Security in hosting CES in the cloud is not more or less different from the normal security challenge of the cloud. The only additional challenge here is the point-to-point connection between instances of CES and instances using CES to cut down the latency. Such a communication level between two user defined entities inside a cloud can raise concern. This critical issue is outside the scope of this paper, yet is to be thoroughly studied independently.