Where On Earth Is Cloud Data Actually Stored?

Think of cloud computing and the first thing that comes to mind is usually a mainstream application like Google Drive, Dropbox or iCloud, but there is a lot more to it than you might think.

Firstly, we need to understand what cloud computing actually is. In a nutshell, cloud computing is all about storing and retrieving your personal (or corporate) data from your own little area on the Internet. Nothing is stored on your local hard drive and it is accessible from any location, any device and at any time.

If that all sounds a little far-fetched, think about an email service you are already using e.g. Gmail, Yahoo, Hotmail etc. None of those emails you send and receive are actually taking up space on your local hard drive, they are stored on the email providers’ servers: this is a form of cloud computing. To take this example further, remember that you can log in and access your emails from any pc, any laptop, and any smartphone. This is only made possible by the cloud. 

However, many people don’t realise that despite being held in the “cloud”, your data still needs to be physically stored on a device somewhere. 

Whether this is on flash or traditional hard drive storage, companies offering this service still need to have huge servers dedicated to storing your data. These places are often called “server farms” and are essentially vast warehouses filled with servers which are running 24/7/365.

This raises a number of questions: where is my data actually stored? Who has access to my data and is my data safe?

In terms of where your data is stored, it is fairly safe to say that you will never truly know unless you do some digging. The provider may be based in the US (for example), but their servers might be in China, or the UK, or anywhere else in the world. 

Many companies outsource their server farms to satellite locations in order to reduce costs. So it is very difficult to know where your data actually resides, and the cloud provider may not necessarily disclose this.

Who has access to your data is another point to consider. Reputable companies have tried and tested security systems to ensure that only you have access to your data. There are faceless companies out there offering the same amount of storage and functionality, whether you choose to trust them or not, is an important decision. In addition, you should also find out about the safeguards which are in place to keep your data secure and always accessible. Most reputable cloud storage providers will replicate your data several times on different servers to ensure that in the event of a catastrophe, your files are safe. 

This is not to say that your data will ever be 100% safe: natural disasters, fires and malicious damage (for example) are all events which can be planned for, but not necessarily avoided.

The vital point to remember is that although your data is not physically stored on your local hard drive, it is still stored somewhere, and with this in mind it may still be susceptible to the same failures and problems as the hard drive in your laptop or pc. 

Server farms are not invincible; storage media can fail, large corporations can get hacked, and data can get deleted just as easily on a server as it can on your computer, so be wary of storing all of your important and confidential files in the cloud.

OnTrack:

You Might Also Read:

Blockchain Improves Multicloud Network Management:

« NASA’s Poor Cybersecurity Is An Operational Threat
"Cookie Walls" Non-Compliant With GDPR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

Rollbar

Rollbar

Rollbar is a full-stack error monitoring platform for web and mobile applications. We help developers find and fix bugs fast. Built by developers for developers.

British Assessment Bureau

British Assessment Bureau

The British Assessment Bureau is an ISO certification body. We check conformity and compliance of companies to recognised ISO standards including ISO 27001.

Association of Information Security Professionals (AISP)

Association of Information Security Professionals (AISP)

The Association of Information Security Professionals (AISP) represents the interests of information security professionals in Singapore.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies is a developer and provider of personal information protection and cyber security solutions and services.

Altron

Altron

Altron provides locally relevant innovative and integrated ICT solutions to business, government and consumers.

European Society of Criminology (ESC)

European Society of Criminology (ESC)

The ESC Working Group on Cybercrime is focused on cybercrime, its causes and offenders, impact on victims, and our response to it at the individual, corporate, and governmental levels.

National Cybersecurity Society (NCSS)

National Cybersecurity Society (NCSS)

The National Cybersecurity Society is a non-profit organization focused on providing cybersecurity education, awareness and advocacy to small businesses.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

FutureCon Events

FutureCon Events

FutureCon produces cutting edge events aimed for Senior Level Professionals working in the security community, bringing together the best minds in the industry for a unique cybersecurity event.

DataEndure

DataEndure

DataEndure helps companies build digital resilience so that their critical information assets are protected and available to the right people, at the right time.

Cyber Insurance Academy

Cyber Insurance Academy

Cyber Insurance Academy was founded to provide insurance professionals with the knowledge needed to work in cyber-insurance and cyber-related insurance fields.

Cyber Legion

Cyber Legion

Cyber Legion Ltd is a UK-based Cyber Security as a Service (CSaaS) start-up that provides IT security testing services to various organizations around the globe.

Gilsbar

Gilsbar

For more than half a century, Gilsbar has offered insurance service solutions and support for businesses and their employees.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.