Text this: Algorithm for determining the degree of vulnerability of cloud computing areas based on the electre i method