What is the best encryption for cloud storage? | Proton (2024)

If you’ve ever stored documents or images on the internet, then you’ve relied on cloud encryption to keep your files safe. Proton Drive, Dropbox, Google Photos, and iCloud are all examples of cloud storage services that use some form of encryption to protect your data on the cloud.

Cloud encryption turns your files into unreadable ciphertext to prevent unauthorized access while it’s traveling over the internet and stored on the provider’s servers.

The security and privacy of your files rely upon this encryption, but the encryption method used to protect your files and how it was implemented depends on which service you use. This can make a big difference, as some encryption methods are stronger than others.

This article explains the different types of encryption and how various cloud storage providers use them to protect data. It covers the following:

  • Types of encryption for cloud storage
  • How does end-to-end encrypted cloud storage work?
  • What is the best encryption for cloud storage?
  • How to use encrypted cloud storage for your files

Learn what the “cloud” means

Types of encryption for cloud storage

If you’re new to cryptography, the process of mathematically locking and unlocking packets of data can be complicated. This article describes cloud encryption in a way that’s easy to understand. If you’re looking for a more technical explanation of how Proton handles cloud storage encryption, you can read the Proton Drive security model.

Encryption allows you to send, receive, and store information in a way that only makes that information readable to people with the correct key.

If your files are encrypted, they’ll remain unreadable even if an attacker can somehow access them. The only way the attacker would be able to read your encrypted files is if they were able to somehow break the encryption or steal the correct encryption key.

Encryption covers data in its two basic states:

  • Data in transit — This is data that’s being sent between servers, often outside a secure network or over multiple networks. Think of how your email goes from your computer to your email service to your recipient’s computer.
  • Data at rest — This refers to data that’s being stored and not used or moved. Data can be stored on your device, on a disk or thumb drive, on a data center server, or in cloud storage.

There are also two main types of encryption, and the type of encryption you use depends on whether you’re protecting data in transit or data at rest.

Symmetric and asymmetric encryption

When you store your files on the cloud, you take the following steps:

  1. You select a file from your device to upload. For this example, let’s imagine it’s a photo from your desktop.
  2. That photo is broken into bits of data used in transit, called packets, to be sent over the internet.
  3. Your photo’s data packets travel over multiple servers until it reaches your cloud storage’s server.
  4. Your photo is then filed and stored on your cloud storage’s server, where you can safely access it again.

To remain secure, your photo must be encrypted as it travels over the internet so hackers and governments can’t see it. It should also be encrypted on your cloud storage provider’s servers, so it’ll be safe if there’s a breach of the server.

To do this, cloud storage services typically use a combination of symmetric and asymmetric encryption.

Symmetric encryption — With symmetric encryption, the same key is used to encrypt and decrypt data. It works extremely quickly to protect large amounts of data. This is great for encrypting files at rest. An example of symmetric encryption is AES encryption(new window).

Asymmetric encryption — Asymmetric encryption (also known as public-key encryption) uses two different keys to encrypt and decrypt data: a public key and a private key. The public key is widely available, but its corresponding private key is only known to the person meant to decrypt the data. This makes it possible to securely encrypt data in transit, but this kind of encryption is much slower. An example of asymmetric encryption is elliptic-curve cryptography.

If you’re interested in the math behind these different types of encryption, check out this explainer(new window).

Many protocols use both symmetric and asymmetric encryption

The main drawback of asymmetric encryption is that it requires a large amount of processing power. Because of this, encrypting anything larger than some lines of text using asymmetric encryption is prohibitively time-consuming.

That’s why the TLS protocol only uses asymmetric encryption to encrypt the symmetric key that’s actually used to encrypt your connection. The symmetric encryption key is tiny, meaning it’s small enough to be quickly encrypted using an asymmetric cipher. (This is a simplified overview of a TLS connection that doesn’t go into handshakes or TLS/SSL certificates.)

TLS is the backbone of the internet, and it’s used to encrypt all HTTPS connections. Almost any file you send to a cloud storage service will at least be encrypted using TLS. It’s also important to note that, as its name suggests, the Transport Layer Security protocol (TLS) is only used to protect data in transit. Once it arrives at its destination, in this case, your cloud storage provider’s server, TLS’s job is done, and the data is decrypted.

Most cloud services take the data that TLS decrypted and use symmetric AES cryptography to protect files on their servers since it requires less computing power.

Let’s revisit the example of uploading a photo to the cloud from earlier and add in the encryption steps a typical cloud storage service takes:

  1. You select a photo on your desktop to upload to the cloud.
  2. The photo is broken into packets for transit. Each of the packets is encrypted by TLS and locked with a single-use session key.
  3. Your browser encrypts that session key with your cloud service’s server’s public key. Then it sends the encrypted session key and your photo’s encrypted data packets across the internet to your cloud service’s server.
  4. The server uses its private key to decrypt the session key. Then it uses the session key to decrypt your photo’s data packets.
  5. Usually, the server will then re-encrypt your photo using AES for storage.

This system is functional, but it’s not the most secure implementation of cloud storage encryption. That’s because your cloud service encrypts your photo using keys they control, meaning it can decrypt it whenever it wants. This also means that if there’s a data breach, the keys will likely be affected along with your file, meaning whatever is stored on the server can be decrypted.

This is like keeping the safe and the key to the safe in the same room —not too helpful if somebody breaks in.

How does end-to-end encrypted cloud storage work?

End-to-end encryption is a form of asymmetric cryptography that ensures data remains encrypted throughout its journey from a sender to the designated recipient. PGP is the most widely used form of end-to-end encryption and incorporates both symmetric and asymmetric encryption.

With TLS, for example, your device and the server are the two “ends” of the encryption journey. But there’s another way to implement end-to-end encryption in which files are encrypted on your device using your own public key before being sent to the server. Only your private key can decrypt the files. This way, your data is inaccessible both in transit and while stored on the server.

If we revisit the photo uploading example, this time using end-to-end encryption, this is what it looks like:

  1. You select a photo on your desktop to upload to the cloud.
  2. The photo is broken into packets for transit. Each of the packets is encrypted using your public key.
  3. These encrypted packets undergo the previously described TLS encryption process and are sent across the internet to your cloud service’s server.
  4. The server receives the packets and decrypts the TLS encryption. However, your data is still encrypted using your public key.

In this example, your cloud service’s server doesn’t possess the key needed to decrypt your photo, your private key, which resides on your device. This means it can’t decrypt your photo for any reason. And, if there’s a data breach, your photo will remain securely encrypted.

What is the best encryption for cloud storage?

Clearly, you need a combination of encryption standards to protect your data in the cloud. No single type of encryption is best because they all have different functions: AES is both efficient and extremely secure. TLS protects data in transit. PGP incorporates elements of both.

However, any cloud storage system that does not use end-to-end encryption is fundamentally less secure. When a server has access to data, anyone with access to the server and the key can access the data.

Cloud storage companies go to great lengths to secure their servers, but data breaches are common, and not even the NSA is immune(new window) to hackers.

Moreover, only end-to-end encryption can ensure your cloud storage provider doesn’t abuse your data. For example, Google uses automated scanning to read every document and look at every image you store on its platforms. End-to-end encryption, on the other hand, ensures your files remain private.

How to use encrypted cloud storage for your files

One way to use end-to-end encryption for your files is to encrypt them yourself on your device before uploading them to a non-private cloud storage service, such as Dropbox or Google. There are third-party encryption apps that will allow you to encrypt individual files.

But the easiest way is to simply use a cloud storage provider that offers end-to-end encryption.

Like all Proton services, Proton Drive uses end-to-end encryption to secure your files on your device before storing them on our servers. When you want to share a file with someone, those files are end-to-end encrypted too.

Proton Drive handles all this encryption automatically, making it simple to use. You simply drag and drop your files into Proton Drive, and it handles the rest. You can also share large files for free.

Get started with secure cloud storage

FAQ

Should I use encrypted cloud storage?


Everyone has sensitive files. From financial documents to family photos, your data represents a complete picture of your personal life. End-to-end encrypted file storage can keep those files safe from hackers and from cloud storage providers that can use your data for marketing or other purposes you wouldn’t approve of.

How can I encrypt my cloud storage files?


Proton Drive is the easiest way to encrypt your files on the cloud. There’s no need for a third-party app, and all the encryption happens automatically, so you don’t need any special technical knowledge.

Do cloud services use encryption?


Most cloud services use TLS to encrypt files in transit and AES encryption when files are stored on their servers. However, the most secure type of encryption for cloud storage is end-to-end encryption.

Can I use cloud storage encryption for free?

All Proton Drive accounts benefit from the same robust encryption, even if you are using a Drive Free plan. Our free cloud storage gives you 1 GB of storage, protected with end-to-end encryption.

What is the best encryption for cloud storage? | Proton (2024)

FAQs

What is the best encryption for cloud storage? | Proton? ›

However, the most secure type of encryption for cloud storage is end-to-end encryption.

What is cloud storage encryption? ›

Cloud encryption is a data security process in which plaintext data is encoded into unreadable ciphertext to help keep it secure in or between cloud environments. It is one of the most effective ways to uphold data privacy as well as protect cloud data in transit or at rest against cyberattacks.

Which type of encryption level is most secure? ›

AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today. While it is theoretically true that AES 256-bit encryption is harder to crack than AES 128-bit encryption, AES 128-bit encryption has never been cracked.

What are the 2 common forms of encryption for data security in cloud? ›

There are two types of encryption in widespread use today: symmetric and asymmetric encryption. The name derives from whether or not the same key is used for encryption and decryption.

Which encryption method is more secure? ›

Security: Asymmetric encryption is considered more secure due to the use of two separate keys, making it harder for attackers to compromise the system. However, symmetric encryption can still provide strong security when implemented correctly with strong key management practices.

What is the best encryption method for cloud storage? ›

Most cloud services use TLS to encrypt files in transit and AES encryption when files are stored on their servers. However, the most secure type of encryption for cloud storage is end-to-end encryption.

What encryption does Google cloud use? ›

All data that is stored by Google is encrypted at the storage layer using the Advanced Encryption Standard (AES) algorithm, AES-256.

Which encryption is the safest? ›

Amongst all the above-stated types of encryption, AES 256-bit encryption is widely used and is the most trusted type of encryption. The United States Government, security agencies, secret services, and a majority of companies around the globe use AES for securing their data communications.

What is the safest data encryption? ›

Advanced Encryption Standard (AES)

A widely used symmetric key algorithm that has become the standard for securing sensitive data. Based on the Rijandael block cipher, AES offers a high level of security and efficiency.

What is the most secure encryption algorithm? ›

AES-256 encryption is extremely secure. It is the most secure encryption algorithm available today and is used extensively in government and military applications, as well as by businesses operating in highly regulated industries.

What is the simplest encryption algorithm? ›

One of the simplest encryption algorithms is the Caesar cipher. It is a type of substitution cipher where each letter in the plaintext is shifted a certain number of places down the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so on.

What is the data encryption standard in cloud computing? ›

The DES (Data Encryption Standard) algorithm is a symmetric-key block cipher created in the early 1970s by an IBM team and adopted by the National Institute of Standards and Technology (NIST). The algorithm takes the plain text in 64-bit blocks and converts them into ciphertext using 48-bit keys.

What is the strongest encryption available today? ›

Strongest Data Encryption Algorithms
  • TripleDES.
  • Twofish encryption algorithm.
  • Blowfish encryption algorithm.
  • Advanced Encryption Standard (AES)
  • IDEA encryption algorithm.
  • MD5 encryption algorithm.
  • HMAC encryption algorithm.
  • RSA security.
Jan 17, 2020

What is the least strongest security encryption? ›

WEP is the least secure type of encryption and should only be used if necessary. WPA and WPA2 are more secure, and WPA2 is the most secure type of encryption available. When configuring wireless security, you should always use WPA2 if possible.

What is the strongest file encryption? ›

Which encryption is best for files? The best encryption for files depends on the specific use case and requirements. AES-256 is considered one of the most secure and commonly used encryption algorithms. Although for most practical purposes, AES-128 will do just as well.

How does iCloud encryption work? ›

iCloud.com provides access to your iCloud data via any web browser. All sessions at iCloud.com are encrypted in transit between Apple's servers and the browser on your device. When Advanced Data Protection is enabled, access to your data via iCloud.com is disabled by default.

Is Google Drive cloud storage encrypted? ›

When you upload a file of any type to Google Drive, it is stored securely in our world-class data centres. Data is encrypted in-transit and at-rest. If you choose to access these files offline, we store this info on your device.

Are all files in cloud storage encrypted? ›

Not all cloud storage providers are equipped with encryption, let alone encryption before your files are saved to the cloud. Also, because many cloud storage services are built to enable sharing, file encryption isn't always an option.

How does storage encryption work? ›

Storage encryption technologies use one or more cryptographic keys to encrypt and decrypt the data that they protect. If a key is lost or damaged, it may not be possible to recover the encrypted data from the computer.

Top Articles
Latest Posts
Article information

Author: Rev. Porsche Oberbrunner

Last Updated:

Views: 5758

Rating: 4.2 / 5 (53 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Rev. Porsche Oberbrunner

Birthday: 1994-06-25

Address: Suite 153 582 Lubowitz Walks, Port Alfredoborough, IN 72879-2838

Phone: +128413562823324

Job: IT Strategist

Hobby: Video gaming, Basketball, Web surfing, Book restoration, Jogging, Shooting, Fishing

Introduction: My name is Rev. Porsche Oberbrunner, I am a zany, graceful, talented, witty, determined, shiny, enchanting person who loves writing and wants to share my knowledge and understanding with you.