An Enhanced Distributed Accountability for Data Sharing in the Cloud Computing Technologies
In the fast growing world the cloud services benefit the humankind in several ways to ease the processing of a distance computers to communicate and storage. Having several advantages there are few chances of losing control their individual data became tuff job to the cloud service providers. To alleviate this, in this paper there is implementation of data accountability scheme that regularly track the data in the cloud of every user with the help of JAR file system for providing user authenticity. However every user can upload their individual data to cloud and can obtain one account on their own which supports the encrypted format and when the user requires his/her data.
 H. Liang, L. X. Cai, D. Huang, X. Shen, and D. Peng, â€œAn smdp-based service model for interdomain resource allocation in mobile cloud networks,â€ IEEE Transactions on Vehicular Technology, vol. 61, no. 5, pp. 2222â€“2232, 2012.
 M. M. Mahmoud and X. Shen, â€œA cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks,â€ IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 10, pp. 1805â€“1818, 2012.
 Q. Shen, X. Liang, X. Shen, X. Lin, and H. Luo, â€œExploiting geo-distributed clouds for e-health monitoring system with minimum service delay and privacy preservation,â€ IEEE Journal of Biomedical and Health Informatics, vol. 18, no. 2, pp. 430â€“439, 2014.
 T. Jung, X. Mao, X. Li, S.-J. Tang, W. Gong, and L. Zhang, â€œPrivacy-preserving data aggregation without secure channel: multivariate polynomial evaluation,â€ in Proceedings of INFOCOM. IEEE, 2013, pp. 2634â€“2642.
 Y. Yang, H. Li, W. Liu, H. Yang, and M. Wen, â€œSecure dynamic searchable symmetric encryption with constant document update cost,â€ in Proceedings of GLOBCOM. IEEE, 2014, to appear.
 N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, â€œPrivacy-preserving multi-keyword ranked search over encrypted cloud data,â€ IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222â€“233, 2014.
 D. X. Song, D. Wagner, and A. Perrig, â€œPractical techniques for searches on encrypted data,â€ in Proceedings of S&P. IEEE, 2000, pp. 44â€“55.
 R. Li, Z. Xu, W. Kang, K. C. Yow, and C.-Z. Xu, â€œEfficient multi-keyword ranked query over encrypted data cloud computing,â€ Future Generation Computer Systems, vol. 30, pp. 179â€“ 190, 2014.
 H. Li, D. Liu, Y. Dai, T. H. Luan, and X. Shen, â€œEnabling efficient multi-keyword ranked search over encrypted cloud data through blind storage,â€ IEEE Transactions on Emerging Topics in Computing, 2014, DOI10.1109/TETC.2014.2371239.
 C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, â€œSecure ranked keyword search over encrypted cloud data,â€ in Proceedings of ICDCS. IEEE, 2010, pp. 253â€“262.
 M.Sheshikala, Mohd Sallauddin, "Survey on Multi Level Security for IoT Network inâ€ in Journal of Advanced Research in Dynamical and Cont, Volume 10, Issue 10, Page No(s) 134 - 146, JUL. 2018, [ISSN (Print): 1943-023X]
 K.Sudheer Kumar, Y.Nagender, "Liability for Information sharing in Cloud" in International Journal on Computer Science and Engi, Volume 9, Issue 11, Page No(s) 630 - 634, NOV. 2017, [ISSN (Print):0975-3397]
 Y. Chanti, Y.Nagender, B. Vijay Kumar, "QUICKLY NEAREST NEIGHBOR SEARCH TRADITIONAL SPATIAL QUERY WITH KEYWORDS" in International Journal on Computer Science and Engineering (IJCSE), Volume 9, Issue 11, Page No(s) 635 - 638, NOV. 2017, [ISSN (Print):2229-5631, ISSN (Online): 0975-3397]
 M Likhitha, S Vahini, â€œIndependent Access to Encrypted Cloud Databasesâ€ in International Journal for Technological Research in Engineering (IJTRE), Volume 3, Issue 4, Page No(s) 629-632, DEC 2015. ISSN (Online): 2347 - 4718.313.