Cloud computing offers new ways to access and store personal and business data via the internet but faces trust issues due to third-party involvement. Fog computing is a solution for data security. Despite cloud storage’s widespread use, security remains a major concern. Evolving communication and computing paradigms introduce new data security challenges. Existing cloud data protection methods fail to prevent data theft attacks. Fog computing utilizes User Behavior Profiling and Decoy Technology. The proposed CUSUM algorithm improves data theft detection by tracking user access pattern changes. User Behavior Profiling includes identifying users based on typing delays and using a simplified picture password.
The authority verifies user details. An algorithm with basic CP-ABE generates a public parameter and master key. It creates ciphertext for specific users based on access policies.
Apache server send the file to the requested user save user details ,Here re encrypt the file name
Upload the video file and encrypt send the file to the APACHE server.
User sends the request for file and secret key and can download the file by using encryption