Improvising Distributed Accountability by Using Fog Methodology
K. Nagendra1, A. Suresh Babu2
1K.Nagendra, Cse, Jntuacep, Pulivendula, Kadapa, (Andhra Pradesh), India.
Dr. A. Suresh Babu, the Department of Cse, Jntuacep, Pulivendula, Kadapa, (Andhra Pradesh), India.
Manuscript received on July 19, 2013. | Revised Manuscript received on August 01, 2013. | Manuscript published on August 30, 2013. | PP: 345-350  | Volume-2, Issue-6, August 2013.  | Retrieval Number: F2090082613/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: In cloud computing environment resources are shared among various clients and it’s important for system provider to allocate the necessary resources for the clients. And IT infrastructure proceeds as the amount increases to grow, cloud computing is a new way of virtualization technologies that enable management of virtual machines over a plethora of physically connected systems [13]Cloud computing provides on demand services. Multiple users need to try and do business of their information exploitation cloud however they get worry to losing their information. Whereas data owner can store his/her information on cloud, he should get confirmation that his/her information is safe on cloud. To unravel higher than downside during this paper this offers effective mechanism to trace usage of information exploitation accountability. Accountability is verification of security policies and it’s necessary for clear information access. In this paper shows automatic work mechanisms exploitation JAR programming that improves security and privacy of information in cloud. We provide an effective mechanism known as fog computing to protect user’s data from theft by confusing attacker with unuseful information. Exploitation this mechanism data owner might apprehend his/her information is handled as per his demand or service level agreement.
Keywords: Cloud computing, Accountability, Security, Data sharing, Privacy.