Enhancing data security in outsourced, distributed, and utility-based environments is crucial for building trust. To maintain data confidentiality, users’ trust in the system remains intact, with uninterrupted availability. Frequent data access necessitates user verification to prevent security breaches. Adding an extra layer of security, users provide a question-and-answer token, approved during file access, without disrupting their activities. Tracking file access patterns is crucial; any changes in access time lead to data failure. Unauthorized access is deterred by providing encrypted false data.