Researchers are attempting to discover technological solutions which would give the data owner verifiable guarantees that their data remains confidential. As explained above, the requirement to perform in-cloud processing makes this complicated. In the remainder of this section, we describe a few of the approaches that are currently actively being researched.