Protection of privacy has also received increasing attention in many fields, mainly in the sense of the Individual Health Record (IHR), as cloud computing has become an essential activity in the real world. Traditional encryption of the cypher text policy (CP-ABE) allows you to track the scrambled PHR information policy in a fine-grained fashion. Still, with the cypher text, the access policy is also sent. However, the entry policy does not allow users to be anonymous, as a considerable amount of sensitive information from legitimate users of the app is needed. It is now necessary to protect users [[CHECK_SINGLEQUOT_ENT]] privacy by hiding access methods. The vast majority of previous plans, however, have to address two problems: the first problem is that specific plans do not embrace a broad universe of attributes, so their common sense in PHR is dramatically reduced, and the second is that the decryption cost is very high because the entry mechanism is set up in the cypher paper. This dramatically reduces their usefulness as a result. To solve these issues, we are constructing a CP-ABE plot with sufficient decryption, where together the size of the available limits and the cost of decryption is endless. Also, using the dual system encoding technique, we show that the proposed conspiracies achieve optimum protection in the basic model.