The connectivity of devices, machines and people via Cloud infrastructure can support collaborations among doctors and specialists from different medical organisations. Such collaborations may lead to data sharing and joint tasks and activities. Hence, the collaborating organisations are responsible for managing and protecting data they share. Therefore, they should define a set of access control policies regulating the exchange of data they own. However, existing Cloud services do not offer tools to analyse these policies. In this paper, we propose a Cloud Policy Verification Service (CPVS ) for the analysis and the verification of access control policies specified using XACML. The analysis process detects anomalies at two policy levels: a) intra-policy: detects discrepancies between rules within a single security policy (conflicting rules and redundancies), and b) interpolicies: detects anomalies between several security policies such as inconsistency and similarity. The verification process consists in verifying the completeness property which guarantees that each access request is either accepted or denied by the access control policy. In order to demonstrate the efficiency of our method, we also provide the time and space complexities. Finally, we present the implementation of our method and demonstrate how efficiently our approach can detect policy anomalies. . Related Work. In a collaborative healthcare process, doctors and specialists from different medical organisations share patient's data in order to make a better diagnosis. Due to the current Big data exponential data growth, solutions that store, process [10] and manage medical data are of a great interest. In this direction, cloud computing represents a cost-effective solution for such needs [1,2]. For instance, Marzini et al.[23] make use of the cloud elasticity to manage basic activities in healthcare scenarios. On the other hand, the usage of cloud computing for medical environments raises several issues such as reliability and security.Regarding the reliability issue, Gawanmeh et al. [14] present a state of the art review on the verification of reliability in healthcare systems using either simulation-based verification, formal methods such as automata and prism [28,29], or semi-formal methods. In the work presented in this paper, we focus on the formal verification of the security aspect, especially access control.Access control protects the system's resources against unauthorized access via a set of policies. Jansen [18] proposed XACML as a policy specification language for cloud applications. Yet, XACML policies may contain conflicting and redundant rules, since XACML policies are sometimes managed by more than one administrator [16]. Moreover, in collaborative applications, the XACML policies are aggregated from collaborative parties which may raise conflicts between rules in different policies.Several works make use of verification techniques such as model checking in order to detect XACML policy anomalies. For instance, to detect conflicts...