Sunday 17th of December 2017
 

Sext3: The Secure Ext3


Raza Muhammad, Zhou Ke and Basheer Riskhan

Harboring bug may leads system crashes, file system bugs hence corrupt file systems and cause data loss, regardless of the existence of journals and similar defensive techniques. While consistency checkers such as fsck can detect this corruption and restore a damaged image to a usable state, they are generally created as an afterthought, to be run only at rare intervals. But issue is that the fsck is the utility for checking errors in Ext3 file system. In our opinion file system must has its own checker for silent killer known as harboring bug. So Sext3 has this ability and does not need third party checking utility for harboring bug. These modifications in system file allow Sext3 to check system in real time scenario. If we use third party utility the system needs to invoke that utility every time when system is writing data to any field. But in our modification of Ext3 there is no need to invoke the application because the checker is the part of file system. In our proposed solution high memory consumption is only drawback. In addition, we demonstrate the Sext3 performance and competitively with Ext3.

Keywords: Sext3, Ext3, fsck

Download Full-Text


ABOUT THE AUTHORS

Raza Muhammad
He completed his Bachelor Degree BS(CS) for Shah Abdul Latif University Kharipur Pakistan in computer science in 2004 and move to Karachi for higher studies. In 2007 he completed his Master Degree MS(CS) in computer science from Pakistan Air Force-Karachi Institute of Economics and Technology Karachi Pakistan. Now he is pursuing his PhD in computer science from Huazhong University of Science and Technology Wuhan P.R. China. In his academic career he worked as lecturer and visiting lecturer in various universities and government institutes. He also contributed in research papers as main author and as second author. His area of interests are Big Data, Linux Kernel programming, Wireless network and security System of Computation.

Zhou Ke
He completed Bachelor in Computer Peripheral from HUST Wuhan China in 1992 and Master in Computer Architecture HUST Wuhan China in 1996 and perused his Doctor in Computer Architecture HUST Wuhan China and completed in 2000. Nowadays he is serving HUST as Professor in Wuhan National Laboratory for Optoelectronics (WNLO). He also served as Visiting Scholar Cranfield University U.K. 2005-03-31-2006-03-31. He got honor and award in A Heterogeneous Unified Storage System for GIS Grid Super Computing 2006 storage challenge finalist Award,2006.

Basheer Riskhan
He received primary and secondary education at St. John¡¯s College, Jaffna and Zahira National College, Puttalam. He earned his Bachelor degree in Computer Science from Bharathidasan University, India in 2002 and Master degree in Education from National Institute of Education, Sri Lanka in 2012. At present he is pursuing his PhD in Computer Science from Huazhong University of Science and Technology Wuhan, P.R. China. Basheer Riskhan joined National College of Education in Sri Lanka as a Lecture in 2005 and working as a Sri Lanka Teacher Educator Service (SLTES) officer in Sri Lanka. Before that he served as Software Engineer in several private companies. His research interests are in the field of Virtualization, Cloud Computing, Kernel Programming and Big Data.


IJCSI Published Papers Indexed By:

 

 

 

 
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »