The two biggest concerns about cloud storage are reliability and security. Clients aren't likely to entrust their data to another company without a guarantee that they'll be able to access their information whenever they want and no one else will be able to get at it.
To secure data, most systems use a combination of techniques, including:
- Encryption, which means they use a complex algorithm to encode information. To decode the encrypted files, a user needs the encryption key. While it's possible to crack encrypted information, most hackers don't have access to the amount of computer processing power they would need to decrypt information.
- Authentication processes, which require to create a user name and password.
- Authorization practices -- the client lists the people who are authorized to access information stored on the cloud system. Many corporations have multiple levels of authorization. For example, a front-line employee might have very limited access to data stored on a cloud system, while the head of human resources might have extensive access to files.
Even with these protective measures in place, many people worry that data saved on a remote storage system is vulnerable. There's always the possibility that a hacker will find an electronic back door and access data. Hackers could also attempt to steal the physical machines on which data are stored. A disgruntled employee could alter or destroy data using his or her authenticated user name and password. Cloud storage companies invest a lot of money in security measures in order to limit the possibility of data theft or corruption.
The other big concern, reliability, is just as important as security. An unstable cloud storage system is a liability. No one wants to save data to a failure-prone system, nor do they want to trust a company that isn't financially stable. While most cloud storage systems try to address this concern through redundancy techniques, there's still the possibility that an entire system could crash and leave clients with no way to access their saved data.
Cloud storage companies live and die by their reputations. It's in each company's best interests to provide the most secure and reliable service possible. If a company can't meet these basic client expectations, it doesn't have much of a chance -- there are too many other options available on the market.
To learn more about cloud storage systems and related topics, follow the links below.
Related HowStuffWorks Articles
- How Cloud Computing Works
- How Shared Computing Works
- How the Google Apple Cloud Computer Will Work
- How Quantum Computers Will Work
- How Web Servers Work
- How Encryption Works
- How Hackers Work
- How Home Networking Works
- How Internet Infrastructure Works
- How Internet Search Engines Work
- How Microprocessors Work
- How Semantic Web Works
- How Web Pages Work
More Great Links
- Brodkin, Jon. "IBM unveils 'cloud computing.'" Network World. Nov. 19, 2007. Vol. 24, Iss. 45. pg. 10.
- Cheng, Jacqui. "Google, Microsoft and Apple building online storage havens: you win." Ars technica. August 12, 2007. Retrieved March 18, 2007. http://arstechnica.com/news.ars/post/20070812-google-microsoft-and-apple-building-online-storage-havens-you-win.html
- Hickins, Michael. "Cloud Computing Gets Down to Earth." eWeek. January 21, 2008. pg. 14.
- "IBM Introduces Ready-to-Use Cloud Computing." IBM. Nov. 15, 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss
- Lohr, Steve. "Cloud Computing and EMC Deal." The New York Times. Feb. 25, 2008. pg. C 6.
- Lohr, Steve. "Google and I.B.M. Jon in 'Cloud Computing' Research." The New York Times. Oct. 8, 2007. pg. C 8.
- Lohr, Steve. "I.B.M. to Push 'Cloud Computing,' Using Data From Afar." The New York Times. Nov. 15, 2007. pg. C 7.
- Markoff, John. "Software via the Internet: Microsoft in 'Cloud' Computing." The New York Times. Sep. 3, 2007. pg. C 1.
- Naone, Erica. "Computer in the Cloud." Technology Review. Sept. 18, 2007. Retrieved March 12, 2008. http://www.technologyreview.com/Infotech/19397/?a=f
- Swanson, Bret and Gilder, George. "Unleashing the 'Exaflood.'" Wall Street Journal. Feb. 22, 2008. pg. A 15.