Data availability ensures efficient data accessibility by the readers anytime and from anywhere. It can be addressed by creating multiple copies of each data file and storing them on well-distributed distinct servers. The more the number of copies, the more is the availability. Considering a distributed cloud scenario with multiple data copies, a file update operation may be performed at any server containing a copy of the data file. Allowing parallel file updates by different users on various servers may incur inconsistent views of the data file among readers. A data replication protocol ensures that a file will remain consistent throughout the network. The existing data replication protocols did not explicitly address the server confidence about when the updated file version will be ready for read. In this work, we propose a consensus-based file replication protocol considering the message passing model that addresses the server confidence issue of the existing protocols. In the proposed protocol, the updated data file will be immediately accessible to the readers without any ambiguity after consensus is made. The proposed protocol is analyzed and compared with the similar protocols. The protocol is implemented, and the experimental results are verified with the analytical results.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Goel S, Buyya R (2007) Data replication strategies in wide-area distributed systems. In: Enterprise service computing: from concept to deployment. IGI Global, pp 211–241
Ahamad M, Ammar M, Cheung SY (1994) Replicated data management in distributed systems. Readings in distributed computing systems, pp 572–591
Zhu Z, Qi G, Zheng M, Sun J, Chai Y (2020) Blockchain based consensus checking in decentralized cloud storage. Simul Model Pract Theory 102:101987
Mehrotra S, Rastogi R, Korth HF, Silberschatz A (1998) Ensuring consistency in multidatabases by preserving two-level serializability. ACM Trans Database Syst (TODS) 23(2):199–230
Silberschatz A, Korth HF, Sudarshan S et al (1997) Database system concepts, vol 4. McGraw-Hill, New York
Bernstein PA, Hadzilacos V, Goodman N (1987) Concurrency control and recovery in database systems. Addison-Wesley. [Online]. Available: http://research.microsoft.com/en-us/people/philbe/ccontrol.aspx
Rabinovich M, Lazowska ED (1993) An efficient and highly available read-one write-all protocol for replicated data management. In: Proceedings of the 2nd International Conference on Parallel and Distributed Information Systems (PDIS 1993), Issues, Architectures, and Algorithms, San Diego, CA, USA, January 20–23, 1993. IEEE Computer Society, 1993, pp 56–65. [Online]. Available: https://doi.org/10.1109/PDIS.1993.253072
di Vimercati SDC, Foresti S, Jajodia S, Paraboschi S, Samarati P (2007) Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Bases, ser. VLDB ’07. VLDB Endowment, pp 123–134. [Online]. Available: http://dl.acm.org/citation.cfm?id=1325851.1325869
Popa RA, Lorch JR, Molnar D, Wang HJ, Zhuang L (2011) Enabling security in cloud storage slas with cloudproof. In: USENIX Annual Technical Conference, vol 242, pp 355–368
Dwivedi AK, Kumar N, Pathela M (2020) Distributed and lazy auditing of outsourced data. In: Distributed Computing and Internet Technology—16th International Conference, ICDCIT 2020, Bhubaneswar, India, January 9–12, 2020, Proceedings, ser. Lecture Notes in Computer Science, D. V. Hung and M. D’Souza, Eds., vol 11969. Springer, 2020, pp 364–379. [Online]. Available: https://doi.org/10.1007/978-3-030-36987-3_24
Di Vimercati SDC, Foresti S, Jajodia S, Livraga G, Paraboschi S, Samarati P (2013) Enforcing dynamic write privileges in data outsourcing. Comput Secur 39:47–63
Wiesmann M, Pedone F, Schiper A, Kemme B, Alonso G (2000) Database replication techniques: a three parameter classification. In: Proceedings 19th IEEE Symposium on Reliable Distributed Systems SRDS-2000. IEEE, pp 206–215
Santana M, Armendáriz-Inigo JE, Munoz-Escoi FD (2016) Evaluation of database replication techniques for cloud systems. Comput Inform 34(5):973–995
Bano S, Sonnino A, Al-Bassam M, Azouvi S, McCorry P, Meiklejohn S, Danezis G (2017) Consensus in the age of blockchains. arXiv preprint arXiv:1711.03936
Gray J et al (1981) The transaction concept: virtues and limitations. VLDB 81:144–154
Hastings AB (1990) Distributed lock management in a transaction processing environment. In: Proceedings Ninth Symposium on Reliable Distributed Systems. IEEE, pp 22–31
Li J, Krohn MN, Mazieres D, Shasha DE (2004) Secure untrusted data repository (sundr). OSDI 4:9–9
Yoon DY, Chowdhury M, Mozafari B (2018) Distributed lock management with rdma: decentralization without starvation. In: Proceedings of the 2018 International Conference on Management of Data. ACM, pp 1571–1586
Wiesmann M, Pedone F, Schiper A, Kemme B, Alonso G (2000) Understanding replication in databases and distributed systems. In: Proceedings 20th IEEE International Conference on Distributed Computing Systems. IEEE, pp 464–474
Kumar N, Mathuria A (2017) Improved write access control and stronger freshness guarantee to outsourced data. In: Proceedings of the 18th International Conference on Distributed Computing and Networking, Hyderabad, India, January 5–7, 2017, 2017, p 19. [Online]. Available: http://dl.acm.org/citation.cfm?id=3007778
Jiménez-Peris R, Patiño-Martínez M, Alonso G, Kernme B (2001) How to select a replication protocol according to scalability, availability and communication overhead. In: Proceedings 20th IEEE Symposium on Reliable Distributed Systems. IEEE, pp 24–33
Herlihy M (1986) A quorum-consensus replication method for abstract data types. ACM Trans Comput Syst 4(1):32–53. [Online]. Available: https://doi.org/10.1145/6306.6308
Attiya H, Bar-Noy A, Dolev D (1995) Sharing memory robustly in message-passing systems. J ACM 42(1):124–142. [Online]. Available: https://doi.org/10.1145/200836.200869
Zhu J, Huang C, Fan X, Guo S, Fu B (2018) EDDA: an efficient distributed data replication algorithm in vanets. Sensors 18(2):547. [Online]. Available: https://doi.org/10.3390/s18020547
Detti A, Bracciale L, Fedi F (2010) Robust data replication algorithm for manets with obstacles and node failures. In: Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23–27 May 2010, pp 1–6. [Online]. Available: https://doi.org/10.1109/ICC.2010.5502566
Fritzke Jr U, Valentim RP, Gomes LAF (2008) Adaptive replication control based on consensus. In: Proceedings of the 2nd Workshop on Dependable Distributed Data Management, pp 1–10
Daniłowicz C, Nguyen NT (2000) Consensus-based methods for restoring consistency of replicated data. In: Intelligent information systems. Springer, pp 325–335
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Maheshwari, R., Kumar, N., Shadi, M. et al. Consensus-based data replication protocol for distributed cloud. J Supercomput 77, 8653–8673 (2021). https://doi.org/10.1007/s11227-021-03619-5
- Data replication
- Data consistency