On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud