Security boundaries in cloud