| 经常拉肚子挂什么科| 什么样的充电宝能带上飞机| 一步两步三步四步望着天是什么歌| 常州有什么特产| 红斑狼疮复发的症状是什么| 甲减是什么病| 风油精有什么作用| 拔火罐对身体有什么好处| 风寒感冒吃什么药| 咽喉炎挂什么科| 未曾谋面什么意思| 白带黄用什么药| 甘油三酯是什么意思| 尿频是什么症状| 燕窝是补什么的| 破伤风有什么作用| 你为什么不快乐| 月经黑褐色是什么原因| 大姨妈能吃什么水果| 苦瓜泡水喝有什么好处| 金字旁的字有什么| 什么情况下需要做造影| 盆腔炎是什么| 类似蜈蚣的虫子叫什么| 蛇盘疮什么原因引起的| 间作套种是什么意思| 这是什么石头| 前列腺炎吃什么消炎药好| 什么是躯体化| 牙釉质是什么| 倒睫是什么意思| 日本是什么时候侵略中国的| hv是什么意思| 如来藏是什么意思| 冬虫夏草有什么好处| 煮花生放什么调料好吃| 三聚磷酸钠是什么东西| 海虫草是什么| 无畏无惧是什么意思| 阴道骚痒是什么原因| 猪肉炒什么菜好吃| 紫菜和海带有什么区别| 应无所住什么意思| 安宫牛黄丸什么时间吃最好| 胃胀疼是什么原因| 马吃什么食物| 八月出生的是什么星座| 为什么医生说直肠炎不用吃药| 彩色多普勒超声常规检查是什么| mrv是什么检查| 凌波仙子是什么意思| 有趣是什么意思| 胃酸过多吃什么食物好| 黑色粑粑是什么原因| 没有美瞳护理液用什么代替| 15度穿什么衣服| 字读什么| 血压高是什么引起的| 人乳头瘤病毒阴性是什么意思| 中空是什么意思| 18岁属什么| 子宫肌瘤什么症状| 十余载是什么意思| 为什么干红那么难喝| 聊表心意是什么意思| 一条什么| 为什么会真菌感染| 从什么不什么四字词语| 梦见自己开车是什么意思| 骆驼吃什么| 吃什么蛋白质含量最高| 老鼠尿是什么颜色的| 乌龟下蛋预示着什么| 四个木字念什么| 为什么脚底板会痛| tg是什么指标| 玛卡是什么| 昝是什么意思| 5月28日什么星座| 龙须菜是什么| 小腿痒痒越挠越痒是什么原因| 贝前列素钠片主治什么病| 西夏国是现在什么地方| 胎儿左心室灶状强回声是什么意思| 什么什么入胜| 副司长是什么级别| 为什么不建议吃茵栀黄| 大驿土是什么意思| 国防部部长是什么级别| rad是什么意思| 跟风是什么意思| 过期的钙片有什么用途| 蛋白质被消化成什么| 字母圈什么意思| 30岁属什么| 波奇饭是什么意思| 爱到极致是什么| 内分泌失调有什么症状| 脆哨是什么| 屁股疼挂什么科室| 人为什么会做春梦| 惊艳了时光温柔了岁月什么意思| 鼻炎是什么原因引起的| 大姨妈来能吃什么水果| 女人嘴唇发紫是什么病| 液基薄层细胞检测是什么| 乌龟下蛋预示着什么| 凌晨的凌是什么意思| 河粉是什么材料做的| 绿豆汤放什么糖| 棉绸是什么面料| 愚不可及是什么意思| 本科属于什么学位| 长宽高用什么字母表示| 男性生殖长水泡是什么原因| 梦见包饺子是什么征兆| 小螳螂吃什么| 听字五行属什么| 心率过快挂什么科| 星星为什么会眨眼睛| 轮状胎盘是什么意思| 缺血灶是什么病| 葡萄糖偏高有什么问题| 暗是什么意思| 护士长是什么级别| 沅字的寓意是什么| 走路快的人是什么性格| 冠脉cta是什么检查| 为什么拉屎有血| 六合是什么意思| 眼睛痛是什么病| 栀子对妇科有什么功效| 金牛座女和什么座最配对| 正印是什么意思| 西夏是什么民族| 淮山和山药有什么区别| 绿色裙子搭配什么颜色上衣| gs是什么| 6月22日什么星座| 女人手脚发热吃什么药| 神昏谵语是什么意思| 化肥对人体有什么危害| 浪迹天涯是什么生肖| i.t品牌什么档次| 昆仑山在什么地方| 双鱼座最配什么星座| 雪纺是什么面料| 女人背心正中间疼是什么原因| 坐蜡什么意思| 赵云属什么生肖| 吃饭容易出汗是什么原因| 补血吃什么好| 冥冥之中是什么意思| 空调外机为什么会滴水| 什么是制动| 磕是什么意思| 羁押是什么意思| 心肌供血不足是什么原因造成的| 梦见打老公是什么意思| 中国属于什么人种| o2o是什么意思| 秋葵什么时候种植最好| 公安局跟派出所有什么区别| 女性尿血是什么原因| 广州有什么特产必带| dei是什么意思| 万能血型是什么血型| 蛋白高是什么病| 做包皮手术有什么好处| 36朵玫瑰花代表什么意思| 公积金缴存基数是什么意思| 胆固醇偏高有什么危害| 胃酸是什么| 骨折吃什么钙片| 什么是摇滚| mlb是什么品牌| 钥字五行属什么| 办身份证要带什么| 壁虎长什么样| 一淘是什么| 肝囊肿有什么危害| 指甲变厚是什么原因| 台湾以前叫什么名字| 盆腔b超检查什么| 痔疮用什么药治最好效果最快| dhc是什么牌子| mi什么意思| 上海九院是什么医院| 甲鱼吃什么的| 调休是什么意思| 肾虚吃什么补最好| 用什么消肿最快最有效方法| 什么牌的笔记本电脑好| lily是什么牌子| oz是什么意思| 阿华田是什么饮料| 辅酶q10什么价格| 身上搓出来的泥是什么| 什么是铅中毒| 凤毛麟角什么意思| 梦见喝酒是什么意思| 1.6号是什么星座| 海澜之家是什么档次| 身份证尾号代表什么| 拉肚子吃什么食物好| 导师是什么意思| 君主是什么意思| 停职是什么意思| 口酸吃什么药| 庚什么意思| 什么克金| 胃胀想吐是什么原因| 亦金读什么| 姓黑的都是什么族| 高校自主招生是什么意思| 骨癌什么症状| 为什么一直放屁| 感冒了挂什么科| 吃花生米是什么意思| 可乐必妥是什么药| 黄钻有什么用| 健脾丸和归脾丸有什么区别| 采阴补阳是什么意思| 体检要带什么| 内外兼修是什么意思| 动物的尾巴有什么作用| 喝什么解酒快| 灰指甲有什么危害| 什么是股癣| 骨折吃什么水果| 天蝎座男是什么性格| 百度Jump to content

影音先锋播放器(先锋影音播放器下载)v9.9.94 官方版

From Wikipedia, the free encyclopedia
百度 省直机关作为全省的领率机关,在全省工作中居于中枢地位,承担着重要职责。

Data integrity is the maintenance of, and the assurance of, data accuracy and consistency over its entire life-cycle.[1] It is a critical aspect to the design, implementation, and usage of any system that stores, processes, or retrieves data. The term is broad in scope and may have widely different meanings depending on the specific context even under the same general umbrella of computing. It is at times used as a proxy term for data quality,[2] while data validation is a prerequisite for data integrity.[3]

Definition

[edit]

Data integrity is the opposite of data corruption.[4] The overall intent of any data integrity technique is the same: ensure data is recorded exactly as intended (such as a database correctly rejecting mutually exclusive possibilities). Moreover, upon later retrieval, ensure the data is the same as when it was originally recorded. In short, data integrity aims to prevent unintentional changes to information. Data integrity is not to be confused with data security, the discipline of protecting data from unauthorized parties.

Any unintended changes to data as the result of a storage, retrieval or processing operation, including malicious intent, unexpected hardware failure, and human error, is failure of data integrity. If the changes are the result of unauthorized access, it may also be a failure of data security. Depending on the data involved this could manifest itself as benign as a single pixel in an image appearing a different color than was originally recorded, to the loss of vacation pictures or a business-critical database, to even catastrophic loss of human life in a life-critical system.

Integrity types

[edit]

Physical integrity

[edit]

Physical integrity deals with challenges which are associated with correctly storing and fetching the data itself. Challenges with physical integrity may include electromechanical faults, design flaws, material fatigue, corrosion, power outages, natural disasters, and other special environmental hazards such as ionizing radiation, extreme temperatures, pressures and g-forces. Ensuring physical integrity includes methods such as redundant hardware, an uninterruptible power supply, certain types of RAID arrays, radiation hardened chips, error-correcting memory, use of a clustered file system, using file systems that employ block level checksums such as ZFS, storage arrays that compute parity calculations such as exclusive or or use a cryptographic hash function and even having a watchdog timer on critical subsystems.

Physical integrity often makes extensive use of error detecting algorithms known as error-correcting codes. Human-induced data integrity errors are often detected through the use of simpler checks and algorithms, such as the Damm algorithm or Luhn algorithm. These are used to maintain data integrity after manual transcription from one computer system to another by a human intermediary (e.g. credit card or bank routing numbers). Computer-induced transcription errors can be detected through hash functions.

In production systems, these techniques are used together to ensure various degrees of data integrity. For example, a computer file system may be configured on a fault-tolerant RAID array, but might not provide block-level checksums to detect and prevent silent data corruption. As another example, a database management system might be compliant with the ACID properties, but the RAID controller or hard disk drive's internal write cache might not be.

Logical integrity

[edit]

This type of integrity is concerned with the correctness or rationality of a piece of data, given a particular context. This includes topics such as referential integrity and entity integrity in a relational database or correctly ignoring impossible sensor data in robotic systems. These concerns involve ensuring that the data "makes sense" given its environment. Challenges include software bugs, design flaws, and human errors. Common methods of ensuring logical integrity include things such as check constraints, foreign key constraints, program assertions, and other run-time sanity checks.

Physical and logical integrity often share many challenges such as human errors and design flaws, and both must appropriately deal with concurrent requests to record and retrieve data, the latter of which is entirely a subject on its own.

If a data sector only has a logical error, it can be reused by overwriting it with new data. In case of a physical error, the affected data sector is permanently unusable.

Databases

[edit]

Data integrity contains guidelines for data retention, specifying or guaranteeing the length of time data can be retained in a particular database (typically a relational database). To achieve data integrity, these rules are consistently and routinely applied to all data entering the system, and any relaxation of enforcement could cause errors in the data. Implementing checks on the data as close as possible to the source of input (such as human data entry), causes less erroneous data to enter the system. Strict enforcement of data integrity rules results in lower error rates, and time saved troubleshooting and tracing erroneous data and the errors it causes to algorithms.

Data integrity also includes rules defining the relations a piece of data can have to other pieces of data, such as a Customer record being allowed to link to purchased Products, but not to unrelated data such as Corporate Assets. Data integrity often includes checks and correction for invalid data, based on a fixed schema or a predefined set of rules. An example being textual data entered where a date-time value is required. Rules for data derivation are also applicable, specifying how a data value is derived based on algorithm, contributors and conditions. It also specifies the conditions on how the data value could be re-derived.

Types of integrity constraints

[edit]

Data integrity is normally enforced in a database system by a series of integrity constraints or rules. Three types of integrity constraints are an inherent part of the relational data model: entity integrity, referential integrity and domain integrity.

  • Entity integrity concerns the concept of a primary key. Entity integrity is an integrity rule which states that every table must have a primary key and that the column or columns chosen to be the primary key should be unique and not null.
  • Referential integrity concerns the concept of a foreign key. The referential integrity rule states that any foreign-key value can only be in one of two states. The usual state of affairs is that the foreign-key value refers to a primary key value of some table in the database. Occasionally, and this will depend on the rules of the data owner, a foreign-key value can be null. In this case, we are explicitly saying that either there is no relationship between the objects represented in the database or that this relationship is unknown.
  • Domain integrity specifies that all columns in a relational database must be declared upon a defined domain. The primary unit of data in the relational data model is the data item. Such data items are said to be non-decomposable or atomic. A domain is a set of values of the same type. Domains are therefore pools of values from which actual values appearing in the columns of a table are drawn.
  • User-defined integrity refers to a set of rules specified by a user, which do not belong to the entity, domain and referential integrity categories.

If a database supports these features, it is the responsibility of the database to ensure data integrity as well as the consistency model for the data storage and retrieval. If a database does not support these features, it is the responsibility of the applications to ensure data integrity while the database supports the consistency model for the data storage and retrieval.

Having a single, well-controlled, and well-defined data-integrity system increases:

  • stability (one centralized system performs all data integrity operations)
  • performance (all data integrity operations are performed in the same tier as the consistency model)
  • re-usability (all applications benefit from a single centralized data integrity system)
  • maintainability (one centralized system for all data integrity administration).

Modern databases support these features (see Comparison of relational database management systems), and it has become the de facto responsibility of the database to ensure data integrity. Companies, and indeed many database systems, offer products and services to migrate legacy systems to modern databases.

Examples

[edit]

An example of a data-integrity mechanism is the parent-and-child relationship of related records. If a parent record owns one or more related child records all of the referential integrity processes are handled by the database itself, which automatically ensures the accuracy and integrity of the data so that no child record can exist without a parent (also called being orphaned) and that no parent loses their child records. It also ensures that no parent record can be deleted while the parent record owns any child records. All of this is handled at the database level and does not require coding integrity checks into each application.

File systems

[edit]

Various research results show that neither widespread filesystems (including UFS, Ext, XFS, JFS and NTFS) nor hardware RAID solutions provide sufficient protection against data integrity problems.[5][6][7][8][9]

Some filesystems (including Btrfs and ZFS) provide internal data and metadata checksumming that is used for detecting silent data corruption and improving data integrity. If a corruption is detected that way and internal RAID mechanisms provided by those filesystems are also used, such filesystems can additionally reconstruct corrupted data in a transparent way.[10] This approach allows improved data integrity protection covering the entire data paths, which is usually known as end-to-end data protection.[11]

Data integrity as applied to various industries

[edit]
  • The U.S. Food and Drug Administration has created draft guidance on data integrity for the pharmaceutical manufacturers required to adhere to U.S. Code of Federal Regulations 21 CFR Parts 210–212.[12] Outside the U.S., similar data integrity guidance has been issued by the United Kingdom (2015), Switzerland (2016), and Australia (2017).[13]
  • Various standards for the manufacture of medical devices address data integrity either directly or indirectly, including ISO 13485, ISO 14155, and ISO 5840.[14]
  • In early 2017, the Financial Industry Regulatory Authority (FINRA), noting data integrity problems with automated trading and money movement surveillance systems, stated it would make "the development of a data integrity program to monitor the accuracy of the submitted data" a priority.[15] In early 2018, FINRA said it would expand its approach on data integrity to firms' "technology change management policies and procedures" and Treasury securities reviews.[16]
  • Other sectors such as mining[17] and product manufacturing[18] are increasingly focusing on the importance of data integrity in associated automation and production monitoring assets.
  • Cloud storage providers have long faced significant challenges ensuring the integrity or provenance of customer data and tracking violations.[19][20][21]

See also

[edit]

References

[edit]
  1. ^ Boritz, J. "IS Practitioners' Views on Core Concepts of Information Integrity". International Journal of Accounting Information Systems. Elsevier. Archived from the original on 5 October 2011. Retrieved 12 August 2011.
  2. ^ What is Data Integrity? Learn How to Ensure Database Data Integrity via Checks, Tests, & Best Practices
  3. ^ What is Data Integrity? Data Protection 101
  4. ^ From the book: Uberveillance and the Social Implications of Microchip Implants: Emerging Page 40
  5. ^ Vijayan Prabhakaran (2006). "IRON FILE SYSTEMS" (PDF). Doctor of Philosophy in Computer Sciences. University of Wisconsin-Madison. Archived (PDF) from the original on 2025-08-05. Retrieved 9 June 2012.
  6. ^ "Parity Lost and Parity Regained".
  7. ^ "An Analysis of Data Corruption in the Storage Stack" (PDF). Archived (PDF) from the original on 2025-08-05.
  8. ^ "Impact of Disk Corruption on Open-Source DBMS" (PDF). Archived (PDF) from the original on 2025-08-05.
  9. ^ "Baarf.com". Baarf.com. Retrieved 4 November 2011.
  10. ^ Bierman, Margaret; Grimmer, Lenz (August 2012). "How I Use the Advanced Capabilities of Btrfs". Retrieved 2025-08-05.
  11. ^ Yupu Zhang; Abhishek Rajimwale; Andrea Arpaci-Dusseau; Remzi H. Arpaci-Dusseau (2010). "End-to-end data integrity for file systems: a ZFS case study" (PDF). USENIX Conference on File and Storage Technologies. CiteSeerX 10.1.1.154.3979. S2CID 5722163. Wikidata Q111972797. Retrieved 2025-08-05.
  12. ^ "Data Integrity and Compliance with CGMP: Guidance for Industry" (PDF). U.S. Food and Drug Administration. April 2016. Archived from the original (PDF) on 2025-08-05. Retrieved 20 January 2018.
  13. ^ Davidson, J. (18 July 2017). "Data Integrity Guidance Around the World". Contract Pharma. Rodman Media. Retrieved 20 January 2018.
  14. ^ Scannel, P. (12 May 2015). "Data Integrity: A perspective from the medical device regulatory and standards framework" (PDF). Data Integrity Seminar. Parenteral Drug Association. pp. 10–57. Archived from the original (PDF) on 20 January 2018. Retrieved 20 January 2018.
  15. ^ Cook, R. (4 January 2017). "2017 Regulatory and Examination Priorities Letter". Financial Industry Regulatory Authority. Retrieved 20 January 2018.
  16. ^ Cook, R. (8 January 2018). "2018 Regulatory and Examination Priorities Letter". Financial Industry Regulatory Authority. Retrieved 20 January 2018.
  17. ^ "Data Integrity: Enabling Effective Decisions in Mining Operations" (PDF). Accenture. 2016. Archived (PDF) from the original on 2025-08-05. Retrieved 20 January 2018.
  18. ^ "Industry 4.0 and Cyber-Physical Systems Raise the Data Integrity Imperative". Nymi Blog. Nymi, Inc. 24 October 2017. Archived from the original on January 20, 2018. Retrieved 20 January 2018.
  19. ^ Priyadharshini, B.; Parvathi, P. (2012). "Data integrity in cloud storage". Proceedings from the 2012 International Conference on Advances in Engineering, Science and Management. ISBN 9788190904223.
  20. ^ Zafar, F.; Khan, A.; Malik, S.U.R.; et al. (2017). "A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends". Computers & Security. 65 (3): 29–49. doi:10.1016/j.cose.2016.10.006.
  21. ^ Imran, M.; Hlavacs, H.; Haq, I.U.I.; et al. (2017). "Provenance based data integrity checking and verification in cloud environments". PLOS ONE. 12 (5): e0177576. Bibcode:2017PLoSO..1277576I. doi:10.1371/journal.pone.0177576. PMC 5435237. PMID 28545151.
一月六号是什么星座 酵母提取物是什么 脚出汗多是什么原因怎么办 女生被操是什么感觉 杉字五行属什么
真菌菌丝阳性什么意思 什么是代沟 单绒双羊是什么意思 胃上面是什么器官 男士阴囊湿疹用什么药膏
灵魂伴侣是指什么意思 什么时候放开二胎政策 羞羞是什么意思 红红的眼睛是什么生肖 屿字五行属什么
6月7号是什么星座 开指是什么意思 梦见大棺材是什么预兆 脂肪粒是什么原因引起的 温字五行属什么
孕妇梦见老鼠是什么意思hcv8jop5ns0r.cn 四五天不排便是什么原因hcv8jop6ns8r.cn 痔疮为什么不建议手术tiangongnft.com 益禾堂什么好喝hcv9jop7ns4r.cn 什么是扁平足图片hcv9jop0ns2r.cn
鸡皮肤是什么原因引起的hcv8jop1ns6r.cn 吃什么止腹泻hcv8jop8ns0r.cn 2023年属兔的是什么命hcv8jop0ns1r.cn 许嵩为什么叫vaehcv8jop7ns2r.cn 赤子之心什么意思hcv8jop4ns4r.cn
看到黄鼠狼什么预兆hcv9jop4ns4r.cn 毓字五行属什么weuuu.com 大型血小板比率偏低是什么意思520myf.com 肝左叶囊性灶什么意思hcv7jop5ns3r.cn ha是什么意思hcv8jop5ns5r.cn
出挑是什么意思bysq.com 浅绿色配什么颜色好看hcv8jop3ns4r.cn 数字2代表什么意思xinmaowt.com 妇科炎症吃什么消炎药效果好hcv9jop1ns3r.cn 拉肚子是什么原因引起的beikeqingting.com
百度