File Sharing and
Protection in
Operating
Systems
OVERVIEW OF FILE SHARING METHODS, SECURITY, AND
PROTECTION MECHANISMS IN OPERATING SYSTEMS.
Introduction
File sharing allows
users and processes to
access files efficiently,
while file protection
ensures data security.
Operating systems
manage file sharing
and protection using
permissions,
encryption, and access
control methods.
- Multiple users
1. Local File can access
Sharing: shared folders or
File directories.
Sharing - NFS, SMB, FTP,
in OS
and cloud storage
services (e.g.,
2. Remote File
Dropbox, Google
Sharing:
Drive) enable
remote access
across systems.
To prevent data corruption
during concurrent access:
Concurrency - Locking Mechanisms
Control (Advisory and Mandatory)
- Read/Write Permissions
control access levels for
users and processes.
File Protection in OS
File Access
File Permissions: Access Control Lists
• - Define read, write, and (ACLs):
execute rights for users, • - Provide more granular
groups, and others. access control beyond
basic permissions.
1. File Encryption:
Encryption
- Protects file contents from
unauthorized access. and
- Tools: BitLocker (Windows),
FileVault (macOS), LUKS
Security
(Linux)
2. Disk Encryption:
- Ensures all data on a drive is
encrypted.
User Authentication &
Security Policies
1. Authentication Methods:
- Passwords, multi-factor
authentication, biometrics.
2. Security Policies:
- Mandatory Access Control
(MAC): OS-enforced policies.
- Discretionary Access Control
(DAC): User-defined permissions.
File Sharing and
Protection in Different OS
- SMB for sharing;
NTFS permissions and
1. Windows:
BitLocker for
protection.
- NFS for sharing; UNIX
2. Linux/UNIX: permissions, ACLs, and
LUKS for protection.
- SMB/AFP for sharing;
3.macOS: FileVault for encryption
and UNIX permissions.
File mounting is the process of making
File a storage device or file system
MOUNTING accessible to operating system. It
connects the device to a directory
(Linux/macOS) or a drive letter
(Windows), allowing users and
programs to interact with the device's
files. For example, in Linux, the mount
command is used to attach
devices to a directory, while in
Windows, Disk Management
handles drive assignments.