File Hosting Service
File Hosting Service
A file-hosting service, also known as cloud-storage service, online file-storage provider, or cyberlocker
is an internet hosting service specifically designed to host user files. These services allows users to upload
files that can be accessed over the internet after providing a username and password or other authentication.
Typically, file hosting services allow HTTP access, and in some cases, FTP access. Other related services
include content-displaying hosting services (i.e. video and image), virtual storage, and remote backup
solutions.
Uses
Personal file storage services are designed for private individuals to store and access their files online. Users
can upload their files and share them publicly or keep them password-protected.[1]
Document-sharing services allow users to share and collaborate on document files. These services
originally targeted files such as PDFs, word processor documents, and spreadsheets.[2] However many
remote file storage services are now aimed at allowing users to share and synchronize all types of files
across all the devices they use.
File syncing and sharing services allow users to create special folders on each of their computers or mobile
devices, which are then synchronized across all devices. Files placed in this folder can be accessed through
a website or mobile app and easily shared with others for viewing or collaboration. [3]
Consumer products such as OneDrive and Google Drive have made file hosting and sharing more
accessible and popular for personal and business use.[4]
Content caching
Content providers who encounter bandwidth congestion issues may use specialized services for distributing
cached or static content. This is especially common for companies with a major internet presence.[5]
Many businesses use file hosting services as part of their backup and disaster recovery strategies. By storing
copies of important files offsite in a secure data center, they can quickly recover from data loss due to
hardware failure, natural disasters, or other unexpected events.[6]
Storage charges
Some online file storage services offer space on a per-gigabyte basis, and sometimes include a bandwidth
cost component as well. Usually these will be charged monthly or yearly. Some companies offer the service
for free, relying on advertising revenue. Some hosting services do not place any limit on how much space
the user's account can consume. Non-paying users' accounts may be deleted or suspended after a
predefined period of inactivity.[7]
Some services require a software download which makes files only available on computers which have that
software installed, others allow users to retrieve files through any web browser. With the increased inbox
space offered by webmail services, many users have started using their webmail service as an online drive.
Some sites offer free unlimited file storage but have a limit on the file size. Some sites offer additional
online storage capacity in exchange for new customer referrals.
One-click hosting
One-click hosting, sometimes referred to as cyberlocker,[8] generally describes web services that allow
internet users to easily upload one or more files from their hard drives (or from a remote location) onto the
one-click host's server free of charge.
Most such services simply return a URL which can be given to other people, who can then fetch the file
later. In many cases these URLs are predictable allowing potential misuse of the service.[9] As of 2005
these sites have drastically increased in popularity, and subsequently, many of the smaller, less efficient sites
have failed. Although one-click hosting can be used for many purposes, this type of file sharing has, to a
degree, come to compete with P2P filesharing services.[10]
The sites make money through advertising or charging for premium services such as increased
downloading capacity, removing any wait restrictions the site may have or prolonging how long uploaded
files remain on the site. Premium services include facilities like unlimited downloading, no waiting,
maximum download speed etc. Many such sites implement a CAPTCHA to prevent automated
downloading. Several programs aid in downloading files from these one-click hosts; examples are
JDownloader, FreeRapid, Mipony, Tucan Manager and CryptLoad.
For example, in the case of Swiss–German file hosting service RapidShare, in 2010 the US government's
congressional international anti-piracy caucus declared the site a "notorious illegal site", claiming that the
site was "overwhelmingly used for the global exchange of illegal movies, music and other copyrighted
works".[11] But in the legal case Atari Europe S.A.S.U. v. Rapidshare AG in Germany,[12] the Düsseldorf
higher regional court examined claims related to alleged infringing activity and reached the conclusion on
appeal that "most people utilize RapidShare for legal use cases"[13] and that to assume otherwise was
equivalent to inviting "a general suspicion against shared hosting services and their users which is not
justified".[14] The court also observed that the site removes copyrighted material when asked, does not
provide search facilities for illegal material, noted previous cases siding with RapidShare, and after analysis
the court concluded that the plaintiff's proposals for more strictly preventing sharing of copyrighted material
– submitted as examples of anti-piracy measures RapidShare might have adopted – were found to be
"unreasonable or pointless".[12]
By contrast in January 2012 the United States Department of Justice seized and shut down the file hosting
site Megaupload.com and commenced criminal cases against its owners and others. Their indictment
concluded that Megaupload differed from other online file storage businesses, suggesting a number of
design features of its operating model as being evidence showing a criminal intent and venture.[15]
Examples cited included reliance upon advertising revenue and other activities showing the business was
funded by (and heavily promoted) downloads and not storage, defendants' communications helping users
who sought infringing material, and defendants' communications discussing their own evasion and
infringement issues. As of 2014 the case has not yet been heard.[16] A year later, Megaupload.com
relaunched as Mega.
In 2016 the file hosting site Putlocker has been noted by the Motion Picture Association of America for
being a major piracy threat,[17] and in 2012 Alfred Perry of Paramount Pictures listed Putlocker as one of
the "top 5 rogue cyberlocker services", alongside Wupload, FileServe, Depositfiles, and MediaFire.[18]
Security
The emergence of cloud storage services has prompted much discussion on security.[19] Security, as it
relates to cloud storage can be broken down into:
Deals with the question of confidentiality and availability, and may be expressed with questions of the kind:
Will the user be able to continue accessing their data? Who else can access it? Who can change it?
Whether the user is able to continue accessing their data depends on a large number of factors, ranging
from the location and quality of their internet connection, and the physical integrity of the provider's data
center, to the financial stability of the storage provider (because, even if perfectly fit from a technical point
of view, if the provider financially goes out of business, then its services go offline too).
The question of who can access and, potentially, change, their data, ranges from what physical access
controls are in place in the provider's data center to what technical steps have been taken, such as access
control, encryption, etc.
Many cloud storage services state that they either encrypt data before it is uploaded or while it is stored.
While encryption is generally regarded as best practice in cloud storage[20] how the encryption is
implemented is very important.
Consumer-grade, public file hosting and synchronization services are popular, but for business use, they
create the concern that corporate information is exported to devices and cloud services that are not
controlled by the organization.
Some cloud storage providers offer granular ACLs for application keys. One important permission is
append-only, which is distinct from simple "read", "write", and "read-write" permissions in that all existing
data is immutable.[21][22] Append-only support is especially important to mitigate the risk of data loss for
backup policies in the event that the computer being backed-up becomes infected with ransomware capable
of deleting or encrypting the victim's backups.[23][24]
Data encryption
Secret key encryption is sometimes referred to as zero knowledge, meaning that only the user has the
encryption key needed to decrypt the data. Since data is encrypted using the secret key, identical files
encrypted with different keys will be different. To be truly zero knowledge, the file hosting service must not
be able to store the user's passwords or see their data even with physical access to the servers. For this
reason, secret key encryption is considered the highest level of access security in cloud storage.[25] This
form of encryption is rapidly gaining popularity, with companies such as MEGA[26] (previously
Megaupload) and SpiderOak being entirely zero knowledge file storage and sharing.[27]
Since secret key encryption results in unique files, it makes data deduplication impossible and therefore
may use more storage space.[28]
Convergent encryption derives the key from the file content itself and means an identical file encrypted on
different computers result in identical encrypted files.[28] This enables the cloud storage provider to de-
duplicate data blocks, meaning only one instance of a unique file (such as a document, photo, music or
movie file) is actually stored on the cloud servers but made accessible to all uploaders. A third party who
gained access to the encrypted files could thus easily determine if a user has uploaded a particular file
simply by encrypting it themselves and comparing the outputs.[28]
Some point out that there is a theoretical possibility that organizations such as the RIAA, MPAA, or a
government could obtain a warrant for US law enforcement to access the cloud storage provider's servers
and gain access to the encrypted files belonging to a user.[29] By demonstrating to a court how applying the
convergent encryption methodology to an unencrypted copyrighted file produces the same encrypted file as
that possessed by the user would appear to make a strong case that the user is guilty of possessing the file in
question and thus providing evidence of copyright infringement by the user.
There is, however, no easily accessible public record of this having been tried in court as of May 2013 and
an argument could be made that, similar to the opinion expressed by Attorney Rick G. Sanders of Aaron |
Sanders PLLC in regards to the iTunes Match "Honeypot" discussion,[30] that a warrant to search the cloud
storage provider's servers would be hard to obtain without other, independent, evidence establishing
probable cause for copyright infringement. Such legal restraint would obviously not apply to the secret
police of an oppressive government who could potentially gain access to the encrypted files through
various forms of hacking or other cybercrime.
Ownership security
See also
Comparison of file hosting services
Comparison of file synchronization software
Comparison of online backup services
Comparison of online music lockers
File sharing
List of backup software
Shared disk access
References
1. "Share OneDrive files and folders" (https://support.microsoft.com/en-us/office/share-onedrive
-files-and-folders-9fcc2f7d-de0c-4cec-93b0-a82024800c07). support.microsoft.com.
Archived (https://web.archive.org/web/20230602174124/https://support.microsoft.com/en-us/
office/share-onedrive-files-and-folders-9fcc2f7d-de0c-4cec-93b0-a82024800c07) from the
original on 2 June 2023. Retrieved 22 April 2022.
2. Geel, Matthias. "Cloud Storage: File Hosting and Synchronisation 2.0" (https://web.archive.o
rg/web/20170731064101/http://www.vis.ethz.ch/de/visionen/pdfs/2012/visionen_2012_3.pd
f?end=15&start=11) (PDF). Archived from the original (http://www.vis.ethz.ch/de/visionen/pdf
s/2012/visionen_2012_3.pdf?end=15&start=11) (PDF) on 31 July 2017. Retrieved 5 August
2014.
3. Metz, Rachel (9 July 2013). "How Dropbox Could Rule a Multi-Platform World" (http://www.t
echnologyreview.com/news/516951/how-dropbox-could-rule-a-multi-platform-world/). MIT
Technology Review. Retrieved 5 August 2014.
4. How to transfer files from Dropbox to Google Drive (http://www.download3k.com/articles/Mult
Cloud-Review-Manage-multiple-cloud-services-search-and-transfer-between-them-00949)
Archived (https://web.archive.org/web/20161112080428/http://www.download3k.com/article
s/MultCloud-Review-Manage-multiple-cloud-services-search-and-transfer-between-them-00
949) 12 November 2016 at the Wayback Machine. Retrieved 24 December 2014
5. "Macworld.com" (https://web.archive.org/web/20070313001736/http://www.macworld.com/n
ews/2004/06/15/akamai/). Archived from the original (http://www.macworld.com/news/2004/0
6/15/akamai/) on 13 March 2007. Retrieved 7 February 2007.
6. "Introduction to Backup and Disaster Recovery | IBM" (https://www.ibm.com/topics/backup-di
saster-recovery). www.ibm.com. Archived (https://web.archive.org/web/20230605080204/htt
ps://www.ibm.com/topics/backup-disaster-recovery) from the original on 5 June 2023.
Retrieved 8 March 2023.
7. Cahane, Amir (15 September 2021). "The Right not to Forget: Cloud Based Services
Moratoriums in War Zones and Data Portability Rights" (https://papers.ssrn.com/sol3/papers.
cfm?abstract_id=3944667). Rights to Privacy and Data Protection in Armed Conflict.
SSRN 3944667 (https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3944667). Archived
(https://web.archive.org/web/20211222192512/https://papers.ssrn.com/sol3/papers.cfm?abst
ract_id=3944667) from the original on 22 December 2021. Retrieved 27 June 2023.
8. "Cyberlockers Take Over File-Sharing Lead From BitTorrent Sites" (http://torrentfreak.com/cy
berlockers-take-over-file-sharing-lead-from-bittorrent-sites-110111/). Archived (https://web.ar
chive.org/web/20110717102409/http://torrentfreak.com/cyberlockers-take-over-file-sharing-l
ead-from-bittorrent-sites-110111/) from the original on 17 July 2011. Retrieved 12 July 2011.
9. Nikiforakis N., Balduzzi M. Van Acker S., Joosen W. and Balzarotti D. "Exposing the Lack of
Privacy in File Hosting Services (http://www.usenix.org/event/leet11/tech/full_papers/Nikifor
akis.pdf) Archived (https://web.archive.org/web/20110915154356/http://www.usenix.org/eve
nt/leet11/tech/full_papers/Nikiforakis.pdf) 15 September 2011 at the Wayback Machine
10. Roettgers, Janko. "Piracy Beyond P2P: One-Click Hosters" (https://web.archive.org/web/201
30603125434/http://gigaom.com/2007/06/17/one-click-hosters/), Retrieved: 5 January 2008.
11. "RIAA joins congressional caucus in unveiling first-ever list of notorious illegal sites" (https://
web.archive.org/web/20171026001341/http://systema.in/blog/2010/05/riaa-unveils-list-of-not
orious-illegal-sites/). RIAA. 19 May 2010. Archived from the original (http://systema.in/blog/2
010/05/riaa-unveils-list-of-notorious-illegal-sites/) on 26 October 2017. Retrieved 16 January
2011.
12. Legal case: OLG Dusseldorf, Judgement of 22.03.2010, Az I-20 U 166/09 dated 22 March
2010.
13. Roettgers, Janko (3 May 2010). "RapidShare Wins in Court" (https://web.archive.org/web/20
110226013817/http://gigaom.com/video/rapidshare-wins-in-court/). Gigaom.com. Archived
from the original (http://gigaom.com/video/rapidshare-wins-in-court/) on 26 February 2011.
Retrieved 16 January 2011. Citation from ruling: "Es ist davon auszugehen, dass die weit
überwiegende Zahl von Nutzern die Speicherdienste zu legalen Zwecken einsetzen und die
Zahl der missbräuchlichen Nutzer in der absoluten Minderheit ist." ("It is to be expected that
the vast majority of users use the storage services for lawful purposes and the number of
abusive users are in the absolute minority.").
14. From the Atari v. RapidShare ruling: "entspricht einem Generalverdacht gegen Sharehoster-
Dienste und ihre Nutzer, der so nicht zu rechtfertigen ist" ("corresponds to a general
suspicion against shared hosting services and their users, which is not to justify such").
15. Department of Justice indictment, on the Wall Street Journal 's website (https://www.wsj.com/
articles/SB10001424052970204616504577171180266957116) Archived (https://archive.ph/
20120715035322/http://online.wsj.com/article/SB100014240529702046165045771711802
66957116.html) 15 July 2012 at archive.today – see sections 7–14.
16. "Release For Victim Notification United States v. Kim Dotcom, et al, Crim. No. 1:12CR3
(E.D. Va. O'Grady, J.)" (https://www.justice.gov/usao/vae/megaupload.html). United States
Department of Justice. Archived (https://web.archive.org/web/20141027111237/http://www.ju
stice.gov/usao/vae/megaupload.html) from the original on 27 October 2014. Retrieved
10 November 2014.
17. Prabhu, Vijay (17 October 2016). "Yet Another Video Streaming Service Bites The Dust,
Putlocker Shuts Down" (http://www.techworm.net/2016/10/putlocker-video-streaming-service
-shuts.html). TechWorm. Archived (https://web.archive.org/web/20161019000409/http://www.
techworm.net/2016/10/putlocker-video-streaming-service-shuts.html) from the original on 19
October 2016. Retrieved 10 November 2016.
18. Sandoval, Greg (31 March 2012). "MPAA wants more criminal cases brought against 'rogue'
sites" (https://www.cnet.com/news/mpaa-wants-more-criminal-cases-brought-against-rogue-
sites/). CNET. Archived (https://web.archive.org/web/20180309012109/https://www.cnet.co
m/news/mpaa-wants-more-criminal-cases-brought-against-rogue-sites/) from the original on
9 March 2018. Retrieved 10 November 2016.
19. Jonathan Strickland (30 April 2008). "How Cloud Storage Works" (http://computer.howstuffw
orks.com/cloud-computing/cloud-storage3.htm/). How Stuff Works. Archived (https://web.arch
ive.org/web/20130429091352/http://computer.howstuffworks.com/cloud-computing/cloud-sto
rage3.htm) from the original on 29 April 2013. Retrieved 8 May 2013.
20. "Cloud Data Storage, Encryption and Data Protection Best Practices" (http://searchcloudsec
urity.techtarget.com/resources/Cloud-Data-Storage-Encryption-and-Data-Protection-Best-Pr
actices). Techtarget.com. Archived (https://web.archive.org/web/20130502073605/http://sear
chcloudsecurity.techtarget.com/resources/Cloud-Data-Storage-Encryption-and-Data-Protecti
on-Best-Practices) from the original on 2 May 2013. Retrieved 8 May 2013.
21. "BorgBase - Secure hosting for your BorgBackup Repos" (https://www.borgbase.com/).
BorgBase - Simple Borg Repo Hosting. Archived (https://web.archive.org/web/20191203113
838/https://www.borgbase.com/) from the original on 3 December 2019. Retrieved
3 December 2019.
22. "Why Use Immutable Storage?" (https://wasabi.com/blog/use-immutable-storage/). Wasabi.
11 September 2018. Archived (https://web.archive.org/web/20191203113834/https://wasabi.
com/blog/use-immutable-storage/) from the original on 3 December 2019. Retrieved
3 December 2019.
23. "Archived copy" (https://web.archive.org/web/20201022012939/https://eugenekolo.com/stati
c/paybreak.pdf) (PDF). Archived from the original (https://eugenekolo.com/static/paybreak.pd
f) (PDF) on 22 October 2020. Retrieved 3 December 2019.
24. https://www.cs.kent.ac.uk/people/staff/ba284/Papers/NordSec2019.pdf Archived (https://web.
archive.org/web/20191203113831/https://www.cs.kent.ac.uk/people/staff/ba284/Papers/Nor
dSec2019.pdf) 3 December 2019 at the Wayback Machine
25. "5 Ways To Securely Encrypt Your Files in the Cloud" (http://www.makeuseof.com/tag/5-way
s-to-securely-encrypt-your-files-in-the-cloud/). Makeuseof.com. 26 May 2012. Archived (http
s://web.archive.org/web/20130507025406/http://www.makeuseof.com/tag/5-ways-to-securel
y-encrypt-your-files-in-the-cloud/) from the original on 7 May 2013. Retrieved 8 May 2013.
26. "MEGA has been designed around user-controlled end-to-end encryption. MEGA's end-to-
end encryption (E2EE) paradigm enhances the overall security by providing 'privacy by
design', unlike many of its competitors who only provide 'privacy by policy' " (https://mega.nz/
security). MEGA Privacy. Archived (https://web.archive.org/web/20190614215450/https://me
ga.nz/security) from the original on 14 June 2019. Retrieved 5 June 2019.
27. "SpiderOak - Zero Knowledge Privacy with Encrypted Cloud Backup" (https://spideroak.co
m/zero-knowledge/). Archived (https://web.archive.org/web/20141009131632/https://spidero
ak.com/zero-knowledge/) from the original on 9 October 2014. Retrieved 29 September
2014.
28. Storer, Mark W.; Greenan, Kevin; Long, Darrell D. E.; Miller, Ethan L. "Secure Data
Deduplication" (http://www.ssrc.ucsc.edu/Papers/storer-storagess08.pdf) (PDF).
Ssrc.ucsc.edu. Archived (https://web.archive.org/web/20130822211856/http://www.ssrc.ucs
c.edu/Papers/storer-storagess08.pdf) (PDF) from the original on 22 August 2013. Retrieved
8 May 2013.
29. Brad McCarty (23 September 2011). "Bitcasa: Infinite storage comes to your desktop, but so
do big questions" (https://thenextweb.com/apps/2011/09/23/bitcasa-infinite-storage-comes-t
o-your-desktop-but-so-do-big-questions/). TheNextWeb.com. Archived (https://web.archive.o
rg/web/20160722061307/http://thenextweb.com/apps/2011/09/23/bitcasa-infinite-storage-co
mes-to-your-desktop-but-so-do-big-questions/) from the original on 22 July 2016. Retrieved
8 May 2013.
30. Brad McCarty (16 September 2011). "Is iTunes Match a honeypot for music pirates? A
copyright lawyer weighs in" (https://thenextweb.com/apple/2011/09/16/is-itunes-match-a-hon
eypot-for-music-pirates-a-copyright-lawyer-weighs-in/). TheNextWeb.com. Archived (https://
web.archive.org/web/20160308035537/http://thenextweb.com/apple/2011/09/16/is-itunes-m
atch-a-honeypot-for-music-pirates-a-copyright-lawyer-weighs-in/) from the original on 8
March 2016. Retrieved 8 May 2013.