Analysis of attribute‐based cryptographic techniques and their application to protect cloud services Article in Transactions on Emerging Telecommunications Technologies (June 2019)