Algorithms in Cloud Computing."

Discuss how it can be applied in securing sensitive data and cloud-based IT resources.
Evaluate and discuss the proposed algorithm as it relates to cloud disaster recovery and security algorithms.