“…The access control requirements or issues may vary from one application domain to other. In cloud computing, protecting user's data from unauthorised access, developing data owner's trust in cloud service providers (CSP), hiding the identity of the data owner (data anonymity), and exchanging data among multiple clouds securely are some of the main concerns (Purushothama and Amberker, 2017;Mishra et al, 2020;Priya et al, 2017;Almutairi et al, 2021;Fan et al, 2018). Maintaining the privacy of patient's data, limiting unnecessary access, deciding the boundary of access to patient's information are some of the basic requirements in healthcare applications (Karim et al, 2017;de Carvalho and Bandiera-Paiva, 2018;Chenthara et al, 2019;Al-Issa et al, 2019).…”