Encrypted tunnels can be set up between the user’s network and the cloud to make sure that traffic between the user’s network and the cloud cannot be intercepted in a man-in- the-middle attack.
Data can also be stored in cloud based storage arrays in a wholly encrypted fashion.
At the moment it is very difficult to process encrypted data.