File Systems Research Papers - Academia.edu (original) (raw)
This paper presents strengths and shortcomings of WinHex Specialist Edition (version 11.25 SR-7) in the context of the overall digital forensics process, focusing on its ability to preserve and examine data on storage media. No serious... more
This paper presents strengths and shortcomings of WinHex Specialist Edition (version 11.25 SR-7) in the context of the overall digital forensics process, focusing on its ability to preserve and examine data on storage media. No serious problems were found during non-exhaustive testing of the tool's ability to create a forensic image of a disk, and to verify the integrity of an image. Generally accepted data sets were used to test WinHex's ability to reliably and accurately interpret file date–time stamps, recover deleted files, and search for keywords. The results of these tests are summarized in this paper. Certain advanced examination capabilities were also evaluated, including the creation of custom templates to interpret EXT2/EXT3 file systems. Based on this review, several enhancements are proposed. In addition to these results, this paper demonstrates a systematic approach to evaluating similar forensic tools.
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge of security engineering. Market forces are driving software... more
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge of security engineering. Market forces are driving software practitioners who are not security specialists to develop software that requires security features. When these practitioners develop software solutions without appropriate security-specific processes and models, they sometimes fail to produce effective solutions. We have adapted a proven object oriented modeling technique, use cases, to capture and analyze security requirements in a simple way. We call the adaptation an abuse case model. Its relationship to other security engineering work products is relatively simple, from a user perspective
The increasing advantages of automated systems now are at the highest position as a result many manual processes are automated. Since the automated system is in demand nowadays, educational infrastructures like colleges are making their... more
The increasing advantages of automated systems now are at the highest position as a result many manual processes are automated. Since the automated system is in demand nowadays, educational infrastructures like colleges are making their manual or semi-automated system to function completely on a computer. One such system that concerns a college is the placement system's automation. The project aims at developing a web application for the placement cell. Placement Management System provides two distinct modules for students and placement officers. It enables students to register online and upload their academic and personal details. They will have their portals to update information as necessary and can view recent and upcoming job postings on their dashboard. Whereas, the Placement Officers will be able to utilize it to manage the student data as well as the hiring company's data concerning the available jobs. The benefits of the system will be to provide enhanced facilities and assemble all the placement related tasks carried out on various platforms to a single application. This will give both the location officer and students an accurate channel and reduces repetitious work that has got to be administered. Additionally, email alerts can be provided to students in case if any new activity takes place which ensures that no important announcement is missed.
Pengertian File Sistem Menurut beberapa literatur yang saya temukan dan saya baca, File System / Sistem Berkas merupakan metoda penyimpanan file pada komputer atau media penyimpanan komputer dalam mengatur lokasi file tersebut. Ada juga... more
Pengertian File Sistem Menurut beberapa literatur yang saya temukan dan saya baca, File System / Sistem Berkas merupakan metoda penyimpanan file pada komputer atau media penyimpanan komputer dalam mengatur lokasi file tersebut. Ada juga yang menyebut bahwa File System adalah struktur logika yang digunakan untuk mengendalikan akses terhadap data yang ada pada disk 1. Jenis File System yang digunakan pada Windows 1. FAT (File Allocation Table) Sistem berkas FAT' atau 'FAT File System adalah sebuah sistem berkas yang menggunakan struktur tabel alokasi berkas sebagai cara dirinya beroperasi. Untuk penyingkatan, umumnya orang menyebut sistem berkas FAT sebagai FAT saja. Kata FAT sendiri adalah singkatan dari File Allocation Table, yang jika diterjemahkan secara bebas ke dalam Bahasa Indonesia menjadi Tabel Alokasi Berkas. Arsitektur FAT sekarang banyak digunakan secara luas dalam sistem komputer dan kartu-kartu memori yang digunakan dalam kamera digital atau pemutar media portabel 2. Ada beberapa versi FAT yang ada hingga saat ini, di antaranya: FAT12 FAT12 merupakan sistem berkas yang menggunakan unit alokasi yang memiliki batas hingga 12-bit. File System ini hanya dapat menampung maksimum hanya 212 unit alokasi saja atau sebanyak 4096 buah. FAT12 pertama kali digunakan pada Sistem Operasi MS-DOS. Karena kapasitasnya sedikit yakni hanya 32 MB, maka FAT12 hanya digunakan sebagai file system pada media penyimpanan floppy disk. FAT16 FAT16 merupakan sistem berkas yang menggunakan unit alokasi yang memiliki batas hingga 16-bit. File System ini dapat menampung maksimum 216 unit alokasi atau sebanyak 65536. Kapasitas File System ini sebanyak 4 GB, jauh melebihi versi sebelumnya yang hanya 32 MB. Ukuran unit alokasi yang digunakan FAT16 tergantung kapasitas partisi harddisk yang akan diformat. Jika kapasitasnya kurang dari 16 MB, maka yang akan digunakan adalah FAT12. Jika melebihi 16 MB maka yang digunakan adalah FAT16.FAT16 pertama kali digunakan pada Sistem Operasi MS-DOS pada tahun 1981. Keuntungan menggunakan FAT16 adalah kompatibel hampir di semua sistem operasi, baik Windows 95/98/ME, OS/2, Linux bahkan Unix. Namun, ada juga kekurangan dari FAT versi ini yakni mempunyai kapasitas tetap dalam jumlah cluster dalam partisi, jadi semakin besar harddisk, semakin besar pula ukuran cluster. Selain itu, FAT16 tidak mendukung kompresi, enkripsi, dan control akses dalam partisi 2. FAT32 FAT32 adalah versi sitem berkas FAT yang generasi terakhir, yang diperkenalkan ketika microsoft merilis windows 95 OEM Service Release 2 atau service Park 2. FAT32 menggunakan lebih banyak Bit untuk mengidentifikasi setiap cluster pada disk. Hasilnya, FAT32 bisa mendukung stotage yang besar sampai 2 terabyte plus efesiensi yang lebih baik. kecuali nda seorang yang sangat haus storage, kapasitas sebesar itu sudah jauh lebih dari cukup. Kelebihan FAT 32 a. Dapat berkerja pada sistem opersi yang berbeda.
File/berkas adalah sekumpulan informasi yang saling berkaitan dan didefenisikan oleh pembuatnya. Umumnya berkas adalah sekumpulan bit, byte, record di mana artinya didefenisikan oleh pembuat dan pemakainya. File data dapat berbentuk... more
File/berkas adalah sekumpulan informasi yang saling berkaitan dan didefenisikan oleh pembuatnya. Umumnya berkas adalah sekumpulan bit, byte, record di mana artinya didefenisikan oleh pembuat dan pemakainya. File data dapat berbentuk numeric, alfabeth ataupun alfanumeric. File dapat berbentuk bebas seperti file teks atau terstruktur. Suatu file mempunyai nama dan diacu berdasarkan nama tersebut. Juga mempunyai komponen lain seperti tipe, waktu pembuatan, nama dan nomor account dari pembuatnya, besar ukuran file. Kita dapat menulis informasi, mengubah informasi, menambah dan menghapus informasi dalam file.
This paper presents an architecture overview of the distributed, heterogeneous query processor (DHQP) in the Microsoft SQL Server database system to enable queries over a large collection of diverse data sources. The paper highlights... more
This paper presents an architecture overview of the distributed, heterogeneous query processor (DHQP) in the Microsoft SQL Server database system to enable queries over a large collection of diverse data sources. The paper highlights three salient aspects of the architecture. First, the system introduces welldefined abstractions such as connections, commands, and rowsets that enable sources to plug into the system. These abstractions are formalized by the OLE DB data access interfaces. The generality of OLE DB and its broad industry adoption enables our system to reach a very large collection of diverse data sources ranging from personal productivity tools, to database management systems, to file system data. Second, the DHQP is built-in to the relational optimizer and execution engine of the system. This enables DH queries and updates to benefit from the cost-based algebraic transformations and execution strategies available in the system. Finally, the architecture is inherently ex...
Multiple methods of information hiding can be used by criminals to conceal incriminating data. The FAT and NTFS file systems are the most commonly used file systems in operating systems today, and therefore are the most exploited. Most... more
Multiple methods of information hiding can be used by criminals to conceal incriminating data. The FAT and NTFS file systems are the most commonly used file systems in operating systems today, and therefore are the most exploited. Most methods of information hiding can be detected using forensic tool kits designed specifically for cyber crime investigators. The purpose of this paper is to explore various methods of information hiding in the FAT and NTFS file systems.
File adalah unit penyimpan logika yang diabstraksi sistem operasi dari perangkat penyimpan. File berisi informasi yang disimpan pada penyimpan sekunder (seperti magnetic disk, magnetic tape dan... more
File adalah unit penyimpan logika yang diabstraksi sistem operasi dari perangkat penyimpan. File berisi informasi yang disimpan pada penyimpan sekunder (seperti magnetic disk, magnetic tape dan optical disk).
Although there is no lack of number and variety of file systems, new file systems must be written to keep up to date with changing software and hardware requirements. One such project is the HydrOS project, developed at the University of... more
Although there is no lack of number and variety of file systems, new file systems must be written to keep up to date with changing software and hardware requirements. One such project is the HydrOS project, developed at the University of Kent, which is a multikernel OS, written entirely in Erlang, designed to withstand complete software failure. Much like any other OS, it requires a file system in order for it to store and retrieve data. This report details the background, design, development and functionality of HydroFS, a file system written entirely in Erlang for HydrOS, and how it can be extended in the future to take full advantage of storage space.
The conventional approach for building pervasive environments relies on middleware to integrate different systems. Instead, we have built a system that can deal with these environments by exporting system resources through distributed... more
The conventional approach for building pervasive environments relies on middleware to integrate different systems. Instead, we have built a system that can deal with these environments by exporting system resources through distributed virtual file systems. This requires no middleware, simplifies interoperation, and permits applying general purpose tools to any system resource. A constraint-based file system import mechanism allows the system to adapt to changes in the environment and permits users to customize the environment and tailor adaptation according to their needs. The system has been in use for over a year to carry out our daily work and is underlying the smart space that we built for our department
ABSTRACT Individual differences are prevalent in personal information management (PIM). There is large variation between individuals in how they structure and retrieve information from personal archives. These differences make it hard to... more
ABSTRACT Individual differences are prevalent in personal information management (PIM). There is large variation between individuals in how they structure and retrieve information from personal archives. These differences make it hard to develop general PIM tools. However we know little about the origins of these differences. We present two studies evaluating whether differences arise from personality traits, by exploring whether different personalities structure personal archives differently. The first exploratory study asks participants to identify PIM cues that signal personality traits. While the aim was to identify cues, these cues also proved surprisingly accurate indicators of personality. In a second study, to evaluate these cues, we directly measure relations between structure and traits. We demonstrate that Conscientiousness predicts file organization, particularly PC users' desktops. Neurotic people may also keep more desktop files. One implication is that systems might be customized for different personalities. We also advance personality theory, showing that personal digital artifacts signal personality.
Mobile agent is a promising paradigm in distributed computing. We use a multiagent system with mobile agents to provide a ubiqui-tous computing environment with regards to file synchronization across machines. In this paper we discuss... more
Mobile agent is a promising paradigm in distributed computing. We use a multiagent system with mobile agents to provide a ubiqui-tous computing environment with regards to file synchronization across machines. In this paper we discuss mulisynch; a multiagent system. It provides ...
Careful simulation-based evaluation plays an important role in the design of file and disk systems. We describe here a particular approach to such evaluations that combines techniques in workload synthesis, file system modeling, and... more
Careful simulation-based evaluation plays an important role in the design of file and disk systems. We describe here a particular approach to such evaluations that combines techniques in workload synthesis, file system modeling, and detailed disk behavior modeling. Together, these make feasible the detailed simulation of I/O hardware and file system software. In particular, using the techniques described here is likely to make comparative file system studies more accurate.In addition to these specific contributions, the paper makes two broader points. First, it argues that detailed models are appropriate and necessary in many cases. Second, it demonstrates that detailed models need not be difficult or time consuming to construct or execute.
Recently Edge Computing paradigm has gained significant popularity both in industry and academia. With its increased usage in real-life scenarios, security, privacy and integrity of data in such environments have become critical.... more
Recently Edge Computing paradigm has gained significant popularity both in industry and academia. With its increased usage in real-life scenarios, security, privacy and integrity of data in such environments have become critical. Malicious deletion of mission-critical data due to ransomware, trojans and viruses has been a huge menace and recovering such lost data is an active field of research. As most of Edge computing devices have compute and storage limitations, difficult constraints arise in providing an optimal scheme for data protection. These devices mostly use Linux/Unix based operating systems. Hence, this work focuses on extending the Ext4 file system to APEX (Adaptive Ext4): a file system based on novel on-the-fly learning model that provides an Adaptive Recover-ability Aware file allocation platform for efficient post-deletion data recovery and therefore maintaining data integrity. Our recovery model and its lightweight implementation allow significant improvement in recover-ability of lost data with lower compute, space, time, and cost overheads compared to other methods. We demonstrate the effectiveness of APEX through a case study of overwriting surveillance videos by CryPy malware on Raspberry-Pi based Edge deployment and show 678% and 32% higher recovery than Ext4 and current state-of-the-art File Systems. We also evaluate the overhead characteristics and experimentally show that they are lower than other related works.
Modern technology has become an integral part of education field. Undeniably, the use of multimedia technology has a major impact on teaching and learning (T&L) process of the new generation. This article focuses on designing and... more
Modern technology has become an integral part of education field. Undeniably, the use of multimedia
technology has a major impact on teaching and learning (T&L) process of the new generation. This article
focuses on designing and developing a mobile learning application of Malay vocabulary for lower
secondary school level. The design and development of the application called “Kuasa Kosa Kata” (3K
henceforth) was based on a novel entitled “Sejambak Bakti”. The context of this study is closely related to
game-based learning (GBL) method in the 3K application that encourages independent learning among the
targeted students. Designing the 3K application was based on a storyboard for the idea and story-making
whilst the development of it was done using Adobe Flash. The data on participants’ comments and
opinions on the learning application were qualitatively gathered from semi-structured interviews. As
conclusion, focus is on the importance of game-based learning implementation in the development of
mobile learning application. It is hoped that use of 3K application as teaching material will boost the
mastery of Malay Language vocabulary among lower secondary school students.