欢迎访问中国科学院大学学报,今天是

中国科学院大学学报 ›› 2008, Vol. 26 ›› Issue (6): 792-801.DOI: 10.7523/j.issn.2095-6134.2008.6.011

• 论文 • 上一篇    下一篇

基于日志式文件系统的数据修复模型

文晓阳1,荆继武1,刘鹏2   

  1. 1中国科学院研究生院 信息安全国家重点实验室,北京 100049;2 宾州州立大学,美国宾州 16802
  • 收稿日期:1900-01-01 修回日期:1900-01-01 发布日期:2008-11-15

A model of efficient intrusion recovery solution based on log-structured file system

WEN Xiao-Yang †, JING Ji-Wu1, LIU Peng2   

  1. 1 State Key Laboratory of Information Security, Graduate University of the Chinese Academy of Sciences, Beijing 100049, China; 2 College of Information Sciences and Technology, Pennsylvania State University, PA 16802, USA
  • Received:1900-01-01 Revised:1900-01-01 Published:2008-11-15

摘要: 被入侵或遭受攻击后的计算机系统,其磁盘数据往往会遭到篡改、删除等恶意修改,而这些数据通常是非常宝贵的,因此数据恢复技术尤为重要。现有的数据恢复技术在很多方面存在不足,这是因为主流文件系统其设计本身并不利于数据恢复。针对上述问题,发现日志式文件系统设计有利于实施高效的数据恢复算法,从理论上分析了它有利于进行数据恢复的原因,设计了基于日志式文件系统的数据恢复算法模型,并在开发的日志式文件系统模拟器和真实环境中分别进行了算法测试。实验表明,日志式文件系统可以容易地实现恢复迅速、对系统性能影响轻微、无需额外存储机制的数据恢复算法。

关键词: 日志式文件系统, 数据修复, 自恢复

Abstract: Data content stored in computer systems are more crucial than ever before. Compromised computer systems always suffer from data contaminations in both system and user files, therefore intrusion recovery methods are indispensable today. Existing intrusion recovery methods have shortcomings in certain aspects because, in our observation, the file systems on which these methods work are not inherently apt to realize recovery. In contrast, Log-Structured File System (LFS) is ideal to perform various intrusion recovery algorithms. We explain our claims theoretically, propose data recovery algorithm, validate it in SimuLFS, the LFS simulator we built, and test it in real LFS environment in FreeBSD. Experiment results indicate that even very simple recovery algorithm can achieve fast file recovery from almost any state of the disk, with little throughput degradation, guarantee accuracy, require no extra storage requirements and minimal changes to any original LFS code.

Key words: log structured file system, data recovery, self-healing