End-to-end Integrity for File-System Data

نویسندگان

  • Jorrit N. Herder
  • David C. van Moolenbroek
  • Raja Appuswamy
  • Andrew S. Tanenbaum
چکیده

The MINIX 3 operating system is designed to restart misbehaving or crashed drivers, but currently cannot protect the user’s file-system data. Because the blockdevice stack lacks end-to-end integrity, it is impossible to tell whether data corruption occurred—and, even if we could, there is no means to recover the data lost. Therefore, we have extended MINIX 3’s failureresilience mechanisms with guarantees for (1) detecting data corruption and (2) recovering lost data in the event of single block-device driver failures. Our approach is based on a flexible filter driver that transparently interposes upon all file system requests. Different protection strategies based on checksumming and mirroring of data are supported.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unifying File System Protection

This paper describes an efficient and elegant architecture for unifying the meta-data protection of journaling file systems with the data integrity protection of collision-resistant cryptographic hashes. Traditional file system journaling protects the ordering of meta-data operations to maintain consistency in the presence of crashes. However, journaling does not protect important system meta-d...

متن کامل

End-to-end Data Integrity for File Systems: A ZFS Case Study

We present a study of the effects of disk and memory corruption on file system data integrity. Our analysis focuses on Sun’s ZFS, a modern commercial offering with numerous reliability mechanisms. Through careful and thorough fault injection, we show that ZFS is robust to a wide range of disk faults. We further demonstrate that ZFS is less resilient to memory corruption, which can lead to corru...

متن کامل

Securing Data Transfers: An Integrity Algorithm for Error Recovery Triangulation

Transferring data is one of the key operations performed by millions of users every day. Users do this by issuing direct commands, such as file transfer commands, or indirectly as a feature invoked by numerous end-user applications. The most important security characteristic of a successful data exchange is the integrity of that data. The receiver user desires to acquire data that has not been ...

متن کامل

SAP: an Architecture for Selectively Approximate Wireless Communication

Integrity checking is ubiquitous in data networks, but not all network traffic needs integrity protection. Many applications can tolerate slightly damaged data while still working acceptably, trading accuracy versus efficiency to save time and energy. Such applications should be able to receive damaged data if they so desire. In today’s network stacks, lower-layer integrity checks discard damag...

متن کامل

High Performance Reliable File Transfers Using Automatic Many-to-Many Parallelization

Shift is a lightweight framework for high performance local and remote file transfers that provides resiliency across a wide variety of failure scenarios. Shift supports multiple file transport protocols with automatic selection of the most appropriate mechanism between each pair of participating hosts allowing it to adapt to heterogeneous clients with differing software and network access rest...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009