Five Tough Problems Moving a Traditional Network Security Perimeter to the Cloud