Research Article
Security of Cloud Computing Using Adaptive Neural Fuzzy Inference System
Table 1
Fuzzy IF/THEN rules when output is undamaged.
| | Data loss | Data integrity | Shared environment | Data breaches | Insecure application programming | Nature of frequency |
| | No | Low | No | No | Medium | Undamaged | | No | Low | Medium | No | Medium | Undamaged | | No | Medium | No | No | Medium | Undamaged | | No | Medium | Medium | No | No | Undamaged |
|
|