The method disaggregates, separates, and obfuscates data so that insiders within cloud service infrastructure cannot make sense of stored assets. In this report, Dr Edward Amoroso of TAG Cyber discusses the method and its applications for back-end cloud security.