This document summarizes a research paper that proposes a new approach called two layer encryption (TLE) to enforce fine-grained access control on confidential data stored in public clouds. The key aspects are:
1) TLE uses two layers of encryption - the data owner performs coarse-grained encryption and the cloud performs fine-grained encryption on top based on access control policies provided by the owner.
2) A challenging problem is how to decompose access control policies for the two layer encryption to work while minimizing what the owner manages and ensuring data confidentiality. The paper shows this is an NP-complete problem.
3) The paper proposes optimization algorithms to find near optimal decompositions and evaluates TLE