IJSRD - International Journal for Scientific Research & Development| Vol. 4, Issue 11, 2017 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 231
A Survey on Operating System Challenges and Security Issues Associate
to it
Bibhudutta Jena
School of Computer Engineering, KIIT University, India
Abstract— An operating system (OS) is generally containing
of software that operates computer hardware resources and
provides some basic services for computer programs. The
operating system is a vital component of the system software
in a computer system. In simple word operating system acts
as an intermediate between the user and hardware. Now –a-
days operating system plays an important role for processing
the system. It is the first thing that is freighted in to memory.
It takes a main role to release the burden from application
programmers during the process of different application. It
also behaves as an interface as an host for computing
paradigms. Operating system offers multiple numbers of
services to different application programmes and users. This
paper aims to provide a brief idea about different challenges
and security issues of operating system and also discusses
how to optimize the work of operating system which will be
helpful for enhancing the performance of the system.
Key words: Operating System Types, Operating System
Services, Kernel approach, I/O Operation, Memory
Management
I. INTRODUCTION
An operating system is a bunch of programs that monitors
the hardware and software resources of a computer. In the
absence of operating system it is impossible to display text
and graphics on the monitor. The first objective of operating
system is to control the hardware of the system. The second
objective is to provide an interactive interface to the user
and interpret commands due to which it can communicate
with the hardware [1] . These hardware resources include
processor memory and disk space and so on. Operating
system is also responsible for error handling procedure and
display an error notification while communicating with the
hardware.
Fig. 1: Operating System Position
The above figure[1] describe the position of
operating system in the computers as the paper has already
discussed operating system is generally act as an
intermediate between computer hardware and user utilities.
The operating system is generally responsible for
following essential activities or task.
A. Processor Management
The operating system responsible for managing the work
flow of processor and monitors different task of processor.
B. Memory Management
The operating also takes the responsibilities to manage the
memory of the system. It assigned the memory to different
task and also takes care for properly utilizing the memory of
the system.
C. Storage Management
It also used to monitor storage networks and devices. Some
other major responsibility of operating system is Storage
Management, Application Interface, User Interface etc.
Fig. 2: Role of an operating System
The above figure [2] describes some basic role of
an operating system inside the computer. Out of number of
responsibilities the paper has described some of the task that
has been carried out by the operating system.
The rest of the paper has been summed up in the
following manner. The section II gives a basic idea about
different type of operating systems that are used in different
domains. Similarly section III describes about Main memory
management after that section IV gives an idea about
different security issues and challenges of operating system.
Finally section V concludes the paper.
II. TYPES OF OPERATING SYSTEM
An operating system may execute its task either in serial
manner or in concurrent manner on the basis of this the
operating system has been classified in to following types:
A Survey on Operating System Challenges and Security Issues Associate to it
(IJSRD/Vol. 4/Issue 11/2017/065)
All rights reserved by www.ijsrd.com 232
Fig. 3: Types of operating System
A. Batch Operating System
In batch operating system the users are not directly interact
with the computers. In this type of operating first user have
prepared their jobs or task by punch cards and after that they
will submit it [2] to the computer for processing. Batch
processing is particularly useful for operations that are
generally required by the peripheral device. The major
disadvantages in this operating system are there will be no
interaction is possible with the user while the programme is
executed. To setup different job is also a biggest challenge
in this operating system.
B. Time Sharing Operating System
Time sharing is an essential feature of the operating system
and it allows multiple users to concurrently running the task
either in one processor or many processors by providing a
terminal to the user [3]. Time sharing can be defined as the
processor’s time which is shared among different users.
The major advantages of this type of operating system are it
gives quick response in comparison to the other operating
system and also minimizes the CPU idle time [4].
C. Distributed Operating System
In this type of operating system a large central computer
with number of remote terminals are connected with each
other for sharing their resources. Data processing jobs are
divided accordingly. By using various communication lines
the processor can communicate with each other which are
known as loosely coupled system or distributed system. The
major advantages of this type of operating system are it can
reduce the burden on host computer and also reduce the
delay in data processing [5].
D. Real–Time Operating System
A real-time system is defined as a data processing system in
which the time interval required to process and respond to
inputs is so small that it controls the environment. Real time
operating system generally follows a time period for the
execution of task known as deadline. It can be classified in
to two types
 Hard real time operating system: In this type of
operating system the job must be executed before reach
to the deadline, otherwise a huge loss will occur.
 Soft real time operating system: In this type of
operating system if the job meets the deadline then not
a huge loss will occur.
Now-a-days real time operating system widely
used in different application such as launching of satellite,
Broadcast of television etc.
Real time operating system is error free in
comparison to the other operating system and memory
allocation is best managed in this type of operating system.
In the above section of the paper some basic types
of operating systems has been described rather than this
number of operating systems are present which are used in
different application domains.
III. OPERATING SYSTEM MEMORY MANAGEMENT
The major service of the operating system is memory
management. Basically this is needed for the following
reason:
 To ensure protection of multiple processes from each
other due to which they will not interrupt each others
operation.
 Proper placement of programme in memory so that
they can be execute frequently.
 For proper assignment of memory to different
resources during execution.
Memory management is the functionality of an
operating system which handles or manages primary
memory and moves processes back and forth between main
memory and disk during execution [6]. It keeps tracks of
each and every memory location whether it is occupied or
free in nature. It also keep track how much memory
allocated to different resources for their execution and also
take the decision when the memory will allocate to different
resources. It checks at which time some memory gets
released or unallocated and according to it it updates the
status.
IV. SECURITY AND CHALLENGES
A. Security
Till now security has been a major concern for developers of
operating system. Generally protection of operating system
involves protection of operating system against the
unauthorized users and protection of file system. If
computer systems has no of users and grants the parallel
execution of multiple processes, then the various processes
must be protected from each other. In other word protection
refers to mechanism for controlling the access of
programmes, Hence the security system prohibits
unauthorized access to the system and confirming venomous
destruction of data. It also refers the authentication the users
of the system to save the purity of the information stored in
the system [7].
When consider the operating system security,
authentication attacks will make the bottom of priority list.
The major problems are attacks like, Trojan Horses, Login
spoofing and Buggy Software [8] . Program Threats is also a
security issue. Operating system's processes and kernel
perform the assigned task as instructed previously. If a user
program prepared these process do malicious tasks, then it is
known as Program Threats.
B. Challenges
Considering the above discussion the following gives a brief
idea about the challenges that need to be improved for
enhancing the performance of the operating system.
 To develop a convenient and secure operating system
that should provide an interface to write secure
applications [9].
A Survey on Operating System Challenges and Security Issues Associate to it
(IJSRD/Vol. 4/Issue 11/2017/065)
All rights reserved by www.ijsrd.com 233
 Construct an adaptable permission model .The existing
models are too simple and limited in nature.
 There will always be buggy code, but the trick is to
construct an application and an operating system that
will basically hamper attacks and will save the
principal assets of the system.
 To make the operating system reliable and fault
tolerance in nature is also an biggest challenge and
different techniques and approaches are developed to
overcome from this challenges.
V. CONCLUSION
Although operating systems have advanced a lot, yet still
there is a lot of things to cover in this domain. Operating
systems research is a very broad field and due to the the
reason for this is mostly because the hardware is becoming
powerful and become more complex day by day and hence
there is a race for the operating systems to proceed. The key
issue of this paper is to describe the challenges and security
issues of different operating system [10]. Optimization the
performance of operating system is a major concern in
today’s date. This paper has also described about different
types of operating systems and their application. Different
researches are going on to overcome from this challenge and
enhance the performance of the operating system.
REFERENCES
[1] A. Belay, A. Bittau, A. Mashtizadeh, D. Terei, D.
Mazieres, and C. Kozyrakis. Dune “Safe user-level
access to privileged CPU features”. In Proceedings of
the 10th USENIX Conference on Operating Systems
Design and Implementation (OSDI2012), pages
335{348, Oct. 2012.
[2] Buck, T. Foley, D. Horn, J. Sugerman, K. Fatahalian, L.
M. Houston and P. Hanrahan. “Brooks for GPUs:
stream computing on graphics hardware”. Proc. Of the
2004 SIGGRAPH Conference, pp. 777-786, 2004.
[3] S. Chaki, S. K. Rajamani and J. Rehof. Types as
Models: Model Checking Message Passing Programs.
Proc of the 29th ACM Symposium on Principles of
Programming Languages, pp. 45-57, 2002.
[4] Bibhudutta Jena"A review on Joining Approaches in
Hadoop Framework and Skewness Associate to it" Vol.
2 - Issue 6 ( Nov - Dec 2016), International Journal of
Engineering and Techniques (IJET) , ISSN: 2395 –
1303.
[5] S. Ghemawat, H. Gobioff and S. T. Leung, “The
Google file system”, Proceedings of the 19th ACM
symposium on Operating systems principles, Bolton
Landing, NY, USA, (2003) October 19–22, pp. 29- 43.
[6] S. Yu, X. L. Gui, R. W. Huang and W. Zhuang,
“Improving the storage efficiency of small files in cloud
storage, Journal of Xi'An Jiao Tong University, vol. 45,
no. 6, (2011), pp. 59-63.
[7] F. Mu, W. Xue, J. W. Shu and W. M. Zheng, “Metadata
management mechanism based on route directory”,
Journal of Tsinghua University (Sci & Tech), vol. 49,
no. 8, (2009), pp. 1229-1232.
[8] M. Guevara, C. Gregg, K. Hazelwood, and K.
Skadron.” Enabling Task Parallelism in the CUDA
Scheduler”. In Proceedings of the Workshop on
Programming Models for Emerging Architectures,
pages 69–76, 2009.
[9] R.M. Needham and D.F. Hartley. “Theory and practice
in operating system design”, in: Proc. 2nd ACM Symp.
on operating system principles, Princeton Univ.,
Princeton, N.J. (Oct. 20-22 1969) 8-12.
[10]R.M. Needham and D.F. Hartley. “Theory and practice
in operating system design”, in: Proc. 2nd ACM Symp.
on operating system principles, Princeton Univ.,
Princeton, N.J. (Oct. 20-22 1969) 8-12.

A Survey On Operating System Challenges And Security Issues Associate To It

  • 1.
    IJSRD - InternationalJournal for Scientific Research & Development| Vol. 4, Issue 11, 2017 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 231 A Survey on Operating System Challenges and Security Issues Associate to it Bibhudutta Jena School of Computer Engineering, KIIT University, India Abstract— An operating system (OS) is generally containing of software that operates computer hardware resources and provides some basic services for computer programs. The operating system is a vital component of the system software in a computer system. In simple word operating system acts as an intermediate between the user and hardware. Now –a- days operating system plays an important role for processing the system. It is the first thing that is freighted in to memory. It takes a main role to release the burden from application programmers during the process of different application. It also behaves as an interface as an host for computing paradigms. Operating system offers multiple numbers of services to different application programmes and users. This paper aims to provide a brief idea about different challenges and security issues of operating system and also discusses how to optimize the work of operating system which will be helpful for enhancing the performance of the system. Key words: Operating System Types, Operating System Services, Kernel approach, I/O Operation, Memory Management I. INTRODUCTION An operating system is a bunch of programs that monitors the hardware and software resources of a computer. In the absence of operating system it is impossible to display text and graphics on the monitor. The first objective of operating system is to control the hardware of the system. The second objective is to provide an interactive interface to the user and interpret commands due to which it can communicate with the hardware [1] . These hardware resources include processor memory and disk space and so on. Operating system is also responsible for error handling procedure and display an error notification while communicating with the hardware. Fig. 1: Operating System Position The above figure[1] describe the position of operating system in the computers as the paper has already discussed operating system is generally act as an intermediate between computer hardware and user utilities. The operating system is generally responsible for following essential activities or task. A. Processor Management The operating system responsible for managing the work flow of processor and monitors different task of processor. B. Memory Management The operating also takes the responsibilities to manage the memory of the system. It assigned the memory to different task and also takes care for properly utilizing the memory of the system. C. Storage Management It also used to monitor storage networks and devices. Some other major responsibility of operating system is Storage Management, Application Interface, User Interface etc. Fig. 2: Role of an operating System The above figure [2] describes some basic role of an operating system inside the computer. Out of number of responsibilities the paper has described some of the task that has been carried out by the operating system. The rest of the paper has been summed up in the following manner. The section II gives a basic idea about different type of operating systems that are used in different domains. Similarly section III describes about Main memory management after that section IV gives an idea about different security issues and challenges of operating system. Finally section V concludes the paper. II. TYPES OF OPERATING SYSTEM An operating system may execute its task either in serial manner or in concurrent manner on the basis of this the operating system has been classified in to following types:
  • 2.
    A Survey onOperating System Challenges and Security Issues Associate to it (IJSRD/Vol. 4/Issue 11/2017/065) All rights reserved by www.ijsrd.com 232 Fig. 3: Types of operating System A. Batch Operating System In batch operating system the users are not directly interact with the computers. In this type of operating first user have prepared their jobs or task by punch cards and after that they will submit it [2] to the computer for processing. Batch processing is particularly useful for operations that are generally required by the peripheral device. The major disadvantages in this operating system are there will be no interaction is possible with the user while the programme is executed. To setup different job is also a biggest challenge in this operating system. B. Time Sharing Operating System Time sharing is an essential feature of the operating system and it allows multiple users to concurrently running the task either in one processor or many processors by providing a terminal to the user [3]. Time sharing can be defined as the processor’s time which is shared among different users. The major advantages of this type of operating system are it gives quick response in comparison to the other operating system and also minimizes the CPU idle time [4]. C. Distributed Operating System In this type of operating system a large central computer with number of remote terminals are connected with each other for sharing their resources. Data processing jobs are divided accordingly. By using various communication lines the processor can communicate with each other which are known as loosely coupled system or distributed system. The major advantages of this type of operating system are it can reduce the burden on host computer and also reduce the delay in data processing [5]. D. Real–Time Operating System A real-time system is defined as a data processing system in which the time interval required to process and respond to inputs is so small that it controls the environment. Real time operating system generally follows a time period for the execution of task known as deadline. It can be classified in to two types  Hard real time operating system: In this type of operating system the job must be executed before reach to the deadline, otherwise a huge loss will occur.  Soft real time operating system: In this type of operating system if the job meets the deadline then not a huge loss will occur. Now-a-days real time operating system widely used in different application such as launching of satellite, Broadcast of television etc. Real time operating system is error free in comparison to the other operating system and memory allocation is best managed in this type of operating system. In the above section of the paper some basic types of operating systems has been described rather than this number of operating systems are present which are used in different application domains. III. OPERATING SYSTEM MEMORY MANAGEMENT The major service of the operating system is memory management. Basically this is needed for the following reason:  To ensure protection of multiple processes from each other due to which they will not interrupt each others operation.  Proper placement of programme in memory so that they can be execute frequently.  For proper assignment of memory to different resources during execution. Memory management is the functionality of an operating system which handles or manages primary memory and moves processes back and forth between main memory and disk during execution [6]. It keeps tracks of each and every memory location whether it is occupied or free in nature. It also keep track how much memory allocated to different resources for their execution and also take the decision when the memory will allocate to different resources. It checks at which time some memory gets released or unallocated and according to it it updates the status. IV. SECURITY AND CHALLENGES A. Security Till now security has been a major concern for developers of operating system. Generally protection of operating system involves protection of operating system against the unauthorized users and protection of file system. If computer systems has no of users and grants the parallel execution of multiple processes, then the various processes must be protected from each other. In other word protection refers to mechanism for controlling the access of programmes, Hence the security system prohibits unauthorized access to the system and confirming venomous destruction of data. It also refers the authentication the users of the system to save the purity of the information stored in the system [7]. When consider the operating system security, authentication attacks will make the bottom of priority list. The major problems are attacks like, Trojan Horses, Login spoofing and Buggy Software [8] . Program Threats is also a security issue. Operating system's processes and kernel perform the assigned task as instructed previously. If a user program prepared these process do malicious tasks, then it is known as Program Threats. B. Challenges Considering the above discussion the following gives a brief idea about the challenges that need to be improved for enhancing the performance of the operating system.  To develop a convenient and secure operating system that should provide an interface to write secure applications [9].
  • 3.
    A Survey onOperating System Challenges and Security Issues Associate to it (IJSRD/Vol. 4/Issue 11/2017/065) All rights reserved by www.ijsrd.com 233  Construct an adaptable permission model .The existing models are too simple and limited in nature.  There will always be buggy code, but the trick is to construct an application and an operating system that will basically hamper attacks and will save the principal assets of the system.  To make the operating system reliable and fault tolerance in nature is also an biggest challenge and different techniques and approaches are developed to overcome from this challenges. V. CONCLUSION Although operating systems have advanced a lot, yet still there is a lot of things to cover in this domain. Operating systems research is a very broad field and due to the the reason for this is mostly because the hardware is becoming powerful and become more complex day by day and hence there is a race for the operating systems to proceed. The key issue of this paper is to describe the challenges and security issues of different operating system [10]. Optimization the performance of operating system is a major concern in today’s date. This paper has also described about different types of operating systems and their application. Different researches are going on to overcome from this challenge and enhance the performance of the operating system. REFERENCES [1] A. Belay, A. Bittau, A. Mashtizadeh, D. Terei, D. Mazieres, and C. Kozyrakis. Dune “Safe user-level access to privileged CPU features”. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI2012), pages 335{348, Oct. 2012. [2] Buck, T. Foley, D. Horn, J. Sugerman, K. Fatahalian, L. M. Houston and P. Hanrahan. “Brooks for GPUs: stream computing on graphics hardware”. Proc. Of the 2004 SIGGRAPH Conference, pp. 777-786, 2004. [3] S. Chaki, S. K. Rajamani and J. Rehof. Types as Models: Model Checking Message Passing Programs. Proc of the 29th ACM Symposium on Principles of Programming Languages, pp. 45-57, 2002. [4] Bibhudutta Jena"A review on Joining Approaches in Hadoop Framework and Skewness Associate to it" Vol. 2 - Issue 6 ( Nov - Dec 2016), International Journal of Engineering and Techniques (IJET) , ISSN: 2395 – 1303. [5] S. Ghemawat, H. Gobioff and S. T. Leung, “The Google file system”, Proceedings of the 19th ACM symposium on Operating systems principles, Bolton Landing, NY, USA, (2003) October 19–22, pp. 29- 43. [6] S. Yu, X. L. Gui, R. W. Huang and W. Zhuang, “Improving the storage efficiency of small files in cloud storage, Journal of Xi'An Jiao Tong University, vol. 45, no. 6, (2011), pp. 59-63. [7] F. Mu, W. Xue, J. W. Shu and W. M. Zheng, “Metadata management mechanism based on route directory”, Journal of Tsinghua University (Sci & Tech), vol. 49, no. 8, (2009), pp. 1229-1232. [8] M. Guevara, C. Gregg, K. Hazelwood, and K. Skadron.” Enabling Task Parallelism in the CUDA Scheduler”. In Proceedings of the Workshop on Programming Models for Emerging Architectures, pages 69–76, 2009. [9] R.M. Needham and D.F. Hartley. “Theory and practice in operating system design”, in: Proc. 2nd ACM Symp. on operating system principles, Princeton Univ., Princeton, N.J. (Oct. 20-22 1969) 8-12. [10]R.M. Needham and D.F. Hartley. “Theory and practice in operating system design”, in: Proc. 2nd ACM Symp. on operating system principles, Princeton Univ., Princeton, N.J. (Oct. 20-22 1969) 8-12.