Research Article
Security of Cloud Computing Using Adaptive Neural Fuzzy Inference System
Table 3
Fuzzy IF/THEN rules when output is damaged.
| Data loss | Data integrity | Shared environment | Data breaches | Insecure application programming | Nature of frequency |
| No | Low | Full | Full | No | Damaged | Medium | Low | No | Medium | High | Damaged | Medium | Full | No | Full | Medium | Damaged | Full | Medium | No | No | Medium | Damaged |
|
|