Security Strategies for Hosting Sensitive Information in the Commercial Cloud