Umschlüsselung Cross-Cloud Methods: Challenges and Opportunities