A file-hosting service, also known as cloud-storage service, online file-storage provider, or cyberlocker, is an
internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
hosting service specifically designed to host user
files. These services allow users to
upload files that can be accessed over the internet after providing a username and password or other
authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
. Typically, file hosting services allow
HTTP access, and in some cases,
FTP access. Other related services include content-displaying hosting services (i.e.
video
Video is an Electronics, electronic medium for the recording, copying, playback, broadcasting, and display of moving picture, moving image, visual Media (communication), media. Video was first developed for mechanical television systems, whi ...
and
image
An image or picture is a visual representation. An image can be Two-dimensional space, two-dimensional, such as a drawing, painting, or photograph, or Three-dimensional space, three-dimensional, such as a carving or sculpture. Images may be di ...
), virtual storage, and
remote backup solutions.
Uses
Personal file storage
Personal file storage services are designed for private individuals to store and access their files online. Users can upload their files and share them publicly or keep them password-protected.
Document-sharing services allow users to share and collaborate on document files. These services originally targeted files such as
PDFs,
word processor documents, and
spreadsheet
A spreadsheet is a computer application for computation, organization, analysis and storage of data in tabular form. Spreadsheets were developed as computerized analogs of paper accounting worksheets. The program operates on data entered in c ...
s. However many remote file storage services are now aimed at allowing users to share and synchronize all types of files across all the devices they use.
File sync and sharing services
File syncing and
sharing services allow users to create special folders on each of their computers or mobile devices, which are then synchronized across all devices. Files placed in this folder can be accessed through a website or mobile app and easily shared with others for viewing or collaboration.
Consumer products such as
OneDrive and
Google Drive have made file hosting and sharing more accessible and popular for personal and business use.
Content caching
Content providers who encounter bandwidth congestion issues may use
specialized services for distributing cached or static content. This is especially common for companies with a major internet presence.
Backup and disaster recovery
Many businesses use file hosting services as part of their backup and disaster recovery strategies. By storing copies of important files offsite in a secure
data center, they can quickly recover from data loss due to hardware failure,
natural disaster
A natural disaster is the very harmful impact on a society or community brought by natural phenomenon or Hazard#Natural hazard, hazard. Some examples of natural hazards include avalanches, droughts, earthquakes, floods, heat waves, landslides ...
s, or other unexpected events.
Storage charges
Some online file storage services offer space on a per-
gigabyte
The gigabyte () is a multiple of the unit byte for digital information. The SI prefix, prefix ''giga-, giga'' means 109 in the International System of Units (SI). Therefore, one gigabyte is one billion bytes. The unit symbol for the gigabyte i ...
basis, and sometimes include a
bandwidth cost component as well. Usually these will be charged monthly or yearly. Some companies offer the service for free, relying on advertising revenue. Some hosting services do not place any limit on how much space the user's account can consume. Non-paying users' accounts may be deleted or suspended after a predefined period of inactivity.
Some services require a software download which makes files only available on computers which have that software installed, others allow users to retrieve files through any web browser. With the increased inbox space offered by
webmail services, many users have started using their webmail service as an online drive. Some sites offer free unlimited file storage but have a limit on the file size. Some sites offer additional online storage capacity in exchange for new customer referrals.
Many providers offer tiered storage levels, charging differently based on frequency of access and retrieval latency. There may be a different cost associated with access vs storage. For example, in a cold storage scenario, the price per GB stored over time can be very low, but it may take longer to access an item at a higher per GB retrieval cost. In some cases, users may have to commit to retrieval being much higher latency as well.
One-click hosting
One-click hosting, sometimes referred to as cyberlocker generally describes
web service
A web service (WS) is either:
* a service offered by an electronic device to another electronic device, communicating with each other via the Internet, or
* a server running on a computer device, listening for requests at a particular port over a n ...
s that allow
internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
users to easily upload one or more files from their
hard drive
A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating hard disk drive platter, pla ...
s (or from a remote location) onto the one-click host's
server free of charge.
Most such services simply return a
URL which can be given to other people, who can then fetch the file later. In many cases these URLs are predictable allowing potential misuse of the service. these sites have drastically increased in popularity, and subsequently, many of the smaller, less efficient sites have failed. Although one-click hosting can be used for many purposes, this type of
file sharing
File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include ...
has, to a degree, come to compete with
P2P filesharing services.
The sites make money through advertising or charging for premium services such as increased downloading capacity, removing any wait restrictions the site may have or prolonging how long uploaded files remain on the site. Premium services include facilities like unlimited downloading, no waiting, maximum download speed etc. Many such sites implement a
CAPTCHA
Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA) ( ) is a type of challenge–response authentication, challenge–response turing test used in computing to determine whether the user is human in order to de ...
to prevent automated downloading. Several programs aid in downloading files from these one-click hosts; examples are
JDownloader, FreeRapid, Mipony, Tucan Manager and CryptLoad.
Use for copyright infringement
File hosting services may be used as a means to
distribute or share files without consent of the copyright owner. In such cases one individual
uploads a file to a file hosting service, which others can then
download
In computer networks, download means to ''receive'' data from a remote system, typically a server such as a web server, an FTP server, an email server, or other similar systems. This contrasts with uploading, where data is ''sent to'' a remote ...
. Legal assessments can be very diverse.
For example, in the case of
Swiss
Swiss most commonly refers to:
* the adjectival form of Switzerland
* Swiss people
Swiss may also refer to: Places
* Swiss, Missouri
* Swiss, North Carolina
* Swiss, West Virginia
* Swiss, Wisconsin
Other uses
* Swiss Café, an old café located ...
German file hosting service
RapidShare, in 2010 the US government's congressional international anti-
piracy
Piracy is an act of robbery or criminal violence by ship or boat-borne attackers upon another ship or a coastal area, typically with the goal of stealing cargo and valuable goods, or taking hostages. Those who conduct acts of piracy are call ...
caucus declared the site a "notorious illegal site", claiming that the site was "overwhelmingly used for the global exchange of illegal movies, music and other copyrighted works". But in the legal case ''Atari Europe S.A.S.U. v. Rapidshare AG'' in Germany,
[Legal case: OLG Dusseldorf, Judgement of 22.03.2010, Az I-20 U 166/09 dated 22 March 2010.] the
Düsseldorf
Düsseldorf is the capital city of North Rhine-Westphalia, the most populous state of Germany. It is the second-largest city in the state after Cologne and the List of cities in Germany with more than 100,000 inhabitants, seventh-largest city ...
higher regional court examined claims related to alleged infringing activity and reached the conclusion on appeal that "most people utilize RapidShare for legal use cases" and that to assume otherwise was equivalent to inviting "a general suspicion against shared hosting services and their users which is not justified". The court also observed that the site removes copyrighted material when asked, does not provide search facilities for illegal material, noted previous cases siding with RapidShare, and after analysis the court concluded that the plaintiff's proposals for more strictly preventing sharing of copyrighted material – submitted as examples of anti-piracy measures RapidShare might have adopted – were found to be "unreasonable or pointless".
By contrast, in January 2012, the
United States Department of Justice
The United States Department of Justice (DOJ), also known as the Justice Department, is a United States federal executive departments, federal executive department of the U.S. government that oversees the domestic enforcement of Law of the Unite ...
seized and shut down the file hosting site
Megaupload.com and commenced criminal cases against its owners and others. Their
indictment
An indictment ( ) is a formal accusation that a person has committed a crime. In jurisdictions that use the concept of felonies, the most serious criminal offense is a felony; jurisdictions that do not use that concept often use that of an ind ...
concluded that Megaupload differed from other online file storage businesses, suggesting
a number of design features of its
operating model as being evidence showing a criminal intent and venture.
[Department of Justice indictment, on the ''Wall Street Journal''s website](_blank)
– see sections 7–14. Examples cited included reliance upon advertising revenue and other activities showing the business was funded by (and heavily promoted) downloads and not storage, defendants' communications helping users who sought infringing material, and defendants' communications discussing their own evasion and infringement issues. , the case has not yet been heard. A year later, Megaupload.com relaunched as
Mega.
In 2016, the file hosting site
Putlocker has been noted by the
Motion Picture Association of America
The Motion Picture Association (MPA) is an American trade association representing the Major film studios, five major film studios of the Cinema of the United States, United States, the Major film studios#Mini-majors, mini-major Amazon MGM Stud ...
for being a major piracy threat, and in 2012, Alfred Perry of
Paramount Pictures
Paramount Pictures Corporation, commonly known as Paramount Pictures or simply Paramount, is an American film production company, production and Distribution (marketing), distribution company and the flagship namesake subsidiary of Paramount ...
listed Putlocker as one of the "top 5 rogue cyberlocker services", alongside Wupload,
FileServe, Depositfiles, and
MediaFire.
Security
The emergence of
cloud storage services has prompted much discussion on security.
Security, as it relates to cloud storage can be broken down into:
Access and integrity security
Deals with the question of
confidentiality and availability, and may be expressed with questions of the kind: Will the user be able to continue accessing their data? Who else can access it? Who can change it?
Whether the user is able to continue accessing their data depends on a large number of factors, ranging from the location and quality of their internet connection, and the physical integrity of the provider's data center, to the financial stability of the storage provider (because, even if perfectly fit from a technical point of view, if the provider financially goes out of business, then its services go offline too).
The question of who can access and, potentially, change, their data, ranges from what
physical access controls are in place in the provider's data center to what
technical steps have been taken, such as access control,
encryption
In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
, etc.
Many
cloud storage services state that they either encrypt data before it is uploaded or while it is stored. While encryption is generally regarded as best practice in cloud storage
how the encryption is implemented is very important.
Consumer-grade, public file hosting and synchronization services are popular, but for business use, they create the concern that corporate information is exported to devices and cloud services that are not controlled by the organization.
Some cloud storage providers offer granular
ACLs for application keys. One important permission is
append-only, which is distinct from simple "read", "write", and "read-write" permissions in that all existing data is immutable. Append-only support is especially important to mitigate the risk of
data loss for
backup
In information technology, a backup, or data backup is a copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event. The verb form, referring to the process of doing so, is "wikt:back ...
policies in the event that the computer being backed-up becomes infected with
ransomware
Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
capable of deleting or encrypting the victim's backups.
Data encryption
Secret key encryption is sometimes referred to as
zero knowledge, meaning that only the user has the encryption key needed to decrypt the data. Since data is encrypted using the secret key, identical files encrypted with different keys will be different. To be truly zero knowledge, the file hosting service must not be able to store the user's passwords or see their data even with physical access to the servers. For this reason, secret key encryption is considered the highest level of access security in cloud storage.
This form of encryption is rapidly gaining popularity, with companies such as
MEGA (previously Megaupload) and
SpiderOak being entirely zero knowledge file storage and sharing.
Since secret key encryption results in unique files, it makes
data deduplication impossible and therefore may use more storage space.
Convergent encryption derives the key from the file content itself and means an identical file encrypted on different computers result in identical encrypted files.
This enables the cloud storage provider to
de-duplicate data blocks, meaning only one instance of a unique file (such as a document, photo, music or movie file) is actually stored on the cloud servers but made accessible to all uploaders. A third party who gained access to the encrypted files could thus easily determine if a user has uploaded a particular file simply by encrypting it themselves and comparing the outputs.
Some point out that there is a theoretical possibility that organizations such as the
RIAA
The Recording Industry Association of America (RIAA) is a trade organization that represents the music recording industry in the United States. Its members consist of record labels and distributors that the RIAA says "create, manufacture, and/o ...
,
MPAA, or a government could obtain a warrant for US law enforcement to access the cloud storage provider's servers and gain access to the encrypted files belonging to a user. By demonstrating to a court how applying the convergent encryption methodology to an unencrypted copyrighted file produces the same encrypted file as that possessed by the user would appear to make a strong case that the user is guilty of possessing the file in question and thus providing evidence of
copyright infringement by the user.
There is, however, no easily accessible public record of this having been tried in court as of May 2013 and an argument could be made that, similar to the opinion expressed by Attorney Rick G. Sanders of Aaron , Sanders PLLC in regards to the iTunes Match "Honeypot" discussion,
that a warrant to search the cloud storage provider's servers would be hard to obtain without other, independent, evidence establishing probable cause for copyright infringement. Such legal restraint would obviously not apply to the
secret police of an
oppressive government who could potentially gain access to the encrypted files through various forms of
hacking or other
cybercrime
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or Computer network, networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cyberc ...
.
Ownership security
See also
*
Comparison of file hosting services
*
Comparison of file synchronization software
*
Comparison of online backup services
*
Comparison of online music lockers
*
List of backup software
*
Shared resource
*
Cloud storage
References
{{DEFAULTSORT:File Hosting Service
File hosting
Records management