wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

File Sharing

profile
Vedant Rana
Sep 08, 2024
0 Likes
0 Discussions
97 Reads

In multiuser systems, effective file sharing involves addressing access rights and managing simultaneous access.

Access Rights:

The file system must provide flexible mechanisms for file sharing by defining various access rights for users or groups. These rights control how files can be accessed and modified. Here’s a summary of typical access rights:

1. None: The user cannot access or even see the file, as the file does not appear in the user's directory listings. This ensures total privacy.

2. Knowledge: The user can see that the file exists and who owns it but cannot access its contents. They can request additional access from the file owner.

3. Execution: The user can execute a program but cannot copy it. This is often used for proprietary software to allow running without duplication.

4. Reading: The user can view and copy the file’s contents. Some systems differentiate between just viewing and copying, where viewing displays content without permitting duplication.

5.Appending: The user can add data to the file, typically only at the end. This is useful for log files or accumulating data from multiple sources, without modifying existing data.

6. Updating: The user can modify, delete, or add data to the file. This includes creating, rewriting, and removing parts of the file. Some systems provide varying levels of update rights.

7. Changing Protection: The user can alter access rights for others. Typically, only the file owner can change these rights, though they may delegate this ability. Owners can specify which rights are modifiable.

8. Deletion: The user can remove the file from the file system entirely.

These rights are hierarchical. For instance, having updating rights implies having all rights below it, such as knowledge, execution, reading, and appending.

Files are owned by the creator, who holds all access rights and can grant permissions to others. Access can be set for:

- Specific Users: Individual users identified by their user ID.

- User Groups: Groups of users, with system mechanisms tracking group membership.

- All Users: Public files accessible to anyone on the system.

Simultaneous Access

When multiple users have rights to append or update a file, the system must manage access to prevent conflicts and maintain integrity. This involves:

- File Locking: A simple approach where a user locks the entire file during updates to prevent others from accessing it simultaneously.

- Record Locking: A more refined method where individual records within the file are locked, allowing multiple users to access different parts of the file concurrently.

These methods address the readers/writers problem, focusing on mutual exclusion and deadlock prevention to ensure smooth and consistent file access.


Comments ()


Sign in

Read Next

Data Science in Healthcare: Predicting Diseases

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

Why we fail after giving 100% ?

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

Elegant fashion style

Blog banner

Types of threads

Blog banner

Deadlock

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

How to kiss

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Busted : Common Web Security Myths

Blog banner

Marvel Cinematic Universe

Blog banner

GIS Bharat Maps

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

GIS

Blog banner

Design Considerations for Disk Cache Management

Blog banner

A Short History of GIS

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

Student Grade Calculator in LISP

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

I/O Buffering

Blog banner

Virtual Machine's

Blog banner

Virtualization

Blog banner

Session Hijacking

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

Open Source Project By Google

Blog banner

Concurrency and Deadlocks

Blog banner

Supervised and Unsupervised Learning

Blog banner

geographic information system (GIS)

Blog banner

Understanding Business Layer in Data Science

Blog banner

OS assignment 3

Blog banner

Memory managment

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

File Allocation Methods

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Web Site

Blog banner

Deadlock

Blog banner

Docker Framework

Blog banner

Race condition

Blog banner

Incident management in ITSM

Blog banner