Skip to main content

Consensus-based data replication protocol for distributed cloud


Data availability ensures efficient data accessibility by the readers anytime and from anywhere. It can be addressed by creating multiple copies of each data file and storing them on well-distributed distinct servers. The more the number of copies, the more is the availability. Considering a distributed cloud scenario with multiple data copies, a file update operation may be performed at any server containing a copy of the data file. Allowing parallel file updates by different users on various servers may incur inconsistent views of the data file among readers. A data replication protocol ensures that a file will remain consistent throughout the network. The existing data replication protocols did not explicitly address the server confidence about when the updated file version will be ready for read. In this work, we propose a consensus-based file replication protocol considering the message passing model that addresses the server confidence issue of the existing protocols. In the proposed protocol, the updated data file will be immediately accessible to the readers without any ambiguity after consensus is made. The proposed protocol is analyzed and compared with the similar protocols. The protocol is implemented, and the experimental results are verified with the analytical results.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2


  1. 1.

    Goel S, Buyya R (2007) Data replication strategies in wide-area distributed systems. In: Enterprise service computing: from concept to deployment. IGI Global, pp 211–241

  2. 2.

    Ahamad M, Ammar M, Cheung SY (1994) Replicated data management in distributed systems. Readings in distributed computing systems, pp 572–591

  3. 3.

    Zhu Z, Qi G, Zheng M, Sun J, Chai Y (2020) Blockchain based consensus checking in decentralized cloud storage. Simul Model Pract Theory 102:101987

    Article  Google Scholar 

  4. 4.

    Mehrotra S, Rastogi R, Korth HF, Silberschatz A (1998) Ensuring consistency in multidatabases by preserving two-level serializability. ACM Trans Database Syst (TODS) 23(2):199–230

    Article  Google Scholar 

  5. 5.

    Silberschatz A, Korth HF, Sudarshan S et al (1997) Database system concepts, vol 4. McGraw-Hill, New York

    MATH  Google Scholar 

  6. 6.

    Bernstein PA, Hadzilacos V, Goodman N (1987) Concurrency control and recovery in database systems. Addison-Wesley. [Online]. Available:

  7. 7.

    Rabinovich M, Lazowska ED (1993) An efficient and highly available read-one write-all protocol for replicated data management. In: Proceedings of the 2nd International Conference on Parallel and Distributed Information Systems (PDIS 1993), Issues, Architectures, and Algorithms, San Diego, CA, USA, January 20–23, 1993. IEEE Computer Society, 1993, pp 56–65. [Online]. Available:

  8. 8.

    di Vimercati SDC, Foresti S, Jajodia S, Paraboschi S, Samarati P (2007) Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Bases, ser. VLDB ’07. VLDB Endowment, pp 123–134. [Online]. Available:

  9. 9.

    Popa RA, Lorch JR, Molnar D, Wang HJ, Zhuang L (2011) Enabling security in cloud storage slas with cloudproof. In: USENIX Annual Technical Conference, vol 242, pp 355–368

  10. 10.

    Dwivedi AK, Kumar N, Pathela M (2020) Distributed and lazy auditing of outsourced data. In: Distributed Computing and Internet Technology—16th International Conference, ICDCIT 2020, Bhubaneswar, India, January 9–12, 2020, Proceedings, ser. Lecture Notes in Computer Science, D. V. Hung and M. D’Souza, Eds., vol 11969. Springer, 2020, pp 364–379. [Online]. Available:

  11. 11.

    Di Vimercati SDC, Foresti S, Jajodia S, Livraga G, Paraboschi S, Samarati P (2013) Enforcing dynamic write privileges in data outsourcing. Comput Secur 39:47–63

    Article  Google Scholar 

  12. 12.

    Wiesmann M, Pedone F, Schiper A, Kemme B, Alonso G (2000) Database replication techniques: a three parameter classification. In: Proceedings 19th IEEE Symposium on Reliable Distributed Systems SRDS-2000. IEEE, pp 206–215

  13. 13.

    Santana M, Armendáriz-Inigo JE, Munoz-Escoi FD (2016) Evaluation of database replication techniques for cloud systems. Comput Inform 34(5):973–995

    Google Scholar 

  14. 14.

    Bano S, Sonnino A, Al-Bassam M, Azouvi S, McCorry P, Meiklejohn S, Danezis G (2017) Consensus in the age of blockchains. arXiv preprint arXiv:1711.03936

  15. 15.

    Gray J et al (1981) The transaction concept: virtues and limitations. VLDB 81:144–154

    Google Scholar 

  16. 16.

    Hastings AB (1990) Distributed lock management in a transaction processing environment. In: Proceedings Ninth Symposium on Reliable Distributed Systems. IEEE, pp 22–31

  17. 17.

    Li J, Krohn MN, Mazieres D, Shasha DE (2004) Secure untrusted data repository (sundr). OSDI 4:9–9

    Google Scholar 

  18. 18.

    Yoon DY, Chowdhury M, Mozafari B (2018) Distributed lock management with rdma: decentralization without starvation. In: Proceedings of the 2018 International Conference on Management of Data. ACM, pp 1571–1586

  19. 19.

    Wiesmann M, Pedone F, Schiper A, Kemme B, Alonso G (2000) Understanding replication in databases and distributed systems. In: Proceedings 20th IEEE International Conference on Distributed Computing Systems. IEEE, pp 464–474

  20. 20.

    Kumar N, Mathuria A (2017) Improved write access control and stronger freshness guarantee to outsourced data. In: Proceedings of the 18th International Conference on Distributed Computing and Networking, Hyderabad, India, January 5–7, 2017, 2017, p 19. [Online]. Available:

  21. 21.

    Jiménez-Peris R, Patiño-Martínez M, Alonso G, Kernme B (2001) How to select a replication protocol according to scalability, availability and communication overhead. In: Proceedings 20th IEEE Symposium on Reliable Distributed Systems. IEEE, pp 24–33

  22. 22.

    Herlihy M (1986) A quorum-consensus replication method for abstract data types. ACM Trans Comput Syst 4(1):32–53. [Online]. Available:

  23. 23.

    Attiya H, Bar-Noy A, Dolev D (1995) Sharing memory robustly in message-passing systems. J ACM 42(1):124–142. [Online]. Available:

  24. 24.

    Zhu J, Huang C, Fan X, Guo S, Fu B (2018) EDDA: an efficient distributed data replication algorithm in vanets. Sensors 18(2):547. [Online]. Available:

  25. 25.

    Detti A, Bracciale L, Fedi F (2010) Robust data replication algorithm for manets with obstacles and node failures. In: Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23–27 May 2010, pp 1–6. [Online]. Available:

  26. 26.

    Fritzke Jr U, Valentim RP, Gomes LAF (2008) Adaptive replication control based on consensus. In: Proceedings of the 2nd Workshop on Dependable Distributed Data Management, pp 1–10

  27. 27.

    Daniłowicz C, Nguyen NT (2000) Consensus-based methods for restoring consistency of replicated data. In: Intelligent information systems. Springer, pp 325–335

Download references

Author information



Corresponding author

Correspondence to Shailesh Tiwari.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Maheshwari, R., Kumar, N., Shadi, M. et al. Consensus-based data replication protocol for distributed cloud. J Supercomput 77, 8653–8673 (2021).

Download citation


  • Consensus
  • Data replication
  • Availability
  • Data consistency