• Title/Summary/Keyword: Disk storage method

Search Result 168, Processing Time 0.021 seconds

BubbleDoc: Document Forgery and Tamper Detection through the Agent-Free File System-Awareness in Cloud Environment (BubbleDoc: 클라우드 환경에서의 agent-free 파일시스템 분석을 통한 문서 위/변조 탐지)

  • Jeon, Woo-Jin;Hong, Dowon;Park, Ki-Woong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.429-436
    • /
    • 2018
  • Electronic documents are efficient to be created and managed, but they are liable to lose their originality because copies are created during distribution and delivery. For this reason, various security technologies for electronic documents have been applied. However, most security technologies currently used are for document management such as file access privilege control, file version and history management, and therefore can not be used in environments where authenticity is absolutely required, such as confidential documents. In this paper, we propose a method to detect document forgery and tampering through analysis of file system without installing an agent inside the instance operating system in cloud computing environment. BubbleDoc monitors the minimum amount of virtual volume storage in an instance, so it can efficiently detect forgery and tampering of documents. Experimental results show that the proposed technique has 0.16% disk read operation overhead when it is set to 1,000ms cycle for monitoring for document falsification and modulation detection.

A Segment Space Recycling Scheme for Optimizing Write Performance of LFS (LFS의 쓰기 성능 최적화를 위한 세그먼트 공간 재활용 기법)

  • Oh, Yong-Seok;Kim, Eun-Sam;Choi, Jong-Moo;Lee, Dong-Hee;Noh, Sam-H.
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.963-967
    • /
    • 2009
  • The Log-structured File System (LFS) collects all modified data into a memory buffer and writes them sequentially to a segment on disk. Therefore, it has the potential to utilize the maximum bandwidth of storage devices where sequential writes are much faster than random writes. However, as disk space is finite, LFS has to conduct cleaning to produce free segments. This cleaning operation is the main reason LFS performance deteriorates when file system utilization is high. To overcome painful cleaning and reduced performance of LFS, we propose the segment space recycling (SSR) scheme that directly writes modified data to invalid areas of the segments and describe the classification method of data and segment to consider locality of reference for optimizing SSR scheme. We implement U-LFS, which employs our segment space recycling scheme in LFS, and experimental results show that SSR scheme increases performance of WOLF by up to 1.9 times in HDD and 1.6 times in SSD when file system utilization is high.

Index Management Method using Page Mapping Log in B+-Tree based on NAND Flash Memory (NAND 플래시 메모리 기반 B+ 트리에서 페이지 매핑 로그를 이용한 색인 관리 기법)

  • Kim, Seon Hwan;Kwak, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.1-12
    • /
    • 2015
  • NAND flash memory has being used for storage systems widely, because it has good features which are low-price, low-power and fast access speed. However, NAND flash memory has an in-place update problem, and therefore it needs FTL(flash translation layer) to run for applications based on hard disk storage. The FTL includes complex functions, such as address mapping, garbage collection, wear leveling and so on. Futhermore, implementation of the FTL on low-power embedded systems is difficult due to its memory requirements and operation overhead. Accordingly, many index data structures for NAND flash memory have being studied for the embedded systems. Overall performances of the index data structures are enhanced by a decreasing of page write counts, whereas it has increased page read counts, as a side effect. Therefore, we propose an index management method using a page mapping log table in $B^+$-Tree based on NAND flash memory to decrease page write counts and not to increase page read counts. The page mapping log table registers page address information of changed index node and then it is exploited when retrieving records. In our experiment, the proposed method reduces the page read counts about 61% at maximum and the page write counts about 31% at maximum, compared to the related studies of index data structures.

Controller Design of Piezoelectric Milliactuator for Dual Stage System (이중 구동 시스템을 위한 압전 밀리엑추에이터의 제어기 설계)

  • Eo-Jin, Hong;No-Cheol, Park;Hyun-Seok, Yang;Young-Pil, Park
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.13 no.12
    • /
    • pp.965-971
    • /
    • 2003
  • To reach high areal density, less track pitch is expected and more servo bandwidth is required. One approach to overcoming the problem is by using dual stage servo system. For this system. we have suggested new milliactuator based on the shear mode of piezoelectric elements to drive the head suspension assembly. In this paper, we introduce milliactuator and controller design method, PQ method. PQ method reduces the controller design problem for DISO (dual-input/single-output) systems to two standard controller design problems for SISO ( single-input/single-output) problems. The first part of PQ method directly addresses the issue of actuator output contribution, and the second part allows the use of traditional loop shaping to achieve the overall system performance. This paper shows how to employ the PQ method to meet aggressive close-loop performance specifications for a disk drive system with a VCM and piezoelectric milliactuator.

An Effective Path Table Method Exploiting the Region Numbering Technique (영역 할당 기법을 이용한 효율적인 경로 테이블 기법)

  • Min Jun-Ki
    • The KIPS Transactions:PartD
    • /
    • v.13D no.2 s.105
    • /
    • pp.157-164
    • /
    • 2006
  • Since XML is emerging as the de facto standard for exchanging and representation of data on the web, the amount of XML data has rapidly increased. Thus, the need for effective store and retrieval of U data has arisen. Since the existing techniques such as XRel which is an XML storage and management technique using RDBMS simply record the existing all label paths, diverse classes of label path expressions could not be efficiently supported. In this paper, we present a technique which supports storage and retrieval for XML data using RDBMS efficiently compared with the existing approaches. Since the proposed technique keeps the XML path index on the relational database and replace label paths with path identifiers, diverse XML queries can be evaluated compared with existing approaches. Also, the proposed technique does not require the modification of the relational database engine and consumes the disk space less. Our experimental result demonstrates the better query performance compared with existing techniques.

Unpacking Technique for In-memory malware injection technique (인 메모리 악성코드 인젝션 기술의 언 패킹기법)

  • Bae, Seong Il;Im, Eul Gyu
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.19-26
    • /
    • 2019
  • At the opening ceremony of 2018 Winter Olympics in PyeongChang, an unknown cyber-attack occurred. The malicious code used in the attack is based on in-memory malware, which differs from other malicious code in its concealed location and is spreading rapidly to be found in more than 140 banks, telecommunications and government agencies. In-memory malware accounts for more than 15% of all malicious codes, and it does not store its own information in a non-volatile storage device such as a disk but resides in a RAM, a volatile storage device and penetrates into well-known processes (explorer.exe, iexplore.exe, javaw.exe). Such characteristics make it difficult to analyze it. The most recently released in-memory malicious code bypasses the endpoint protection and detection tools and hides from the user recognition. In this paper, we propose a method to efficiently extract the payload by unpacking injection through IDA Pro debugger for Dorkbot and Erger, which are in-memory malicious codes.

Analysis and Reduction of Subsidiary Resonance of an Optical Pickup Actuator (광 픽업 액추에이터의 부공진 원인 규명과 저감화)

  • Seo, Jin-Gyu;Jeong, Ho-Seop;Park, Gi-Hwan
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.24 no.3 s.174
    • /
    • pp.728-734
    • /
    • 2000
  • An asymmetric actuator can be used to reduce the distance between the reflective mirror and objective lens of a small optical disk drive for use in the notebook-sized personal computer data storage devices. However, this asymmetric actuator is very sensitive to the subsidiary resonance which is caused by its rigid body motion. In this paper, an analytical approach using a simple lumped parameter system model is presented with a physical insight to investigate why the subsidiary resonance occurs. The finite element method is used to figure out the force and torque characteristics of the asymmetric actuator which are essential to understand the subsidiary vibration characteristics. The frequency responses are presented to examine how the subsidiary resonance is altered for various situations of having different thickness of a yoke and permanent magnet and of having a different magnet circuit. Finally, the design guidelines to avoid the subsidiary resonance will be presented.

Optical Cap Sensor for Magneto-Optic Near-Field Recording (MO 근접장 기록을 위한 광학 갭 센서)

  • Yoon, Yong-Joong;Park, Jae-Hyuk;Park, No-Cheol;Park, Young-Pil
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.28 no.3
    • /
    • pp.245-250
    • /
    • 2004
  • This paper proposes a new method of measuring an air interface distance between a solid immersion lens(SIL) applied magneto-optic technology and the disk surface. For applying near-field recording (NFR) technology to the magneto-optic storage devices for the next generation, it is positively necessary to maintain the small air gap under about 100㎚. We design an apparatus that consists of some optical components such as a prism, a polarizer and an analyzer. By using the Fresnel reflection coefficient equation, Jones matrices calculation and Malus's law, we establish a mathematical model for understanding the characteristics of the system. The simulations are based on the mathematical model and through the simulation results which is made with various cases we can estimate the performance of the new optical gap sensor system. Experimental results, which are also based on the mathematical model for specific cases, are in good agreement with simulated ones and demonstrate the possibility as the new optical gap sensor.

Digital Evidence Collection Procedure for Hardware Unique Information Collection (하드웨어 고유 정보 수집에 대한 디지털 증거 수집 절차)

  • Pak, Chan-ung;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.839-845
    • /
    • 2018
  • Sensitive data is encrypted and stored as privacy policy is strengthened through frequent leakage of personal information. For this reason, the cryptographically owned encrypted data is a very important analysis from the viewpoint of digital forensics. Until now, the digital evidence collection procedure only considers imaging, so hardware specific information is not collected. If the encryption key is generated by information that is not left in the disk image, the encrypted data can not be decrypted. Recently, an application for performing encryption using hardware specific information has appeared. Therefore, in this paper, hardware specific information which does not remain in file form in auxiliary storage device is studied, and hardware specific information collection method is introduced.

An Efficient Overlay Multi-cast Scheduling for Next Generation Internet VOD Service (차세대 인터넷 VOD 서비스를 위한 효율적인 오버레이 멀티캐스트 스케줄링)

  • Choi, Sung-Wook
    • Journal of the Korea Computer Industry Society
    • /
    • v.9 no.2
    • /
    • pp.53-62
    • /
    • 2008
  • Intensive studies have been made in the area of IPTV VOD server. The basic goal of the study is to find an efficient mechanism to allow maximum number of users under the limited resources such as Buffer utilization, disk performance and network bandwidth. The overlay multicast that has been recently presented as an alternative for the IP multicast has been getting much persuasion by the system resource and the network bandwidth and the advancement of the network cost. we propose a efficient overlay multi_casting network policy for multimedia services with multi media partition storage. Simulation results show that the rate of service number and service time of proposed scheme are about 23% performance improved than that of traditional methods. This implies that our method can allow much more users for given resources.

  • PDF