Operating Systems & Networks Files and Security

Similar documents
Operating Systems. Designed and Presented by Dr. Ayman Elshenawy Elsefy

COMP091 Operating Systems 1. File Systems

Mass Storage. 2. What are the difference between Primary storage and secondary storage devices? Primary Storage is Devices. Secondary Storage devices

CSC 453 Operating Systems

Table 12.2 Information Elements of a File Directory

FILE SYSTEMS. CS124 Operating Systems Winter , Lecture 23

Segmentation with Paging. Review. Segmentation with Page (MULTICS) Segmentation with Page (MULTICS) Segmentation with Page (MULTICS)

I/O and file systems. Dealing with device heterogeneity

CS3600 SYSTEMS AND NETWORKS

Hard facts. Hard disk drives

SAZ4B/SAE5A Operating System Unit : I - V

makes floppy bootable o next comes root directory file information ATTRIB command used to modify name

File System Interface and Implementation

Today: File System Functionality. File System Abstraction

Che-Wei Chang Department of Computer Science and Information Engineering, Chang Gung University

Outlook. File-System Interface Allocation-Methods Free Space Management

Frequently asked questions from the previous class survey

CSI3131 Operating Systems Tutorial 9 Winter 2015 File Systems

Files & I/O. Today. Comp 104: Operating Systems Concepts. Operating System An Abstract View. Files and Filestore Allocation

Announcements/Reminders

File Systems. ECE 650 Systems Programming & Engineering Duke University, Spring 2018

CSE 120: Principles of Operating Systems. Lecture 10. File Systems. November 6, Prof. Joe Pasquale

File Systems: Interface and Implementation

File Systems: Interface and Implementation

ESE 333 Real-Time Operating Systems 163 Review Deadlocks (Cont.) ffl Methods for handling deadlocks 3. Deadlock prevention Negating one of four condit

Last Class: Memory management. Per-process Replacement

Fall 2015 COMP Operating Systems. Lab #8

Principles of Operating Systems

EECE.4810/EECE.5730: Operating Systems Spring 2017

Chapter 4 File Systems. Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall, Inc. All rights reserved

Typical File Extensions File Structure

OPERATING SYSTEMS: Lesson 11: Files

Chapter 12: File System Implementation

File Systems: Interface and Implementation

File Systems. Information Server 1. Content. Motivation. Motivation. File Systems. File Systems. Files

Database Technology. Topic 7: Data Structures for Databases. Olaf Hartig.

ECE 650 Systems Programming & Engineering. Spring 2018

Module 20: Security. The Security Problem Authentication Program Threats System Threats Threat Monitoring Encryption. Operating System Concepts 20.

Chapter 9: File System Interface

Secondary Storage (Chp. 5.4 disk hardware, Chp. 6 File Systems, Tanenbaum)

CS4500/5500 Operating Systems File Systems and Implementations

Introduction. Secondary Storage. File concept. File attributes

File Systems. Before We Begin. So Far, We Have Considered. Motivation for File Systems. CSE 120: Principles of Operating Systems.

CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed.

CS333 Intro to Operating Systems. Jonathan Walpole

lesson 3 Transforming Data into Information

CSE 120: Principles of Operating Systems. Lecture 10. File Systems. February 22, Prof. Joe Pasquale

File System CS170 Discussion Week 9. *Some slides taken from TextBook Author s Presentation

There is a general need for long-term and shared data storage: Files meet these requirements The file manager or file system within the OS

Chapter 6 Storage Management File-System Interface 11.1

File Systems. CSE 2431: Introduction to Operating Systems Reading: Chap. 11, , 18.7, [OSC]

EECS 482 Introduction to Operating Systems

COMP 530: Operating Systems File Systems: Fundamentals

Introduction to Network Operating Systems

File System Implementation. Sunu Wibirama

File Systems. File system interface (logical view) File system implementation (physical view)

File Management. COMP3231 Operating Systems

Directory Structure and File Allocation Methods

Module 1: Basics and Background Lecture 4: Memory and Disk Accesses. The Lecture Contains: Memory organisation. Memory hierarchy. Disks.

Chapter 6A. Describing Storage Devices. Describing Storage Devices. Types of Storage Devices. Store data when computer is off Two processes

ICS Principles of Operating Systems

File Management. COMP3231 Operating Systems

File-System Structure. Allocation Methods. Free-Space Management. Directory Implementation. Efficiency and Performance. Recovery

File system internals Tanenbaum, Chapter 4. COMP3231 Operating Systems

Computer Engineering II Exercise Sheet Chapter 6

csci 3411: Operating Systems

DOS. 5/1/2006 Computer System Software CS 012 BE 7th Semester 2

Operating Systems. Operating Systems Professor Sina Meraji U of T

CSC 553 Operating Systems

1. What is the difference between primary storage and secondary storage?

CS370 Operating Systems

File system internals Tanenbaum, Chapter 4. COMP3231 Operating Systems

CS370 Operating Systems

UNIX File Systems. How UNIX Organizes and Accesses Files on Disk

V. File System. SGG9: chapter 11. Files, directories, sharing FS layers, partitions, allocations, free space. TDIU11: Operating Systems

Disks, Memories & Buffer Management

UNIT 4 Device Management

File System Management

File Management. Ezio Bartocci.

Lecture S3: File system data layout, naming

Goals for This Lecture:

File System Implementation. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

File Management By : Kaushik Vaghani

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 18: Naming, Directories, and File Caching

SMD149 - Operating Systems - File systems

31268_WEB SYSTEMS LECTURE 1. Operating Systems Part 1

File System: Interface and Implmentation

EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture)

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 18: Naming, Directories, and File Caching

Files and File Systems

MODULE 4. FILE SYSTEM AND SECONDARY STORAGE

File Directories Associated with any file management system and collection of files is a file directories The directory contains information about

FILE SYSTEM IMPLEMENTATION. Sunu Wibirama

File Systems. What do we need to know?

Windows File System. File allocation table (FAT) NTFS - New Technology File System. used in Windows 95, and MS-DOS

Disks & Files. Yanlei Diao UMass Amherst. Slides Courtesy of R. Ramakrishnan and J. Gehrke

Files. Eric McCreath

Introduction to OS. File Management. MOS Ch. 4. Mahmoud El-Gayyar. Mahmoud El-Gayyar / Introduction to OS 1

The Host Environment. Module 2.1. Copyright 2006 EMC Corporation. Do not Copy - All Rights Reserved. The Host Environment - 1

File Systems: Fundamentals

Transcription:

Operating Systems & Networks Files and Security Perspectives on Computing COMP1200 Weifa Liang updated by Chris Johnson (Slides are adopted from Eric McCreath) The Australian National University Semester 1 2005

Overview Files What is a file? Information associated with files Directories File storage structures Security and protection Authentication

Files Information used by a computer system may be stored on a variety of storage mediums(magnetic disks, magnetic tapes, optical disks, etc). A file system provides a uniform logical view of this information. The operating system provides a mapping between the abstract logical units of storage, that is a file, and the physical storage device. Exam.doc quake

Files A file is a named collection of related information. file information is persistent: it lives longer than the process which creates or changes it files consist of a sequence of bits which can be interpreteted as bits, bytes, lines, or records. The type of information within a file is generally defined by its creator.

File Types There are numerous types of files. These include: text, source code, executable, binary, compressed, graphics images, data base, etc... A critical decision in the design of an operating system is to what extent does the operating system support typed files. If the OS does notprovide support, application programs must do their own interpretation MS DOS recognizes file extensions. Macintosh has file types like "text" or "pic"; and files have their creator program as part of their attributes. UNIX does not really support file types. However: files have a crude magic number at the beginning of the file giving an indication of their type.

File Attributes Typically the operating system will keep track of the following attributes for each file: type location size protection: owner and access controls temporal information (timestamps) about creation, accesses and changes. [~/comp1200] % ls -alsi total 216 327044 4 drwxr-xr-x 9 ericm users 4096 Mar 20 10:20. 768545 8 drwxrwxr-x 125 dcs users 8192 Mar 16 13:02.. 376100 4 drwxr-xr-x 2 ericm users 4096 Oct 29 2000 1999 : : : : : : : : : 327728 8 -rw-rw-r-- 1 ericm users 7462 Mar 4 18:10 test.eps 327724 8 -rw-r--r-- 1 ericm users 5059 Mar 20 10:19 tutes.html 327060 8 -rw-r--r-- 1 ericm users 5047 Mar 11 10:41 tutes.html~ 523285 4 drwxr-xr-x 2 ericm users 4096 Mar 20 10:18 tutorials

Accessing files Files can be accessed in one of two basic ways: Sequential access 1) Read 2) Read 3) Write Pointer Read/Write Direct (or random) access. 1) Read 2) Write 3) Read

Directories Directories provide a mechanism for locating and organizing the files within the file system. A directory contains a list of entries. Each entry contains a file name and a reference to the file associated with that file name. These entries may also refer to other directories. ref.doc index.html Wordprocessor

Directory Structures Different operating systems provide different directory structures. Single Level Root Directory Root Directory Tree Structure Root Directory General Graph

Storage Medium Memory provides a way of storing information that can be retrieved rapidly, however, it is generally volatile and limited in its capacity. Magnetic and optical technologies provide a storage medium that persists when the power is removed. They also have capacity that is an order of magnitude larger than main memory.

Magnetic Disk Logically a hard disk can be viewed as a large number of blocks. Blocks are often 512 bytes long. Each block is stored within a sector. Blocks are often joined together to form clusters. Track Read/Write Head Sector Platter

File Structures Logically a disk drive can be viewed as a large number of blocks. These blocks can be either completely read or completely written. The operating system must provide a mapping from these variable sized files to these fixed sized blocks. Files that are larger than one block must be broken up over a number of blocks. There are three major approaches: contiguous linked indexed

Contiguous Approach The contiguous allocation method places each file in a set of blocks which are next to each other on the disk. File1 File2

Indexed Approach Indexed allocation uses an index block which contains pointers that point directly to the blocks that make up the file. File1 File2

Linked Approach The linked approach uses a pointer in each block that points to the next block that makes up the file. File1 File2

FAT The File Allocation Table or FAT approach is used by MS DOS and Windows operating systems. It works in a similar way to the linked approach. However, the 'links'or block pointers are relocated to one section of the disk drive (The FAT). This improves performance when files are accessed randomly.

Security and Protection Operating system protection: how to provide control over access to programs and data in the computer system protect one process's memory from other processes Protection is strictly an OS internal issue a technical problem. OS security: how to control access from outside the system to the information inside: a management problem. Information stored in a system must be secured from: unauthorized access malicious destruction malicious alteration accidental introduction of inconsistency.

Authentication The authentication problem involves determining if the identity of a user is authentic. Authentication is based on one of three items: a user's possessions (such as a key card), a user's knowledge (such as a user id and password) a user's attributes (such as fingerprint, retina pattern). Currently the most common of these is the user's knowledge, in the form of an id and password.

Passwords Passwords authenticate users by having the user provide an (openly known) user id and corresponding (secret) password. If the password provided is correct for that user id then the system assumes that the user is legitimate. Passwords are extremely common as they are easy to use, understand, and require no additional hardware. However passwords can be vulnerable, as it can be difficult to keep a password secret. Passwords can be compromised by: being guessed, being exposed(shoulder surfing or sniffing), or being illegally transferred.

Encrypted Passwords It may be difficult to keep passwords secret on a computer system. To address this problem a process of encryption is often used to store passwords. A function f is used that is simple to compute but extremely difficult to invert. Given a password w, instead of storing each password w on the system, an encrypted version f(w) is stored. When a password p is checked it is also encrypted using f, and the result is checked against the stored value f(w). Only if f(p) = f(w) do we conclude that p=w i.e. that the password is correct. Hence, even if some BadGuy reads the files and knows the stored value of f(w), this does not help him to find w thus BadGuy cannot pretend to be the user of password w.

Reading and study questions OS.2 Brookshear has separated the material on files into different areas of the 8 th edition of the book. section 9.5: traditional file structures (note: indexed files described in this section are a more complex form of the direct access files in this lecture) Q3, Q4 section 9.7: social impact of database technology section 3.5: operating system security Q1, Q3