Traditional approaches are inefficient to support finegrained encryption. Under such approaches, data owner is responsible for encrypting the data before uploading them into cloud and re-encrypting the data whenever there is a change in user’s sub access control policy. Data owners thus incur high communication and computation costs. In order to minimize the overhead at the data owner, fine-gra...