Research Article
Security of Cloud Computing Using Adaptive Neural Fuzzy Inference System
Table 2
Fuzzy IF/THEN rules when output is unknown.
| Data loss | Data integrity | Shared environment | Data breaches | Insecure application programming | Nature of frequency |
| Medium | Medium | Medium | No | No | Unknown | Medium | Medium | Medium | No | Medium | Unknown | Medium | Low | No | No | High | Unknown | No | Full | No | Medium | Medium | Unknown |
|
|