SlideShare a Scribd company logo
1 of 30
Group member are
Hira Gul
Bushra Mehmood
Our topic :-
File system interface
Protection
Context
• Introduction
• Access Methods
• Access control
• Other protection approaches
• Permission in unix system
• Summery
Introduction
• When information is stored in a
computer system, we want to keep it
safe from physical damage (the issue
of reliability) and improper access (the
issue of protection).
Introduction (continues)
• Reliability is generally
provided by duplicate
copies of files.
• Many computers have
systems programs that
automatically.
• File systems can be
damaged by hardware
problems.
• Files may be deleted
accidentally.
Introduction (continues)
• Two types of user system:-
• Single user system:
• For a small single-user system, we
might provide protection by physically
removing the floppy disks and locking
them in a desk drawer or file cabinet.
Introduction (continues )
• Multi-user system:
• In a multiuser system, however, other mechanisms
are needed.
• We discuss later…..
Access method
• Why we need access protection?
• The need to protect files is a direct result of the
ability to access files. Systems that do not permit
access to the files of other users do not need
protection. Thus, we could provide complete
protection by prohibiting access.
Protection
• File owner/creator should
be able to control:
– what can be done
– by whom
• Types of access
– Read
– Write
– Execute
– Append
– Delete
– List
Types of access
• Several different types of operations may be
controlled:
• Read. Read from the file.
• Write. Write or rewrite the file.
• Execute. Load the file into memory and execute it.
• Append. Write new information at the end of the
file.
• Delete. Delete the file and free its space for possible
reuse.
• List. List the name and attributes of the file.
Types of access (continuous)
• Other operations, such as renaming, copying, and
editing the file, may also be controlled. For many
systems, however, these higher-level functions may
be implemented by a system program that makes
lower-level system calls. Protection is provided at
only the lower level.
Access control
• The most common approach to the protection
problem is to make access dependent on the
identity of the user.
• Different users may need different types of access
to a file or directory.
• The most general scheme to implement dependent
access is to associate with each file and directory an
(Acl) specifying user names and the types of access
allowed for each user.
Main problem with access list
• The main problem with access lists is their length.
• If we want to allow everyone to read a file, we must
list all users with read access.
• This technique has two undesirable consequences:
• Constructing such a list may be a tedious and
unrewarding task, especially if we do not know in
advance the list of users in the system.
• The directory entry, previously of fixed size, now
must be of variable size, resulting in more
complicated space management.
Solution to problem
• These problems can be resolved by use of a
condensed version of the access list.
• To condense the length of the access-control list,
many systems recognize three classifications of
users in connection with each file:
• Owner. The user who created the file is the owner.
• Group. A set of users who are sharing the file and
need similar access is a group, or work group.
• Universe. All other users in the system constitute
the universe.
Example:
• consider a person, Sara, who is writing a new book.
She has hired three graduate students (Jim, Dawn,
and Jill) to help with the project. The text of the
book is kept in a file named book.
Continuous
• The protection associated with this file is
as follows:
• Sara should be able to invoke all
operations on the file.
• Jim, Dawn, and Jill should be able only to
read and write the file; they should not
be allowed to delete the file.
• All other users should be able to read,
but not write, the file. (Sara is interested
in letting as many people as possible read
the text so that she can obtain feedback.)
Over to
Bushra Mehmood
Scenario
• Now consider a visitor to whom Sara would like to
grant temporary access to Chapter 1.
• The visitor cannot be added to the text group
because that would give him access to all chapters.
Because a file can only be in one group, Sara cannot
add another group to Chapter 1.
• with the addition of access-control-list
functionality, though, the visitor can be added to
the access control list of Chapter 1.
Scheme in unix system
• For this scheme to work properly,
permissions and access lists must be
controlled tightly. This control can be
accomplished in several ways. For
example, in the UNIX system, groups
can be created and modified only by
the manager of the facility (or by any
superuser)
Unix system (continuous)
• With the more limited protection classification, only
three fields are needed to define protection. Often,
each field is a collection of bits, and each bit either
allows or prevents the access associated with it.
• Example:
• For example, the UNIX system defines three fields of
3 bits each -rwx, where r controls read access, w
controls write access, and x controls execution.
Scheme (continuous)
• A separate field is kept for the file
owner, for the file's group, and for all
other users. In this scheme, 9 bits per
file are needed to record protection
information. Thus, for our example,
the protection fields for the file book
are as follows: for the owner Sara, all
bits are set; for the group text, the
rand w bits are set; and for the
universe, only the r bit is set.
Unix system (continuous)
• One difficulty in combining approaches comes in
the user interface. Users must be able to tell when
the optional ACL permissions are set on a file. In the
Solaris example, a"+" appends the regular
permissions.
• -rw-r--r--+ 1 jim staff 130 May 25 22:13 file1
• A separate set of commands, setfacl and getfacl, is
used to manage the ACLs
window xp access control list
management
PERMISSIONS IN A UNIX SYSTEM
• Associated with each subdirectory are three fields-
owner, group, and universe-each consisting of the
three bits rwx.
• Thus, a user can list the content of a subdirectory
only if the r bit is set in the appropriate field.
• Similarly, a user can change his current directory to
another current directory (say, foo) only if the x bit
associated with the foo subdirectory is set in the
appropriate field.
PERMISSIONS IN A UNIX SYSTEM
con….
• A sample directory listing from a UNIX
environment is shown
• The first field describes the protecti.on
of the file or directory
• A d as the first character indicates a
s11bdirectory.
• Also shown are the number of links to
the file, the owner's name, the group's
name, the size of the file in bytes, the
date of last modification, and finally the
file's name (with optional extension).
PERMISSIONS IN A UNIX SYSTEM conti…
Summery
• In a multilevel directory structure, we
need to protect not only individual
files but also collections of files in
subdirectories; that is, we need to
provide a mechanism for directory
protection.
• In systems where files may have
numerous path names (such as acyclic
or general graphs), a given user may
have different access rights to a
particular file, depending on the path
name used.
Oerating system project
Oerating system project

More Related Content

What's hot

Unit 3 chapter 1-file management
Unit 3 chapter 1-file managementUnit 3 chapter 1-file management
Unit 3 chapter 1-file managementKalai Selvi
 
File System Interface
File System InterfaceFile System Interface
File System Interfacechandinisanz
 
M2 211-unix fs-rl_2.1.1
M2 211-unix fs-rl_2.1.1M2 211-unix fs-rl_2.1.1
M2 211-unix fs-rl_2.1.1MrudulaJoshi10
 
File system security
File system securityFile system security
File system securityAmmAr mobark
 
File Directory Structure-R.D.Sivakumar
File Directory Structure-R.D.SivakumarFile Directory Structure-R.D.Sivakumar
File Directory Structure-R.D.SivakumarSivakumar R D .
 
2nd unit part 1
2nd unit  part 12nd unit  part 1
2nd unit part 1Pavan Illa
 
Ch11 file system implementation
Ch11   file system implementationCh11   file system implementation
Ch11 file system implementationWelly Dian Astika
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systemsvampugani
 
File Management
File ManagementFile Management
File ManagementNajma Alam
 
File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating SystemJanki Shah
 
ITFT_File system interface in Operating System
ITFT_File system interface in Operating SystemITFT_File system interface in Operating System
ITFT_File system interface in Operating SystemSneh Prabha
 

What's hot (19)

Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Unit 3 chapter 1-file management
Unit 3 chapter 1-file managementUnit 3 chapter 1-file management
Unit 3 chapter 1-file management
 
File System Interface
File System InterfaceFile System Interface
File System Interface
 
System calls
System callsSystem calls
System calls
 
M2 211-unix fs-rl_2.1.1
M2 211-unix fs-rl_2.1.1M2 211-unix fs-rl_2.1.1
M2 211-unix fs-rl_2.1.1
 
File system security
File system securityFile system security
File system security
 
File Directory Structure-R.D.Sivakumar
File Directory Structure-R.D.SivakumarFile Directory Structure-R.D.Sivakumar
File Directory Structure-R.D.Sivakumar
 
Operating System
Operating SystemOperating System
Operating System
 
OSCh21
OSCh21OSCh21
OSCh21
 
OSCh11
OSCh11OSCh11
OSCh11
 
2nd unit part 1
2nd unit  part 12nd unit  part 1
2nd unit part 1
 
Os6
Os6Os6
Os6
 
Ch11 file system implementation
Ch11   file system implementationCh11   file system implementation
Ch11 file system implementation
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systems
 
File Management
File ManagementFile Management
File Management
 
File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating System
 
File management
File managementFile management
File management
 
Cyber security
Cyber securityCyber security
Cyber security
 
ITFT_File system interface in Operating System
ITFT_File system interface in Operating SystemITFT_File system interface in Operating System
ITFT_File system interface in Operating System
 

Viewers also liked

A presentation on e commerece
A presentation on e commerece A presentation on e commerece
A presentation on e commerece Swarnima Tiwari
 
Information system in business functions unit iv
Information system in business functions unit ivInformation system in business functions unit iv
Information system in business functions unit ivlaiprabhakar
 
Array in c language
Array in c languageArray in c language
Array in c languagehome
 
Presentation on different kinds of software
Presentation on different kinds of softwarePresentation on different kinds of software
Presentation on different kinds of softwareNitish Xavier Tirkey
 
04 software system and application software
04 software   system and application software04 software   system and application software
04 software system and application softwareSowmini Gowda
 
Information system
Information systemInformation system
Information systemhiddensoul
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)Navneet Jingar
 

Viewers also liked (8)

A presentation on e commerece
A presentation on e commerece A presentation on e commerece
A presentation on e commerece
 
Information system in business functions unit iv
Information system in business functions unit ivInformation system in business functions unit iv
Information system in business functions unit iv
 
Array in c language
Array in c languageArray in c language
Array in c language
 
Presentation on different kinds of software
Presentation on different kinds of softwarePresentation on different kinds of software
Presentation on different kinds of software
 
04 software system and application software
04 software   system and application software04 software   system and application software
04 software system and application software
 
Information system
Information systemInformation system
Information system
 
Array in C
Array in CArray in C
Array in C
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)
 

Similar to Oerating system project

File system in operating system e learning
File system in operating system e learningFile system in operating system e learning
File system in operating system e learningLavanya Sharma
 
06 users groups_and_permissions
06 users groups_and_permissions06 users groups_and_permissions
06 users groups_and_permissionsShay Cohen
 
Top school in noida
Top school in noidaTop school in noida
Top school in noidaEdhole.com
 
Course 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and PermissionsCourse 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and PermissionsAhmed El-Arabawy
 
File Management & Access Control
File Management & Access Control File Management & Access Control
File Management & Access Control YuvrajWadavale
 
INVESTIGATING UNIX SYSTEMS.pptx
INVESTIGATING UNIX SYSTEMS.pptxINVESTIGATING UNIX SYSTEMS.pptx
INVESTIGATING UNIX SYSTEMS.pptxAmAngel1
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction Mohamed Gad
 
04-1-Linux.ppt
04-1-Linux.ppt04-1-Linux.ppt
04-1-Linux.pptEidTahir
 
File systeminterface-pre-final-formatting
File systeminterface-pre-final-formattingFile systeminterface-pre-final-formatting
File systeminterface-pre-final-formattingmarangburu42
 
File system interface Pre Final
File system interface Pre FinalFile system interface Pre Final
File system interface Pre Finalmarangburu42
 
Unit 3 file management
Unit 3 file managementUnit 3 file management
Unit 3 file managementKalai Selvi
 

Similar to Oerating system project (20)

File System operating system operating system
File System  operating system operating systemFile System  operating system operating system
File System operating system operating system
 
File system in operating system e learning
File system in operating system e learningFile system in operating system e learning
File system in operating system e learning
 
Protection
ProtectionProtection
Protection
 
Unix/Linux
Unix/Linux Unix/Linux
Unix/Linux
 
06 users groups_and_permissions
06 users groups_and_permissions06 users groups_and_permissions
06 users groups_and_permissions
 
Top school in noida
Top school in noidaTop school in noida
Top school in noida
 
OS Unit IV.ppt
OS Unit IV.pptOS Unit IV.ppt
OS Unit IV.ppt
 
Ppt linux
Ppt linuxPpt linux
Ppt linux
 
File structure
File structureFile structure
File structure
 
Course 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and PermissionsCourse 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and Permissions
 
File Management & Access Control
File Management & Access Control File Management & Access Control
File Management & Access Control
 
INVESTIGATING UNIX SYSTEMS.pptx
INVESTIGATING UNIX SYSTEMS.pptxINVESTIGATING UNIX SYSTEMS.pptx
INVESTIGATING UNIX SYSTEMS.pptx
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction
 
File Systems
File SystemsFile Systems
File Systems
 
04-1-Linux.ppt
04-1-Linux.ppt04-1-Linux.ppt
04-1-Linux.ppt
 
File systeminterface-pre-final-formatting
File systeminterface-pre-final-formattingFile systeminterface-pre-final-formatting
File systeminterface-pre-final-formatting
 
File system interface Pre Final
File system interface Pre FinalFile system interface Pre Final
File system interface Pre Final
 
Unit 3 file management
Unit 3 file managementUnit 3 file management
Unit 3 file management
 
Chapter 12.pptx
Chapter 12.pptxChapter 12.pptx
Chapter 12.pptx
 
UNIT I.pptx
UNIT I.pptxUNIT I.pptx
UNIT I.pptx
 

More from Hira Gul

Final iwvc
Final iwvcFinal iwvc
Final iwvcHira Gul
 
project Judaism iwvc presentation
project Judaism iwvc presentation project Judaism iwvc presentation
project Judaism iwvc presentation Hira Gul
 
09d transform & conquer spring2015
09d transform & conquer spring201509d transform & conquer spring2015
09d transform & conquer spring2015Hira Gul
 
08 decrease and conquer spring 15
08 decrease and conquer spring 1508 decrease and conquer spring 15
08 decrease and conquer spring 15Hira Gul
 
04 brute force
04 brute force04 brute force
04 brute forceHira Gul
 
03 mathematical anaylsis
03 mathematical anaylsis03 mathematical anaylsis
03 mathematical anaylsisHira Gul
 
02 order of growth
02 order of growth02 order of growth
02 order of growthHira Gul
 
01 intro to algorithm--updated 2015
01 intro to algorithm--updated 201501 intro to algorithm--updated 2015
01 intro to algorithm--updated 2015Hira Gul
 

More from Hira Gul (12)

Final iwvc
Final iwvcFinal iwvc
Final iwvc
 
project Judaism iwvc presentation
project Judaism iwvc presentation project Judaism iwvc presentation
project Judaism iwvc presentation
 
09d transform & conquer spring2015
09d transform & conquer spring201509d transform & conquer spring2015
09d transform & conquer spring2015
 
08 decrease and conquer spring 15
08 decrease and conquer spring 1508 decrease and conquer spring 15
08 decrease and conquer spring 15
 
07 dc3
07 dc307 dc3
07 dc3
 
06 dc2
06 dc206 dc2
06 dc2
 
05 dc1
05 dc105 dc1
05 dc1
 
04 brute force
04 brute force04 brute force
04 brute force
 
03 mathematical anaylsis
03 mathematical anaylsis03 mathematical anaylsis
03 mathematical anaylsis
 
03 dc
03 dc03 dc
03 dc
 
02 order of growth
02 order of growth02 order of growth
02 order of growth
 
01 intro to algorithm--updated 2015
01 intro to algorithm--updated 201501 intro to algorithm--updated 2015
01 intro to algorithm--updated 2015
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...Pooja Nehwal
 
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...ranjana rawat
 
Develop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointDevelop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointGetawu
 
VVIP Pune Call Girls Kalyani Nagar (7001035870) Pune Escorts Nearby with Comp...
VVIP Pune Call Girls Kalyani Nagar (7001035870) Pune Escorts Nearby with Comp...VVIP Pune Call Girls Kalyani Nagar (7001035870) Pune Escorts Nearby with Comp...
VVIP Pune Call Girls Kalyani Nagar (7001035870) Pune Escorts Nearby with Comp...Call Girls in Nagpur High Profile
 
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Pooja Nehwal
 
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...nagunakhan
 
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...Call Girls in Nagpur High Profile
 
(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service
(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service
(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...Amil baba
 
Dubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai WisteriaDubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai WisteriaUnited Arab Emirates
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...Pooja Nehwal
 
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...ranjana rawat
 
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikLow Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)kojalkojal131
 
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Pooja Nehwal
 
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service SaharanpurVIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service SaharanpurSuhani Kapoor
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
 
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
 
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
 
Develop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointDevelop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power point
 
VVIP Pune Call Girls Kalyani Nagar (7001035870) Pune Escorts Nearby with Comp...
VVIP Pune Call Girls Kalyani Nagar (7001035870) Pune Escorts Nearby with Comp...VVIP Pune Call Girls Kalyani Nagar (7001035870) Pune Escorts Nearby with Comp...
VVIP Pune Call Girls Kalyani Nagar (7001035870) Pune Escorts Nearby with Comp...
 
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
 
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
 
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
 
(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service
(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service
(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service
 
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
 
Dubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai WisteriaDubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai Wisteria
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
 
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
 
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
 
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikLow Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
 
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
 
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
 
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service SaharanpurVIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
 

Oerating system project

  • 1.
  • 2. Group member are Hira Gul Bushra Mehmood
  • 3. Our topic :- File system interface Protection
  • 4. Context • Introduction • Access Methods • Access control • Other protection approaches • Permission in unix system • Summery
  • 5. Introduction • When information is stored in a computer system, we want to keep it safe from physical damage (the issue of reliability) and improper access (the issue of protection).
  • 6. Introduction (continues) • Reliability is generally provided by duplicate copies of files. • Many computers have systems programs that automatically. • File systems can be damaged by hardware problems. • Files may be deleted accidentally.
  • 7. Introduction (continues) • Two types of user system:- • Single user system: • For a small single-user system, we might provide protection by physically removing the floppy disks and locking them in a desk drawer or file cabinet.
  • 8. Introduction (continues ) • Multi-user system: • In a multiuser system, however, other mechanisms are needed. • We discuss later…..
  • 9. Access method • Why we need access protection? • The need to protect files is a direct result of the ability to access files. Systems that do not permit access to the files of other users do not need protection. Thus, we could provide complete protection by prohibiting access.
  • 10. Protection • File owner/creator should be able to control: – what can be done – by whom • Types of access – Read – Write – Execute – Append – Delete – List
  • 11. Types of access • Several different types of operations may be controlled: • Read. Read from the file. • Write. Write or rewrite the file. • Execute. Load the file into memory and execute it. • Append. Write new information at the end of the file. • Delete. Delete the file and free its space for possible reuse. • List. List the name and attributes of the file.
  • 12. Types of access (continuous) • Other operations, such as renaming, copying, and editing the file, may also be controlled. For many systems, however, these higher-level functions may be implemented by a system program that makes lower-level system calls. Protection is provided at only the lower level.
  • 13. Access control • The most common approach to the protection problem is to make access dependent on the identity of the user. • Different users may need different types of access to a file or directory. • The most general scheme to implement dependent access is to associate with each file and directory an (Acl) specifying user names and the types of access allowed for each user.
  • 14. Main problem with access list • The main problem with access lists is their length. • If we want to allow everyone to read a file, we must list all users with read access. • This technique has two undesirable consequences: • Constructing such a list may be a tedious and unrewarding task, especially if we do not know in advance the list of users in the system. • The directory entry, previously of fixed size, now must be of variable size, resulting in more complicated space management.
  • 15. Solution to problem • These problems can be resolved by use of a condensed version of the access list. • To condense the length of the access-control list, many systems recognize three classifications of users in connection with each file: • Owner. The user who created the file is the owner. • Group. A set of users who are sharing the file and need similar access is a group, or work group. • Universe. All other users in the system constitute the universe.
  • 16. Example: • consider a person, Sara, who is writing a new book. She has hired three graduate students (Jim, Dawn, and Jill) to help with the project. The text of the book is kept in a file named book.
  • 17. Continuous • The protection associated with this file is as follows: • Sara should be able to invoke all operations on the file. • Jim, Dawn, and Jill should be able only to read and write the file; they should not be allowed to delete the file. • All other users should be able to read, but not write, the file. (Sara is interested in letting as many people as possible read the text so that she can obtain feedback.)
  • 19. Scenario • Now consider a visitor to whom Sara would like to grant temporary access to Chapter 1. • The visitor cannot be added to the text group because that would give him access to all chapters. Because a file can only be in one group, Sara cannot add another group to Chapter 1. • with the addition of access-control-list functionality, though, the visitor can be added to the access control list of Chapter 1.
  • 20. Scheme in unix system • For this scheme to work properly, permissions and access lists must be controlled tightly. This control can be accomplished in several ways. For example, in the UNIX system, groups can be created and modified only by the manager of the facility (or by any superuser)
  • 21. Unix system (continuous) • With the more limited protection classification, only three fields are needed to define protection. Often, each field is a collection of bits, and each bit either allows or prevents the access associated with it. • Example: • For example, the UNIX system defines three fields of 3 bits each -rwx, where r controls read access, w controls write access, and x controls execution.
  • 22. Scheme (continuous) • A separate field is kept for the file owner, for the file's group, and for all other users. In this scheme, 9 bits per file are needed to record protection information. Thus, for our example, the protection fields for the file book are as follows: for the owner Sara, all bits are set; for the group text, the rand w bits are set; and for the universe, only the r bit is set.
  • 23. Unix system (continuous) • One difficulty in combining approaches comes in the user interface. Users must be able to tell when the optional ACL permissions are set on a file. In the Solaris example, a"+" appends the regular permissions. • -rw-r--r--+ 1 jim staff 130 May 25 22:13 file1 • A separate set of commands, setfacl and getfacl, is used to manage the ACLs
  • 24. window xp access control list management
  • 25. PERMISSIONS IN A UNIX SYSTEM • Associated with each subdirectory are three fields- owner, group, and universe-each consisting of the three bits rwx. • Thus, a user can list the content of a subdirectory only if the r bit is set in the appropriate field. • Similarly, a user can change his current directory to another current directory (say, foo) only if the x bit associated with the foo subdirectory is set in the appropriate field.
  • 26. PERMISSIONS IN A UNIX SYSTEM con…. • A sample directory listing from a UNIX environment is shown • The first field describes the protecti.on of the file or directory • A d as the first character indicates a s11bdirectory. • Also shown are the number of links to the file, the owner's name, the group's name, the size of the file in bytes, the date of last modification, and finally the file's name (with optional extension).
  • 27. PERMISSIONS IN A UNIX SYSTEM conti…
  • 28. Summery • In a multilevel directory structure, we need to protect not only individual files but also collections of files in subdirectories; that is, we need to provide a mechanism for directory protection. • In systems where files may have numerous path names (such as acyclic or general graphs), a given user may have different access rights to a particular file, depending on the path name used.