Research Article
Secure and Efficient Data Storage Operations by Using Intelligent Classification Technique and RSA Algorithm in IoT-Based Cloud Computing
Table 1
Security risks with details.
| Attacks | Explanation |
| Data revelation | Secure details of the owner shall be exposed to any unwanted user. | Tampering | At the point when any unapproved individual does a few changes in other client’s information. | Rejection | At the point when an individual rejected in the wake of communicating something specific that he did not send it. | Virus | Those are particularly well-known threats. Those are symbols that will infect the show of a certain program. | Personality tricking | In this assault, a person mimics himself as someone who owns the details. |
|
|