Protection of data in the presence of untrusted users or software has been address in [4], where a virtual machine monitor is deployed to separate sensitive data and applications from other malicious or untrusted software, e.g., malware, compromised operating system, etc.