The two biggest concerns about cloud storage arereliability
To secure data, most systems use a combination of techniques, including:
- Encryption, which means they use a complexalgorithm
to encode information. To decode the encrypted files, a user needs the encryption key. While it's possible to crack encrypted information, most hackers don't have access to the amount of computer processing power they would need to decrypt information. - Authentication
processes, which require to create a user name and password. - Authorization
practices -- the client lists the people who are authorized to access information stored on the cloud system. Many corporations have multiple levels of authorization. For example, a front-line employee might have very limited access to data stored on a cloud system, while the head of human resources might have extensive access to files.
Even with these protective measures in place, many people worry that data saved on a remote storage system is vulnerable. There's always the possibility that a hacker will find an electronic back door and access data. Hackers could also attempt to steal the physical machines on which data are stored. A disgruntled employee could alter or destroy data using his or her authenticated user name and password. Cloud storage companies invest a lot of money in security measures in order to limit the possibility of data theft or corruption.
The other big concern, reliability, is just as important as security. An unstable cloud storage system is a liability. No one wants to save data to a failure-prone system, nor do they want to trust a company that isn't financially stable. While most cloud storage systems try to address this concern through redundancy techniques, there's still the possibility that an entire system could crash and leave clients with no way to access their saved data.
Cloud storage companies live and die by their reputations. It's in each company's best interests to provide the most secure and reliable service possible. If a company can't meet these basic client expectations, it doesn't have much of a chance -- there are too many other options available on the market.
Sources
- Brodkin, Jon. "IBM unveils 'cloud computing.'" Network World. Nov. 19, 2007. Vol. 24, Iss. 45. pg. 10.
- Cheng, Jacqui. "Google, Microsoft and Apple building online storage havens: you win." Ars technica. August 12, 2007. Retrieved March 18, 2007. http://arstechnica.com/news.ars/post/20070812-google-microsoft-and-apple-building-online-storage-havens-you-win.html
- Hickins, Michael. "Cloud Computing Gets Down to Earth." eWeek. January 21, 2008. pg. 14.
- "IBM Introduces Ready-to-Use Cloud Computing." IBM. Nov. 15, 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss
- Lohr, Steve. "Cloud Computing and EMC Deal." The New York Times. Feb. 25, 2008. pg. C 6.
- Lohr, Steve. "Google and I.B.M. Jon in 'Cloud Computing' Research." The New York Times. Oct. 8, 2007. pg. C 8.
- Lohr, Steve. "I.B.M. to Push 'Cloud Computing,' Using Data From Afar." The New York Times. Nov. 15, 2007. pg. C 7.
- Markoff, John. "Software via the Internet: Microsoft in 'Cloud' Computing." The New York Times. Sep. 3, 2007. pg. C 1.
- Naone, Erica. "Computer in the Cloud." Technology Review. Sept. 18, 2007. Retrieved March 12, 2008. http://www.technologyreview.com/Infotech/19397/?a=f
- Swanson, Bret and Gilder, George. "Unleashing the 'Exaflood.'" Wall Street Journal. Feb. 22, 2008. pg. A 15.