This thesis proposes a design and implementation of an anonymous authentication and authorization protocol for cloud computing. The protocol uses traceable anonymous certificates instead of standard public key certificates to authenticate users without revealing personally identifiable information. Authorization is provided through XACML access control policies bound to anonymous identities rather than real identities. The protocol aims to mitigate threats like identity theft and privacy leaks while requiring minimal changes to existing systems. It was validated using Scyther to ensure resistance against common attacks such as man-in-the-middle and replay attacks.