PCI Configuration based Data Security Architecture and Co-Design Techniques
Subscribe/Renew Journal
The recovery of intentional/ unintentional modification of data is conventionally done by creating a backup/copy of data prior to its modification. Alternately, In this paper, the data recovery process is performed by contextually switching the semaphores to control the system resources. The designed hardware is placed in the PCI slot between the CPU and lower-level peripherals. A binary semaphore controls the data flow between the designed hardware and the CPU, whereas a mutually exclusive (context-switching) semaphore controls the data flow between the designed hardware and lower-level peripherals. The semaphore management mechanisms are moved from the application to the physical and data-link communication layers. A fully distributed management scheme is implemented, and there is no need to place the semaphore control structures on a particular node in the network. The existing version of the selected data file is copied and directed to a non-readable area of the secondary storage. This ensures retrieval of the former contents of the data file via Linked Link concept if the current modification is not authenticated.
Keywords
Abstract Views: 224
PDF Views: 1