Defeating Critical Threats to Cloud User Data in Trusted Execution Environments