1) The DROPS methodology divides files into fragments and replicates each fragment to different cloud nodes to improve security and performance of outsourced data. Each node stores only a single fragment, so a successful attack would not reveal meaningful information. 2) Nodes storing fragments are separated using graph T-coloring to restrict an attacker's ability to guess fragment locations. 3) The methodology aims to increase the effort required for an attacker to retrieve data after intrusion while minimizing data loss. It evaluates both security and performance when securing and managing outsourced data in the cloud.