The Double-Edged Sword of Cloud Security