Where On Earth Is Cloud Data Actually Stored?

Think of cloud computing and the first thing that comes to mind is usually a mainstream application like Google Drive, Dropbox or iCloud, but there is a lot more to it than you might think.

Firstly, we need to understand what cloud computing actually is. In a nutshell, cloud computing is all about storing and retrieving your personal (or corporate) data from your own little area on the Internet. Nothing is stored on your local hard drive and it is accessible from any location, any device and at any time.

If that all sounds a little far-fetched, think about an email service you are already using e.g. Gmail, Yahoo, Hotmail etc. None of those emails you send and receive are actually taking up space on your local hard drive, they are stored on the email providers’ servers: this is a form of cloud computing. To take this example further, remember that you can log in and access your emails from any pc, any laptop, and any smartphone. This is only made possible by the cloud. 

However, many people don’t realise that despite being held in the “cloud”, your data still needs to be physically stored on a device somewhere. 

Whether this is on flash or traditional hard drive storage, companies offering this service still need to have huge servers dedicated to storing your data. These places are often called “server farms” and are essentially vast warehouses filled with servers which are running 24/7/365.

This raises a number of questions: where is my data actually stored? Who has access to my data and is my data safe?

In terms of where your data is stored, it is fairly safe to say that you will never truly know unless you do some digging. The provider may be based in the US (for example), but their servers might be in China, or the UK, or anywhere else in the world. 

Many companies outsource their server farms to satellite locations in order to reduce costs. So it is very difficult to know where your data actually resides, and the cloud provider may not necessarily disclose this.

Who has access to your data is another point to consider. Reputable companies have tried and tested security systems to ensure that only you have access to your data. There are faceless companies out there offering the same amount of storage and functionality, whether you choose to trust them or not, is an important decision. In addition, you should also find out about the safeguards which are in place to keep your data secure and always accessible. Most reputable cloud storage providers will replicate your data several times on different servers to ensure that in the event of a catastrophe, your files are safe. 

This is not to say that your data will ever be 100% safe: natural disasters, fires and malicious damage (for example) are all events which can be planned for, but not necessarily avoided.

The vital point to remember is that although your data is not physically stored on your local hard drive, it is still stored somewhere, and with this in mind it may still be susceptible to the same failures and problems as the hard drive in your laptop or pc. 

Server farms are not invincible; storage media can fail, large corporations can get hacked, and data can get deleted just as easily on a server as it can on your computer, so be wary of storing all of your important and confidential files in the cloud.

OnTrack:

You Might Also Read:

Blockchain Improves Multicloud Network Management:

« NASA’s Poor Cybersecurity Is An Operational Threat
"Cookie Walls" Non-Compliant With GDPR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

General Dynamics Information Technology (GDIT)

General Dynamics Information Technology (GDIT)

General Dynamics IT delivers cyber security services to defend critical information and infrastructure.

INCIBE-CERT

INCIBE-CERT

INCIBE-CERT is the reference security incident response center for citizens and private law entities in Spain

Seceon

Seceon

Seceon OTM, is a cyber security advanced threat management platform that visualizes, detects, and eliminates threats in real time.

RiskCentric

RiskCentric

RiskCentric is a consultancy specializing in risk management and compliance.

Somansa

Somansa

Somansa is a global leader in Data Security and Compliance solutions designed to protect valuable company information from leakage and help meet regulatory compliance requirements.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

Novastor

Novastor

NovaStor® is an award-winning, international data backup and recovery software company with solutions supporting physical, virtual and cloud environments.

SOFTwarfare

SOFTwarfare

SOFTwarfare deliver high-quality, reliable and secure enterprise application integrations through RESTful APIs for Cyber, Ops & Dev.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

Cyber Readiness Institute (CRI)

Cyber Readiness Institute (CRI)

At the Cyber Readiness Institute, our mission is simple: empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient.

Northdoor

Northdoor

Northdoor provides a comprehensive set of services around information security and works with leading global technology vendors to deploy and manage cyber security solutions.

IDVerse

IDVerse

IDVerse is focused on making user verification effortless through technology. We build intelligent tools that protect users from identity fraud while enabling a seamless user experience.

National Renewable Energy Laboratory (NREL) - USA

National Renewable Energy Laboratory (NREL) - USA

NREL is transforming energy through research, development, commercialization, and deployment of renewable energy and energy efficiency technologies.

Hive Systems

Hive Systems

Hive Systems specialize in tailored solutions that unify risk assessments, IT, security awareness, and cybersecurity operations for businesses of all sizes.