Cloud computing offers new ways to access and store personal and business data via the internet but faces trust issues due to third-party involvement. Fog computing is a solution for data security. Despite cloud storage’s widespread use, security remains a major concern. Evolving communication and computing paradigms introduce new data security challenges. Existing cloud data protection methods fail to prevent data theft attacks. Fog computing utilizes User Behavior Profiling and Decoy Technology. The proposed CUSUM algorithm improves data theft detection by tracking user access pattern changes. User Behavior Profiling includes identifying users based on typing delays and using a simplified picture password.

Module Description
Trusted Authority


The authority verifies user details. An algorithm with basic CP-ABE generates a public parameter and master key. It creates ciphertext for specific users based on access policies.

Apache Server

Apache server send the file to the requested user  save user details ,Here re encrypt the file name

Group Manager

Upload the video file and encrypt send the file to the APACHE  server.

Data User

User sends the request for file and secret key and can  download the file by using encryption

  • Cloud Computing
  • Data Security
  • Fog Computing