148 results on '"filesystem"'
Search Results
2. High-Performance Computing Storage Performance and Design Patterns—Btrfs and ZFS Performance for Different Use Cases.
- Author
-
Dakic, Vedran, Kovac, Mario, and Videc, Igor
- Subjects
COMPUTER systems ,DATA warehousing ,ORDER picking systems ,INTERNET servers - Abstract
Filesystems are essential components in contemporary computer systems that organize and manage data. Their performance is crucial in various applications, from web servers to data storage systems. This paper helps to pick the suitable filesystem by comparing btrfs with ZFS by considering multiple situations and applications, ranging from sequential and random performance in the most common use cases to extreme use cases like high-performance computing (HPC). It showcases each option's benefits and drawbacks, considering different usage scenarios. The performance of btrfs and ZFS will be evaluated through rigorous testing. They will assess their capabilities in handling huge files, managing numerous small files, and the speed of data read and write across varied usage levels. The analysis indicates no definitive answer; the selection of the optimal filesystem is contingent upon individual data-access requirements. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Dataset of Windows operating system forensics artefacts
- Author
-
Eva Marková, Pavol Sokol, Sophia Petra Krišáková, and Kristína Kováčová
- Subjects
Digital evidence analysis ,Event logs ,Filesystem ,Forensic artefact ,NTFS ,Operating system Windows ,Computer applications to medicine. Medical informatics ,R858-859.7 ,Science (General) ,Q1-390 - Abstract
The dataset consists of records from the NTFS file system and event logs. In this study, we used images of devices from capture the flags competitions focused on the digital forensic of Windows operating systems and user activities. We created timelines of the security incident from the disk images using the Plaso tool, which we then processed and transformed the attributes of the timelines into binary values to simplify the application of data analysis and machine learning methods. The data are divided into 12 different files, and they are saved in CSV format.
- Published
- 2024
- Full Text
- View/download PDF
4. Forensic Examination of Ceph.
- Author
-
Bausch, Florian and Dewald, Andreas
- Subjects
OPEN source software ,SOFTWARE development tools ,DATA warehousing - Abstract
The concept of Software Defined Storage (SDS) has become very popular over the last few years. It is used in public, private, and hybrid clouds to store enterprise, private, and other kinds of data. Ceph is an open source software that implements an SDS stack. This article analyzes the data found on storage devices (Object Store Devices (OSDs)) used to store Ceph BlueStore data from a data forensics point of view. The Object Store Device (OSD) data is categorized using the model proposed by Carrier into the five categories file system, content, metadata, file name, and application category. It then describes how the different data can be connected to present useful information about the content of an OSD and presents the implementation of a forensic software tool for OSD analysis based on Ceph 12.2.4 luminous. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. High-Performance Computing Storage Performance and Design Patterns—Btrfs and ZFS Performance for Different Use Cases
- Author
-
Vedran Dakic, Mario Kovac, and Igor Videc
- Subjects
btrfs ,ZFS ,Linux ,filesystem ,performance ,HPC ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Filesystems are essential components in contemporary computer systems that organize and manage data. Their performance is crucial in various applications, from web servers to data storage systems. This paper helps to pick the suitable filesystem by comparing btrfs with ZFS by considering multiple situations and applications, ranging from sequential and random performance in the most common use cases to extreme use cases like high-performance computing (HPC). It showcases each option’s benefits and drawbacks, considering different usage scenarios. The performance of btrfs and ZFS will be evaluated through rigorous testing. They will assess their capabilities in handling huge files, managing numerous small files, and the speed of data read and write across varied usage levels. The analysis indicates no definitive answer; the selection of the optimal filesystem is contingent upon individual data-access requirements.
- Published
- 2024
- Full Text
- View/download PDF
6. DLPFS: The Data Leakage Prevention FileSystem
- Author
-
Braghin, Stefano, Simioni, Marco, Sinn, Mathieu, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Zhou, Jianying, editor, Adepu, Sridhar, editor, Alcaraz, Cristina, editor, Batina, Lejla, editor, Casalicchio, Emiliano, editor, Chattopadhyay, Sudipta, editor, Jin, Chenglu, editor, Lin, Jingqiang, editor, Losiouk, Eleonora, editor, Majumdar, Suryadipta, editor, Meng, Weizhi, editor, Picek, Stjepan, editor, Shao, Jun, editor, Su, Chunhua, editor, Wang, Cong, editor, Zhauniarovich, Yury, editor, and Zonouz, Saman, editor
- Published
- 2022
- Full Text
- View/download PDF
7. Partition Compression Flash Translation Layer Based on Data Separation
- Author
-
Li, Xiaochang, Zhai, Zhengjun, Ye, Xin, Dong, Feiyao, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Ren, Jinchang, editor, Hussain, Amir, editor, Zhao, Huimin, editor, Huang, Kaizhu, editor, Zheng, Jiangbin, editor, Cai, Jun, editor, Chen, Rongjun, editor, and Xiao, Yinyin, editor
- Published
- 2020
- Full Text
- View/download PDF
8. Video Recorder as an Object of Forensic Expert Analysis
- Author
-
S. A. Krutov
- Subjects
computer forensics ,video recorder ,hdd ,video recording ,filesystem ,data analysis in sectors ,video file ,Social pathology. Social and public welfare. Criminology ,HV1-9960 - Abstract
The article addresses the issues related to stationary video recorders: their types, purpose, principles of functioning, design characteristics, key components installed in these devices. The author analyses the procedure for using the video recordings from the surveillance cameras in court proceedings. He also justifies the need for comprehensive examinations when investigating stationary video recorders and points out the cases when the appointment of an examination is necessary and when a specialist inspection is enough. The paper presents a research sequence for a stationary video recorder as a computer forensics’ object. Possible questions to the expert, methods, and approaches are listed; difficulties arising during the examination are considered. The author analyzes a case study of a stationary video recorder examination from the expert practice of the laboratory of computer forensics of the Russian Federal Centre of Forensic Science of the Russian Ministry of Justice.
- Published
- 2021
- Full Text
- View/download PDF
9. A Study on the Processing of Timestamps in the Creation of Multimedia Files on Mobile Devices.
- Author
-
Jaehyeok Han and Sangjin Lee
- Abstract
Digital data can be manipulated easily, so information related to the timestamp is important in establishing the reliability of the data. The time values for a certain file can be extracted following the analysis of the filesystem metadata or file internals, and the information can be utilized to organize a timeline for a digital investigation. Suppose the reversal of a timestamp is found on a mobile device during this process. In this case, a more detailed analysis is required due to the possibility of anti-forensic activity, but little previous research has investigated the handling and possible manipulation of timestamps on mobile devices. Therefore, in this study, we determine how time values for multimedia files are handled according to the operating system or filesystem on mobile devices. We also discuss five types of timestamps--file created (C), last modified (M), last accessed (A), digitalized (Di), and filename (FN) of multimedia files, and experimented with their operational features across multiple devices such as smartphones and cameras. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
10. Efficient Key-Value Data Placement for ZNS SSD.
- Author
-
Oh, Gijun, Yang, Junseok, and Ahn, Sungyong
- Subjects
REFUSE collection ,OPTICAL disks ,COMPACTING ,SOLID state drives - Abstract
Log-structured merge-tree (LSM-Tree)-based key–value stores are attracting attention for their high I/O (Input/Output) performance due to their sequential write characteristics. However, excessive writes caused by compaction shorten the lifespan of the Solid-state Drive (SSD). Therefore, there are several studies aimed at reducing garbage collection overhead by using Zoned Namespace ZNS; SSD in which the host can determine data placement. However, the existing studies have limitations in terms of performance improvement because the lifetime and hotness of key–value data are not considered. Therefore, in this paper, we propose a technique to minimize the space efficiency and garbage collection overhead of SSDs by arranging them according to the characteristics of key–value data. The proposed method was implemented by modifying ZenFS of RocksDB and, according to the result of the performance evaluation, the space efficiency could be improved by up to 75%. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
11. Examining FAT File System
- Author
-
Lin, Xiaodong and Lin, Xiaodong
- Published
- 2018
- Full Text
- View/download PDF
12. Customized Filesystem with Dynamic Stripe Strategies on Lustre-Based Hadoop
- Author
-
Li, Hongbo, Xing, Yuxuan, Xiao, Nong, Chen, Zhiguang, Lu, Yutong, Barbosa, Simone Diniz Junqueira, Series editor, Chen, Phoebe, Series editor, Filipe, Joaquim, Series editor, Kotenko, Igor, Series editor, Sivalingam, Krishna M., Series editor, Washio, Takashi, Series editor, Yuan, Junsong, Series editor, Zhou, Lizhu, Series editor, Chen, Guoliang, editor, Shen, Hong, editor, and Chen, Mingrui, editor
- Published
- 2017
- Full Text
- View/download PDF
13. Recovering from Cloud Application Deployment Failures Through Re-execution
- Author
-
Giannakopoulos, Ioannis, Konstantinou, Ioannis, Tsoumakos, Dimitrios, Koziris, Nectarios, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Sellis, Timos, editor, and Oikonomou, Konstantinos, editor
- Published
- 2017
- Full Text
- View/download PDF
14. HA Jenkins Setup Using Pacemaker, Corosync, and DRBD
- Author
-
Pathania, Nikhil and Pathania, Nikhil
- Published
- 2017
- Full Text
- View/download PDF
15. Efficient Key-Value Data Placement for ZNS SSD
- Author
-
Gijun Oh, Junseok Yang, and Sungyong Ahn
- Subjects
zoned namespace ,flash translation layer ,host-level FTL ,key–value store ,filesystem ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
Log-structured merge-tree (LSM-Tree)-based key–value stores are attracting attention for their high I/O (Input/Output) performance due to their sequential write characteristics. However, excessive writes caused by compaction shorten the lifespan of the Solid-state Drive (SSD). Therefore, there are several studies aimed at reducing garbage collection overhead by using Zoned Namespace ZNS; SSD in which the host can determine data placement. However, the existing studies have limitations in terms of performance improvement because the lifetime and hotness of key–value data are not considered. Therefore, in this paper, we propose a technique to minimize the space efficiency and garbage collection overhead of SSDs by arranging them according to the characteristics of key–value data. The proposed method was implemented by modifying ZenFS of RocksDB and, according to the result of the performance evaluation, the space efficiency could be improved by up to 75%.
- Published
- 2021
- Full Text
- View/download PDF
16. FFS: A cryptographic cloud-based deniable filesystem through exploitation of online web services : Store your sensitive data in plain sight
- Author
-
Olsson, Glenn and Olsson, Glenn
- Abstract
Many Online Web Services (OWSs) today, such as Flickr and Twitter, provide users with the possibility to post images that are stored on the platform for free. This thesis explores creating a cryptographically secure filesystem that stores its data on an online web service by encoding the encrypted data as images. Images have been selected as the target as more data can usually be stored in image posts than text posts on OWS. The proposed filesystem, named Fejk Filesystem (FFS), provides users with free, deniable, and cryptographic storage by exploiting the storage provided by online web services. The thesis analyzes and compares the performance of FFS against two other filesystems and a version of FFS that does not use an OWS. While FFS has performance limitations that make it non-viable as a general-purpose filesystem, such as a substitute for the local filesystem on a computer; however, FFS provides security benefits compared to other cloud-based filesystems specifically by providing end-to-end encryption, authenticated encryption, and plausible deniability of the data. Furthermore, being a cloud-based filesystem, FFS can be mounted on any computer with the same operating system, given the correct secrets., Flertalet webbtjänster idag, så som Flickr och Twitter, tillhandahåller möjligheten att lägga upp bilder som lagras på tjänsten utan kostnad. Denna avhandling utforskar en ide om att skapa ett kryptografiskt säkert filsystem som lagrar sin data på webbtjänster med hjälp av kodade och krypterade bilder. Mer data kan ofta lagras i bildinlägg än i textinlägg på webbtjänsterna. Filsystemet, döpt Fejk Filesystem (FFS), tillhandahåller användare med gratis, förnekningsbar, och kryptografisk lagring genom att utnyttja det lagringsutrymme som tillhandahålls av dessa webbtjänster. Avhandlingen analyserar och jämför prestandan hos FFS med två andra filsystem, samt en version av FFS som inte använder en webbtjänst. En slutsats som kan dras är att FFS har begränsningar i prestanda, vilket gör det ohållbart som ett generellt-ändamålsfilssystem, till exempel som ersättare för det lokala filsystemet på en dator. Däremot tillhandahåller det säkerhetsförmåner jämfört med andra molnbaserade filsystem, så som början-till-slutetkryptering, autentiserad kryptering, samt sannolik förnekningsbarhet av datan. Dessutom, som ett molnbaserat filsystem kan FFS monteras på vilken dator som helst med samma operativsystem, givet de korrekta nycklarna.
- Published
- 2023
17. Comparing Ext4 and ZFS for Onboard Data Processing : A Systematic Mapping and Experimental Evaluation
- Author
-
Johansson, Stephanie Liza, Said, Hassan Omer, Forsberg, Håkan, Tsog, Nandinbaatar, Flordal, O., Johansson, Stephanie Liza, Said, Hassan Omer, Forsberg, Håkan, Tsog, Nandinbaatar, and Flordal, O.
- Abstract
Selecting the correct file system is critical for space applications where risks are present. This study systematically maps and tests Ext4 versus ZFS for onboard data processing on the iX10-100 and iX5-100 payload processors. The test sets are presented along with results on several performance metrics. The conclusion is that both ZFS and Ext4 are useful, but based on certain considerations of onboard data processing, Ext4 is better than the other.
- Published
- 2023
- Full Text
- View/download PDF
18. Controlador de disco y sistema de ficheros con persistencia en un sistema operativo docente
- Author
-
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Costa Prats, Juan José, Chiodi Calo, Wenceslao, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Costa Prats, Juan José, and Chiodi Calo, Wenceslao
- Abstract
Desde los orígenes de la computación, almacenar datos de forma ordenada ha sido una de las principales necesidades de los usuarios de ordenadores. Para este fin se crearon diferentes medios de almacenamiento masivo, de entre ellos siendo el disco duro el más prominente, y componentes software capaces de comunicarse con estos y guardar o leer datos. Estos componentes son los controladores, concretamente de disco, y los sistemas de ficheros. En este proyecto se pretende implementar un controlador de disco y un sistema de ficheros para el sistema operativo ZeOS, un pequeño sistema operativo docente, de forma que pueda almacenar datos y leerlos en posteriores ejecuciones, junto con una simple interfaz para el usuario en forma de llamadas de sistema. Los protocolos y estándares usados son bastante sencillos y casi obsoletos hoy en día, pero ha sido necesario priorizar la simplicidad, ya que los controladores y sistemas de ficheros modernos son órdenes de magnitud más complejos y extensos que lo que pueda abarcar un trabajo de final de grado. El controlador de disco usará el estándar ATA y el sistema de ficheros estará basado en FAT32. Una vez finalizado el proyecto, el código y documentación podrán ser usa- dos en alguna de las asignaturas de sistemas operativos de la Facultad de Informática de Barcelona como material adicional., Since the origins of computing, storing data in an organized manner has been one of the main needs of computer users. To this end, different massive storage devices have been created, with the hard drive being the most prominent, as well as software components capable of communicating with these and saving or reading data. These components are drivers, specifically disk drivers, and file systems. In this project, we aim to implement a disk driver and a file system for the ZeOS operating system, a small educational operating system, so that it can store and read data in subsequent executions, along with a simple user interface in the form of system calls. The protocols and standards used are quite simple and almost obsolete today, but it has been necessary to prioritize simplicity, as modern drivers and file systems are orders of magnitude more complex and extensive than what can be covered in a end of degree project. The disk driver will use the ATA standard and the file system will be based on FAT32. Once the project is completed, the code and documentation can be used in any of the operating system subjects at the Barcelona School of Informatics as additional material.
- Published
- 2023
19. FTRFS: A Fault-Tolerant Radiation-Robust Filesystem for Space Use
- Author
-
Fuchs, Christian M., Langer, Martin, Trinitis, Carsten, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Pinho, Luís Miguel Pinho, editor, Karl, Wolfgang, editor, Cohen, Albert, editor, and Brinkschulte, Uwe, editor
- Published
- 2015
- Full Text
- View/download PDF
20. A Reliable and Secure GPU-Assisted File System
- Author
-
Lin, Shang-Chieh, Liao, Yu-Cheng, Hsu, Yarsun, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Kobsa, Alfred, Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Sun, Xian-he, editor, Qu, Wenyu, editor, Stojmenovic, Ivan, editor, Zhou, Wanlei, editor, Li, Zhiyang, editor, Guo, Hua, editor, Min, Geyong, editor, Yang, Tingting, editor, Wu, Yulei, editor, and Liu, Lei, editor
- Published
- 2014
- Full Text
- View/download PDF
21. An Analysis on Empirical Performance of SSD-Based RAID
- Author
-
Park, Chanhyun, Lee, Seongjin, Won, Youjip, Czachórski, Tadeusz, editor, Gelenbe, Erol, editor, and Lent, Ricardo, editor
- Published
- 2014
- Full Text
- View/download PDF
22. Izvajalno okolje za hipotetični računalnik SIC/XE
- Author
-
KORENJAK, MIHA and Mihelič, Jurij
- Subjects
loader ,zbirnik ,standardna knjižnica ,filesystem ,datotečni sistem ,standard library ,assembler ,nalagalnik ,povezovanje ,linking - Abstract
Večina sodobnih uporabniških programov se izvaja na računalnikih s prisotnim operacijskim sistemom. Pri pisanju programov, ki ciljajo neposredno strojno opremo, se ne moremo zanašati na operacijski sistem. Prav tako zbirni jeziki nimajo standardne knjižnice, ki je prisotna pri višjenivojskih jezikih in vsebuje velik del pogosteje uporabljenih funkcij. V diplomski nalogi smo načrtovali izvajalno okolje za računalnik SIC/XE. Omogoča enostavnejše programiranje in definira nekaj konvencij za boljšo interoperabilnost med programi. Ponuja nekaj funkcionalnosti, ki bi bile sicer del operacijskega sistema ali standardne knjižnice. Programerju priskrbi deljeno standardno knjižnico z nekaterimi pogosteje uporabljenimi funkcijami. Okolje ponuja funkcije za delo z datotečnim sistemom, izpisovanje besedil na tekstovni zaslon in nekatere bolj nizkonivojske sistemske funkcije. Omogoča tudi dinamično nalaganje in izvajanje programov. Contemporary user programs are mostly run on computers running an operating system. We cannot rely on the operating system when writing programs that target bare metal. Assembly languages also lack a standard library that is usually present in most higher-level languages and contains a large portion of commonly used functions. In our thesis, we designed an execution environment for the SIC/XE computer. It allows easier programming and defines some conventions for better interoperability between programs. It offers some functionality that would otherwise be part of an operating system or standard library. It provides the programmer a shared standard library with some of the most commonly used functions. The environment offers functions for working with the filesystem, printing text to the screen and some lower-level system functions. It also allows dynamic loading and execution of programs.
- Published
- 2023
23. Access control for a peer-to-peer filesystem based on cryptographic capabilities
- Author
-
Fixl, Stefan
- Subjects
Access control system ,Zugriffskontrolle ,filesystem ,peer-to-peer ,Dateisystem - Abstract
In this thesis we propose an access control system for the peer-to-peer filesystem Hyperdrive that utilizes a cryptographic capability system based approach. The overall goal is to simplify the development of local-first software, following the principles of prioritizing local resources instead of relying on centralized services. Hyperdrive can be a useful foundation for local-first software, but it provides only very limited access control functionality. Sharing read or write capabilities with other users is crucial for applications that enable collaborative work or social interactions. Fine-grained access control therefore is a central requirement for such use cases. Our proposed system utilizes a graph data structure for key management and enables per-file and per-directory control of read and write permissions. Additionally, it provides a simple user system that keeps track of a user’s friends and other contacts. It includes a system for initial key exchange and asynchronous communication that also works with sporadic internet access. Read and write permissions can be shared with known users, read permissions also by URL. We implemented the proposed system as a NodeJS module and published it as an open-source library called CertaCrypt. In addition to that, we also published a demonstrator application, the CertaCrypt-Filemanager. It aims to implement an app that, from a user perspective, looks like the web interface of a cloud-storage solution similar to Dropbox or Google Drive, hiding the fact that it works completely decentralized using Peer-to-Peer (P2P) technology. This demonstrates the potential of P2P systems for implementing local-first software that replaces Software-as-a-Service (SaaS) applications. In dieser Arbeit stellen wir ein Zugriffskontrollsystem für das Peer-to-Peer Dateisystem Hyperdrive vor, welches auf einem Cryptographic Capability System aufbaut. Unser Hauptziel ist es, die Entwicklung von Software, die lokale Ressourcen priorisiert, statt auf zentralisierte Dienste zu vertrauen, sogenannter Local-First Software, zu vereinfachen. Hyperdrive kann eine nützliche Grundlage solcher Software sein, bietet aber nur sehr begrenzte Funktionalität für die Zugriffskontrolle. Das Teilen von Lese- oder Schreibberechtigungen mit anderen Benutzern ist von entscheidender Bedeutung für Anwendungen, die kollaboratives Arbeiten oder soziale Interaktionen ermöglichen. Feingranulare Zugriffskontrolle ist daher eine zentrale Anforderung für solche Anwendungsfälle. Unser Ansatz organisiert kryptographische Schlüssel in einem Graphen und ermöglicht das Management von Lese- und Schreibrechten pro Datei und Verzeichnis. Zusätzlich beinhaltet unsere Arbeit ein einfaches Benutzersystem, sowie ein System zur Verwaltung von Freunden und anderen Kontakten. Weiters vereinfacht es den initialen Schlüsselaustausch und inkludiert ein Protokoll für asynchrone Kommunikation, das auch bei sporadischem Internetzugang funktioniert. Lese- und Schreibberechtigungen können mit Kontakten geteilt werden, Leserrechte auch per URL. Das Konzept wurde als NodeJS-Modul implementiert und als Open-Source Bibliothek namens CertaCrypt veröffentlicht. Zusätzlich dazu haben wir auch eine Demonstrator-Anwendung implementiert, den CertaCrypt-Filemanager. Dieser zielt darauf ab, eine App zu implementieren, die aus der Perspektive des Benutzers wie die Weboberfläche einer Cloud-Speicherlösung wie Dropbox oder Google Drive aussieht, wobei die Tatsache verborgen bleibt, dass sie vollständig dezentralisiert mit Peer-to-Peer (P2P) Technologie arbeitet. Author Stefan Fixl, BSc Masterarbeit Universität Linz 2023
- Published
- 2023
24. FFS: Ett kryptografiskt molnbaserat förnekningsbart filsystem genom utnyttjande av onlinebaserade webtjänster : Lagra din känsliga data öppet
- Author
-
Olsson, Glenn
- Subjects
Fejk FileSystem ,Datavetenskap (datalogi) ,Cloud-based filesystem ,Computer Sciences ,Filesystem ,Steganografiskt filsystem ,Molnbaserat filsystem ,Steganograhpic filesystem ,Filsystem - Abstract
Many Online Web Services (OWSs) today, such as Flickr and Twitter, provide users with the possibility to post images that are stored on the platform for free. This thesis explores creating a cryptographically secure filesystem that stores its data on an online web service by encoding the encrypted data as images. Images have been selected as the target as more data can usually be stored in image posts than text posts on OWS. The proposed filesystem, named Fejk Filesystem (FFS), provides users with free, deniable, and cryptographic storage by exploiting the storage provided by online web services. The thesis analyzes and compares the performance of FFS against two other filesystems and a version of FFS that does not use an OWS. While FFS has performance limitations that make it non-viable as a general-purpose filesystem, such as a substitute for the local filesystem on a computer; however, FFS provides security benefits compared to other cloud-based filesystems specifically by providing end-to-end encryption, authenticated encryption, and plausible deniability of the data. Furthermore, being a cloud-based filesystem, FFS can be mounted on any computer with the same operating system, given the correct secrets. Flertalet webbtjänster idag, så som Flickr och Twitter, tillhandahåller möjligheten att lägga upp bilder som lagras på tjänsten utan kostnad. Denna avhandling utforskar en ide om att skapa ett kryptografiskt säkert filsystem som lagrar sin data på webbtjänster med hjälp av kodade och krypterade bilder. Mer data kan ofta lagras i bildinlägg än i textinlägg på webbtjänsterna. Filsystemet, döpt Fejk Filesystem (FFS), tillhandahåller användare med gratis, förnekningsbar, och kryptografisk lagring genom att utnyttja det lagringsutrymme som tillhandahålls av dessa webbtjänster. Avhandlingen analyserar och jämför prestandan hos FFS med två andra filsystem, samt en version av FFS som inte använder en webbtjänst. En slutsats som kan dras är att FFS har begränsningar i prestanda, vilket gör det ohållbart som ett generellt-ändamålsfilssystem, till exempel som ersättare för det lokala filsystemet på en dator. Däremot tillhandahåller det säkerhetsförmåner jämfört med andra molnbaserade filsystem, så som början-till-slutetkryptering, autentiserad kryptering, samt sannolik förnekningsbarhet av datan. Dessutom, som ett molnbaserat filsystem kan FFS monteras på vilken dator som helst med samma operativsystem, givet de korrekta nycklarna.
- Published
- 2023
25. HSFS: A Compress Filesystem for Metadata Files
- Author
-
Corriero, Nicola, Covino, Emanuele, D’amore, Giuseppe, Pani, Giovanni, Snasel, Vaclav, editor, Platos, Jan, editor, and El-Qawasmeh, Eyas, editor
- Published
- 2011
- Full Text
- View/download PDF
26. Bringing Order to Chaos.
- Author
-
Won, Youjip, Oh, Joontaek, Jung, Jaemin, Choi, Gyeongyeol, Son, Seongbae, Hwang, Jooyoung, and Cho, Sangyeun
- Subjects
INFORMATION storage & retrieval systems ,LINUX operating systems ,MOBILE operating systems ,SOFTWARE architecture ,QUEUEING networks - Abstract
This work is dedicated to eliminating the overhead required for guaranteeing the storage order in the modern IO stack. The existing block device adopts a prohibitively expensive approach in ensuring the storage order among write requests: interleaving the write requests with Transfer-and-Flush. For exploiting the cache barrier command for flash storage, we overhaul the IO scheduler, the dispatch module, and the filesystem so that these layers are orchestrated to preserve the ordering condition imposed by the application with which the associated data blocks are made durable. The key ingredients of Barrier-Enabled IO stack are Epoch-based IO scheduling, Order-Preserving Dispatch, and Dual-Mode Journaling. Barrier-enabled IO stack can control the storage order without Transfer-and-Flush overhead. We implement the barrier-enabled IO stack in server as well as in mobile platforms. SQLite performance increases by 270% and 75%, in server and in smartphone, respectively. In a server storage, BarrierFS brings as much as by 43 × and by 73× performance gain in MySQL and SQLite, respectively, against EXT4 via relaxing the durability of a transaction. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
27. Prevention of a DoS Attack with Copy-on-write in the Overlay Filesystem
- Author
-
Satou, Hirofumi, Kourai, Kenichi, Satou, Hirofumi, and Kourai, Kenichi
- Abstract
Recently, containers are widely used for lightweight virtualization. A container usually uses a disk image that stacks a thin writable layer on top of a read-only image layer. For this layering, a filesystem called OverlayFS is often used. To modify a file in the read-only lower layer, OverlayFS first copies the entire file to the upper layer and then writes requested data to it. This copy-on-write suspends a container for a long time and consumes the disk space of the upper layer when the size of the target file is large. If large files are intentionally modified by attackers, a potential denial-of-service (DoS) attack can be mounted. This paper proposes a new filesystem, called TranslayFS, based on OverlayFS to prevent this type of DoS attack. TranslayFS creates only a special file called a sparse file in the upper layer when a container modifies a file in the lower layer for the first time. Using this file, it holds only modified file data in the upper layer without copying the entire file. It returns the modified part of the file from the upper layer and the unmodified part from the lower layer. We have implemented TranslayFS in the Linux kernel and confirmed that TranslayFS could dramatically reduce the latency in the first write to a file, so that the DoS attack was not possible., 19th IEEE International Conference on Dependable, Autonomic & Secure Computing (DASC 2021), October 25-28, 2021, Virtual Conference
- Published
- 2022
28. Physical Storage
- Author
-
Vohra, Deepak and Vohra, Deepak
- Published
- 2016
- Full Text
- View/download PDF
29. The HST/WFC3 Quicklook Project: A User Interface to Hubble Space Telescope Wide Field Camera 3 Data.
- Author
-
Bourque, Matthew, Bajaj, Varun, Bowers, Ariel, Dulude, Michael, Durbin, Meredith, Gosmeyer, Catherine, Gunning, Heather, Khandrika, Harish, Martlin, Catherine, Sunnquist, Ben, Viana, Alex, Brescia, M., Djorgovski, S.G., Feigelson, E., Longo, G., and Cavuoti, S.
- Abstract
The Hubble Space Telescope’s Wide Field Camera 3 (WFC3) instrument, comprised of two detectors, UVIS (Ultraviolet-Visible) and IR (Infrared), has been acquiring ~ 50-100 images daily since its installation in 2009. The WFC3 Quicklook project provides a means for instrument analysts to store, calibrate, monitor, and interact with these data through the various Quicklook systems: (1) a ~ 175 TB filesystem, which stores the entire WFC3 archive on disk, (2) a MySQL database, which stores image header data, (3) a Python-based automation platform, which currently executes 22 unique calibration/monitoring scripts, (4) a Python-based code library, which provides system functionality such as logging, downloading tools, database connection objects, and filesystem management, and (5) a Python/Flask-based web interface to the Quicklook system. The Quicklook project has enabled large-scale WFC3 analyses and calibrations, such as the monitoring of the health and stability of the WFC3 instrument, the measurement of ~ 20 million WFC3/UVIS Point Spread Functions (PSFs), the creation of WFC3/IR persistence calibration products, and many others. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
30. Prevention of a DoS Attack with Copy-on-write in the Overlay Filesystem
- Author
-
Satou, Hirofumi and Kourai, Kenichi
- Subjects
filesystem ,disk image ,Data_FILES ,DoS attack ,containers ,copy-on-write - Abstract
Recently, containers are widely used for lightweight virtualization. A container usually uses a disk image that stacks a thin writable layer on top of a read-only image layer. For this layering, a filesystem called OverlayFS is often used. To modify a file in the read-only lower layer, OverlayFS first copies the entire file to the upper layer and then writes requested data to it. This copy-on-write suspends a container for a long time and consumes the disk space of the upper layer when the size of the target file is large. If large files are intentionally modified by attackers, a potential denial-of-service (DoS) attack can be mounted. This paper proposes a new filesystem, called TranslayFS, based on OverlayFS to prevent this type of DoS attack. TranslayFS creates only a special file called a sparse file in the upper layer when a container modifies a file in the lower layer for the first time. Using this file, it holds only modified file data in the upper layer without copying the entire file. It returns the modified part of the file from the upper layer and the unmodified part from the lower layer. We have implemented TranslayFS in the Linux kernel and confirmed that TranslayFS could dramatically reduce the latency in the first write to a file, so that the DoS attack was not possible., 19th IEEE International Conference on Dependable, Autonomic & Secure Computing (DASC 2021), October 25-28, 2021, Virtual Conference
- Published
- 2021
- Full Text
- View/download PDF
31. Disseny i implementació d’un sistema de fitxers replicat en temps real
- Author
-
Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Costa Prats, Juan José, Pajuelo Gonzalez, Alex, Armengod Fernández, Daniel, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Costa Prats, Juan José, Pajuelo Gonzalez, Alex, and Armengod Fernández, Daniel
- Abstract
Garantir la integritat de dades i maximitzar el rendiment dels sistemes d'emmagatzematge són habilitats essencials per a qualsevol administrador de sistemes. Per a assolir aquest objectiu hi ha a disposició dels professionals d'IT un ampli ventall de tecnologies. L'objectiu d'aquest projecte ha estat el disseny i la implementació d'un sistema que serveixi com a nova eina dins d'aquest conjunt de tecnologies. El sistema permet replicar en temps real els continguts d'un directori dins d'un node de computació a un altre directori bessó allotjat físicament en un altre node. Tant per al disseny com per a la implementació del sistema s'ha emprat la llibreria File System in Userspace (FUSE) de programari lliure i disponible en sistemes Linux/MacOS. El sistema s'ha anomenat rfs, per les seves inicials de Replicated FileSystem., Ensuring data integrity and maximizing storage systems performance are essential skills for system administrators. In order to meet those objectives, system administrators have a wide arsenal of tools at their disposal. This project's goal has been to design and implement a system that adds another option to this arsenal. This system will allow for the real-time replication of a directory's contents, stored in one given compute node, to a «twin» directory physically stored in a different node. The library File System in Userspace (FUSE) has been used for both the design and implementation of this system. FUSE is both open-source and available for Linux and MacOS systems. This system has been named rfs after its initials, Replicated FileSystem.
- Published
- 2021
32. Software for Embedded System for Remote Image Acquisition via Satellite
- Author
-
Petrak, Goran and Džapo, Hrvoje
- Subjects
FERSAT ,FreeRTOS ,TEHNIČKE ZNANOSTI. Računarstvo ,TEHNIČKE ZNANOSTI. Elektrotehnika ,satellite ,upravljanje kamerom ,Flash memory ,sustavi za rad u stvarnom vremenu ,real-time systems ,camera control ,TECHNICAL SCIENCES. Electrical Engineering ,Flash memorija ,filesystem ,TECHNICAL SCIENCES. Computing ,datotečni sustav ,satelit ,embedded systems ,ugradbeni računalni sustavi ,cubesat - Abstract
U ovom radu razvijena je programska potpora za rad s ugradbenim računalnom sustavom na satelitu. Cjelokupni sustav sastoji se od mikrokontrolera, vanjske Flash memorije, kamere, modula s fotosenzorima i odašiljača u X-pojasu. Omogućeno je prikupljanje slika s kamere u RAW i JPEG formatu uz ručno upravljanje trajanjem ekspozicije. Omogućena je akvizicija podataka s više kanala modula s fotosenzorima uz uzorkovanje stabilnom frekvencijom. Omogućena je pohrana prikupljenih podataka na Flash memoriju, za koju je razvijen datotečni sustav s podrškom za ujednačenje trošenja blokova (wear leveling), upravljanje neispravnim blokovima (bad block management) i sa sustavom za očuvanje konzistencije u slučaju iznenadnog prekida izvođenja (journaling). Prema odašiljaču za X-pojas ostvareno je paralelno sinkrono sučelje za prijenos podataka. Programska potpora razvijena je modularno, koristeći operacijski sustav za rad u stvarnom vremenu FreeRTOS. Ostvareno je i povezivanje sustava s osobnim računalom, putem kojeg je moguće upravljati radom sustava i preuzimati prikupljene podatke. In this thesis, software for an embedded system to be used on a satellite is presented. The system consists of the following components: microcontroller, external Flash memory, camera module, photosensor module and X-band transmitter. The following features were developed: image capture via camera, in both RAW and JPEG format, with manual exposure time control; data acquisition from multiple channels on the photosensor board, with a stable sampling frequency; data storage in Flash memory, for which a filesystem, supporting wear leveling, bad block management and journaling, was developed. Additionally, support for X-band module interfacing was provided via a parallel synchronous interface. All software modules were then integrated using an open source real-time operating system FreeRTOS. Finally, interfacing the system with a personal computer was demonstrated. The computer can be used to issue commands and retrieve data from the system.
- Published
- 2021
33. Operating system level data tiering using online workload characterization.
- Author
-
Salkhordeh, Reza, Asadi, Hossein, and Ebrahimi, Shahriar
- Subjects
- *
COMPUTER operating systems , *COST effectiveness , *CLIENT/SERVER computing equipment , *COMPUTER storage devices , *SOLID state drives , *HARD disks , *LINUX operating systems - Abstract
Over the past decade, storage has been the performance bottleneck in I/O-intensive programs such as online transaction processing applications. To alleviate this bottleneck with minimal cost penalty, cost-effective design of a high-performance disk subsystem is of decisive importance in enterprise applications. Data tiering is an efficient way to optimize cost, performance, and reliability in storage servers. With the promising advantages of solid-state drives (SSDs) over hard disk drives (HDDs) such as lower power consumption and higher performance, traditional data tiering techniques should be revisited to use SSDs in a more efficient way. Previously proposed tiering solutions have attempted to enhance performance based on different parameters such as request size or randomness. These solutions, however, are mostly optimized towards one type of I/O workloads and are not applicable to workloads with different characteristics. This paper presents an online data tiering technique at the operating system level with a linear weighted formulation to enhance I/O performance with minimal cost overhead. The proposed technique characterizes the workload access pattern with respect to metadata versus user data, frequency of accesses, random versus sequential accesses, and read versus write accesses. To evaluate the proposed technique, it is implemented on a Linux 3.1.4 equipped with ext2 filesystem. The experimental results over I/O-intensive workloads show that the proposed technique improves performance up to 30 % as compared to the previous techniques while imposing negligible memory overhead to the system. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
34. The Software Heritage Filesystem (SwhFS): Integrating Source Code Archival with Development
- Author
-
Stefano Zacchiroli, Antoine Pietri, Thibault Allançon, Laboratoire de Recherche et de Développement de l'EPITA (LRDE), Ecole Pour l'Informatique et les Techniques Avancées (EPITA), Direction générale déléguée à l'innovation (DGD-I), Institut National de Recherche en Informatique et en Automatique (Inria), Université de Paris (UP), and Université Paris Cité (UPCité)
- Subjects
FOS: Computer and information sciences ,Source code ,source code ,Computer science ,media_common.quotation_subject ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,computer.software_genre ,digital libraries ,Computer Science - Software Engineering ,Software ,open source ,FUSE ,media_common ,digital preservation ,Cloning (programming) ,Database ,business.industry ,Digital library ,Software Engineering (cs.SE) ,version control system ,Workflow ,POSIX ,Digital preservation ,Scripting language ,filesystem ,business ,computer - Abstract
International audience; We introduce the Software Heritage filesystem (SwhFS), a user-space filesystem that integrates large-scale open source software archival with development workflows. SwhFS provides a POSIX filesystem view of Software Heritage, the largest public archive of software source code and version control system (VCS) development history.Using SwhFS, developers can quickly "checkout" any of the 2 billion commits archived by Software Heritage, even after they disappear from their previous known location and without incurring the performance cost of repository cloning. SwhFS works across unrelated repositories and different VCS technologies. Other source code artifacts archived by Software Heritage-individual source code files and trees, releases, and branches-can also be accessed using common programming tools and custom scripts, as if they were locally available.A screencast of SwhFS is available online at dx.doi.org/10.5281/zenodo.4531411.
- Published
- 2021
35. Contiki Ring File System for Real-Time Applications.
- Author
-
Schildt, Sebastian, Pottner, Wolf-Bastian, and Wolf, Lars
- Abstract
Wireless Sensor Nodes often need to store or cache measurement or operational data into some non-volatile memory. Many applications using low power sensor nodes are based on Contiki, which provides the COFFEE file system for data storage. As COFFEE introduces occasional long and hard to predict write delays, it can not be used in applications which have real time demands, such as sensor networks operating in industrial environments. In this paper we present an efficient implementation of a flexible Ring File System for Contiki, that can be used in real-time applications. Read and write times are predictable and adherence to Contiki's file system API allows it to be used as a drop-in replacement for COFFEE in many applications. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
36. File Exchange in Cloud.
- Author
-
de Sousa Junior, Rafael Timoteo, Canedo, Edna Dias, de Oliveira Albuquerque, Robson, and Gomes de Deus, Fl'vio Elias
- Abstract
Computing systems trust and reputation representation have been widely discussed and applied in a lot of information technology scenarios, becoming subject of scientific researches both from a theoretical and practical point of view. This paper proposes the development of a trust model to ensure a reliable files exchange among users in a private cloud, as well as the calculation process of trust among these users, according to the metrics previously established. The simulation result shows that this trust model is robust because it successfully access node reliable under Private Cloud Computing environment. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
37. Filesystem Layout Reorganization in Virtualized Environment.
- Author
-
Yamada, Masaya and Yamaguchi, Saneyasu
- Abstract
Reorganization of storage data layout is a famous I/O performance improvement method. Many methods have been studied. These methods improve I/O performance by reducing storage seek distances. In virtualized environment, a storage device has several huge image files. Thus, I/O performance is severely decreased by many long distance seeks among these files. Accordingly, I/O performance is expected to be significantly improved by reorganizing data layout in this environment. However, existing reorganizing methods were published before virtualized environment has emerged and take no account of virtualized environment. Thus, the existing methods cannot improve I/O performance largely in virtualized environment. In this paper, we present performance evaluation of the existing reorganizing methods in virtualized environment. After that, we propose a reorganizing method suitable for virtualized environment. Finally, we demonstrate that the propose method outperforms the existing methods with experiments. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
38. Fine-Grained Access Control in the Chirp Distributed File System.
- Author
-
Donnelly, Patrick and Thain, Douglas
- Abstract
Although the distributed file system is a widely used technology in local area networks, it has seen less use on the wide area networks that connect clusters, clouds, and grids. One reason for this is access control: existing file system technologies require either the client machine to be fully trusted, or the client process to hold a high value user credential, neither of which is practical in large scale systems. To address this problem, we have designed a system for fine-grained access control which dramatically reduces the amount of trust required of a batch job accessing a distributed file system. We have implemented this system in the context of the Chirp user-level distributed file system used in clusters, clouds, and grids, but the concepts can be applied to almost any other storage system. The system is evaluated to show that performance and scalability are similar to other authentication methods. The paper concludes with a discussion of integrating the authentication system into workflow systems. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
39. Analysis of B-tree data structure and its usage in computer forensics.
- Author
-
Koruga, Petra and Bača, Miroslav
- Subjects
DATA structures ,COMPUTER crimes ,CRIMINAL investigation ,INDEXING ,DATABASES ,MAGNETIC disks ,INFORMATION storage & retrieval systems - Abstract
The idea behind this article is to give an overview of B-tree data structure and show the connection between B-tree indexing technique and computer forensics. B-tree is a fast data indexing method that organizes indexes into a multi-level set of nodes, where each node contains indexed data. This technique is most commonly used in databases and file systems where it is important to retrieve records stored in a file when data is to large to fit in main memory. In that case, B-trees are used to reduce the number of disk accesses. [ABSTRACT FROM AUTHOR]
- Published
- 2010
40. A Share Quota Manager for the Public Administrations
- Author
-
Gianluca Mazzini, Enrica Salbaroli, and Andrea Zucchelli
- Subjects
Public Administration ,Computer science ,Data center services ,Dell EMC Unity ,Possession (law) ,Computer security ,computer.software_genre ,A share ,Domain (software engineering) ,Quota, management, filesystem, NAS, Dell EMC Unity, storage, shared, Public Administration ,storage ,Economica ,NAS ,Order (business) ,filesystem ,Quota ,shared ,Layer (object-oriented design) ,Storage as a service ,computer ,management - Abstract
Among the data center services that Lepida ScpA offers to the Public Administrations (PAs) of Emilia-Romagna Region, there is the Storage As A Service; in particular, a growing number of PAs is asking for NAS to use for file systems joined to their domain, that we erogate over shared hardware. However, on the storage in our possession only a storage administrator user has the permissions to manage the quotas on the shares; but a storage administrator, on the other hand, would see all the shares of the different PAs that have been allocated on that physical storage. We therefore decided to develop a layer capable of decoupling the users who could access the storage from the permissions necessary for managing the quotas, in order to allow each individual PA to manage independently the quota trees on their own shares; in this paper we describe the solution we have devised and implemented.
- Published
- 2021
41. Using ceph's BlueStore as object storage in HPC storage framework
- Author
-
Michael Kuhn and Kira Duwe
- Subjects
NetCDF ,Interface (Java) ,business.industry ,Computer science ,Data management ,Filesystem ,Device file ,Storage framework ,computer.file_format ,Hierarchical Data Format ,computer.software_genre ,Object store ,BlueStore ,Object storage ,POSIX ,Scalability ,Operating system ,business ,JULEA ,computer - Abstract
In times of ever-increasing data sizes, data management and insightful analysis are amidst the most severe challenges of high-performance computing. While high-level libraries such as NetCDF, HDF5, and ADIOS2, as well as the associated self-describing data formats, offer convenient interfaces to complex data sets, they were built on outdated assumptions of storage systems and interfaces. They mostly rely on the POSIX interface that researchers have been aiming to replace for decades. Among others, its strict file semantics are not suitable for current HPC systems. As object storage has become increasingly prominent to store datasets of data formats like HDF5, providing a scalable object store back-end is necessary. Therefore, we looked into Ceph's object store BlueStore and developed a backend for the storage framework JULEA that uses BlueStore without the need for a full-fledged working Ceph cluster. This way, we significantly reduce the prerequisites of running it on an existing HPC cluster. BlueStore works directly on a raw block device and thereby circumvents the problems of other Ceph storage backends like Filestore and KStore. In a first evaluation, we examine the performance of Blue-Store and compare it to a POSIX-based solution which shows our prototype is functional yet not optimized enough to keep up with the POSIX-based object store. For example, the peak for explicitly synced writes is 50 MB/s for POSIX with a block size of 4,096 kiB and thereby twice as high as BlueStore's with 20.5 MB/s.
- Published
- 2021
- Full Text
- View/download PDF
42. Journaling deduplication with invalidation scheme for flash storage-based smart systems.
- Author
-
Lim, Seung-Ho and Jeong, Young-Sik
- Subjects
- *
COMPUTER storage devices , *COMPUTER operating systems , *BANDWIDTHS , *ELECTRONIC file management , *JOURNAL writing - Abstract
Transaction support for filesystems has become a common feature in modern operating systems where data atomicity is achieved by writing transactions to the log region in advance. The logging mechanism is appropriate for flash storage devices due to the inherent nature of flash memory. However, the logging schemes inherently create multiple copies of data, leading to a decrease in the bandwidth of storage systems. In this paper, we present a simple and efficient invalidation scheme for multiple copies of data in a common journaling module. We identify two types of duplications, one in which there is an explicit duplication of the journal region and original region with the same data, and the other in which there is an implicit duplication of transaction commit operations. The invalidation of duplicated data reduces internal write and erase operations and garbage collection overhead for flash devices, which would otherwise increases external I/O bandwidth. Experimental results show that the overall performance improves roughly from 5% to 35% with the invalidation scheme for journal transactions. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
43. Cost effective data wiping methods for mobile phone.
- Author
-
Kang, Seung-Hoon, Park, Keun-Young, and Kim, Juho
- Subjects
WIRELESS communications ,INFORMATION retrieval ,MOBILE communication systems ,TELECOMMUNICATION systems ,CELL phone systems - Abstract
Thanks to the supply of smartphones, mobile phones have come to store increasingly more personal information of users. To protect users' information, the information stored in mobile phones should not only be managed safety but also be deleted not to allow restoration. In the filesystems that have been applied to existing mobile phones, even when users have deleted information, data are not completely wiped from the storage. Therefore, the data can be easily recovered by using forensics tools. Considering that mobile phones are always exposed to the risk of robberies and loss, this situation can be misused for personal information spill. The present paper points out problems in the methods of data deleting from smartphones, proposes an efficient data deleting method considering mobile device environments with limitations in battery and hardware performance such as smartphones, and analyzes the efficiency of the techniques in relation to the types of filesystems and data formats. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
44. Failsafe Filesystem for Embedded Systems
- Author
-
Pejić, Emanuel and Džapo, Hrvoje
- Subjects
STM32F4 ,TECHNICAL SCIENCES. Computing ,datotečni sustav ,TEHNIČKE ZNANOSTI. Računarstvo ,Filesystem ,embedded systems ,RAID ,FatFS ,Hamming code ,Hammingov kod ,ugradbeni računalni sustavi - Abstract
Ugradbeni računalni sustavi danas se koriste u različitim primjenama u kojima sve više zamjenjuju klasična moćnija računala. U određenim primjenama potrebna je dugotrajna pohrana podataka na Flash memoriju, za koju je potrebno osigurati mehanizme redundancije i mogućnost ispravljanja pogrešaka ako se radi u okolini koja može nepovoljno utjecati i mijenjati pohranjene podatke. Datotečni sustavi za ugradbena računala tipično ne implementiraju takve mogućnosti, a među posebnim implementacijama koje imaju takve mogućnosti testiran je datotečni sustav LittleFS. Premda se radi o sustavu otvorenog koda, pokazalo se da takvo rješenje nije zadovoljavajuće jer je implementacija nepouzdana i više se aktivno kod ne održava. Izrađene su stoga nadogradnje na postojeći FatFS datotečni sustav, uz dodavanje sloja za siguran rad sa datotekama, koji koristi Hammingovo kodiranje i sustav nalik na RAID-4. Nad navedenim rješenjem provedeni su osnovni testovi koji su dokazali ispravnost i upotrebljivost predloženog pristupa. Razvijeni programski okvir moguće je primijeniti i na druge datotečne sustave. Embedded systems are used in a variety of applications where they increasingly replace classic, more powerful computing platforms. Certain applications require long-term data storage on a Flash memory, where it is necessary to provide redundancy mechanisms and the ability to correct errors when operating in harsh environments, which can affect and change the stored data. Embedded file systems typically do not implement such capabilities, and among the special implementations that possess such capabilities is the file system named LittleFS. Although it is an open source filesystem, tests yielded that such a solution is not satisfactory because the implementation proved to be unreliable and the code is no longer actively maintained. Therefore, upgrades have been made to the existing FatFS file system, with addition of a secure software layer, which uses Hamming codes and a RAID-4 like system to provide an extra layer of data redundancy and safety. Basic tests were performed, and they proved the correctness and usability of the proposed approach. The developed software framework may be used with other file system implementations as well.
- Published
- 2020
45. BTRFS: The Linux B-Tree Filesystem.
- Author
-
RODEH, OHAD, BACIK, JOSEF, and MASON, CHRIS
- Subjects
LINUX operating systems ,ELECTRONIC file management ,DATA structures ,COMPUTER performance ,COMPUTER networks ,SCALABILITY ,CENTRAL processing units ,METADATA - Abstract
BTRFS is a Linux filesystem that has been adopted as the default filesystem in some popular versions of Linux. It is based on copy-on-write, allowing for efficient snapshots and clones. It uses B-trees as its main on-disk data structure. The design goal is to work well for many use cases and workloads. To this end, much effort has been directed to maintaining even performance as the filesystem ages, rather than trying to support a particular narrow benchmark use-case. Linux filesystems are installed on smartphones as well as enterprise servers. This entails challenges on many different fronts. Scalability. The filesystem must scale in many dimensions: disk space, memory, and CPUs. -- Data integrity. Losing data is not an option, and much effort is expended to safeguard the content. This includes checksums, metadata duplication, and RAID support built into the filesystem. -- Disk diversity. The system should work well with SSDs and hard disks. It is also expected to be able to use an array of different sized disks, which poses challenges to the RAID and striping mechanisms. This article describes the core ideas, data structures, and algorithms of this filesystem. It sheds light on the challenges posed by defragmentation in the presence of snapshots, and the tradeoffs required to maintain even performance in the face of a wide spectrum of workloads. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
46. IFHNFS: fast indexing information in mobile devices.
- Author
-
Corriero, Nicola, Gargiuolo, Giuseppe, and Pani, Giovanni
- Subjects
AD hoc computer networks ,INDEXING ,MOBILE communication systems ,COMPUTER software ,COMPUTER storage devices ,DATABASES ,SMARTPHONES ,INFORMATION sharing - Abstract
Abstract: To track movements of objects and people we need to use expensive technologies and complex softwares. Usually these softwares need lots of memory. There are many examples of objects and people of which would be useful to know the precise locations. Something sent via pony express, position of buses in the city, friends’ locations, and so on. Our purpose is to use connectivity of smartphone to share position via gps by using only a filesystem created ad hoc without databases or user space programs. IFHNFS is based on Hixosfs and NFS (Linux kernel). Indexing the most relevant data directly in the fs structure makes the exchange of data Faster and, via NFS, potentially available whenever and whenever. Ad-hoc solutions for Android have been developed in real contexts. The system have been tested on a network of Android OS devices that share data with a Linux server. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
47. Analysis of changes in file time attributes with file manipulation.
- Author
-
Bang, Jewan, Yoo, Byeongyeong, and Lee, Sangjin
- Subjects
ELECTRONIC file management ,WINDOWS (Graphical user interfaces) ,COMPUTER systems ,TABLE manipulation (Computer science) ,COMPUTER users ,FORENSIC sciences - Abstract
Abstract: Time information is an important factor in digital forensic investigations. The time information of files obtained under the New Technology File System (NTFS) for Windows is determined by the creation, modification, access, and master file table (MFT) entry modification times and can be changed by user manipulations such as copy, move, and change. The characteristics of changes in time attributes can be used to analyze certain user behaviors related to data transfer and modification. This study analyzes the change in time attributes of files or folders resulting from user manipulations under different Windows operating systems and deduces user behaviors through a procedure based on the analysis results. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
48. 具有无线传输功能的腕戴式血氧采集系统设计.
- Author
-
王建林, 孙佳, and 姜子庠
- Abstract
This paper introduces the design and implementation of pulse oximetry based on MSP430FG439. Based on the analysis of the system requirements, the signal acquisition and signal processing hardware design of the oximeter are completed. The multi-functional blood oxygen detection module with MSP430 as the core is set up. The oximeter has features: a peripheral probe combined with MSP430 MCU is used to signal acquisition and processing, has a good man-machine interface, real-timely displays the OLED screen pulse waveform and human blood oxygen heart rate, and detects of finger clip. And according to heart rate and blood oxygen alarm which are integrated by file system-based SDHC memory card, one can run the real-time recording and storage parameters. The design of the oxygen meter can be carried out on the power electronics and embedded experiment design. [ABSTRACT FROM AUTHOR]
- Published
- 2017
49. SPACE: A lightweight collaborative caching for clusters.
- Author
-
Akon, Mursalin, Islam, Towhidul, Shen, Xuemin, and Singh, Ajit
- Abstract
In this paper, we introduce Systematic P2P Aided Cache Enhancement or SPACE, a new collaboration scheme among clients in a computer cluster of a high performance computing facility to share their caches with each other. The collaboration is achieved in a distributed manner, and is designed based on peer-to-peer computing model. The objective is to provide (1) a decentralized solution, and (2) a near optimal performance with reasonably low overhead. Simulation results are given to demonstrate the performance of the proposed scheme. In addition, the results show that SPACE evenly distributes work loads among participators, and entirely eliminates any requirement of a central cache manager. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
50. High-Performance NAND and PRAM Hybrid Storage Design for Consumer Electronics.
- Author
-
Hyung Gyu Lee
- Subjects
- *
RANDOM access memory , *COMPUTER storage devices , *CENTRAL processing units , *HOUSEHOLD electronics industry , *COMPUTER architecture , *SYSTEMS development - Abstract
Recently PRAM (Phase-change RAM) is emerging as a promising next generation non-volatile memory device, because it supports fast byte-level access capability and in-place update (no erase-before-program constraint) unlike traditional NAND Flash. Although this PRAM technology is not matured yet, in terms of capacity and write performance, we expect that using this PRAM with traditional NAND Flash enables us to design high-performance and low cost storage for consumer electronics. So in this paper, we introduce a PRAM and NAND hybrid storage design as a practical approach. To this end, we first define a hybrid storage architecture, and then design a hybrid FTL (Flash Translation Layer) and a hybrid FAT filesystem. Finally, we demonstrate that our proposed hybrid storage solution enhances the storage performance 6 times faster and lifetime 6.4 times longer, on the average. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.