{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T10:37:16Z","timestamp":1772102236656,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T00:00:00Z","timestamp":1771891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:00:00Z","timestamp":1772064000000},"content-version":"vor","delay-in-days":2,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-026-00862-0","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T06:55:32Z","timestamp":1771916132000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A zero-trust decentralized identifier specification based machine learning against cyber-attacks in blockchain based self-sovereign identity"],"prefix":"10.1186","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2085-5615","authenticated-orcid":false,"given":"Joel Herve Mboussam","family":"Emati","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3836-1859","authenticated-orcid":false,"given":"Vianney Kengne","family":"Tchendji","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6341-6247","authenticated-orcid":false,"given":"Mounirah","family":"Djam-Doudou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"862_CR1","doi-asserted-by":"publisher","first-page":"102731","DOI":"10.1016\/j.jnca.2020.102731","volume":"166","author":"Y Liu","year":"2020","unstructured":"Liu Y, He D, Obaidat MS, Kumar N, Khan MK, Raymond Choo KK (2020) Blockchain-based identity management systems: a review. J Network Comput Appl 166:102731. https:\/\/doi.org\/10.1016\/j.jnca.2020.102731. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804520302058","journal-title":"J Network Comput Appl"},{"key":"862_CR2","doi-asserted-by":"publisher","DOI":"10.5772\/acrt.08","volume-title":"Modern authentication methods: a comprehensive survey","author":"M Papathanasaki","year":"2022","unstructured":"Papathanasaki M, Maglaras L, Ayres N (2022) Modern authentication methods: a comprehensive survey. AI, Computer Science and Robotics Technology. https:\/\/doi.org\/10.5772\/acrt.08"},{"key":"862_CR3","doi-asserted-by":"publisher","unstructured":"F W, Filippi D (2020) Self-sovereign identity in a globalized world: credentials-based identity systems as a driver for economic inclusion. Frontier Blockchain. https:\/\/doi.org\/10.3389\/fbloc.2019.00028","DOI":"10.3389\/fbloc.2019.00028"},{"key":"862_CR4","doi-asserted-by":"publisher","first-page":"100579","DOI":"10.1016\/j.array.2025.100579","volume":"28","author":"JHM Emati","year":"2025","unstructured":"Emati JHM, Tchendji VK, Djam-Doudou M (2025) Enhancing trust in machines integration with dirichlet distribution and self-sovereign identity. Array 28:100579. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2590005625002061","journal-title":"Array"},{"key":"862_CR5","doi-asserted-by":"publisher","unstructured":"Emati JHM, Mboussam HP, Tchendji VK (2023) Feasibility study of improving blockchain-based self-sovereign identity security using artificial intelligence and lightweight cryptography. In 2023 IEEE AFRICON, pp (01\u201303). https:\/\/doi.org\/10.1109\/AFRICON55910.2023.10293491","DOI":"10.1109\/AFRICON55910.2023.10293491"},{"key":"862_CR6","unstructured":"Reed D, Sporny M, Longley D, Allen C, Sabadello M, Steele O (2021) Decentralized identifiers (dids) v1.0. https:\/\/www.w3.org\/TR\/did-core\/"},{"issue":"1","key":"862_CR7","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1186\/s13677-022-00341-2","volume":"11","author":"V Mani","year":"2022","unstructured":"Mani V, Prakash M, Lai WC (2022) Cloud-based blockchain technology to identify counterfeits. J Cloud Comput 11(1):67. https:\/\/doi.org\/10.1186\/s13677-022-00341-2","journal-title":"J Cloud Comput"},{"issue":"12","key":"862_CR8","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans Inf Forensics Secur 10(12):2681\u20132691. https:\/\/doi.org\/10.1109\/TIFS.2015.2473820","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"862_CR9","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1186\/s13677-024-00697-7","volume":"13","author":"A Punia","year":"2024","unstructured":"Punia A, Gulia P, Gill NS, Ibeke E, Iwendi C, Shukla (2024) P.K.: a systematic review on blockchain-based access control systems in cloud environment. J Cloud Comput 13(1):146. https:\/\/doi.org\/10.1186\/s13677-024-00697-7","journal-title":"J Cloud Comput"},{"key":"862_CR10","doi-asserted-by":"publisher","unstructured":"Saidi H, Labraoui N, Ari AAA, Maglaras L, Emati JHM (2022) Dsmac: privacy-aware decentralized self-management of data access control based on blockchain for health data. IEEE Access 1\u20131. https:\/\/doi.org\/10.1109\/ACCESS.2022.3207803","DOI":"10.1109\/ACCESS.2022.3207803"},{"key":"862_CR11","unstructured":"Bitcoin: Bitcoin source code (2021) https:\/\/github.com\/bitcoin\/"},{"key":"862_CR12","doi-asserted-by":"publisher","unstructured":"Emati JHM, Mboussam HP (2023) A block mining based machine learning scheme for data integrity in blockchain based iot solutions. In 2023 IEEE AFRICON, pp (1\u20136). https:\/\/doi.org\/10.1109\/AFRICON55910.2023.10293321","DOI":"10.1109\/AFRICON55910.2023.10293321"},{"key":"862_CR13","doi-asserted-by":"crossref","unstructured":"Bensaid R, Labraoui N, Ari AAA, Saidi H, Emati JHM, Maglaras LA (2024) Sa-flids: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare. PeerJ Comput Sci 10. https:\/\/api.semanticscholar.org\/CorpusID:274745614","DOI":"10.7717\/peerj-cs.2414"},{"key":"862_CR14","doi-asserted-by":"publisher","unstructured":"Emati JHM, Tchendji VK (2023) The sita project: a blockchain-based quality assurance framework as a contribution to the transformation of higher education in africa. Comput Sci Educ eJournal. https:\/\/doi.org\/10.2139\/ssrn.4836619","DOI":"10.2139\/ssrn.4836619"},{"key":"862_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1115\/1.4062597","volume":"23","author":"D Van Bossuyt","year":"2023","unstructured":"Van Bossuyt D, Hale B, Arlitt R, Papakonstantinou N (2023) Zero-trust for the system design lifecycle. J Comput Inf Sci Eng 23:1\u201312. https:\/\/doi.org\/10.1115\/1.4062597","journal-title":"J Comput Inf Sci Eng"},{"key":"862_CR16","unstructured":"Scott R, Borchert O, Stu M, Sean C (2020) Zero trust architecture. Tech. rep. (https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-207.pdf"},{"key":"862_CR17","doi-asserted-by":"publisher","unstructured":"Ghalechyan H, Israyelyan E, Arakelyan A, Hovhannisyan G, Davtyan A (2024) Phishing doi detection with neural networks: an empirical study. Sci Rep 14. https:\/\/doi.org\/10.1038\/s41598-024-74725-6","DOI":"10.1038\/s41598-024-74725-6"},{"key":"862_CR18","doi-asserted-by":"publisher","first-page":"8842","DOI":"10.1038\/s41598-022-10841-5","volume":"12","author":"A Aljofey","year":"2022","unstructured":"Aljofey A, Jiang Q, Rasool D, Chen H, Liu W, Qu Q, Wang Y (2022) An effective detection approach for phishing websites using doi and html features. Sci Rep 12:8842. https:\/\/doi.org\/10.1038\/s41598-022-10841-5","journal-title":"Sci Rep"},{"key":"862_CR19","doi-asserted-by":"publisher","unstructured":"Le A, Markopoulou A, Faloutsos M (2011) Phishdef: Url names say it all. In 2011 Proceedings IEEE INFOCOM, pp (191\u2013195). https:\/\/doi.org\/10.1109\/INFCOM.2011.5934995","DOI":"10.1109\/INFCOM.2011.5934995"},{"key":"862_CR20","doi-asserted-by":"publisher","first-page":"5625","DOI":"10.32604\/cmc.2022.030982","volume":"73","author":"S Alshahrani","year":"2022","unstructured":"Alshahrani S, Al Shehri W, Almalki J, Khan N (2022) Url phishing detection using particle swarm optimization and data mining. Comput, Mater Continua 73:5625\u20135640. https:\/\/doi.org\/10.32604\/cmc.2022.030982","journal-title":"Comput, Mater Continua"},{"key":"862_CR21","doi-asserted-by":"publisher","unstructured":"Naik N, Jenkins P (2020) Uport open-source identity management system: an assessment of self-sovereign identity and user-centric data platform built on blockchain. In 2020 IEEE International Symposium on Systems Engineering (ISSE), pp (1\u20137). https:\/\/doi.org\/10.1109\/ISSE49799.2020.9272223","DOI":"10.1109\/ISSE49799.2020.9272223"},{"key":"862_CR22","unstructured":"Jolocom: Jolocom, a decentralized, open source solution for digital identity and access management, whitepaper 2.1 (2019)"},{"key":"862_CR23","doi-asserted-by":"publisher","unstructured":"Naik N, Jenkins P (2021) Sovrin network for decentralized digital identity: analysing a self-sovereign identity system based on distributed ledger technology. In 2021 IEEE International Symposium on Systems Engineering (ISSE), pp (1\u20137). https:\/\/doi.org\/10.1109\/ISSE51541.2021.9582551","DOI":"10.1109\/ISSE51541.2021.9582551"},{"key":"862_CR24","doi-asserted-by":"crossref","unstructured":"Ritu J, S (2016) A trust model in cloud computing based on fuzzy logic. In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), pp {47\u201352). https:\/\/api.semanticscholar.org\/CorpusID:17365121","DOI":"10.1109\/RTEICT.2016.7807780"},{"key":"862_CR25","doi-asserted-by":"publisher","unstructured":"Zhao J, Bose B (2002) Evaluation of membership functions for fuzzy logic controlled induction motor drive. In IEEE 2002 28th Annual Conference of the Industrial Electronics Society. IECON 02, vol. 1. pp (229\u2013234). https:\/\/doi.org\/10.1109\/IECON.2002.1187512","DOI":"10.1109\/IECON.2002.1187512"},{"key":"862_CR26","doi-asserted-by":"crossref","unstructured":"Mamdani E, Assilian S (1975) An experiment in linguistic synthesis with a fuzzy logic controller. Int J Man-Mach Stud 7(1):1\u201313. https:\/\/doi.org\/10.1016\/S0020-7373(75)80002-2. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020737375800022","DOI":"10.1016\/S0020-7373(75)80002-2"},{"key":"862_CR27","doi-asserted-by":"crossref","unstructured":"Chetioui K, Bah B, Alami AO, Bahnasse A (2022) Overview of social engineering attacks on social networks. In Procedia Computer Science, vol 198. pp (656\u2013661). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050921025412. 12th International Conference on Emerging Ubiquitous Systems and Pervasive Networks \/ 11th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare","DOI":"10.1016\/j.procs.2021.12.302"},{"key":"862_CR28","doi-asserted-by":"publisher","unstructured":"Djam-Doudou M, Abba Ari AA, Tchapgnouo HB, Gueroui AM, Mohamadou A, Labraoui N, Thiare O (2024) A lightweight authenticated key agreement scheme for resource-constrained devices based on implicit certificates and finite graphs. In: Safe, secure, ethical, responsible technologies and emerging applications. Springer, Nature Switzerland, Cham, pp (128\u2013155). https:\/\/doi.org\/10.1007\/978-3-031-56396-6_9","DOI":"10.1007\/978-3-031-56396-6_9"},{"key":"862_CR29","doi-asserted-by":"publisher","unstructured":"Djam-Doudou M, Ari AAA, Emati JHM, Njoya AN, Thiare O, Labraoui N, Gueroui AM (2023) A certificate-based pairwise key establishment protocol for iot resource-constrained devices. In: Pan-african artificial intelligence and smart systems. Springer, Nature Switzerland, Cham, pp (3\u201318). https:\/\/doi.org\/10.1007\/978-3-031-25271-6_1","DOI":"10.1007\/978-3-031-25271-6_1"},{"key":"862_CR30","first-page":"113","volume":"22","author":"K Krombholz","year":"2015","unstructured":"Krombholz K, Hobel H, Huber M, Weippl E (2015) Advanced social engineering attacks. J Inf Secur Appl 22:113\u2013122. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214212614001343. Special Issue on Security of Information and Networks","journal-title":"J Inf Secur Appl"},{"key":"862_CR31","unstructured":"Lopez C (2023) Fast, reliable zero trust network access (ztna). https:\/\/www.cloudflare.com\/zero-trust\/products\/access\/"},{"issue":"6","key":"862_CR32","first-page":"6","volume":"39","author":"R Ward","year":"2014","unstructured":"Ward R, Beyer B (2014) Beyondcorp: a new approach to enterprise security. Login 39(6):6\u201311","journal-title":";login"},{"key":"862_CR33","unstructured":"Microsoft: azure policy + intune compliance (2023)https:\/\/learn.microsoft.com\/en-us\/mem\/intune\/protect\/device-compliance-get-started"},{"key":"862_CR34","unstructured":"Microsoft: conditional access documentation (2023) https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/conditional-access\/"},{"key":"862_CR35","unstructured":"Microsoft: Microsoft defender for endpoint integration (2023) https:\/\/learn.microsoft.com\/en-us\/defender-endpoint\/"},{"key":"862_CR36","unstructured":"Von Network, a portable development level indy node network, including a ledger browser. https:\/\/github.com\/bcgov\/von-network"},{"key":"862_CR37","unstructured":"Hyperledger indy. https:\/\/www.hyperledger.org\/projects\/hyperledger-indy"},{"key":"862_CR38","unstructured":"Siddhaetha M: malicious-urls-dataset (2021) https:\/\/www.kaggle.com\/datasets\/sid321axn\/malicious-urls-dataset\/code"},{"key":"862_CR39","doi-asserted-by":"publisher","unstructured":"Zhang Y, Wang Z, Zhang Z, Fang Y, Liu H (2016) Comparison of online adaptive learning algorithms for myoelectric hand control. In 2016 9th International Conference on Human System Interactions (HSI), pp (69\u201375). https:\/\/doi.org\/10.1109\/HSI.2016.7529611","DOI":"10.1109\/HSI.2016.7529611"},{"key":"862_CR40","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.cosrev.2018.10.002","volume":"30","author":"A M\u00fchle","year":"2018","unstructured":"M\u00fchle A, Gr\u00fcner A, Gayvoronskaya T, Meinel C (2018) A survey on essential components of a self-sovereign identity. Comput Sci Rev 30:80\u201386. https:\/\/doi.org\/10.1016\/j.cosrev.2018.10.002. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574013718301217","journal-title":"Comput Sci Rev"},{"key":"862_CR41","doi-asserted-by":"publisher","unstructured":"Zhang L, Lee B, Ye Y, Qiao Y (2021) Evaluation of ethereum end-to-end transaction latency. In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp (1\u20135). https:\/\/doi.org\/10.1109\/NTMS49979.2021.9432676","DOI":"10.1109\/NTMS49979.2021.9432676"},{"key":"862_CR42","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.cose.2016.11.018","volume":"67","author":"W Lueks","year":"2017","unstructured":"Lueks W, Alp\u00e1r G, Hoepman JH, Vullers P (2017) Fast revocation of attribute-based credentials for both users and verifiers. Comput Secur 67:308\u2013323. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404816301729","journal-title":"Comput Secur"},{"issue":"11","key":"862_CR43","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/S1353-4858(20)30131-8","volume":"2020","author":"R Seifert","year":"2020","unstructured":"Seifert R (2020) Digital identities \u2013 self-sovereignty and blockchain are the keys to success. Network Secur 2020(11):17\u201319. https:\/\/doi.org\/10.1016\/S1353-4858(20)30131-8. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1353485820301318","journal-title":"Network Secur"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-026-00862-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00862-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00862-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T09:47:19Z","timestamp":1772099239000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13677-026-00862-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,24]]},"references-count":43,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["862"],"URL":"https:\/\/doi.org\/10.1186\/s13677-026-00862-0","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,24]]},"assertion":[{"value":"28 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"27"}}