Detecting a malicious insider in the cloud environment using sequential rule mining