TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
A Survey On Operating System Challenges And Security Issues Associate To It
1. IJSRD - International Journal for Scientific Research & Development| Vol. 4, Issue 11, 2017 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 231
A Survey on Operating System Challenges and Security Issues Associate
to it
Bibhudutta Jena
School of Computer Engineering, KIIT University, India
Abstract— An operating system (OS) is generally containing
of software that operates computer hardware resources and
provides some basic services for computer programs. The
operating system is a vital component of the system software
in a computer system. In simple word operating system acts
as an intermediate between the user and hardware. Now –a-
days operating system plays an important role for processing
the system. It is the first thing that is freighted in to memory.
It takes a main role to release the burden from application
programmers during the process of different application. It
also behaves as an interface as an host for computing
paradigms. Operating system offers multiple numbers of
services to different application programmes and users. This
paper aims to provide a brief idea about different challenges
and security issues of operating system and also discusses
how to optimize the work of operating system which will be
helpful for enhancing the performance of the system.
Key words: Operating System Types, Operating System
Services, Kernel approach, I/O Operation, Memory
Management
I. INTRODUCTION
An operating system is a bunch of programs that monitors
the hardware and software resources of a computer. In the
absence of operating system it is impossible to display text
and graphics on the monitor. The first objective of operating
system is to control the hardware of the system. The second
objective is to provide an interactive interface to the user
and interpret commands due to which it can communicate
with the hardware [1] . These hardware resources include
processor memory and disk space and so on. Operating
system is also responsible for error handling procedure and
display an error notification while communicating with the
hardware.
Fig. 1: Operating System Position
The above figure[1] describe the position of
operating system in the computers as the paper has already
discussed operating system is generally act as an
intermediate between computer hardware and user utilities.
The operating system is generally responsible for
following essential activities or task.
A. Processor Management
The operating system responsible for managing the work
flow of processor and monitors different task of processor.
B. Memory Management
The operating also takes the responsibilities to manage the
memory of the system. It assigned the memory to different
task and also takes care for properly utilizing the memory of
the system.
C. Storage Management
It also used to monitor storage networks and devices. Some
other major responsibility of operating system is Storage
Management, Application Interface, User Interface etc.
Fig. 2: Role of an operating System
The above figure [2] describes some basic role of
an operating system inside the computer. Out of number of
responsibilities the paper has described some of the task that
has been carried out by the operating system.
The rest of the paper has been summed up in the
following manner. The section II gives a basic idea about
different type of operating systems that are used in different
domains. Similarly section III describes about Main memory
management after that section IV gives an idea about
different security issues and challenges of operating system.
Finally section V concludes the paper.
II. TYPES OF OPERATING SYSTEM
An operating system may execute its task either in serial
manner or in concurrent manner on the basis of this the
operating system has been classified in to following types:
2. A Survey on Operating System Challenges and Security Issues Associate to it
(IJSRD/Vol. 4/Issue 11/2017/065)
All rights reserved by www.ijsrd.com 232
Fig. 3: Types of operating System
A. Batch Operating System
In batch operating system the users are not directly interact
with the computers. In this type of operating first user have
prepared their jobs or task by punch cards and after that they
will submit it [2] to the computer for processing. Batch
processing is particularly useful for operations that are
generally required by the peripheral device. The major
disadvantages in this operating system are there will be no
interaction is possible with the user while the programme is
executed. To setup different job is also a biggest challenge
in this operating system.
B. Time Sharing Operating System
Time sharing is an essential feature of the operating system
and it allows multiple users to concurrently running the task
either in one processor or many processors by providing a
terminal to the user [3]. Time sharing can be defined as the
processor’s time which is shared among different users.
The major advantages of this type of operating system are it
gives quick response in comparison to the other operating
system and also minimizes the CPU idle time [4].
C. Distributed Operating System
In this type of operating system a large central computer
with number of remote terminals are connected with each
other for sharing their resources. Data processing jobs are
divided accordingly. By using various communication lines
the processor can communicate with each other which are
known as loosely coupled system or distributed system. The
major advantages of this type of operating system are it can
reduce the burden on host computer and also reduce the
delay in data processing [5].
D. Real–Time Operating System
A real-time system is defined as a data processing system in
which the time interval required to process and respond to
inputs is so small that it controls the environment. Real time
operating system generally follows a time period for the
execution of task known as deadline. It can be classified in
to two types
Hard real time operating system: In this type of
operating system the job must be executed before reach
to the deadline, otherwise a huge loss will occur.
Soft real time operating system: In this type of
operating system if the job meets the deadline then not
a huge loss will occur.
Now-a-days real time operating system widely
used in different application such as launching of satellite,
Broadcast of television etc.
Real time operating system is error free in
comparison to the other operating system and memory
allocation is best managed in this type of operating system.
In the above section of the paper some basic types
of operating systems has been described rather than this
number of operating systems are present which are used in
different application domains.
III. OPERATING SYSTEM MEMORY MANAGEMENT
The major service of the operating system is memory
management. Basically this is needed for the following
reason:
To ensure protection of multiple processes from each
other due to which they will not interrupt each others
operation.
Proper placement of programme in memory so that
they can be execute frequently.
For proper assignment of memory to different
resources during execution.
Memory management is the functionality of an
operating system which handles or manages primary
memory and moves processes back and forth between main
memory and disk during execution [6]. It keeps tracks of
each and every memory location whether it is occupied or
free in nature. It also keep track how much memory
allocated to different resources for their execution and also
take the decision when the memory will allocate to different
resources. It checks at which time some memory gets
released or unallocated and according to it it updates the
status.
IV. SECURITY AND CHALLENGES
A. Security
Till now security has been a major concern for developers of
operating system. Generally protection of operating system
involves protection of operating system against the
unauthorized users and protection of file system. If
computer systems has no of users and grants the parallel
execution of multiple processes, then the various processes
must be protected from each other. In other word protection
refers to mechanism for controlling the access of
programmes, Hence the security system prohibits
unauthorized access to the system and confirming venomous
destruction of data. It also refers the authentication the users
of the system to save the purity of the information stored in
the system [7].
When consider the operating system security,
authentication attacks will make the bottom of priority list.
The major problems are attacks like, Trojan Horses, Login
spoofing and Buggy Software [8] . Program Threats is also a
security issue. Operating system's processes and kernel
perform the assigned task as instructed previously. If a user
program prepared these process do malicious tasks, then it is
known as Program Threats.
B. Challenges
Considering the above discussion the following gives a brief
idea about the challenges that need to be improved for
enhancing the performance of the operating system.
To develop a convenient and secure operating system
that should provide an interface to write secure
applications [9].
3. A Survey on Operating System Challenges and Security Issues Associate to it
(IJSRD/Vol. 4/Issue 11/2017/065)
All rights reserved by www.ijsrd.com 233
Construct an adaptable permission model .The existing
models are too simple and limited in nature.
There will always be buggy code, but the trick is to
construct an application and an operating system that
will basically hamper attacks and will save the
principal assets of the system.
To make the operating system reliable and fault
tolerance in nature is also an biggest challenge and
different techniques and approaches are developed to
overcome from this challenges.
V. CONCLUSION
Although operating systems have advanced a lot, yet still
there is a lot of things to cover in this domain. Operating
systems research is a very broad field and due to the the
reason for this is mostly because the hardware is becoming
powerful and become more complex day by day and hence
there is a race for the operating systems to proceed. The key
issue of this paper is to describe the challenges and security
issues of different operating system [10]. Optimization the
performance of operating system is a major concern in
today’s date. This paper has also described about different
types of operating systems and their application. Different
researches are going on to overcome from this challenge and
enhance the performance of the operating system.
REFERENCES
[1] A. Belay, A. Bittau, A. Mashtizadeh, D. Terei, D.
Mazieres, and C. Kozyrakis. Dune “Safe user-level
access to privileged CPU features”. In Proceedings of
the 10th USENIX Conference on Operating Systems
Design and Implementation (OSDI2012), pages
335{348, Oct. 2012.
[2] Buck, T. Foley, D. Horn, J. Sugerman, K. Fatahalian, L.
M. Houston and P. Hanrahan. “Brooks for GPUs:
stream computing on graphics hardware”. Proc. Of the
2004 SIGGRAPH Conference, pp. 777-786, 2004.
[3] S. Chaki, S. K. Rajamani and J. Rehof. Types as
Models: Model Checking Message Passing Programs.
Proc of the 29th ACM Symposium on Principles of
Programming Languages, pp. 45-57, 2002.
[4] Bibhudutta Jena"A review on Joining Approaches in
Hadoop Framework and Skewness Associate to it" Vol.
2 - Issue 6 ( Nov - Dec 2016), International Journal of
Engineering and Techniques (IJET) , ISSN: 2395 –
1303.
[5] S. Ghemawat, H. Gobioff and S. T. Leung, “The
Google file system”, Proceedings of the 19th ACM
symposium on Operating systems principles, Bolton
Landing, NY, USA, (2003) October 19–22, pp. 29- 43.
[6] S. Yu, X. L. Gui, R. W. Huang and W. Zhuang,
“Improving the storage efficiency of small files in cloud
storage, Journal of Xi'An Jiao Tong University, vol. 45,
no. 6, (2011), pp. 59-63.
[7] F. Mu, W. Xue, J. W. Shu and W. M. Zheng, “Metadata
management mechanism based on route directory”,
Journal of Tsinghua University (Sci & Tech), vol. 49,
no. 8, (2009), pp. 1229-1232.
[8] M. Guevara, C. Gregg, K. Hazelwood, and K.
Skadron.” Enabling Task Parallelism in the CUDA
Scheduler”. In Proceedings of the Workshop on
Programming Models for Emerging Architectures,
pages 69–76, 2009.
[9] R.M. Needham and D.F. Hartley. “Theory and practice
in operating system design”, in: Proc. 2nd ACM Symp.
on operating system principles, Princeton Univ.,
Princeton, N.J. (Oct. 20-22 1969) 8-12.
[10]R.M. Needham and D.F. Hartley. “Theory and practice
in operating system design”, in: Proc. 2nd ACM Symp.
on operating system principles, Princeton Univ.,
Princeton, N.J. (Oct. 20-22 1969) 8-12.