... and performance. In this paper, we extendthe CloNe architecture by designing, deploying, and integratingan identity management framework, customized for the CloNeinfrastructure. The identity ... information misuse [6], [7]. Therefore,it is important to secure and manage identity information ofusers, by using a well defined cloud-provider independent identity management framework. The ... responsible for managing useridentities. If different cloud providers share the credentials ofa user, a malicious cloud provider can exploit user identity credentials leading to information misuse...