wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

File Sharing

profile
Vedant Rana
Sep 08, 2024
0 Likes
0 Discussions
97 Reads

In multiuser systems, effective file sharing involves addressing access rights and managing simultaneous access.

Access Rights:

The file system must provide flexible mechanisms for file sharing by defining various access rights for users or groups. These rights control how files can be accessed and modified. Here’s a summary of typical access rights:

1. None: The user cannot access or even see the file, as the file does not appear in the user's directory listings. This ensures total privacy.

2. Knowledge: The user can see that the file exists and who owns it but cannot access its contents. They can request additional access from the file owner.

3. Execution: The user can execute a program but cannot copy it. This is often used for proprietary software to allow running without duplication.

4. Reading: The user can view and copy the file’s contents. Some systems differentiate between just viewing and copying, where viewing displays content without permitting duplication.

5.Appending: The user can add data to the file, typically only at the end. This is useful for log files or accumulating data from multiple sources, without modifying existing data.

6. Updating: The user can modify, delete, or add data to the file. This includes creating, rewriting, and removing parts of the file. Some systems provide varying levels of update rights.

7. Changing Protection: The user can alter access rights for others. Typically, only the file owner can change these rights, though they may delegate this ability. Owners can specify which rights are modifiable.

8. Deletion: The user can remove the file from the file system entirely.

These rights are hierarchical. For instance, having updating rights implies having all rights below it, such as knowledge, execution, reading, and appending.

Files are owned by the creator, who holds all access rights and can grant permissions to others. Access can be set for:

- Specific Users: Individual users identified by their user ID.

- User Groups: Groups of users, with system mechanisms tracking group membership.

- All Users: Public files accessible to anyone on the system.

Simultaneous Access

When multiple users have rights to append or update a file, the system must manage access to prevent conflicts and maintain integrity. This involves:

- File Locking: A simple approach where a user locks the entire file during updates to prevent others from accessing it simultaneously.

- Record Locking: A more refined method where individual records within the file are locked, allowing multiple users to access different parts of the file concurrently.

These methods address the readers/writers problem, focusing on mutual exclusion and deadlock prevention to ensure smooth and consistent file access.


Comments ()


Sign in

Read Next

Risk mitigation and management

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Data Lake

Blog banner

I/O Management and Disk Scheduling

Blog banner

This too shall pass

Blog banner

Self defence

Blog banner

Travel: Everything Everywhere!

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

EMAIL INVESTIGATION

Blog banner

Apple

Blog banner

E-learning

Blog banner

Escape

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Privacy LAWs in IT

Blog banner

HOW A CENTRAL PROCESSING UNIT (CPU) WORKS?

Blog banner

Kernel in Operating System

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Mendeley (management software)

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Esri India launches Policy Maps.

Blog banner

Clustering Techniques

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

Short note on expert system

Blog banner

File sharing

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Interrupts in operating system.

Blog banner

ONLINE NEWSROOMS

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

You Get Everyone, But No One Gets You: The Lonely Side of High Emotional Intelligence

Blog banner

Memory Management

Blog banner

Risk management in IT

Blog banner

What are Virtual Machines

Blog banner

Making Money through Instagram

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

Memory Partitioning

Blog banner

GIS in Disaster Management

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

INTRODUCTION

Blog banner