This document summarizes a survey on attribute-based data hiding and access policies in cloud computing. It discusses how cloud computing delivers computing services over the internet and how securing client data is important for cloud providers. It then describes different cloud models like SaaS, PaaS, and IaaS and discusses virtualization and how resources are mapped. It also discusses techniques for data hiding like dispersing files across servers, encrypting data, and revoking access policies. The goal is to address security and storage issues by implementing access control, authentication, and ensuring data availability even if servers are compromised.