The present invention discloses methods, devices, and media for securely utilizing a non-secured, distributed, virtualized network resource with applications to cloud-computing security and management. Methods including the steps of: receiving, by a deployed security mechanism, a user request over a network;
parsing the user request by the deployed security mechanism; preparing, including applying security measures, the user request to transmit to a computing-
service resource; and submitting, by the deployed security mechanism, the user request to the computing-
service resource. Methods further including the steps of: dividing an
original data stream into a set of split data streams; applying a first invertible transformation function to the split data streams, which produces an intermediate set of data streams; and extracting a final set of data streams from the intermediate set by applying a
selection rule which produces the final set, thereby transforming the
original data stream into individually-unintelligible parts.