Improving Cloud Security for Authentication using Attribute Based Encryption. Attribute-based encryption is a type of public key encryption in which the secret key of a user and the cipher text are dependent upon attributes. The decryption of a cipher text is possible only if the set of attributes of the user key matches the attributes of the cipher text. A crucial security aspect of Attribute-Based Encryption is collusion-resistance: An adversary that holds multiple keys should only be able to access data if at least one individual key grants access. Cloud computing is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers that may be located far from the user–ranging in distance from across a city to across the world. There were several cases of security breach on the cloud in the past few year and data security was compromised like Adobe’s Security Breach, Amazon website failure and many security attacks like this motivated us to work on strict security measures on cloud. In such a system, a user provides an untrusted server, say a cloud service provider, with a transformation key that allows the cloud to translate any ABE cipher text satisfied by that user’s attributes into a simple cipher text, and it only incurs a small computational overhead for the user to recover the plaintext from the transformed cipher text. Security of an ABE system with outsourced decryption ensures that an adversary including a malicious cloud will not be able to learn anything about the encrypted message. The formal model of ABE with outsourced decryption forms a concrete scheme. Data owner decides the access using combinations of or policies and encrypt the file and corresponding authentic user can decrypt it using their policies.