This document discusses secure data access and sharing in cloud computing environments. It first outlines some security requirements for data sharing in clouds, including data security, privacy, confidentiality, access control, user revocation, and scalability. It then surveys several cryptographic techniques for secure data sharing, including attribute-based encryption (ABE), key-policy attribute-based encryption (KP-ABE), and identity-based encryption (IBE). It also discusses proxy re-encryption as another technique that supports secure data sharing using a semi-trusted proxy to convert ciphertexts between users' public keys.