The document proposes a decentralized access control scheme for secure data storage in clouds, which enables anonymous authentication without revealing user identities. This system addresses critical issues such as access control, authentication, and privacy protection, while providing robust security against various attacks. It outlines advantages such as distributed access control, collusion resistance, and protection against replay attacks, with costs comparable to centralized approaches.