Preview

The Winfs File System and Modern Encryption Methods

Powerful Essays
Open Document
Open Document
4575 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Winfs File System and Modern Encryption Methods
The WinFS File System
In the last decade there has been a “combination of trends and technologies” that will change the way people work with managing their data in the future. Because computers have become faster, bandwidth continues to increase, and data storage has increased, the amount of “digitally born data” has exploded (Rizzo, 2005). The increase in digital data has propelled Microsoft to invest in building a new way to manage data. WinFS (Windows Future Storage) is being developed by Microsoft to be used as an advanced storage system that shall be implemented on top of NTFS. Because WinFS is actually operating on top of NTFS, the only way to compare the two is to highlight the features of WinFS that distinguish it from NTFS.
“WinFS is modeled on the file system of the coming SQL server (Yukon), whose FS is based entirely on a relational database”(Ibelshäuser, 2004). According to the Wikipedia encyclopedia, “WinFS is not a physical file system; rather it provides rich data modeling capabilities on top of the NTFS file system. But it still uses NTFS to store its data in physical files” (p. 4). The concept of WinFS is that it will identify different data by a form of Extensible Markup Language (XML) metadata and use this metadata to set up relationships among the data. This metadata is attributes “such as type of file (e.g., document, picture, music), creator, artist” (Wikipedia, 2006). WinFS will be able to utilize the metadata to aggregate data from two or more applications and organize “using attributes to describe the data in files and the relation of that data with other data. By creating a unified datastore, it promotes sharing and reuse of data between different applications” (Wikipedia, 2006).
WinFS is comprised of five components: Core WinFS, Data Model, Schemas, Services, and APIs. Below is a diagram detailing the different components. The core WinFS building blocks (Rizzo. 2004, Figure 1)
Core WinFS helps provide the core services of a file



References: Anderson, Matt (2006). The Evolution of NTFS: NTFS 1.1. Retrieved April 16,2006 from, http://arstechnica.com/paedia/n/ntfs/ntfs4-1.html Bright, Peter (2003) Bryson, David (2002). Using CryptoAPI. Retrieved April 12, 2006, from http://www.kerneli.org/howto/node3.php Davis, W & Rajkumar, T.M Dubrawsky, Ido (2003). Cryptographic Filesystems, Part One: Design and Implementation. Retrieved April 16, 2006, from http://www.securityfocus.com/print/infocus/1673 Grimes, Richard (2004) Ibelshäuser, Oliver (2004). The WinFS File System For Windows Longhorn: Faster & Smarter. Retrieved April 12, 2006, from http://www.tomshardware.com/2003/06/17/the_winfs_file_system_for_windows_longhorn/index.html Knorr, Eric Microsoft (2006), Encrypting File System for Windows 2000, Retrieved April 15, 2006, from http://www.microsoft.com/resources/documentation/Windows/2000/server/reskit/en-us/distrib/dsck_efs_WQPT.asp Rizzo, Thomas (2004) TCFS (2001). TCFS v.3.0.1 Frequently Asked Questions. Retrieved April 16, 2006, from http://www.tcfs.it/docs/tcfslinux-faq.3.html Walsh, Norman (1998) Wikipedia Encyclopedia (2206). WinFS. Retrieved April 6, 2006 from http://en.wikipedia.org/wiki/WinFS Wildermuth, Shawn (2004) Zadok, Erez, Ion Badulescu and Alex Shender, Cryptfs: A Stackable Vnode Level Encryption File System. Retrieved April 12, 2006, from http://www.cs.columbia.edu/~ezk/research/cryptfs/cryptfs.pdf Bibliography Linux Reviews (2006) Microsoft (2006). Windows Vista Developer Center. Retrieved April 19, 2006, from http://msdn.microsoft.com/windowsvista/ Rodriguez, Jesus (2004) WinMagic (2006). WinMagic Hard Disk Encryption - The most secure and versatile disk encryption software. Retrieved April 19, 2006, from http://www.winmagic.com/tech_support/efs.asp

You May Also Find These Documents Helpful

  • Satisfactory Essays

    FileWard - Personal File Encryption & Security for Mac OS X. (n.d.). Retrieved May 15, 2014, from http://www.northernsoftworks.com/fileward.html…

    • 515 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The company that I work is need of a file system, one that can support 5000 users or more. This particular system was designed to allow multiple users to access the same file, in doing so there must be a way to protect the data that is being accessed by all of those users.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2580 Unit 5 assignment

    • 340 Words
    • 2 Pages

    TrueCrypt supports parallelized encryption for multi-core systems and, under Microsoft Windows, pipelined read/write operations to reduce the performance hit of encryption and decryption. On newer processors supporting the AES-NI instruction set, TrueCrypt supports hardware-accelerated AES to further improve performance. The performance impact of disk encryption is especially noticeable on operations which would normally useDirect Memory Access (DMA), as all data must pass through the CPU for decryption, rather than being copied directly from disk to RAM.…

    • 340 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    9.) NTFS (NT file system; sometimes New Technology File System) is the file system that the Windows NT operating system uses for storing and retrieving files on a hard disk. NTFS is the Windows NT equivalent of the Windows 95 file allocation table (FAT) and the OS/2 High…

    • 2058 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    The evolution of the Ethernet standards will have a large effect on data storage requirements. As the speeds of these connections continue to increase, users and businesses will be able to transfer larger files faster and will required larger data storage to accommodate the increased demand of resources. Thirty years ago, when the standard was only 10MB, there was nowhere near the need for the data storage capacity as there is today, with the current standard being 100 Gbit, with 1 Tbit on the way. Data storage wasn’t as high in demand before because it would take an extremely long amount of time to transfer large files, but as the speed increases, so will the demand.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Red 40 Lab

    • 2090 Words
    • 9 Pages

    Determining Red 40 Concentrations Using Absorption with Beer’s Law Introduction I like color and enjoyed learning about wavelengths and the spectrum of light, so I considered incorporating something related to that into my Internal Assessment. We also had just used concentrations in our Group 4 Project, so when I found an experiment that dealt with both of these I thought it was a great idea. This experiment is not completely original; the basic concept has been used multiple times. It uses Beer’s Law: · A is light absorbance · is “molar absorptivity with units of L mol-1 cm-1” · l is the length of the cuvette in centimeters · c is the concentration of the solution in mol L-1…

    • 2090 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4639 Words
    • 19 Pages

    Computers store data ondisks using files, which are structured in specific ways in order to allow for faster access, higher reliability, and to make better use out of the drive's available space. The specific way in which files are stored on a disk is called a file system, and enables files to have names and attributes. It also allows them to be stored in a hierarchy of directories or folders arranged in a directory tree.…

    • 4639 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    NT1110Module4 SA

    • 302 Words
    • 1 Page

    The File Allocation Table 32 is preferred over the New Technology File system only in certain situations. When the hard disk has to be accessed by a dual-booting system that is an older version of windows then NTFS will not be supported.…

    • 302 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Stallings, W. ((2015)). Operating Systems: Internal and Design Principles, 8e. Retrieved from The University of Phoenix eBook Collection Database.…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Project Part 1

    • 1209 Words
    • 4 Pages

    Data encryption on removable media guideline. (2014). In Berkeley Security. Retrieved March 15, 2014, from https://security.berkeley.edu/content/data-encryption-removable-media-guideline?destination=node/379…

    • 1209 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Quiz on Computers

    • 2372 Words
    • 16 Pages

    (TCO 1) NTFS has been supported in Windows Server systems from when _____ was introduced in the early 1990s to Windows 2000 Server and Windows Server 2003.…

    • 2372 Words
    • 16 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hfs+, Ext3Fs, and Ntfs

    • 523 Words
    • 3 Pages

    NTFS is a Windows op and file allocation system. It is standard on Windows NT, Windows 2000, Windows XP, Windows server 2003, Windows server 2008 Windows Vista and Windows 7. NTFS replaced the FAT file system as the preferred file system for Microsoft Windows operating systems. NTFS has several improvements over FAT and HPFS (High Performance File System) such as improved support for metadata and the use of advanced data structures to improve performance, reliability, and disk space utilization, plus security access control lists (ACL) and file system journaling. FAT systems are still used in portable media like thumb drives, MP3 players, cell phones and cameras. You will probably run into NTFS and HFS+ systems more often. Cyber criminals might use Linux powered platforms if they are some sort of computer geek. The source code is open on Linux and can be modified by anyone. You can make software and do other things than it was meant to do more easily. Open source software and Linux does not have much support.…

    • 523 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Since its introduction, the hard disk drive has become the most common form of mass storage for personal computers. Manufacturers have made immense strides in drive capacity, size, and performance. Today, 3.5-inch, gigabyte drives capable of storing and accessing one billion bytes of data…

    • 757 Words
    • 4 Pages
    Good Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Good Essays

    128 Bit Encryption

    • 662 Words
    • 2 Pages

    Bradford, C. (2014). 5 Common Encryption Algorithms and the Unbreakables of the Future - StorageCraft. Storagecraft.com. Retrieved 11 February 2015, from http://www.storagecraft.com/blog/5-common-encryption-algorithms/…

    • 662 Words
    • 2 Pages
    Good Essays