Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Secure Cloud Document Storage and Encryption

in Blog, Document Security, DRM, PDF Security

How effective is secure cloud document storage for encrypted file sharing?

This blog examines what makes a cloud storage provider secure, whether the reality matches the marketing hype, and what additional steps you can take to achieve secure encrypted file sharing and prevent leaks.

 

Storing documents & files securely in the cloud


With a general shift towards flexible working over the past decade, cloud storage has become high in demand and even essential for some organizations.  Providers have looked to capitalize on this, offering secure cloud storage that aims to meet the regulatory requirements of the modern enterprise.  These companies clearly have a stronger focus on security in their marketing material, but how effective are they in the real world for protecting sensitive documents?

This article will cover:

  1. What is secure cloud storage?
  2. Is cloud storage safe and secure?
  3. Are cloud watermarks an effective deterrent?
  4. Which cloud storage is most secure?
  5. Achieving secure encrypted file sharing
  6. The best cloud storage and security

   What is secure cloud storage?


Secure cloud storage is, at its core, very similar to any “regular” cloud storage.  You upload your files to somebody else’s server and share links via email with others who want to access them.  Some providers also allow you to collaborate on documents in real-time with others.  There’s no set standard or definition that differentiates “secure” cloud providers from regular ones.  There are, however, several features that companies using such a label tend to share.

   End-to-end encryption


Most secure cloud service providers use TLS and end-to-end encryption to protect files when they are in transit and at rest.  Data is encrypted on the sender’s device and is only ever decrypted on the recipient’s device – never in the cloud.   So files are encrypted while they’re being uploaded and while they are stored, but cloud providers such as Google and Dropbox, always have the ability to decrypt your files.

Some secure cloud storage providers take this further by enabling users to use their own encryption keys (which consists of a public key and private key pair) which they store locally on their device.  Files are encrypted using the public key and can only be decrypted with the private key (secret key).  This is referred to as “zero-knowledge storage”.  This is better for privacy and security than the type of encryption regular cloud providers tend to use, with the core idea being that the cloud provider is unable to access your sensitive files (since the cloud storage provider does not have the keys to decrypt your data) and nor are hackers that compromize the server where your files are stored.

   Access controls


The cloud provider gives their customers more options for controlling access to files, folders, and accounts.  Features such as multi-factor authentication (MFA) might require users to provide multiple forms of verification before they gain access.  Systems such as Role-based access control (RBAC) and Identity and Access Management (IAM) enable more streamlined control over which users can access which files.

   Logging and monitoring


Admins usually get more specific insights into how files are being used, such as who has accessed a file, when, and where from.  Most providers will alert them of unauthorized access and if a file is accessed from an unusual location, and some even allow admins to configure policies to determine when they should be notified (i.e. whenever a user shares a file with somebody outside of the organization).  However, if a file can be downloaded or printed to file, then untracked copies can be distributed unknowingly.

   Document controls


Document controls aren’t unique to “secure” cloud providers, but there’s usually more emphasis on them and often additional features.  Other than standard printing, editing, and download prevention, you’re more likely to see options such as expiry, password protection, dynamic watermarks, and open limits.

   Compliance and certifications


Organizations, particularly those that process customer information, have strict regulations they must comply with.  Almost all secure cloud providers are compliant with some standards, the most common ones being GDPR, ISO/IEC 27001, HIPAA, and SOC 2.  This is hopefully backed by third-party audits.

Certifications however are more of a marketing tool.  They do not guarantee that a system is secure or provides adequate data protection, just that it abides by certain cybersecurity policies and procedures.  Many companies that have these certifications have had a data breach regardless.

   Is Cloud storage safe and secure?


The features of secure cloud providers certainly improve security in some ways, but they’re not secure in every aspect.

If properly implemented, secure cloud providers can prevent:

  1. The interception of files by attackers while they are in transit to the providers servers or being downloaded.
  2. Documents from being extracted and used should their server be comprised.
  3. Their servers from being compromised in the first place.

  Cloud storage security issues


Cloud storage is generally better than standard messaging or cloud platforms at protecting your documents in transit and at rest.  But they’re still poor at preventing leaks and misuse, especially since login details can be shared.

They cannot:

  1. Stop users from making unauthorized copies of files.
  2. Prevent sharing with unauthorized users (leaks).
  3. Prevent unauthorized editing or printing.
  4. Provide accurate monitoring.
  5. Enable dynamic, irremovable watermarks.

Let’s take a look at why this is in detail.

   Why can’t secure cloud providers stop user leaks?


To prevent the copying and sharing of cloud documents, you need to stop downloading in any form.  This sounds simple on the surface, but means preventing:

  • Printing and scanning.
  • Printing to file drivers (print to PDF) if printing is allowed.
  • Screenshots.
  • Copy and paste.
  • Downloads.

All of this must be achieved with a very limited toolset, as to prevent malware, a browser must prevent websites from directly controlling a user’s system functions.  As a result, developers typically use HTML and CSS to hide certain buttons and features within their web applications. JavaScript, meanwhile, is utilized to interact with and restrict certain browser features.

The problem with using JavaScript controls is that they are primarily executed in the user’s browser rather than at the server level.  As such, they can be disabled or bypassed using the browser’s developer mode or specifically designed browser plugins.  You can see our how secure are Google Docs or Flipbook or PDF guides for examples of this.  HTML and CSS can also be edited in the browser, so users can enable buttons and features that they should not be able to access.

   Are cloud watermarks an effective deterrent?


Some providers implement dynamic watermarks try to make up for their inadequate document controls.  The idea is that a dynamic watermark that states the user’s name will deter them from sharing the document.

Alas, while the thought process here is correct, the implementation undermines it.  A watermark is only a useful deterrent if it fulfils the following criteria:

  1. It cannot be removed or modified.
  2. It clearly states the user’s name and can do so accurately.
  3. It can be applied automatically to prevent issues at scale.

As we discussed before, cloud providers such as secure data rooms, are unable to prevent users from making local copies of their PDF files, and consequently, they cannot stop them from editing them and removing the watermark.

   Which cloud storage is most secure?


Just about every provider on the market will say they have the “most secure cloud storage”, “the most secure file sharing solution”, “the best data security for sensitive information” or similar marketing nonsense.  The majority have broadly similar data security features to their competitors and the same inherent flaws.

The right choice for your organization typically depends on what you value most:

  • If you value company size and reputation:  Microsoft OneDrive, Google Drive, and Apple iCloud will probably make the most sense.
  • If you think open source is the key to good security:  Proton Drive is the obvious pick, as its source code is available on GitHub and has been independently audited.
  • If you just want AES-256 bit encryption:  Google Cloud, OneDrive, Proton, iCloud (opt-in), Box, and more all support it.
  • If integration with your existing security tools/processes is key:  Box or Dropbox are most likely to suit your needs.

Other important factors to consider and ease of use, the user experience, support of mobile devices, advanced features, known vulnerabilities, and protection of confidential and sensitive data.

Ultimately, though, as we have demonstrated, no cloud provider is truly secure.  Regardless of their feature set, the level of security they provide, or market cap, they do not stop leaks and misuse.

   Achieving secure encrypted file sharing


Thankfully, though secure cloud storage is more marketing than merit, it’s possible to achieve secure encrypted file sharing through other means.  You do need to be careful with the type of solution you choose, however, since general file encryption software tools fail to protect files and documents in use – once documents are decrypted users have full control over them.  This includes software solutions such as:

  • Microsoft Word password protection
  • WinZip encryption
  • PGP encryption
  • Windows Bitlocker encryption
  • AxCrypt
  • Cyrptomator

You should primarily be using these tools if you want to prevent files from being intercepted en route to their destination or when they are at rest.  One example is when you’re uploading files from an insecure network or to a file host that you do not trust to protect your data adequately.  If you want to protect documents during use, at rest, and in transit, you should look at a document DRM solution.

   How DRM enables secure file sharing


Digital Rights Management (DRM) solutions such as Locklizard take a very different approach to cloud document protection and secure file sharing.  Though they use AES encryption, a good document DRM solution will only decrypt files in memory, never expose decryption keys to the end user, and lock those decryption keys to an authorized device.  This approach is typically combined with a focus on protecting files not only at rest and in transit but also in use.  A good document DRM solution will use a desktop viewer app to exert more control over users’ systems, preventing saving, printing, copying, sharing, and screenshots, and enforcing expiration dates regardlesss of offline use.

Overall, a document DRM solution is not as convenient for secure file sharing as uploading a file to a cloud provider and praying.  What they do offer, if implemented correctly, is protection for a file’s entire lifecycle and across all of its use cases.

   The best cloud storage security


Locklizard Safeguard is a PDF DRM solution that is purpose-built to protect documents regardless of where they are stored and whether they are being shared securely within an organization or with a third party.  Protecting a PDF with Locklizard before uploading it to a cloud service ensures that it cannot be accessed if servers/accounts are compromized or an authorized user shares it with an unauthorized one.  Users require a valid license installed on their PC to decrypt and view files, and this license file is single-use by default.  As Locklizard also stops saving, editing, and copy-pasting and can optionally prevent screenshots and printing, there is no good route for users to share document content with others.

Safeguard provides additional controls to help publishers and businesses stop leaks, enforce compliance, and protect against IP theft.  It allows companies to:

  • Stop online and offline PDF scraping.
  • Restrict access to specific users or user groups.
  • Lock use to authorized devices.
  • Expire PDF documents based on date, days since first open, number of opens, or number of prints (note: limited opens and prints are not available offline).
  • Manually revoke access regardless of where the document is located.
  • Disable printing or restrict it to black and black-and-white or greyscale copies.
  • Add dynamic, irremovable watermarks that can include usernames, date/time, company, publisher, and more.
  • Track who has opened a document, when, and where from.
  • Limit access to approved IP addresses and locations.

You can see if Locklizard Safeguard provides the best protection of your business documents by taking a 15-day free trial of our DRM software.

   FAQs

Is it safe to store documents in the cloud?

The short answer is that it depends.  It depends on your provider, how secure their servers are, what security features they have, how their encryption is implemented.  It also depends on you: how well you have secured your account, whether you have taken additional steps to secure your data, and whether your PC is compromised by malware or used in a public place.  Ultimately, you have to decide what “safe” means to you.  If it means stopping leaks and document misuse, then no – cloud storage is not safe.  If you consider your files safe if they are protected from natural disasters, then cloud storage may work for you.

Where is the safest place to store files?

On a local PC at a physically secure location that is disconnected from the internet, preferably in an area with few natural disasters.  This is not feasible or proportionate for most people, so an encrypted file on a stationary PC is more common.

What is the most privacy-conscious cloud storage?

It would be impossible to single out one provider.  In general, cloud storage providers that use zero-knowledge encryption are the most privacy-conscious.  Sync and pCloud are two services that have zero knowledge and are particularly privacy-minded.  But in any case, you must place a high degree of trust in your provider and that they do not have any security issues, backdoors, etc.

How can I improve the security of my cloud files?

By encrypting them yourself before you upload them.  This ensures you aren’t reliant on your cloud provider to properly store your encryption keys and account.  If you want to share files securely with others, or are looking to sell a PDF document online securely, then preferably protect them with DRM software so you can control their use.

Is Adobe document cloud secure?

No.  As we have covered how secure Adobe Document Cloud is, it has several issues, including the use of PDF password protection for downloaded files.

Does Google Drive provide encryption for shared files?

Regular and shared files are encrypted at rest and in transit on the server side.  They aren’t protected if someone accesses their copies on your local PC or logs into your account.

Does Lockizard secure files other than PDF?

No.  We only protect PDF files.

How does Locklizard secure file sharing work?
  1. The contents of your files are encrypted using the AES (Advanced Encryption Standard) algorithm and DRM controls are applied.  File encryption is done on your desktop using a Writer app.
  2. You give users permission to view protected files via the Safeguard Admin System (web interface).
  3. Users are sent an email with a license file to authorize their device and a link to download a viewer app.  They can install the viewer app on different devices – Windows, Mac, Android and iOS are supported.
  4. You distribute your protected files just like any other file – via email attachments, upload it to public or private clouds (useful for large files), use SharePoint, etc.
Can users view Locklizard protected documents in the browser?

Yes, with the Safeguard Web Viewer.  Protected PDF files can be published to the web and viewed in the user’s browser for a simple secure file sharing solution.

Tags: cloud document storage, cloud documents, cloud encryption, cloud security, cloud storage security, encrypted file sharing, secure cloud, secure document cloud, secure encrypted file sharing, secure file sharing, secure files, sensitive documents, senstive files
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Data loss prevention (DLP) vs DRM Link to: Data loss prevention (DLP) vs DRM Data loss prevention (DLP) vs DRMLink to: How to sell study notes online & prevent piracy Link to: How to sell study notes online & prevent piracy How to sell study notes online & prevent piracy
Scroll to top Scroll to top Scroll to top