Research Article
Security of Cloud Computing Using Adaptive Neural Fuzzy Inference System
Table 1
Fuzzy IF/THEN rules when output is undamaged.
| Data loss | Data integrity | Shared environment | Data breaches | Insecure application programming | Nature of frequency |
| No | Low | No | No | Medium | Undamaged | No | Low | Medium | No | Medium | Undamaged | No | Medium | No | No | Medium | Undamaged | No | Medium | Medium | No | No | Undamaged |
|
|