Research Article

Security of Cloud Computing Using Adaptive Neural Fuzzy Inference System

Table 4

Inputs and output and their membership function.

[Input 1] = [data loss]Range = [0 3], num MFs = 3
MF 1 = “no (data loss)”: “trimf,” [0 0.5 1]
MF 2 = “medium (data loss)”: “trimf,” [1 1.5 2]
MF 3 = “full (data loss)”: “trimf,” [2 2.5 3]

[Input 2] = [data integrity]Range = [1 3], num MFs = 3
MF 1 = “no (data integrity)”: “trimf,” [1 1.333 1.667]
MF 2 = “medium (data integrity)”: “trimf,” [1.667 2 2.333]
MF 3 = “full (data integrity)”: “trimf,” [2.333 2.667 3]

[Input 3] = [shared environment]Range = [1 3], num MFs = 3
MF 1 = “no (shared environment)”: “trimf,” [1 1.333 1.667]
MF 2 = “medium (shared environment)”: “trimf,” [1.667 2 2.333]
MF 3 = “full (shared environment)”: “trimf,” [2.333 2.667 3]

[Input 4] = [data breaches]Range = [0 1.5], num MFs = 3
MF 1 = “no (data breaches)”: “trimf,” 0 0.25 0.5]
MF 2 = “medium (data breaches)”: “trimf,” [[0.5 0.75 1]
MF 3 = “full (data breaches)”: “trimf,” [1 1.25 1.5]

[Input 5] = [ insecure application programming]Range = [0 3], num MFs = 3
MF 1 = “no (insecure application programming)”: “trimf,” [0 0.5 1]
MF 2 = “medium (insecure application programming)”: “trimf,” [1 1.5 2]
MF 3 = “full (insecure application programming)”: “trimf,” [2 2.5 3]

[Output 1] = [access control]Range = [0 1], num MFs = 3
MF 1 = “no (access control)”: “trimf,” [0 0.16 .29]
MF 2 = “full (access control)”: “trimf,” [0.6 0.85 1]
MF 3 = “medium (access control)”: “trimf,” [0.29 0.45 0.6]