A file-hosting service, cloud-storage service, online file-storage provider, or cyberlocker is an internet hosting service specifically designed to host user files. It allows users to upload files that could be accessed over the internet after a user name and password or other
authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicatin ...
is provided. Typically, the services allow
HTTP
The Hypertext Transfer Protocol (HTTP) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide We ...
access, and sometimes
FTP
The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data ...
access. Related services are content-displaying hosting services (i.e.
video
Video is an electronic medium for the recording, copying, playback, broadcasting, and display of moving visual media. Video was first developed for mechanical television systems, which were quickly replaced by cathode-ray tube (CRT) syst ...
and
image),
virtual storage, and
remote backup.
Uses
Personal file storage
Personal file storage services are aimed at private individuals, offering a sort of "network storage" for personal backup, file access, or file distribution. Users can upload their files and share them publicly or keep them password-protected.
Document-sharing services allow users to share and collaborate on document files. These services originally targeted files such as
PDFs, word processor documents, and spreadsheets. However many remote file storage services are now aimed at allowing users to share and synchronize all types of files across all the devices they use.
File sync and sharing services
File syncing and sharing services are file hosting services which allow users to create special folders on each of their computers or mobile devices, which the service then synchronizes so that it appears to be the same folder regardless of which computer is used to view it. Files placed in this folder also are typically accessible through a website and mobile apps, and can be easily shared with other users for viewing or collaboration.
Such services have become popular via consumer products such as
OneDrive
Microsoft OneDrive (formerly SkyDrive) is a file hosting service operated by Microsoft. First launched in August 2007, it enables registered users to share and synchronize their files. OneDrive also works as the storage backend of the web vers ...
and
Google Drive
Google Drive is a file storage and synchronization service developed by Google. Launched on April 24, 2012, Google Drive allows users to store files in the cloud (on Google's servers), synchronize files across devices, and share files. In add ...
.
Content caching
Content providers who potentially encounter bandwidth congestion issues may use services specialized in distributing cached or static content. It is the case for companies with a major Internet presence.
Storage charges
Some online file storage services offer space on a per-
gigabyte basis, and sometimes include a bandwidth cost component as well. Usually these will be charged monthly or yearly. Some companies offer the service for free, relying on advertising revenue. Some hosting services do not place any limit on how much space the user's account can consume. Non-paying users' accounts may be deleted or suspended after a predefined period of inactivity.
Some services require a software download which makes files only available on computers which have that software installed, others allow users to retrieve files through any web browser. With the increased inbox space offered by
webmail services, many users have started using their webmail service as an online drive. Some sites offer free unlimited file storage but have a limit on the file size. Some sites offer additional online storage capacity in exchange for new customer referrals.
One-click hosting
One-click hosting, sometimes referred to as cyberlocker, generally describes
web services that allow
internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
users to easily upload one or more files from their
hard drive
A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magne ...
s (or from a remote location) onto the one-click host's
server
Server may refer to:
Computing
*Server (computing), a computer program or a device that provides functionality for other programs or devices, called clients
Role
* Waiting staff, those who work at a restaurant or a bar attending customers and su ...
free of charge.
Most such services simply return a
URL which can be given to other people, who can then fetch the file later. In many cases these URLs are predictable allowing potential misuse of the service. these sites have drastically increased in popularity, and subsequently, many of the smaller, less efficient sites have failed. Although one-click hosting can be used for many purposes, this type of
file sharing
File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include r ...
has, to a degree, come to compete with
P2P
P2P may refer to:
* Pay to play, where money is exchanged for services
* Peer-to-peer, a distributed application architecture in computing or networking
** List of P2P protocols
* Phenylacetone, an organic compound commonly known as P2P
* Poin ...
filesharing
File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include re ...
services.
The sites make money through advertising or charging for premium services such as increased downloading capacity, removing any wait restrictions the site may have or prolonging how long uploaded files remain on the site. Premium services include facilities like unlimited downloading, no waiting, maximum download speed etc. Many such sites implement a
CAPTCHA
A CAPTCHA ( , a contrived acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge–response test used in computing to determine whether the user is human.
The term was coined in 2003 b ...
to prevent automated downloading. Several programs aid in downloading files from these one-click hosts; examples are
JDownloader
JDownloader is a download manager, written in Java, which allows automatic download of groups of files from one-click hosting sites. JDownloader supports the use of premium accounts. Some parts of the code are open-source. In December 2009 the p ...
, FreeRapid, Mipony, Tucan Manager and
CryptLoad
CryptLoad is a freeware download manager for Microsoft Windows that downloads files from file-hosting websites such as RapidShare
RapidShare was an online file hosting service that opened in 2002. In 2009, it was among the Internet's 20 most ...
.
Use for copyright infringement
File hosting services may be used as a means to
distribute or share files without consent of the copyright owner. In such cases one individual
upload
Uploading refers to ''transmitting'' data from one computer system to another through means of a network. Common methods of uploading include: uploading via web browsers, FTP clients], and computer terminal, terminals ( SCP/ SFTP). Uploadin ...
s a file to a file hosting service, which others can then
download
In computer networks, download means to ''receive'' data from a remote system, typically a server such as a web server, an FTP server, an email server, or other similar system. This contrasts with uploading, where data is ''sent to'' a remote ...
. Legal assessments can be very diverse.
For example, in the case of
Swiss-
German
German(s) may refer to:
* Germany (of or related to)
** Germania (historical use)
* Germans, citizens of Germany, people of German ancestry, or native speakers of the German language
** For citizens of Germany, see also German nationality law
**Ge ...
file hosting service
RapidShare
RapidShare was an online file hosting service that opened in 2002. In 2009, it was among the Internet's 20 most visited websites and claimed to have 10 petabytes of files uploaded by users with the ability to handle up to three million users si ...
, in 2010 the US government's congressional international anti-
piracy
Piracy is an act of robbery or criminal violence by ship or boat-borne attackers upon another ship or a coastal area, typically with the goal of stealing cargo and other valuable goods. Those who conduct acts of piracy are called pirates, v ...
caucus declared the site a "notorious illegal site", claiming that the site was "overwhelmingly used for the global exchange of illegal movies, music and other copyrighted works". But in the legal case ''Atari Europe S.A.S.U. v. Rapidshare AG'' in Germany,
[Legal case: OLG Dusseldorf, Judgement of 22.03.2010, Az I-20 U 166/09 dated 22 March 2010.] the
Düsseldorf
Düsseldorf ( , , ; often in English sources; Low Franconian and Ripuarian language, Ripuarian: ''Düsseldörp'' ; archaic nl, Dusseldorp ) is the capital city of North Rhine-Westphalia, the most populous state of Germany. It is the second- ...
higher regional court examined claims related to alleged infringing activity and reached the conclusion on appeal that "most people utilize RapidShare for legal use cases" and that to assume otherwise was equivalent to inviting "a general suspicion against shared hosting services and their users which is not justified". The court also observed that the site removes copyrighted material when asked, does not provide search facilities for illegal material, noted previous cases siding with RapidShare, and after analysis the court concluded that the plaintiff's proposals for more strictly preventing sharing of copyrighted material – submitted as examples of anti-piracy measures RapidShare might have adopted – were found to be "unreasonable or pointless".
By contrast in January 2012 the
United States Department of Justice
The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the United States government tasked with the enforcement of federal law and administration of justice in the United Stat ...
seized and shut down the file hosting site
Megaupload.com
Megaupload Ltd was a Hong Kong-based online company established in 2005 that operated from 2005 to 2012 providing online services related to file storage and viewing.
On 19 January 2012, the United States Department of Justice seized the do ...
and commenced criminal cases against its owners and others. Their
indictment
An indictment ( ) is a formal accusation that a person has committed a crime. In jurisdictions that use the concept of felonies, the most serious criminal offence is a felony; jurisdictions that do not use the felonies concept often use that of a ...
concluded that Megaupload differed from other online file storage businesses, suggesting
a number of design features of its
operating model
An operating model is both an abstract and visual representation (model) of how an organization delivers value to its customers or beneficiaries as well as how an organization actually runs itself.
Definition
There are different ways of defining t ...
as being evidence showing a criminal intent and venture.
[Department of Justice indictment, on the ''Wall Street Journal''s website](_blank)
– see sections 7–14. Examples cited included reliance upon advertising revenue and other activities showing the business was funded by (and heavily promoted) downloads and not storage, defendants' communications helping users who sought infringing material, and defendants' communications discussing their own evasion and infringement issues. the case has not yet been heard. A year later, Megaupload.com relaunched as
Mega
Mega or MEGA may refer to:
Science
* mega-, a metric prefix denoting 106
* Mega (number), a certain very large integer in Steinhaus–Moser notation
* "mega-" a prefix meaning "large" that is used in taxonomy
* Gravity assist, for ''Moon-Eart ...
.
In 2016 the file hosting site
Putlocker
Putlocker is one of various online file hosting index websites used for streaming entertainment media, particularly films and television series, for free. The initial website originated in the United Kingdom as early as 2011, and grew to receive ...
has been noted by the
Motion Picture Association of America
The Motion Picture Association (MPA) is an American trade association representing the five major film studios of the United States, as well as the video streaming service Netflix. Founded in 1922 as the Motion Picture Producers and Distrib ...
for being a major piracy threat, and in 2012 Alfred Perry of
Paramount Pictures listed Putlocker as one of the "top 5 rogue cyberlocker services", alongside Wupload,
FileServe, Depositfiles, and
MediaFire
MediaFire is a file hosting, file synchronization, and cloud storage service based in Shenandoah, Texas, United States. Founded in June 2006 by Derek Labian and Tom Langridge, the company provides client software for Microsoft Windows, macOS, L ...
.
Security
The emergence of
cloud storage services has prompted much discussion on security.
Security, as it relates to cloud storage can be broken down into:
Access and integrity security
Deals with the question of
confidentiality
Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits the access or places restrictions on certain types of information.
Legal confidentiality
By law, lawyers are often required ...
and
availability
In reliability engineering, the term availability has the following meanings:
* The degree to which a system, subsystem or equipment is in a specified operable and committable state at the start of a mission, when the mission is called for at ...
: Will the user be able to continue accessing their data? Who else can access it? Who can change it?
Whether the user is able to continue accessing their data depends on a large number of factors, ranging from the location and quality of their internet connection and the physical integrity of the provider's data center to the financial stability of the storage provider.
The question of who can access and, potentially, change their data ranges from what physical access controls are in place in the provider's data center to what technical steps have been taken, such as access control,
encryption
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can de ...
, etc.
Many cloud storage services state that they either encrypt data before it is uploaded or while it is stored. While encryption is generally regarded as best practice in cloud storage
how the encryption is implemented is very important.
Consumer-grade, public file hosting and synchronization services are popular, but for business use, they create the concern that corporate information is exported to devices and cloud services that are not controlled by the organization.
Some cloud storage providers offer granular ACLs for application keys. One important permission is
append-only
Append-only is a property of computer data storage such that new data can be appended to the storage, but where existing data is immutable.
Access control
Many file systems' Access Control Lists implement an "append-only" permission:
* chatt ...
, which is distinct from simple "read", "write", and "read-write" permissions in that all existing data is immutable. Append-only support is especially important to mitigate the risk of
data loss Data loss is an error condition in information systems in which information is destroyed by failures (like failed spindle motors or head crashes on hard drives) or neglect (like mishandling, careless handling or storage under unsuitable conditions) ...
for
backup policies in the event that the computer being backed-up becomes infected with
ransomware capable of deleting or encrypting the victim's backups.
Data encryption
Secret key encryption is sometimes referred to as
zero knowledge, meaning that only the user has the encryption key needed to decrypt the data. Since data is encrypted using the secret key, identical files encrypted with different keys will be different. To be truly zero knowledge, the file hosting service must not be able to store the user's passwords or see their data even with physical access to the servers. For this reason, secret key encryption is considered the highest level of access security in cloud storage.
This form of encryption is rapidly gaining popularity, with companies such as
MEGA
Mega or MEGA may refer to:
Science
* mega-, a metric prefix denoting 106
* Mega (number), a certain very large integer in Steinhaus–Moser notation
* "mega-" a prefix meaning "large" that is used in taxonomy
* Gravity assist, for ''Moon-Eart ...
(previously Megaupload) and
SpiderOak being entirely zero knowledge file storage and sharing.
Since secret key encryption results in unique files, it makes
data deduplication impossible and therefore may use more storage space.
Convergent encryption
Convergent encryption, also known as content hash keying, is a cryptosystem that produces identical ciphertext from identical plaintext files. This has applications in cloud computing to remove duplicate files from storage without the provider h ...
derives the key from the file content itself and means an identical file encrypted on different computers result in identical encrypted files.
This enables the cloud storage provider to
de-duplicate data blocks, meaning only one instance of a unique file (such as a document, photo, music or movie file) is actually stored on the cloud servers but made accessible to all uploaders. A third party who gained access to the encrypted files could thus easily determine if a user has uploaded a particular file simply by encrypting it themselves and comparing the outputs.
Some point out that there is a theoretical possibility that organizations such as the
RIAA,
MPAA
The Motion Picture Association (MPA) is an American trade association representing the five major film studios of the United States, as well as the video streaming service Netflix. Founded in 1922 as the Motion Picture Producers and Distribu ...
, or a government could obtain a warrant for US law enforcement to access the cloud storage provider's servers and gain access to the encrypted files belonging to a user. By demonstrating to a court how applying the convergent encryption methodology to an unencrypted copyrighted file produces the same encrypted file as that possessed by the user would appear to make a strong case that the user is guilty of possessing the file in question and thus providing evidence of
copyright infringement
Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, s ...
by the user.
There is, however, no easily accessible public record of this having been tried in court as of May 2013 and an argument could be made that, similar to the opinion expressed by Attorney Rick G. Sanders of Aaron , Sanders PLLC in regards to the iTunes Match "Honeypot" discussion,
that a warrant to search the cloud storage provider's servers would be hard to obtain without other, independent, evidence establishing probable cause for copyright infringement. Such legal restraint would obviously not apply to the
secret police
Secret police (or political police) are intelligence, security or police agencies that engage in covert operations against a government's political, religious, or social opponents and dissidents. Secret police organizations are characteristic of ...
of an oppressive government who could potentially gain access to the encrypted files through various forms of
hacking or other
cybercrime
A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing th ...
.
Ownership security
See also
*
Comparison of file hosting services
This is a comparison of file hosting services which are currently active. File hosting services are a particular kind of online file storage; however, various products that are designed for online file storage may not have features or character ...
*
Comparison of file synchronization software
Glossary
Free and open-source
Freeware
This is a comparison of the freeware (proprietary software release free of charge) file synchronization software.
Commercial
This is a comparison of commercial software in the fie ...
*
Comparison of online backup services
This is a comparison of online backup services.
Online backup is a special kind of online storage service; however, various products that are designed for file storage may not have features or characteristics that others designed for backup have ...
*
Comparison of online music lockers
This is a comparison of online music storage services (Cloud Music Services), Internet services that allow uploads of personally owned or licensed music to the cloud for listening on multiple devices.
Previously, there were three large services ...
*
File sharing
File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include r ...
*
List of backup software
This is a list of notable backup software that performs data backups. Archivers, transfer protocols, and version control systems are often used for backups but only software focused on backup is listed here. See Comparison of backup softwar ...
*
Shared disk access
References
{{DEFAULTSORT:File Hosting Service
File hosting
A file-hosting service, cloud-storage service, online file-storage provider, or cyberlocker is an internet hosting service specifically designed to host user files. It allows users to upload files that could be accessed over the internet afte ...
Records management