Cloud Storage Security: How to Keep Your Files Safe in the Cloud

Cloud Storage Security: How to Keep Your Files Safe in the Cloud

Storing files in the cloud is convenient but introduces new risks. Learn how to evaluate provider security, encrypt your data, and follow best practices for safe cloud storage.

Passwordly Team
10 min read

The Real Risks of Cloud Storage

Cloud storage transformed how we manage files — instant access from any device, automatic syncing, effortless sharing, and protection against local hardware failure. But convenience introduces risks that most users don't think about.

The fundamental issue: When you upload a file to Google Drive, Dropbox, or OneDrive, you're handing your data to a third party. That company stores it, manages it, and — in most cases — has the technical ability to access it. Standard cloud storage providers encrypt your data in transit and at rest, but they hold the encryption keys.

This means:

  • The provider can read your files. Employees with sufficient access could theoretically view your data. Most providers have policies against this, but policies aren't the same as technical impossibility.
  • Government agencies can request access. Cloud providers routinely receive and comply with law enforcement requests for user data. In the US, the CLOUD Act allows the government to compel disclosure from providers. Google's transparency report shows hundreds of thousands of government data requests annually.
  • Data breaches expose your files. If the provider is hacked, attackers may access your data. Major cloud providers have strong security, but no system is impenetrable. The 2023 Microsoft Storm-0558 breach demonstrated that even top-tier providers can be compromised.
  • Account compromise exposes everything. If someone gains access to your cloud account (phishing, password reuse, stolen sessions), they get access to every file you've stored.
  • Synced deletions are permanent. Ransomware that encrypts files on your local machine will sync those encrypted files to the cloud, potentially overwriting your good copies. Accidental deletions sync too.

None of this means you shouldn't use cloud storage — the benefits are real and the major providers have excellent security teams. But understanding the risks helps you make informed decisions about what to store, where to store it, and what additional protections to apply.

How Cloud Providers Protect Your Data

Major cloud providers implement multiple layers of security:

Encryption in transit. All major providers use TLS (HTTPS) to encrypt data moving between your device and their servers. This prevents network eavesdropping — your ISP, public WiFi operators, and network attackers can't see your file contents.

Encryption at rest. Providers encrypt stored data on their servers, typically with AES-256. This protects against physical theft of hardware from data centers. However, the provider manages the encryption keys, meaning they can decrypt data when needed (for user access, compliance, or unfortunately, in the event of a breach).

Access controls and authentication. Providers offer two-factor authentication, session management, and device authorization to prevent unauthorized account access.

Infrastructure security. Major providers operate data centers with physical security (biometric access, 24/7 surveillance), network security (firewalls, intrusion detection, DDoS protection), and operational security (employee background checks, access logging, least-privilege access).

Redundancy and availability. Data is typically replicated across multiple data centers in different geographic regions. This protects against hardware failure, natural disasters, and regional outages.

What providers typically DON'T provide:

  • Client-side encryption (you encrypt, they can't read) — most major providers don't offer this by default
  • Zero-knowledge encryption — the provider can still access your data
  • Protection against your account being compromised — if someone has your credentials, they have your files
  • Protection against targeted government surveillance — providers comply with legal requests

Security Comparison of Major Providers

Google Drive:

  • Encryption: TLS in transit, AES-256 at rest
  • 2FA: Yes (authenticator apps, hardware keys, prompts)
  • End-to-end encryption: No (Google holds encryption keys)
  • Government requests: Complies with valid legal requests; publishes transparency reports
  • Privacy concern: Google may scan Drive contents for policy violations; previously scanned for ad targeting (discontinued)
  • Notable: Advanced Protection Program available for high-risk users

Microsoft OneDrive:

  • Encryption: TLS in transit, AES-256 at rest
  • 2FA: Yes (Microsoft Authenticator, hardware keys)
  • End-to-end encryption: Personal Vault feature adds an extra authentication layer but isn't true E2EE
  • Government requests: Complies with valid legal requests
  • Notable: Deep integration with Microsoft 365; SharePoint-based sharing controls

Apple iCloud Drive:

  • Encryption: TLS in transit, AES-128 at rest (minimum)
  • 2FA: Yes (built into Apple ID)
  • End-to-end encryption: Advanced Data Protection (opt-in) provides E2EE for iCloud Drive, Photos, Notes, and most other iCloud data. This is the strongest privacy option from a major provider.
  • Government requests: Cannot comply for E2EE data under Advanced Data Protection
  • Notable: Best privacy option among major providers when Advanced Data Protection is enabled

Dropbox:

  • Encryption: TLS in transit, AES-256 at rest
  • 2FA: Yes (authenticator apps, hardware keys)
  • End-to-end encryption: No for standard Dropbox
  • Government requests: Complies with valid legal requests
  • Notable: Vault feature adds PIN protection for sensitive files; has had notable breaches in the past (2012 breach exposed 68 million accounts)

The key distinction: Among mainstream providers, only Apple iCloud with Advanced Data Protection offers true end-to-end encryption where the provider cannot access your data. For all others, you need additional tools to achieve zero-knowledge encryption.

Zero-Knowledge Encryption Providers

Zero-knowledge providers encrypt your data on your device before uploading it. They never see or have access to your encryption keys. Even if their servers are breached or they receive a government subpoena, they cannot provide your data in readable form.

Proton Drive:

  • Built by the team behind Proton Mail
  • End-to-end encrypted by default
  • Open-source clients
  • Swiss-based (strong privacy jurisdiction)
  • 1 GB free, paid plans for more storage
  • Files are encrypted before leaving your device

Tresorit:

  • Swiss-based, end-to-end encrypted
  • Independently audited by Ernst & Young
  • Zero-knowledge encryption for all files
  • Strong sharing controls with expiration and access tracking
  • Business-focused with compliance features (GDPR, HIPAA)

Sync.com:

  • Canadian-based, zero-knowledge encryption
  • 5 GB free plan
  • Files encrypted client-side before uploading
  • Vault feature for extra-secure storage
  • No file scanning or metadata reading by provider

Filen:

  • German-based, zero-knowledge encryption
  • Open-source client
  • 10 GB free plan
  • AES-256 client-side encryption
  • Competitive pricing for paid plans

MEGA:

  • New Zealand-based, end-to-end encrypted
  • 20 GB free plan (with caveats on bandwidth)
  • Client-side encryption
  • Note: controversial history — founded by Kim Dotcom (who later criticized the company's security)

Trade-offs with zero-knowledge providers:

  • No server-side search — files can't be indexed on the server, so search must happen on your device
  • No file previews from the web without downloading and decrypting first
  • Password recovery is impossible — if you lose your password, your data is permanently lost (because the provider doesn't have the key)
  • Potentially slower — encryption/decryption happens on your device
  • Smaller ecosystems — fewer integrations compared to Google or Microsoft

Encrypting Files Before Uploading

If you want to use a mainstream provider (Google Drive, OneDrive, Dropbox) but add strong encryption, encrypt files on your device before uploading:

Cryptomator (recommended):

  • Free, open-source encryption tool designed specifically for cloud storage
  • Creates an encrypted "vault" inside your sync folder
  • Files are individually encrypted (efficient syncing — only changed files re-sync)
  • Mounts as a virtual drive — use normally, encryption is transparent
  • Available on Windows, macOS, Linux, iOS, and Android
  • AES-256 encryption with scrypt key derivation

How Cryptomator works:

  1. Install Cryptomator and create a vault inside your Google Drive/Dropbox folder
  2. Set a strong password (use our password generator)
  3. The vault appears as a virtual drive letter
  4. Save files to the virtual drive — Cryptomator encrypts them automatically
  5. Encrypted files sync to the cloud via your normal sync client
  6. On other devices, install Cryptomator, point to the same vault, enter your password

Boxcryptor (alternative):

  • Previously popular but acquired by Dropbox in 2022
  • Existing users grandfathered; new users should consider alternatives

VeraCrypt containers (for tech-savvy users):

  • Create an encrypted volume, store it in your cloud folder
  • Downside: the entire container re-syncs on any change (inefficient for cloud sync)
  • Better suited for archival storage than active use

7-Zip encrypted archives:

  • Right-click files → 7-Zip → Add to archive → Set password → AES-256
  • Good for one-off encryptions of specific files before uploading
  • Not practical for frequently accessed files

Securing Your Cloud Account

Your cloud storage account is the gateway to all your files. Securing it is essential:

Use a strong, unique password. Your cloud storage password should be generated by a password manager — at least 16 characters, completely random, used nowhere else. If an attacker gets this one password, they get access to every file you've ever uploaded.

Enable two-factor authentication. Use an authenticator app (Google Authenticator, Authy, Microsoft Authenticator) or, even better, a hardware security key (YubiKey, Titan). Hardware keys are phishing-proof — they won't authenticate to a fake site. Avoid SMS-based 2FA for cloud storage due to SIM-swapping risks.

Review connected apps and third-party access. Cloud storage services often allow third-party apps to access your files (document editors, backup tools, AI assistants). Periodically review these permissions and revoke access for apps you no longer use.

Monitor account activity. Check your account's security dashboard for unrecognized logins, devices, or activity. Google's "Recent Security Activity," Apple's device list, and Dropbox's session view let you spot unauthorized access.

Set up login alerts. Enable notifications for new device logins so you're immediately aware of unauthorized access.

Be cautious with shared devices. Never leave cloud storage sessions logged in on shared or public computers. If you must use a shared device, use private/incognito browsing and log out completely.

Sharing Files Safely

Cloud sharing features are powerful but easily misconfigured:

Default sharing settings matter. When you share a file, check the permission level:

  • Viewer: Can see but not edit or share
  • Editor: Can modify the file
  • Owner: Full control including deletion and permission changes
  • Anyone with the link: No authentication required — anyone who obtains the URL can access the file

Common sharing mistakes:

  • Setting sharing to "Anyone with the link" and then posting the link in a semi-public channel (email, Slack) — the link can be forwarded indefinitely
  • Granting "Editor" access when "Viewer" would suffice
  • Sharing entire folders when only specific files are needed
  • Never revoking sharing permissions after the need has passed
  • Not setting expiration dates on shared links

Best practices for sharing:

  • Share with specific email addresses rather than open links whenever possible
  • Use view-only access by default, granting edit access only when needed
  • Set expiration dates on shared links (available in most paid plans)
  • Disable downloading, printing, and copying for sensitive shared files
  • Audit shared files regularly — review who has access and revoke when no longer needed
  • For sensitive files, consider password-protected sharing (Dropbox, OneDrive) or time-limited links

Cloud Storage Best Practices

A comprehensive approach to cloud storage security:

Classify your data. Not all files need the same level of protection. Ordinary documents can safely go in standard cloud storage. Tax returns, medical records, financial documents, and passwords deserve encrypted storage (zero-knowledge provider or pre-upload encryption).

Don't rely solely on cloud storage as backup. Cloud sync is not backup. Follow the 3-2-1 backup rule — keep local copies of important files in addition to cloud copies.

Enable version history. Most providers retain file versions (Google Drive: 30 days for free, 100 versions for Workspace; Dropbox: 30-180 days depending on plan). This protects against accidental edits, file corruption, and some ransomware scenarios.

Separate personal and work data. Use different accounts or different providers for personal and professional data. This limits the blast radius if one account is compromised and keeps compliance requirements separate.

Review your storage regularly. Old files accumulate. Periodically review and delete files you no longer need — especially sensitive documents that served a temporary purpose.

Consider jurisdiction. Where your data is stored physically matters for legal access and privacy protections. EU-based providers fall under GDPR. Swiss-based providers have additional privacy protections. US-based providers are subject to the CLOUD Act.


Cloud storage is a powerful tool, but it requires conscious security decisions. The convenience of having your files everywhere should be balanced with appropriate protections — strong account security, considered sharing, and encryption for sensitive data. The goal isn't to avoid the cloud; it's to use it intelligently.

Related Articles

Continue exploring related topics