SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
FILE PROTECTION
PRESENTED BY :-
AKASH
KUMAR CHAUBEY
CLASS :- MCA (II)
ROLL NO. :- MCA/25014/18
It is implemented to prevent interferences with the
use of files both logical and physical address space.
It can be of two types :-
(I)Protection
(II)Security
Any file system may have two types of threats
i.e. INTERNAL and EXTERNAL
Let there be multiple users (U)in the system
using different resources (R)of system i.e.
U1
U2
U3
U4
U5
R1
R2
If U3 wants to access R1 then this threats
is internal and leads to protection
If any external users want to access R1 or
R2 then this threats leads to security.
INTERNAL
PROTECTION :-
It deals with threats information that are internal.
It provides mechanism for controlling the access to
program process user to a resource.
SECURITY :-
It deals with threats that are external.
It includes firewall and encryption technique.
••
•
• Protection refers to a mechanism for controlling the access
of programs, processes, or users to the resources defined
by a computer system.
Protection ensures that the resources of the computer are
used in a proper way.
It ensure that each object accessed correctly and only by
those processes that are allowed to do so.
OS designer faces challenge of creating a protection scheme
that cannot be by passed by any software that may be
created in the future
• Safe sharing of common logical address
space or common physical address space.
• Fair and reliable resources usage.
• Detect malfunction before they
contaminate the system.
• Access control is concerned with determining the allowed
activities of valid users, mediating every attempt by a user to
access a resource in the system.
Basic Terminology are :
Object: An entity that contains or receives information.
•
access to the- Access to an object potentially implies
information it contains.
example. File, programs, printer, disk, etc.
performAccess rights: The permisiion granted to a user
to an operation
example. read, write, execute etc
Access
Conrol
policy
object
source
(e.g. users,
processes)
request
guard resource
(e.g. files,
printers)
Access
request
subject
•
•
•
•
• Domain = collection of objects and a set of access rights for
each of the objects
A process operates within a Protection Domain that specifies
the resources that the process may access.
Each domain defines a set of objects and the types of
operations that may be invoked on each object.
The ability to execute an operation on an object is an access
right
System will consists of such multiple domains each having
certain predefined access right on different object
• During execution of the process it can change the domain
this is called domain switching
•
•
•
A domain can be realized in a variety of ways:
Each user may be a domain. In this case, the set of objects
that can be accessed depends on the identity of the user.
Each process may be a domain. In this case, the set of
objects that can be accessed depends on the identity of the
process.
Example of Unix:
In the UNIX operating system, a domain is associated with
the user.
In Unix operating system user ID’s use for identify the
domain.
Allocate space to the file so that disk space is utilized in a efficient
manner.
FACTOR TO CONSIDER FOR FILE ALLOCATION
1) Processing speed: If we are allocating file where
sequential and random access is very slow then allocation is
inefficient.
2) Ability to use multisector and multitract transfer
3) Disk space utilization: File should be stored or allocated such
that maximum number of file can be stored in the disk.
4) Main memory requirement : It should be less.
1.Each file occupies a set if contiguous addresses on disk.
2.Linear ordering.
3.Location of a file is defined by the disk address of the first
block and its length.
4.Both sequential and direct /random access are supported.
Disadvantages:-
--Finding space for new file.
--leads to external fragmentations.
First fit : Allocate at first space that is capable of storing file.
Best fit : Allocate the smallest space that is big enough to store the
file.
Worst fit : Allocate the largest space.
1. Solves all the problems of contiguous
allocation . Each file is a linked list of disk
blocks.
2. No External fragmentation.
3. Can be used only for sequential access of file.
1.Solves the problem of linked allocation.
2. In this all the pointers are brought together into
one location called index blocks.
3.Each file has its own index block.
File Protection in Operating System

More Related Content

PPT
Thrashing allocation frames.43
PPTX
Allocation of Frames & Thrashing
PPTX
Virtual memory management in Operating System
PPT
Contiguous Memory Allocation.ppt
PPTX
Operating system critical section
PPTX
file system in operating system
PPTX
Os unit 3
PPT
Memory allocation (4)
Thrashing allocation frames.43
Allocation of Frames & Thrashing
Virtual memory management in Operating System
Contiguous Memory Allocation.ppt
Operating system critical section
file system in operating system
Os unit 3
Memory allocation (4)

What's hot (20)

PDF
Distributed Operating System_1
PPT
Transport services
PPTX
Media Access Control
PPTX
Multiprocessor Architecture (Advanced computer architecture)
PPTX
SCHEDULING ALGORITHMS
PPTX
Structure of operating system
PPT
Multiprocessor Systems
PPTX
Deadlock ppt
PPT
Types of Load distributing algorithm in Distributed System
PPTX
Design Goals of Distributed System
PPTX
Congestion control
PPTX
Direct memory access (dma)
PPTX
directory structure and file system mounting
PPTX
Decomposition using Functional Dependency
PDF
Bus structure in Computer Organization.pdf
PDF
Multiple Access in Computer Network
PDF
Distributed deadlock
PPTX
System protection in Operating System
PPTX
Framing in data link layer
Distributed Operating System_1
Transport services
Media Access Control
Multiprocessor Architecture (Advanced computer architecture)
SCHEDULING ALGORITHMS
Structure of operating system
Multiprocessor Systems
Deadlock ppt
Types of Load distributing algorithm in Distributed System
Design Goals of Distributed System
Congestion control
Direct memory access (dma)
directory structure and file system mounting
Decomposition using Functional Dependency
Bus structure in Computer Organization.pdf
Multiple Access in Computer Network
Distributed deadlock
System protection in Operating System
Framing in data link layer
Ad

Similar to File Protection in Operating System (20)

PPTX
Operating Systems Protection and Security
PPT
OS Security 2009
PPTX
File Protection-R.D.Sivakumar
PPT
PPTX
Oerating system project
PPT
OperatingSystem.ppt
PPT
OperatingSystem.ppt
PPTX
File management
PPT
Protection and Security in Operating Systems
PPTX
Protection and security of operating system
PPT
Unit 3 chapter 1-file management
PPT
PDF
ITFT_File system interface in Operating System
PPTX
protection-151130150434-lva1-app6891.ppt_20240605_104455_0000.pptx
PPTX
Swap space management and protection in os
PDF
CSI-503 - 10. Security & Protection (Operating System)
PPTX
8 File Management system project .pptx
PPT
Computer Securityyyyyyyy - Chapter 1.ppt
PPTX
Protection Domain and Access Matrix Model -Operating System
Operating Systems Protection and Security
OS Security 2009
File Protection-R.D.Sivakumar
Oerating system project
OperatingSystem.ppt
OperatingSystem.ppt
File management
Protection and Security in Operating Systems
Protection and security of operating system
Unit 3 chapter 1-file management
ITFT_File system interface in Operating System
protection-151130150434-lva1-app6891.ppt_20240605_104455_0000.pptx
Swap space management and protection in os
CSI-503 - 10. Security & Protection (Operating System)
8 File Management system project .pptx
Computer Securityyyyyyyy - Chapter 1.ppt
Protection Domain and Access Matrix Model -Operating System
Ad

More from Meghaj Mallick (20)

PPT
24 partial-orderings
PPTX
PORTFOLIO BY USING HTML & CSS
PPTX
Introduction to Software Testing
PPTX
Introduction to System Programming
PPTX
MACRO ASSEBLER
PPTX
Icons, Image & Multimedia
PPTX
Project Tracking & SPC
PPTX
Peephole Optimization
PPTX
Routing in MANET
PPTX
Macro assembler
PPTX
Architecture and security in Vanet PPT
PPTX
Design Model & User Interface Design in Software Engineering
PPTX
Text Mining of Twitter in Data Mining
PPTX
DFS & BFS in Computer Algorithm
PPTX
Software Development Method
PPTX
Secant method in Numerical & Statistical Method
PPTX
Motivation in Organization
PPTX
Communication Skill
PPT
Partial-Orderings in Discrete Mathematics
PPTX
Hashing In Data Structure
24 partial-orderings
PORTFOLIO BY USING HTML & CSS
Introduction to Software Testing
Introduction to System Programming
MACRO ASSEBLER
Icons, Image & Multimedia
Project Tracking & SPC
Peephole Optimization
Routing in MANET
Macro assembler
Architecture and security in Vanet PPT
Design Model & User Interface Design in Software Engineering
Text Mining of Twitter in Data Mining
DFS & BFS in Computer Algorithm
Software Development Method
Secant method in Numerical & Statistical Method
Motivation in Organization
Communication Skill
Partial-Orderings in Discrete Mathematics
Hashing In Data Structure

Recently uploaded (20)

PPTX
Project and change Managment: short video sequences for IBA
PDF
Swiggy’s Playbook: UX, Logistics & Monetization
PPTX
Learning-Plan-5-Policies-and-Practices.pptx
PPTX
The Effect of Human Resource Management Practice on Organizational Performanc...
PPTX
An Unlikely Response 08 10 2025.pptx
DOCX
ENGLISH PROJECT FOR BINOD BIHARI MAHTO KOYLANCHAL UNIVERSITY
PPTX
Hydrogel Based delivery Cancer Treatment
PPTX
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
PPTX
Tablets And Capsule Preformulation Of Paracetamol
PPTX
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
PPTX
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
PPTX
2025-08-10 Joseph 02 (shared slides).pptx
PPTX
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
PDF
Why Top Brands Trust Enuncia Global for Language Solutions.pdf
PPTX
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
PPTX
Emphasizing It's Not The End 08 06 2025.pptx
PPTX
Self management and self evaluation presentation
PPTX
fundraisepro pitch deck elegant and modern
PPTX
Relationship Management Presentation In Banking.pptx
PPTX
Primary and secondary sources, and history
Project and change Managment: short video sequences for IBA
Swiggy’s Playbook: UX, Logistics & Monetization
Learning-Plan-5-Policies-and-Practices.pptx
The Effect of Human Resource Management Practice on Organizational Performanc...
An Unlikely Response 08 10 2025.pptx
ENGLISH PROJECT FOR BINOD BIHARI MAHTO KOYLANCHAL UNIVERSITY
Hydrogel Based delivery Cancer Treatment
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
Tablets And Capsule Preformulation Of Paracetamol
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
2025-08-10 Joseph 02 (shared slides).pptx
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
Why Top Brands Trust Enuncia Global for Language Solutions.pdf
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
Emphasizing It's Not The End 08 06 2025.pptx
Self management and self evaluation presentation
fundraisepro pitch deck elegant and modern
Relationship Management Presentation In Banking.pptx
Primary and secondary sources, and history

File Protection in Operating System

  • 1. FILE PROTECTION PRESENTED BY :- AKASH KUMAR CHAUBEY CLASS :- MCA (II) ROLL NO. :- MCA/25014/18
  • 2. It is implemented to prevent interferences with the use of files both logical and physical address space. It can be of two types :- (I)Protection (II)Security Any file system may have two types of threats i.e. INTERNAL and EXTERNAL
  • 3. Let there be multiple users (U)in the system using different resources (R)of system i.e. U1 U2 U3 U4 U5 R1 R2 If U3 wants to access R1 then this threats is internal and leads to protection If any external users want to access R1 or R2 then this threats leads to security. INTERNAL
  • 4. PROTECTION :- It deals with threats information that are internal. It provides mechanism for controlling the access to program process user to a resource. SECURITY :- It deals with threats that are external. It includes firewall and encryption technique.
  • 5. •• • • Protection refers to a mechanism for controlling the access of programs, processes, or users to the resources defined by a computer system. Protection ensures that the resources of the computer are used in a proper way. It ensure that each object accessed correctly and only by those processes that are allowed to do so. OS designer faces challenge of creating a protection scheme that cannot be by passed by any software that may be created in the future
  • 6. • Safe sharing of common logical address space or common physical address space. • Fair and reliable resources usage. • Detect malfunction before they contaminate the system.
  • 7. • Access control is concerned with determining the allowed activities of valid users, mediating every attempt by a user to access a resource in the system. Basic Terminology are : Object: An entity that contains or receives information. • access to the- Access to an object potentially implies information it contains. example. File, programs, printer, disk, etc. performAccess rights: The permisiion granted to a user to an operation example. read, write, execute etc
  • 9. • • • • • Domain = collection of objects and a set of access rights for each of the objects A process operates within a Protection Domain that specifies the resources that the process may access. Each domain defines a set of objects and the types of operations that may be invoked on each object. The ability to execute an operation on an object is an access right System will consists of such multiple domains each having certain predefined access right on different object
  • 10. • During execution of the process it can change the domain this is called domain switching • • • A domain can be realized in a variety of ways: Each user may be a domain. In this case, the set of objects that can be accessed depends on the identity of the user. Each process may be a domain. In this case, the set of objects that can be accessed depends on the identity of the process.
  • 11. Example of Unix: In the UNIX operating system, a domain is associated with the user. In Unix operating system user ID’s use for identify the domain.
  • 12. Allocate space to the file so that disk space is utilized in a efficient manner. FACTOR TO CONSIDER FOR FILE ALLOCATION 1) Processing speed: If we are allocating file where sequential and random access is very slow then allocation is inefficient. 2) Ability to use multisector and multitract transfer 3) Disk space utilization: File should be stored or allocated such that maximum number of file can be stored in the disk. 4) Main memory requirement : It should be less.
  • 13. 1.Each file occupies a set if contiguous addresses on disk. 2.Linear ordering. 3.Location of a file is defined by the disk address of the first block and its length. 4.Both sequential and direct /random access are supported. Disadvantages:- --Finding space for new file. --leads to external fragmentations.
  • 14. First fit : Allocate at first space that is capable of storing file. Best fit : Allocate the smallest space that is big enough to store the file. Worst fit : Allocate the largest space.
  • 15. 1. Solves all the problems of contiguous allocation . Each file is a linked list of disk blocks. 2. No External fragmentation. 3. Can be used only for sequential access of file.
  • 16. 1.Solves the problem of linked allocation. 2. In this all the pointers are brought together into one location called index blocks. 3.Each file has its own index block.