“…Jahan et al present selective read/write access to the outsourced data for clients using mobile devices supporting users from multiple domains. The authors use Ciphertext‐Policy Attribute‐based Encryption (CP‐ABE) scheme that provides access control on encrypted outsourced data.…”