Control challenges typically highlight situations inwhich otherwise successful security controls are ineffective in a
cloud setting. Thus, these challenges are of special interest for further cloud computing security research. Indeed, many
current efforts—such as the development of security metrics and certification schemes, and the move toward fullfeatured
virtualized network components—directly address control challenges by enabling the use of such tried-andtested
controls for cloud computing