This presentation discusses achieving secure, scalable, and fine-grained data access control in cloud computing. It proposes a scheme that enables data owners to delegate tasks like data file re-encryption and user secret key updates to cloud servers without disclosing data contents or access privileges. The scheme uses attribute-based encryption, proxy re-encryption, and lazy re-encryption to define access policies based on data attributes while allowing computation tasks to be delegated. The presentation covers an architecture, working, modules, advantages and disadvantages of the proposed scheme.