This document summarizes and compares various encryption algorithms for providing security in cloud computing environments. It first discusses key-policy attribute-based encryption (KP-ABE) which associates attributes with keys and policies with data. It also covers ciphertext-policy attribute-based encryption (CP-ABE) which associates policies with ciphertext and attributes with keys. The document then analyzes expressive KP-ABE and ciphertext-policy attribute set-based encryption (CP-ASBE) which uses hierarchical attribute sets. It concludes that improving previous work to leverage hierarchical attribute sets of users may enhance security and access control when utilizing cloud computing.