“…Attribute based encryption, ant colony optimization, Data Classification, trust based mechanism, fuzzy logic, cipher text encryption, genetic algorithm [9], [11], [17], [18], [19], [20], [21], [23], [26], [27], [28], [29], [30], [31], [34], [37], [41], [45], [46], [47], [56], [57].…”