End-to-end Integrity for File-System Data
نویسندگان
چکیده
The MINIX 3 operating system is designed to restart misbehaving or crashed drivers, but currently cannot protect the user’s file-system data. Because the blockdevice stack lacks end-to-end integrity, it is impossible to tell whether data corruption occurred—and, even if we could, there is no means to recover the data lost. Therefore, we have extended MINIX 3’s failureresilience mechanisms with guarantees for (1) detecting data corruption and (2) recovering lost data in the event of single block-device driver failures. Our approach is based on a flexible filter driver that transparently interposes upon all file system requests. Different protection strategies based on checksumming and mirroring of data are supported.
منابع مشابه
Unifying File System Protection
This paper describes an efficient and elegant architecture for unifying the meta-data protection of journaling file systems with the data integrity protection of collision-resistant cryptographic hashes. Traditional file system journaling protects the ordering of meta-data operations to maintain consistency in the presence of crashes. However, journaling does not protect important system meta-d...
متن کاملEnd-to-end Data Integrity for File Systems: A ZFS Case Study
We present a study of the effects of disk and memory corruption on file system data integrity. Our analysis focuses on Sun’s ZFS, a modern commercial offering with numerous reliability mechanisms. Through careful and thorough fault injection, we show that ZFS is robust to a wide range of disk faults. We further demonstrate that ZFS is less resilient to memory corruption, which can lead to corru...
متن کاملSecuring Data Transfers: An Integrity Algorithm for Error Recovery Triangulation
Transferring data is one of the key operations performed by millions of users every day. Users do this by issuing direct commands, such as file transfer commands, or indirectly as a feature invoked by numerous end-user applications. The most important security characteristic of a successful data exchange is the integrity of that data. The receiver user desires to acquire data that has not been ...
متن کاملSAP: an Architecture for Selectively Approximate Wireless Communication
Integrity checking is ubiquitous in data networks, but not all network traffic needs integrity protection. Many applications can tolerate slightly damaged data while still working acceptably, trading accuracy versus efficiency to save time and energy. Such applications should be able to receive damaged data if they so desire. In today’s network stacks, lower-layer integrity checks discard damag...
متن کاملHigh Performance Reliable File Transfers Using Automatic Many-to-Many Parallelization
Shift is a lightweight framework for high performance local and remote file transfers that provides resiliency across a wide variety of failure scenarios. Shift supports multiple file transport protocols with automatic selection of the most appropriate mechanism between each pair of participating hosts allowing it to adapt to heterogeneous clients with differing software and network access rest...
متن کامل