Computer Science Lecture 20, page 1 CS677: Distributed OS Today: Coda, xFS Case Study: Coda File System Brief overview of other recent file systems –xFS.

Slides:



Advertisements
Similar presentations
Computer Science 101 Data Encryption And Computer Networks.
Advertisements

By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 CS 194: Distributed Systems Other Distributed File Systems Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering.
Principles of Information Security, 2nd edition1 Cryptography.
G Robert Grimm New York University Disconnected Operation in the Coda File System.
Distributed File Systems Chapter 11
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Computer Science Lecture 21, page 1 CS677: Distributed OS Today: Coda, xFS Case Study: Coda File System Brief overview of other recent file systems –xFS.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Concurrency Control & Caching Consistency Issues and Survey Dingshan He November 18, 2002.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Jeff Chheng Jun Du.  Distributed file system  Designed for scalability, security, and high availability  Descendant of version 2 of Andrew File System.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Science Lecture 22, page 1 Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter.
Network Security Sorina Persa Group 3250 Group 3250.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Network Security  introduction  cryptography  authentication  key exchange  Reading: Tannenbaum, section 7.1 Ross/Kurose, Ch 7 (which is incomplete)
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Distributed Systems Principles and Paradigms Chapter 10 Distributed File Systems 01 Introduction 02 Communication 03 Processes 04 Naming 05 Synchronization.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
1 Network Security  introduction  cryptography  authentication  key exchange  Reading: Tannenbaum, section 7.1 Ross/Kurose, Ch 7 (which is incomplete)
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
22-1 Last time □ SMTP ( ) □ DNS This time □ P2P □ Security.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Feb 11, 2003Mårten Trolin1 Applied Cryptography Main goal –Give some practical experience on cryptographic technics used today. –Show how to use existing.
MODULE I NETWORKING CONCEPTS.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Introduction to DFS. Distributed File Systems A file system whose clients, servers and storage devices are dispersed among the machines of a distributed.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
1 Security and Cryptography: basic aspects Ortal Arazi College of Engineering Dept. of Electrical & Computer Engineering The University of Tennessee.
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
Computer Science Lecture 19, page 1 CS677: Distributed OS Last Class: Fault tolerance Reliable communication –One-one communication –One-many communication.
CS425 / CSE424 / ECE428 — Distributed Systems — Fall 2011 Some material derived from slides by Prashant Shenoy (Umass) & courses.washington.edu/css434/students/Coda.ppt.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Network Security & Accounting
CS 346 – Chapter 11 File system –Files –Access –Directories –Mounting –Sharing –Protection.
Network Security7-1 Today r Reminders m Ch6 Homework due Wed Nov 12 m 2 nd exams have been corrected; contact me to see them r Start Chapter 7 (Security)
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Highly Available Services and Transactions with Replicated Data Jason Lenthe.
Computer Science Lecture 19, page 1 CS677: Distributed OS Last class: Distributed File Systems Issues in distributed file systems Sun’s Network File System.
THE EVOLUTION OF CODA M. Satyanarayanan Carnegie-Mellon University.
Distributed File Systems Sun Network File Systems Andrew Fıle System CODA File System Plan 9 xFS SFS Hadoop.
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
Computer Science Lecture 19, page 1 CS677: Distributed OS Last Class: Fault tolerance Reliable communication –One-one communication –One-many communication.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Truly Distributed File Systems Paul Timmins CS 535.
Network Security  introduction  cryptography  authentication  key exchange  required reading: text section 7.1.
Nomadic File Systems Uri Moszkowicz 05/02/02.
What is network security?
Chapter 25: Advanced Data Types and New Applications
Cryptography.
Today: Coda, xFS Case Study: Coda File System
CSE451 Virtual Memory Paging Autumn 2002
Security in Distributed Systems
Presentation transcript:

Computer Science Lecture 20, page 1 CS677: Distributed OS Today: Coda, xFS Case Study: Coda File System Brief overview of other recent file systems –xFS –Log structured file systems

Computer Science Lecture 20, page 2 CS677: Distributed OS File Identifiers Each file in Coda belongs to exactly one volume –Volume may be replicated across several servers –Multiple logical (replicated) volumes map to the same physical volume –96 bit file identifier = 32 bit RVID + 64 bit file handle

Computer Science Lecture 20, page 3 CS677: Distributed OS Sharing Files in Coda Transactional behavior for sharing files: similar to share reservations in NFS –File open: transfer entire file to client machine [similar to delegation] –Uses session semantics: each session is like a transaction Updates are sent back to the server only when the file is closed

Computer Science Lecture 20, page 4 CS677: Distributed OS Transactional Semantics Network partition: part of network isolated from rest –Allow conflicting operations on replicas across file partitions –Reconcile upon reconnection –Transactional semantics => operations must be serializable Ensure that operations were serializable after thay have executed –Conflict => force manual reconciliation File-associated dataRead?Modified? File identifierYesNo Access rightsYesNo Last modification timeYes File lengthYes File contentsYes

Computer Science Lecture 20, page 5 CS677: Distributed OS Client Caching Cache consistency maintained using callbacks –Server tracks all clients that have a copy of the file [provide callback promise] –Upon modification: send invalidate to clients

Computer Science Lecture 20, page 6 CS677: Distributed OS Server Replication Use replicated writes: read-once write-all –Writes are sent to all AVSG (all accessible replicas) How to handle network partitions? –Use optimistic strategy for replication –Detect conflicts using a Coda version vector –Example: [2,2,1] and [1,1,2] is a conflict => manual reconciliation

Computer Science Lecture 20, page 7 CS677: Distributed OS Disconnected Operation The state-transition diagram of a Coda client with respect to a volume. Use hoarding to provide file access during disconnection –Prefetch all files that may be accessed and cache (hoard) locally –If AVSG=0, go to emulation mode and reintegrate upon reconnection

Computer Science Lecture 20, page 8 CS677: Distributed OS Overview of xFS. Key Idea: fully distributed file system [serverless file system] xFS: x in “xFS” => no server Designed for high-speed LAN environments

Computer Science Lecture 20, page 9 CS677: Distributed OS Processes in xFS The principle of log-based striping in xFS –Combines striping and logging

Computer Science Lecture 20, page 10 CS677: Distributed OS Reading a File Block Reading a block of data in xFS.

Computer Science Lecture 20, page 11 CS677: Distributed OS xFS Naming Main data structures used in xFS. Data structureDescription Manager mapMaps file ID to manager ImapMaps file ID to log address of file's inode InodeMaps block number (i.e., offset) to log address of block File identifierReference used to index into manager map File directoryMaps a file name to a file identifier Log addressesTriplet of stripe group, ID, segment ID, and segment offset Stripe group mapMaps stripe group ID to list of storage servers

Computer Science Lecture 20, page 12 CS677: Distributed OS Security in Distributed Systems Introduction Cryptography Authentication Key exchange Readings: Tannenbaum, chapter 8

Computer Science Lecture 20, page 13 CS677: Distributed OS Network Security Intruder may eavesdrop remove, modify, and/or insert messages read and playback messages

Computer Science Lecture 20, page 14 CS677: Distributed OS Issues Important issues: cryptography: secrecy of info being transmitted authentication: proving who you are and having correspondent prove his/her/its identity

Computer Science Lecture 20, page 15 CS677: Distributed OS Security in Computer Networks User resources: login passwords often transmitted unencrypted in TCP packets between applications (e.g., telnet, ftp) passwords provide little protection

Computer Science Lecture 20, page 16 CS677: Distributed OS Security Issues Network resources: often completely unprotected from intruder eavesdropping, injection of false messages mail spoofs, router updates, ICMP messages, network management messages Bottom line: intruder attaching his/her machine (access to OS code, root privileges) onto network can override many system-provided security measures users must take a more active role

Computer Science Lecture 20, page 17 CS677: Distributed OS Encryption plaintext: unencrypted message ciphertext: encrypted form of message Intruder may intercept ciphertext transmission intercept plaintext/ciphertext pairs obtain encryption decryption algorithms

Computer Science Lecture 20, page 18 CS677: Distributed OS A simple encryption algorithm Substitution cipher: abcdefghijklmnopqrstuvwxyz poiuytrewqasdfghjklmnbvczx replace each plaintext character in message with matching ciphertext character: plaintext: Charlotte, my dear ciphertext: iepksgmmy, dz uypk

Computer Science Lecture 20, page 19 CS677: Distributed OS Encryption Algo (contd) key is pairing between plaintext characters and ciphertext characters symmetric key: sender and receiver use same key 26! (approx 10^26) different possible keys: unlikely to be broken by random trials substitution cipher subject to decryption using observed frequency of letters –'e' most common letter, 'the' most common word