This document reviews various data access control schemes for cloud computing. It discusses role-based access control (RBAC) and role-based encryption (RBE) which allows data owners to encrypt data such that only users with appropriate roles can decrypt it. Attribute-based encryption (ABE) is also covered, which allows fine-grained access control of encrypted data based on user attributes. The document also reviews user-based access control (UBAC) which applies access control lists to data to control access. It evaluates these schemes and their ability to efficiently handle user revocation while protecting data access and privacy in the cloud.