Understanding Trust Relationships in Cloud-Based Confidential Computing