Where On Earth Is Cloud Data Actually Stored?

Think of cloud computing and the first thing that comes to mind is usually a mainstream application like Google Drive, Dropbox or iCloud, but there is a lot more to it than you might think.

Firstly, we need to understand what cloud computing actually is. In a nutshell, cloud computing is all about storing and retrieving your personal (or corporate) data from your own little area on the Internet. Nothing is stored on your local hard drive and it is accessible from any location, any device and at any time.

If that all sounds a little far-fetched, think about an email service you are already using e.g. Gmail, Yahoo, Hotmail etc. None of those emails you send and receive are actually taking up space on your local hard drive, they are stored on the email providers’ servers: this is a form of cloud computing. To take this example further, remember that you can log in and access your emails from any pc, any laptop, and any smartphone. This is only made possible by the cloud. 

However, many people don’t realise that despite being held in the “cloud”, your data still needs to be physically stored on a device somewhere. 

Whether this is on flash or traditional hard drive storage, companies offering this service still need to have huge servers dedicated to storing your data. These places are often called “server farms” and are essentially vast warehouses filled with servers which are running 24/7/365.

This raises a number of questions: where is my data actually stored? Who has access to my data and is my data safe?

In terms of where your data is stored, it is fairly safe to say that you will never truly know unless you do some digging. The provider may be based in the US (for example), but their servers might be in China, or the UK, or anywhere else in the world. 

Many companies outsource their server farms to satellite locations in order to reduce costs. So it is very difficult to know where your data actually resides, and the cloud provider may not necessarily disclose this.

Who has access to your data is another point to consider. Reputable companies have tried and tested security systems to ensure that only you have access to your data. There are faceless companies out there offering the same amount of storage and functionality, whether you choose to trust them or not, is an important decision. In addition, you should also find out about the safeguards which are in place to keep your data secure and always accessible. Most reputable cloud storage providers will replicate your data several times on different servers to ensure that in the event of a catastrophe, your files are safe. 

This is not to say that your data will ever be 100% safe: natural disasters, fires and malicious damage (for example) are all events which can be planned for, but not necessarily avoided.

The vital point to remember is that although your data is not physically stored on your local hard drive, it is still stored somewhere, and with this in mind it may still be susceptible to the same failures and problems as the hard drive in your laptop or pc. 

Server farms are not invincible; storage media can fail, large corporations can get hacked, and data can get deleted just as easily on a server as it can on your computer, so be wary of storing all of your important and confidential files in the cloud.

OnTrack:

You Might Also Read:

Blockchain Improves Multicloud Network Management:

« NASA’s Poor Cybersecurity Is An Operational Threat
"Cookie Walls" Non-Compliant With GDPR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

AlgoSec

AlgoSec

The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network.

Miller Group

Miller Group

Miller Group is an IT managed service provider. We proactively monitor and manage your entire business computer network. Services include backup & recovery and cyber security.

Texplained

Texplained

Texplained specializes in security audits of microchips to identify vulnerabilities and protect against invasive cyber attacks.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

PAX Momentum

PAX Momentum

PAX Momentum is the Mid-Atlantic’s premier startup accelerator, specializing in cyber, enterprise software, telecom, CleanTech, FinTech, InsureTech, and AI.

Depth Security

Depth Security

Depth Security assessment services provide organizations with real-world visibility into threats facing their infrastructure and applications.

Jacobs

Jacobs

Jacobs is at the forefront of the most important security issues today. We are inspired to be the best and deliver innovative, mission-focused outcomes that matter to our clients.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

LTIMindtree

LTIMindtree

LTIMindtree is a new kind of technology consulting firm. We help businesses transform – from core to experience – to thrive in the marketplace of the future.

Luxembourg House of Financial Technology (LHoFT)

Luxembourg House of Financial Technology (LHoFT)

Offering start-up incubation, co-working spaces including a soft-landing platform, the LHoFT connects and creates value for the entire Luxembourg FinTech ecosystem.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

XpertDPO

XpertDPO

XpertDPO provides data security, governance, risk and compliance, GDPR and ISO consultancy to public and private sector organisations.

Centric Consulting

Centric Consulting

Centric Consulting is an international management consulting firm with unmatched expertise in business transformation, AI strategy, cyber risk management, technology implementation and adoption. 

StrongDM

StrongDM

StrongDM is the leader in Zero Trust Privileged Access Management (PAM).

Veracity Trust Network

Veracity Trust Network

Veracity Trust Network safeguards organisations from the threat of bot attacks on their public facing platforms.

Cyber Castle

Cyber Castle

Linux Demands Sophisticated, Purpose-Built Security. Cyber Castle is the solution. A safe, deployable platform down to the edge device for monitoring Linux security anywhere across the globe.