1. The document describes a secure cloud storage system that uses proxy re-encryption to allow authorized data sharing among multiple users. It focuses on privacy issues in cloud storage and proposes a solution using proxy re-encryption.
2. Proxy re-encryption schemes allow a proxy (like a cloud server) to alter an encrypted file so that it can be decrypted by another user, without revealing the content to the proxy. The proposed system uses this to share files encrypted for one user so they can be decrypted by another authorized user.
3. The system assigns different trust levels to control what data different users can access. A high trust level allows access to more data fields, while a low trust level restricts access. This trust