Data-Aware Security: How to Take a 360 View of Cloud Security