<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Privacy-Preserving Identity Management in Cloud Environments via SOLID</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alfredo Cuzzocrea</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Islam Belmerabet</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ismail Benlaredj</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Dept. of Computer Science, University of Paris City</institution>
          ,
          <addr-line>Paris</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>iDEA Lab, University of Calabria</institution>
          ,
          <addr-line>Rende</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <abstract>
        <p>Focusing on the main research context of privacy-preserving identity management in multi-Cloud environments, this paper presents a novel framework integrating high-level identity verification policies, Zero-Knowledge Proof (ZKP) protocols, and SOLID decentralized secure data stores. By leveraging SOLID Personal Online Datastores (PODs), our approach ensures that users maintain full control over their identity data while enabling secure interoperability across diverse Cloud infrastructures. To support our proposed methodology, we provide UML-based modeling for conceptual representation blueprint outlining its implementation.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Privacy-Preserving Identity Management</kwd>
        <kwd>Advanced Identity Management Protocols</kwd>
        <kwd>SOLID</kwd>
        <kwd>Multi-Cloud</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Nowadays, security challenges faced by Cloud Computing (e.g., [
        <xref ref-type="bibr" rid="ref13 ref20">13,20</xref>
        ]) and the ever-evolving
cybercrime landscape present fresh risks that necessitate the adoption of solutions capable of helping
companies with prevention, detection, and response. During the previous year, a noteworthy 80% of
organizations encountered at least one Cloud security threat, while 45% reported experiencing up to
four incidents over the same duration. This has given birth to several research proposals in the actual
literature.
      </p>
      <p>
        On the other hand, Identity Management (IdM) is a key aspect of security and privacy of complex
information systems (e.g., [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]). When applied to Cloud Computing Environments, the problem gets
worse, since security mechanisms are critical for Cloud services (e.g., [
        <xref ref-type="bibr" rid="ref13 ref20">13,20</xref>
        ]). Data leakage are a first
reason of security issues in Clouds, and it is becoming one of most important challenges of
nextgeneration research. Indeed, nowadays, Clouds influence a wide spectrum of architecture paradigms,
including Mobile Cloud Computing (MCC) and Service-Oriented Architectures (SOA). Data leakage can
involve in theft of sensitive personal information (e.g., [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]), which would seriously limit the large
adoption of Cloud Computing technologies in modern data-driven societies
      </p>
      <p>
        For ensuring Cloud security over sensitive information, the actual approaches adopt the idea of
employing a third-party authority service (e.g., [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]), which ensures about the identity of the actual
user. Generally, this is achieved via Identity and Access Management (IAM), whose main solution
consists in keeping a single ID associated to the actual user, and incorporating suitable identity
provisioning and identity de-provisioning activities across different and possibly heterogenous
networks (e.g., [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]). As a consequence, it clearly follows that identity management is a relevant
research challenge of Cloud Computing security research, especially when it is considered in the
context of multiple Cloud environments, as also pinpointed by recent studies in the field (e.g., [
        <xref ref-type="bibr" rid="ref16 ref17">16,17</xref>
        ]).
Beyond this, another research challenge arises. How to perform secure identity management in
multi-Cloud environments without violating the privacy of user data (e.g., [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ])? The latter question
1SEDB 2025: 33rd Symposium on Advanced Database Systems, June 16-19, 2025, Ischia, Italy
* This research has been made in the context of the Excellence Chair in Big Data Management and Analytics at University of Paris City,
Paris, France
∗ Corresponding author.
      </p>
      <p>
        : alfredo.cuzzocrea@unical.it (A. Cuzzocrea); islam.belmerabet@unical.it (I. Belmerabet); ismail.benlaredj@unical.it (I. Benlaredj)
: 0000-0002-7104-6415 (A. Cuzzocrea); 0009-0003-7878-0991 (I. Belmerabet); 0009-0003-1138-8039 (I. Benlaredj)
© 2025 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
has become crucial, recently, by also getting a great deal of attention from both the academic and
industrial research communities (e.g., [
        <xref ref-type="bibr" rid="ref4 ref5">4,5</xref>
        ]).
      </p>
      <p>
        SOLID [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] is a formal specification of a network protocols that enables individuals and groups to
securely store their data in decentralized data stores known as PODs (Personal Online Datastores).
PODs serve as secure web servers for data. By storing data in a POD, the owners retain control over
who can access it, including both individuals and applications. A SOLID POD stores and retrieves all
data using widely adopted and compatible data formats and protocols, thus being strongly oriented
to architecture interoperability. To this end, SOLID employs a unified and widely understood
approach to describing entities and their interconnectedness, enabling diverse applications to
seamlessly collaborate with shared data. This exceptional capability of SOLID allows multiple
applications to operate on the same dataset, being the latter stored in so-called SOLID Decentralized
Secure Data Stores.
      </p>
      <p>
        From the considerations above, it is obvious that, by integrating SOLID in suitable Cloud services,
privacy-preserving identity management over multiple Clouds can become a reality, thus
determining novel, advanced Cloud-based Big Data applications (e.g., [
        <xref ref-type="bibr" rid="ref25 ref3 ref4 ref5">3,4,5,25</xref>
        ]) where the identity
management task is performed in a privacy-preserving manner thanks to SOLID PODs that store
user data across these multiple Clouds. On the basis of this conceptual and theoretical setting, in this
paper we introduce a framework that makes use of (i) high-level identity verification policies, (ii)
ZeroKnowledge proof protocols [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], and (iii) SOLID to finally obtain privacy-preserving identity
management in multiple Cloud environments.
      </p>
      <p>To address security challenges, Cloud-based IAM solutions are designed to provide seamless
access control, authentication, and identity verification for IoT devices and users. These solutions
enable enterprises to manage user roles, enforce security policies, and monitor access permissions across
a distributed IoT ecosystem. High-risk devices such as smart security cameras, industrial sensors, and
connected medical equipment require advanced IAM frameworks to prevent unauthorized access.</p>
      <p>
        This paper significantly extends our previous study [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], where we introduce the basic concepts
and ideas of our proposed framework. The remaining part of this paper is organized as follows.
Section 2 introduces the UML modelling of the proposed methodology. Finally, Section 3 reports
conclusions and future work of our research.
      </p>
      <sec id="sec-1-1">
        <title>2. Identity Management Methodology: UML Modelling</title>
        <p>
          We introduce an identity management methodology known as anonymous identification that
focuses on entities and identities. This approach utilizes Zero-knowledge proof to authenticate
entities without revealing their identifiers. Figure1 [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] below illustrates the concept of anonymous
identification and the IdM service topology within the context of our reference Cloud framework,
which includes SOLID PODs to enhance the privacy-preserving capabilities.
        </p>
        <p>One of the key advantages of anonymous identity is the ability to authenticate claims or assertions
without requiring any credentials. Let’s consider a scenario: a customer makes a book purchase from
Amazon and needs to provide their mailing address for delivery. In certain cases, different parties
involved in the transaction may require specific information from the user. The shipping company
requires the address information. On the other hand, Amazon does not require the customer’s
address, but it does aim to ensure that the user provides a valid address for the delivery service. To
achieve this, following anonymous identification, the IdM service generates a token that includes the
necessary address details. In addition to the address, this token contains metadata, access control
restrictions, and VM. The token is then transmitted to the CSP, which can subsequently distribute it
to the mailing company. The IdM service ensures the secure transmission of user attributes to the
CSP, allowing us to utilize these attributes on untrusted hosts and send tokens.</p>
        <p>User identities are stored and disclosed under the control of an IdM service. As shown in Figure
1, it has the following structure: (i) Identity Data: The data utilized for authentication, service
acquisition, and service use (for example, SSN and date of birth). This information is encrypted and
contained within the IdM service; (ii) Disclosure Policy: This is a set of criteria for selecting identity
data from a collection of identities in the IdM service. For example, if particular identification data
has been used for a specific service, the same data must be utilized and disclosed every time for the
same service. There is no need to reveal any more user identification attributes to that service; (iii)
Disclosure History: This may be used for logging and auditing, as well as choosing which Identity
data to publish depending on past disclosures; (iv) Negotiation Policy: Based on Zero-Knowledge
Proofing, this is Anonymous Identification. It is discussed in the Section 2.2; (v) Virtual Machine:
Contains the code for securing user attribute data on untrusted hosts. It is in charge of enforcing the
disclosure policies.
2.2.</p>
        <sec id="sec-1-1-1">
          <title>A Service-Oriented Identity Management Framework</title>
          <p>
            According to Web Service Oriented Architecture (WSOA) [
            <xref ref-type="bibr" rid="ref15">15</xref>
            ], the IdM framework complexity is
contained at a set of service interfaces that should not include business domain-specific features. The
basic purpose of the IdM framework is to enable access control to validate authorization for service
consumption at runtime. The first condition for access control is an authentication mechanism that
checks any possible credentials. This can be done once with validity for a series of future accesses
(relates to a single sign-on method) or on every access - which is not preferred in WSOA due to the
large number of services that are generally accessed. User authentication can begin, for example, at
the WSOA portal layer. Secondly, in order for the authenticated subject to call a WSOA service, an
authorization verification mechanism that verifies if permission has been given is required. For both
basic and composite services, the functionality of both (authorization verification and authentication)
should be wrapped at service interfaces with “identity as a service” features. This suggests that they
only provide the IdM services with pertinent data to calculate access control.
          </p>
          <p>The layout of our Web service-aware IdM framework is shown in Figure 2. Three categories of
aspects are of interest: IdM services related to the administration and core concern portion of WSOA
are the first. The data that the components work on comes in last but not least, followed by the
service that implements the components. We utilize this structure to explain our identity
management architectural design in the following.</p>
          <p>Access control is founded on authentication and implies permission verification, both of which
are often different procedures. Nowadays, access control is often managed within an application
system boundary. The usual application boundaries are ignored with WSOA. Instead, Web services
are handled, revealing the essential concerns of apps. They import all functionality required for
access control utilizing external service invocations, following the principles of “identity as a
service”.</p>
          <p>Authentication is handled via the individual Web service interface, which provides several
functions to validate various forms of credentials such as username/password-based authentication,
certificate-based authentication, and so on. On successful authentication, a security token (creating
a session context) with WSOA-wide validity and the option of time-limitation is provided to enable
single sign-on and improve privacy. Before accessing protected Web services, user authentication
can be initiated at the WSOA portal layer.</p>
          <p>
            The foundation of authorization verification is an access control paradigm. In order to improve
on the work of [
            <xref ref-type="bibr" rid="ref24">24</xref>
            ] and [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ], we introduce an access control meta-model for Web service-oriented
framework, like in [
            <xref ref-type="bibr" rid="ref7">7</xref>
            ]. In summary, because Web services are specified at a high granularity, it is
important to know which user is attempting to access which Web service activity and what the
parameters of the submitted invocation are for access control. Every Web service activity is given a
unique identifier for identification purposes. A Web service action that requires access control sends
its identifier, the user security token, and the parameter the user sent over to the authorization
verification service. The permission verification service determines a Boolean result based on its
internal policy data, returns it, and instructs the Web service to either continue or cease activities.
          </p>
          <p>Our IdM framework has an administration interface as its third interface. As will be explained
later, it serves to maintain the data. It does not always mean WSDL/SOAP because administration is
frequently carried out by people.</p>
          <p>Using UML 2.0 sequence diagrams, we show the authentication process and the parties involved
on the left side of Figure 3. The (virtual) boundary between the IdM framework and the main area of
concern for WSOA is where the gap is between the Security Token Service and the Portal on the left,
and the Policy Enforcement Point and the Policy Decision Point on the right. Single sign-on
capabilities of the WSOA are made possible by issuing security tokens and creating a session context
in the process.</p>
          <p>The authorization verification procedure is shown on the right-hand side. A Secure Service Agent
called the Policy Enforcement Point is installed once on each application server.
2.3.</p>
        </sec>
        <sec id="sec-1-1-2">
          <title>Modelling Digital Identities</title>
          <p>
            According to [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ], an identity is a representation of an entity in a particular application domain. The
practice of representing and identifying entities as digital identities in virtual networks is known as
identity management [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ].
          </p>
          <p>In the real world, an entity might be a person, an organization, or a smart gadget. In various
settings, an entity may assume different identities. For instance, a student may simultaneously have
an account with the teaching system and a bank account. A portion of each account private data.</p>
          <p>A collection of an entity attributes, including name, gender, address, and production sequence
number of devices, make up an identity. When an attribute is used for authentication, it can be
referred to as a credential. Credentials may include a password, a USB drive that contains a special
private key, or a fingerprint. Multiple credentials can be associated with one identity. For instance, a
user fingerprint or password can be used to access their computer. Every identity has a unique
identifier that serves as a means of unambiguous identity identification in the given situation.</p>
          <p>A system in charge of establishing, preserving, and administering identities is known as an
identity provider (IdP). A Cloud-based system that offers services to consumers is called a Cloud
service provider. Although CSPa often play the role of IdP in current identity management practices,
IdP may occasionally function independently of CSPs.</p>
          <p>Figure 4 shows the connections between entities, identities, identifiers, and credentials/attributes.
We present a generic information model of identity, which consists of an identifier set, credential
set, attribute set, access information set, and authorization information set, to suit the requirements
of identity management. In the following, we provide a description about all the mentioned
components, by highlighting their specific characteristics.</p>
          <p></p>
          <p>Identifier Set: Global IdP generates the global identifiers. The following parameters are used
by local IdP to construct the local identifier: local identifiers, global identifiers, and local IdP
identifiers. Local IdPs may occasionally provide temporary IDs for brief usage;
</p>
          <p>Credential Set: An identity provider attestation of an entity identity, access, or credit is known
as a credential. There are several sorts of credentials that an entity may possess, such as local
serial numbers, names, values, security levels, descriptions, and values of these credentials;
Attribute Set: The attributes of an attribute set describe the particular context of an entity.
This comprises: local attribute serial numbers, attribute types, attribute names, attribute
values, and, if these are important attributes, attribute descriptions;</p>
          <p>Access Information Set: The entity cross-domain access is recorded using the access
information set. Included in the access information are the following: local access information
serial numbers, access source and destination domain identifiers, local entity identifiers in
source and destination domains, and permission data;
</p>
          <p>Authorization Information Set: The authorization between an identity provider and a service
provider, or between many service providers, is recorded in the authorization information
set. Authorization information consists of local serial numbers for authorization data,
identifiers for the source and destination domains, start and expiration periods for
authorization, and authorization scopes.</p>
          <p>Figure 5 shows the UML class diagram about the specific interaction between IdP and SOLID for
managing digital identities, by stressing their cooperation in finally supporting the IdM process
across multi-Clouds.
2.4.</p>
        </sec>
        <sec id="sec-1-1-3">
          <title>IdP Interaction with SOLID</title>
          <p>Enterprise apps are often installed and operated on the corporate network. Many of these programs
are designed to interface with corporate directories, such Microsoft Active Directory, in order to
retrieve user profile and group information. More significantly, the directory is usually used to store
and verify user credentials. For instance, her/his sign-in credentials are his Active Directory
credentials if she/he utilizes SharePoint and Exchange that are hosted on-premises as shown in
Figure 6.</p>
          <p>However, many applications have migrated outside of a company domain due to growing
cooperation and the shift towards Cloud-based settings. Federated Authentication offers an answer
to this issue.</p>
          <p>
            Since Security Assertion Markup Language (SAML) [
            <xref ref-type="bibr" rid="ref2">2</xref>
            ] depends on the browser agent to broker
the authentication transaction, it is primarily utilized as a Web-based authentication technique.
Figure 7 depicts the SAML authentication flow at a high level.
          </p>
          <p>Based on LDAP attributes and SOLID decentralized data stores for User Data, SOLID PODs are
used by the Cloud Data Storage Tier to hold user-related data and attributes connected to the LDAP
protocol, which are essentially key-value pairs. SOLID data stores are decentralized, compatible data
repositories that follow guidelines that support user ownership and control over their data. User
profiles, access permissions, login passwords, and other pertinent information needed for identity
management are safely stored on these PODs. The settings, directory structures, and schema data
required for LDAP protocol-based interactions and activities inside the identity provider system are
included in the LDAP-related data. Thanks to SOLID PODs, we can really achieve a
privacypreserving identity management service across multi-Clouds, since PODs will migrate across Clouds,
ready to be accessed by the same (owner) user, without the need for re-identification in different
Clouds. The latter guarantees the identity provider system accessibility, security, and usefulness. The
system can be efficiently managed, scaled, and maintained while satisfying the needs of both system
administrators and end users.</p>
          <p>We present a few often used SAML concepts, as follows. (i) The organization offering the service
is known as a Cloud service provider, and they usually take the form of a Cloud-based application.
(ii) The organization that supplies the identities, together with the capability of user authentication,
is known as an identity provider. The user profile, which includes other details about the user
including their job code, address, phone number, and first and last names, is usually also included in
the Identity Provider. Certain service providers could need a very basic profile (username, email),
while others might need a more comprehensive collection of user data (job code, department,
address, location, manager, and so on), depending on the application. (iii) The Cloud service provider
creates a SAML Request, sometimes called an authentication request, in order to “request” an
authentication. (iv) The identity provider generates a SAML Response. It includes the verified user
genuine claim. Depending on what the Service Provider can offer, a SAML Response may also include
other data, such as user profile and group/role information. (v) When a Cloud service provider
initiates the SAML sign-in flow, it is referred to as a CSP-initiated sign-in. This usually happens when
the end user tries to sign in or access a resource directly from the Service Provider end, as when the
browser tries to access a resource that is protected from access from the Service Provider end. (vi)
An identity provider-initiated sign-in (IdP-initiated sign in) denotes the SAML sign-in process that
the Identity Provider started. In this flow, the Identity Provider starts a SAML Response that is routed
to the Service Provider in order to confirm the user identity, as opposed to the SAML flow being
started by a redirection from the Service Provider.</p>
        </sec>
      </sec>
      <sec id="sec-1-2">
        <title>3. Conclusions and Future Work</title>
        <p>In conclusion, digital identity management services play a crucial role in Cloud Computing
infrastructures. Their role is to authenticate users, facilitate flexible access control to services based
on user identity features, and safeguard data privacy. The proposed methodology aims to enhance
interoperability across various domains while simplifying identity verification management in a
privacy-preserving manner. This is achieved through the utilization of high-level identity
verification policies, such as identity attributes, zero-knowledge proof protocols, and semantic
matching techniques. Additionally, decentralized secure data stores are employed to ensure data
security. The strength of our proposal lies in the well-established SOLID PODs concept.</p>
        <p>
          Future work primarily focuses on enhancing our framework by incorporating cutting-edge
features in big data processing and management in Clouds (e.g., [
          <xref ref-type="bibr" rid="ref22 ref23 ref25 ref26 ref27">22,23,25,26,27,28</xref>
          ]), as this relevantly
impacts on the performance of the overall framework.
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Acknowledgements</title>
      <p>This work was partially supported by project SERICS (PE00000014) under the MUR National
Recovery and Resilience Plan funded by the European Union -NextGenerationEU.</p>
    </sec>
    <sec id="sec-3">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.
[28] A. Kanimozhi, N. Vimala, “Adaptive Weighted Support Vector Machine Classification Method
for Privacy Preserving in Cloud over Big Data Using Hadoop Framework”. Multimedia Tools and
Applications 83(2), pp. 3879–3893, 2024.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>P.</given-names>
            <surname>Angin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Bhargava</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ranchal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Linderman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. B.</given-names>
            <surname>Othmane</surname>
          </string-name>
          , and
          <string-name>
            <surname>L. Lilien. “</surname>
          </string-name>
          <article-title>An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing”</article-title>
          .
          <source>In: SRDS</source>
          <year>2023</year>
          ,
          <source>29th IEEE Symposium on Reliable Distributed Systems</source>
          , pp.
          <fpage>177</fpage>
          -
          <lpage>183</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Armando</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Carbone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Compagna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cuellar</surname>
          </string-name>
          ,
          <string-name>
            <surname>L. Tobarra.</surname>
          </string-name>
          “
          <source>Formal Analysis of SAML 2</source>
          .0
          <string-name>
            <given-names>Web</given-names>
            <surname>Browser Single</surname>
          </string-name>
          Sign-On:
          <article-title>Breaking the SAML-Based Single Sign-On for Google Apps”</article-title>
          .
          <source>In: FMSE</source>
          <year>2008</year>
          , 6th ACM Workshop on Formal Methods in Security Engineering, pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>E.</given-names>
            <surname>Bertino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Paci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ferrini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Shang</surname>
          </string-name>
          . “
          <article-title>Privacy-Preserving Digital Identity Management for Cloud Computing”</article-title>
          .
          <source>IEEE Data Engineering Bulletin</source>
          <volume>32</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>21</fpage>
          -
          <lpage>27</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>T.</given-names>
            <surname>Chaudhary</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kalra</surname>
          </string-name>
          . “
          <article-title>Interoperable Identity Management Protocol for Multi-Cloud Platform”</article-title>
          .
          <source>International Journal of Big Data Intelligence</source>
          <volume>6</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>69</fpage>
          -
          <lpage>85</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Cui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , L. Liu. “
          <article-title>Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment”</article-title>
          .
          <source>IEEE Transactions on Information Forensics and Security 15</source>
          , pp.
          <fpage>1654</fpage>
          -
          <lpage>1667</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Deng</surname>
          </string-name>
          . “
          <string-name>
            <surname>Privacy Preserving Content Protection (Privacy Behoud Content Protection</surname>
          </string-name>
          <article-title>)”</article-title>
          . Faculty of Engineering Katholieke Universiteit Leuven, Leuven, Belgium,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>C.</given-names>
            <surname>Emig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Brandt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Abeck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Biermann</surname>
          </string-name>
          ,
          <string-name>
            <surname>H. Klarl. “</surname>
          </string-name>
          <article-title>An Access Control Metamodel for Web Service-Oriented Architecture”</article-title>
          .
          <source>In: ICSEA</source>
          <year>2007</year>
          ,
          <source>2nd IEEE International Conference on Software Engineering Advances, art. 57</source>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>D.F.</given-names>
            <surname>Ferraiolo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sandhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gavrila</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.R.</given-names>
            <surname>Kuhn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Chandramouli</surname>
          </string-name>
          . “
          <article-title>Proposed NIST Standard for Role-Based Access Control”</article-title>
          .
          <source>ACM Transactions on Information and System Security</source>
          <volume>4</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>224</fpage>
          -
          <lpage>274</lpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>O.</given-names>
            <surname>Goldreich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Krawczyk</surname>
          </string-name>
          . “
          <article-title>On the Composition of Zero-Knowledge Proof Systems”</article-title>
          .
          <source>SIAM Journal on Computing</source>
          <volume>25</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>169</fpage>
          -
          <lpage>192</lpage>
          ,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T.</given-names>
            <surname>Howes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Smith</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.S.</given-names>
            <surname>Good</surname>
          </string-name>
          . “Understanding and
          <string-name>
            <surname>Deploying LDAP Directory</surname>
          </string-name>
          <article-title>Services”</article-title>
          .
          <string-name>
            <surname>Addison-Wesley Professional</surname>
          </string-name>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jøsang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fabre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Hay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Dalziel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pope</surname>
          </string-name>
          . “
          <article-title>Trust Requirements in Identity Management”</article-title>
          .
          <source>In: AusGrid</source>
          <year>2005</year>
          , 2005 Australasian Workshop on Grid Computing and E-Research, pp.
          <fpage>99</fpage>
          -
          <lpage>108</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jøsang</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. Pope. “</surname>
          </string-name>
          <article-title>User Centric Identity Management”</article-title>
          .
          <source>In: APSIRC</source>
          <year>2005</year>
          ,
          <source>AusCERT Asia Pacific Information Technology Security Conference</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.K.</given-names>
            <surname>Sehgal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.S.</given-names>
            <surname>Chauhan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Diwakar</surname>
          </string-name>
          . “
          <article-title>Effective Ways of Secure, Private and Trusted Cloud Computing”</article-title>
          .
          <source>CoRR abs/1111.3165</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Cuzzocrea</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Belmerabet.</surname>
          </string-name>
          “
          <article-title>Towards Privacy-Preserving Multi-Cloud Identity Management using SOLID”</article-title>
          .
          <source>In: SECRYPT</source>
          <year>2024</year>
          ,
          <source>21st International Conference on Security and Cryptography</source>
          , pp.
          <fpage>649</fpage>
          -
          <lpage>654</lpage>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Neuenschwander</surname>
          </string-name>
          . “
          <source>Enterprise Identity Management Market</source>
          <year>2006</year>
          -2007”. Burton Group Identity and
          <string-name>
            <given-names>Privacy</given-names>
            <surname>Strategies</surname>
          </string-name>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>P.S.</given-names>
            <surname>Pawar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sajjad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Dimitrakos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.W.</given-names>
            <surname>Chadwick</surname>
          </string-name>
          . “
          <article-title>Security-as-a-service in Multi-Cloud and Federated Cloud Environments”</article-title>
          .
          <source>In: IFIPTM</source>
          <year>2015</year>
          ,
          <string-name>
            <surname>Trust Management</surname>
            <given-names>IX</given-names>
          </string-name>
          ,
          <source>9th IFIP WG 11</source>
          .11 International Conference, pp.
          <fpage>251</fpage>
          -
          <lpage>261</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.K.S.</given-names>
            <surname>Raja</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sathya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Karthikeyan</surname>
          </string-name>
          , T. Janane.
          <article-title>“Multi Cloud-Based Secure Privacy Preservation of Hospital Data in Cloud Computing”</article-title>
          .
          <source>International Journal of Cloud Computing</source>
          <volume>10</volume>
          (
          <issue>1-2</issue>
          ), pp.
          <fpage>101</fpage>
          -
          <lpage>111</lpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>SOLID</surname>
          </string-name>
          , Available at: https://solidproject.org/,
          <year>2024</year>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>G.</given-names>
            <surname>Spyra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.J.</given-names>
            <surname>Buchanan</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Ekonomou.</surname>
          </string-name>
          “
          <article-title>Sticky Policy Enabled Authenticated OOXML”</article-title>
          .
          <source>In: SAI</source>
          <year>2016</year>
          , SAI Computing Conference, pp.
          <fpage>1118</fpage>
          -
          <lpage>1122</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Tari</surname>
          </string-name>
          . “
          <article-title>Security and Privacy in Cloud Computing”</article-title>
          .
          <source>IEEE Cloud Computing</source>
          <volume>1</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>54</fpage>
          -
          <lpage>57</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>R.</given-names>
            <surname>Weingärtner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.M.</given-names>
            <surname>Westphall</surname>
          </string-name>
          . “
          <article-title>Enhancing Privacy on Identity Providers”</article-title>
          .
          <source>In: SECURWARE</source>
          <year>2014</year>
          ,
          <source>8th International Conference on Emerging Security Information Systems and Technologies</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>R.C.</given-names>
            <surname>Camara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cuzzocrea</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.M.</given-names>
            <surname>Grasso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.K.</given-names>
            <surname>Leung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.B.</given-names>
            <surname>Powell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Souza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Tang</surname>
          </string-name>
          . “
          <article-title>Fuzzy Logic-Based Data Analytics on Predicting the Effect of Hurricanes on the Stock Market”</article-title>
          .
          <source>In FUZZ-IEEE</source>
          <year>2018</year>
          ,
          <source>2018 IEEE International Conference on Fuzzy Systems</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>P.</given-names>
            <surname>Howlader</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.K.</given-names>
            <surname>Pal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cuzzocrea</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.M.</given-names>
            <surname>Kumar</surname>
          </string-name>
          . “
          <string-name>
            <surname>Predicting</surname>
          </string-name>
          Facebook-Users'
          <article-title>Personality Based on Status and Linguistic Features via Flexible Regression Analysis Techniques”</article-title>
          .
          <source>In: SAC</source>
          <year>2018</year>
          ,
          <source>33rd Annual ACM Symposium on Applied Computing</source>
          , pp.
          <fpage>339</fpage>
          -
          <lpage>345</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>C.K. Leung</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Braun</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Cuzzocrea</surname>
          </string-name>
          . “
          <article-title>AI-Based Sensor Information Fusion for Supporting Deep Supervised Learning”</article-title>
          .
          <source>Sensors</source>
          <volume>19</volume>
          (
          <issue>6</issue>
          ),
          <source>art. 1345</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>M.J.H. Faruk</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Shahriar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Valero</surname>
            ,
            <given-names>F.L.</given-names>
          </string-name>
          <string-name>
            <surname>Barsha</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Sobhan</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>M.E.</given-names>
          </string-name>
          <string-name>
            <surname>Whitman</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Cuzzocrea</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Lo</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Wu</surname>
          </string-name>
          . “
          <article-title>Malware Detection and Prevention using Artificial Intelligence Techniques”</article-title>
          .
          <source>In BigData</source>
          <year>2021</year>
          ,
          <source>2021 IEEE International Conference on Big Data</source>
          , pp.
          <fpage>5369</fpage>
          -
          <lpage>5377</lpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>M.</given-names>
            <surname>Masum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Shahriar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Haddad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.J.H.</given-names>
            <surname>Faruk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Valero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.A.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.A.</given-names>
            <surname>Rahman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.I.</given-names>
            <surname>Adnan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cuzzocrea</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Wu</surname>
          </string-name>
          . “
          <article-title>Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection”</article-title>
          .
          <source>In: BigData</source>
          <year>2021</year>
          ,
          <source>2021 IEEE International Conference on Big Data</source>
          , pp.
          <fpage>5413</fpage>
          -
          <lpage>5419</lpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>J.D.</given-names>
            <surname>Roberts</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.F.</given-names>
            <surname>DeFranco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.R.</given-names>
            <surname>Kuhn</surname>
          </string-name>
          .
          <article-title>“Data Block Matrix and Hyperledger Implementation: Extending Distributed Ledger Technology for Privacy Requirements”</article-title>
          .
          <source>Distributed Ledger Technologies: Research and Practice</source>
          <volume>2</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>