Five Key Steps for Database Security in the Cloud Age