Research Article

Security of Cloud Computing Using Adaptive Neural Fuzzy Inference System

Table 3

Fuzzy IF/THEN rules when output is damaged.

Data lossData integrityShared environmentData breachesInsecure application programmingNature of frequency

NoLowFullFullNoDamaged
MediumLowNoMediumHighDamaged
MediumFullNoFullMediumDamaged
FullMediumNoNoMediumDamaged