"In Encryption-in-Use: Challenges and Realities, I discussed why encryption-in-use as a security technology is critical to meeting the governance requirements for cloud data ownership and control. I also wrote about the technical challenges, and the need to engineer a delicate balance of the customer’s requirements...