3 steps to ensure data sovereignty in cloud computing