Cloud Encryption Keys: Some Important Considerations