International Journal of Engineering Science and Technology
Companies are into the cloud and provide services on it. the increasing popularity of cloud computing draws attention to its security challenges, which are particularly worsen due to resource sharing. This technology is prone to security threats because of which the users want to trust their precious data. Several schemes are employed for access control of outsourced data. So, hierarchical attribute set based encryption, an extension of cipher-text policy attribute set-based encryption, has been proposed for its fine grained access control with hierarchical structure of users.