CFP last date
20 January 2025
Reseach Article

Encode Decode Linux based Partitions to Hide and Explore File System

by Ajahar Ismailkha Pathan, Amit Sinhal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 75 - Number 12
Year of Publication: 2013
Authors: Ajahar Ismailkha Pathan, Amit Sinhal
10.5120/13167-0896

Ajahar Ismailkha Pathan, Amit Sinhal . Encode Decode Linux based Partitions to Hide and Explore File System. International Journal of Computer Applications. 75, 12 ( August 2013), 40-45. DOI=10.5120/13167-0896

@article{ 10.5120/13167-0896,
author = { Ajahar Ismailkha Pathan, Amit Sinhal },
title = { Encode Decode Linux based Partitions to Hide and Explore File System },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 75 },
number = { 12 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 40-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume75/number12/13167-0896/ },
doi = { 10.5120/13167-0896 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:44:08.305071+05:30
%A Ajahar Ismailkha Pathan
%A Amit Sinhal
%T Encode Decode Linux based Partitions to Hide and Explore File System
%J International Journal of Computer Applications
%@ 0975-8887
%V 75
%N 12
%P 40-45
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

One of the big advantages of using Linux is that its security tends to be so much better than that of the competing alternatives. Linux has gained its popularity as an open source operating system and has been used for workstations and servers. Due to the growth of its usage in application and production line, its vulnerabilities have increased from time to time. Exploits are written based on these vulnerabilities that enable systems to be controlled over or simply knock out of its purpose. Linux might be impervious to viruses and worms written for Windows, but that's just a small subset of the larger issue. We are not sure about security. With the limitations of above there is a need of a analysing different methods to secure Linux. Here we perform analysis on some tool that are Explore 2fs, DiskInternal Linux Reader, Ext2fsd to access Linux partition and security of Linux define based on efficiency of that tools.

References
  1. W. Richard Stevens And Stephen A. Rago, "Advanced Programming in the UNIX Environment" Second Edition June 17 2005, Addison Wesley Professional, ch 1 and 2, pp 09-210
  2. HAN Hua, GUO Chaoyang, DAI Yafei, YUE Bin, LI Xiaoming," A Scheme to Construct Global File System" Peking University Beijing, China 100871, 2002 IEEE, China National Key Fundamental Research Grant G1999032708
  3. Red Hat http://www. redhat. com/mirrors/LDP/LDP/tlk/fs/file-system. html
  4. Priscilla Oppenheimer. 2008. New Technologies File System (NTFS).
  5. A. Aho, J. Hopcroft, and J. Ullman. 1974. The Design and Analysis of Computer Algorithms. Addison-Wesley,.
  6. Daniel P. Bovet And Marco Cesati. 2007. 2nd Edition "Understanding the linux Kernel". O'Reilly Publication. Ch 17, Pn 574-607.
  7. Stephen C. Tweedie, '98. " Journaling the Linux ext2fs Filesystem", a paper from LinuxExpo.
  8. A fast file system for UNIX. McKusick, Joy, Leffler and Fabry. Aug. 1984. ACM Transactions on Computer Systems, vol. 2.
  9. Ext2 File System http://www. linux-tutorial. info/modules. php?name=MContent&pageid=272
  10. R. E. Tarjan March. 22 (1975), Efficiency of a good but not linear set union algorithm, J. Assoc. Comput. , 215–225.
  11. M. A. Weiss, 1994, Data Structures and Algorithm Analysis, Benjamin Cummings, Redwood City, California, Second Edition.
  12. Dominic Giampaolo, "Practical File System Design:The Be File System", BLANK, Pn 08-247.
  13. Xiang Cai and Yuwei Gui, "Exploiting Unix File-System Races via Algorithmic Complexity Attacks", Stony Brook University.
  14. Ashish Aggarwal and Pankaj Jalote. Nov. 2006. Monitoring the security health of software systems. Software Reliability Engineering, 2006. ISSRE '06. 17th International Symposium on, pages 146–158.
  15. Claybrook, Billy G. File Management Techniques. John Wiley & Sons.
  16. Ext3 File System http://frankdrews. com/public_filetree/cs458_558_SQ03/studentpapers/shangyouzeng. pdf
  17. Song-Hwa Park, Tae-Hoon Kim, Ki-Dong Chung, "Fast Mounting and Recovery for NAND Flash Memory Based Embedded Systems," EVC Workshops 2006, LNCS 4097, pp. 710-720, 2006.
  18. Kazuhide Fukushima and Shinsaku Kiyomoto, , May 2010 "Security Analysis of Access Linux Platform", KDDI R&D Laboratories Inc. , Fujimino, Japan, IJCSNS VOL. 10 No. 5.
  19. ACCESS Co. , LTD. The access linux platform.
  20. H. C. Rao and L. L. Peterson, "Accessing files in an INTERNET: The JADE File System", IEEE Trans. Sofiw. Eng. 19, 6, June 1993, pp. 61 3-624
  21. B. C. Neuman. "The Prosper0 Fill: System: A Global File System Based on the Virtual System". Computing Systems, 5(4), 1992, pp. 407-432.
  22. Linux platform Access http://www. howtogeek. com/112888/3-ways-to-access- your-linux-partitions-from-windows/
Index Terms

Computer Science
Information Sciences

Keywords

File System Virtual File System Journaling File Explore Permission Modification.