A user should be able to access data if user possesses a set of credentials or attributes. However if any server is storing the data is being compromised, and then the confidentiality of data will also be compromised. Outsourcing data on cloud may lose access control over users and confidentiality control data. In this paper, we discuss various approaches to address the challenges, existing solutions, and future work needed to provide a truthful cloud computing milieu. This paper presents a survey on privacy preserving schemes and techniques used so far to secure the data when outsourced to the cloud server.