Discuss how it can be applied in securing the sensitive data and cloud-based IT resources. Evaluate and discuss the proposed algorithm as it relates to cloud disaster recovery and security algorithms.