Abstract: Data outsourcing is now subject to additional safety and privacy concerns as a result of the rise in cloud computing demand. Because data management was moved to words an unstable cloud during the outsourcing stage of the data, data permit control identified a key problem in the cloud repository. This analysis uses the Attribute-Based Access Control method to control access to the cloud storage to solve the issue. The data is reserved in the cloud and protected by strict security before the user may access it. This model takes into account specific properties of the cloud data stored in the database authentication process in order to store the information of registered collections alongside the user-committed data. Each of the clusters has a unique set of benefits, including usernames, group names, and registry message authorization codes. Prior to sending the data to the service provider, it should be encrypted to ensure its security. However, there may occasionally be problems with the supplier’s security measures. In this outcome, a variety of metrics are analyzed, such as the amount of time used for encryption, decryption, key generation, and time consumption. The numerous existing techniques, like Nth Truncated Ring Units and Cipher text. Constraints on online storage access may make policy attribute-based encryption impossible. The time of encryption is reduced by 20% and 36%, respectively, via NTRU and CP-ABE. The proposed technique decrypts data 10.64% faster than the current approach, which decrypts data 19% more slowly.