A New approach using redundancy technique to improve security in cloud computing Conference Paper uri icon