This document summarizes several papers related to secure data sharing schemes for dynamic groups in the cloud. It discusses key distribution methods using a key manager to distribute keys to group members. The document also reviews papers on revoking members from a group without compromising past signatures, verifying computations on outsourced data, variations of computational and decisional Diffie-Hellman problems, and proofs of retrievability for verifying intact files stored remotely. The conclusion is that mobile cloud computing can extend the boundaries of mobile applications but must satisfy security parameters like integrity, authorization and access control.