Uploading anonymous data over untrustworthy cloud service providers (CSP), the privacy and security concerns emerge over the authenticity of the query answer and the leakage of the Data Owner (DO) identity. Providing signature of data owner is always a good solution but the signatures can reveal identity of data owner. In this paper we try to review some techniques and methods which can be used collaboratively to satisfy the aforementioned requirements. These techniques are ring signature scheme for anonymous data upload, Merkel Hash Tree (MHT) for data authentication and non-repudiable service protocol using online trusted authority (TA). To protect trading behavior between the user and the cloud service provider, non-repudiation protocol is used during the transmission of the query answer and the verification object (VO).