Research Article

Secure and Efficient Data Storage Operations by Using Intelligent Classification Technique and RSA Algorithm in IoT-Based Cloud Computing

Table 1

Security risks with details.

AttacksExplanation

Data revelationSecure details of the owner shall be exposed to any unwanted user.
TamperingAt the point when any unapproved individual does a few changes in other client’s information.
RejectionAt the point when an individual rejected in the wake of communicating something specific that he did not send it.
VirusThose are particularly well-known threats. Those are symbols that will infect the show of a certain program.
Personality trickingIn this assault, a person mimics himself as someone who owns the details.