
Most encrypted cloud storage providers are lying to you by omission. "AES-256 encrypted" means nothing if they also hold your keys — which most do. This guide breaks down the real distinction: at-rest encryption vs zero-knowledge, which providers actually deliver on the promise, and what to look for before trusting a service with your files.
Surya Prakash
Author
TL;DR: Encrypted cloud storage stores your files on remote servers with the contents scrambled by AES-256 (or equivalent), so a stolen disk or leaked backup yields ciphertext, not your data. The important distinction is who holds the keys: at-rest encryption (Google Drive, Dropbox, OneDrive) — provider holds the keys, can read your files; end-to-end / zero-knowledge encryption (Proton Drive, Tresorit, Sync.com, Mega) — only you hold the keys, the provider literally cannot read your files. Pick zero-knowledge for regulated, sensitive, or long-term archival data; pick at-rest for collaboration-heavy work where preview / search / virus scan matter. This guide explains the difference, the realistic threat model for each, and how to pick.
I have been using cloud storage for over a decade — Dropbox since 2010, Google Drive since 2013, Tresorit since 2017, Proton Drive since the beta. And the single most common mistake I see, including from people who should know better, is treating "AES-256 encrypted" as a one-size-fits-all label that means your data is safe.
It's not that simple. Two services can both honestly claim "AES-256 encryption" and offer wildly different security guarantees. The cipher is the same; the key handling is different. And the key handling is where almost every real-world cloud-storage breach happens.
This guide walks through what encrypted cloud storage actually is, the two big architectures (at-rest vs end-to-end), what each protects against, what each does NOT protect against, and how to pick a provider in 2026.
Encrypted cloud storage is any cloud-based file storage service where your files are encrypted before being written to disk and decrypted when you (or an authorized party) access them. The encryption is almost always AES-256 — the symmetric cipher NIST standardized in 2001 and the NSA approved for top-secret data (NIST FIPS 197).
If a service says "AES-256 encryption" without telling you anything else, they're almost certainly describing encryption at rest — files are scrambled on the provider's disks but the provider holds the decryption keys. That's table stakes in 2026. What differentiates services is whether you also get end-to-end encryption (also called zero-knowledge encryption in this context).
I went deeper on the AES-256 cipher itself in AES-256 encryption explained — this article is about how providers use it. Two services can both honestly say "AES-256" while offering completely different security postures.
This is the only distinction that matters. Once you understand it, every "encrypted cloud storage" marketing page becomes readable.
The provider encrypts your files with AES-256 on their disks. The encryption keys are stored in the provider's key-management service. When you log in, the provider decrypts your files server-side and sends them to your device over TLS.
Who holds the keys: the provider. Who can read your files: the provider (and anyone who compromises the provider's account or key infrastructure). Examples: Google Drive, Dropbox, OneDrive, iCloud, Amazon S3 (default).
This architecture is fine for most non-sensitive files. The provider needs to read your files to do useful things: serve previews, run virus scanning, build search indexes, deduplicate identical blocks across users, recover your password if you forget it. All of those features require the provider to have key access.
Files are encrypted on your device before they ever leave it. The encryption key is derived from your password (or a passkey) using a slow KDF like Argon2 or PBKDF2 — and the key never leaves your machine. The provider stores ciphertext only. They can serve it back to you, but they cannot decrypt it.
Who holds the keys: you only (derived from your password). Who can read your files: you only. Examples: Tresorit, Proton Drive, Sync.com, Mega, Internxt, Cryptomator (overlay on Dropbox/Drive/OneDrive).
The tradeoff: features that require server-side reads break. No file preview generation (some E2EE services do client-side preview, which only works in their app). No server-side search of file contents. No web-based password recovery — if you lose your password, your files are gone. No deduplication.

Vague "AES-256 encryption" claims with no architecture diagram are mostly marketing.
Different architectures defend against different threats. Knowing which threat you care about is the only useful way to pick.
Pick by threat model and use case. There's no "best" — there's a best for your specific situation.
Use zero-knowledge / end-to-end encrypted storage:
Use end-to-end with a signed BAA / DPA:
At-rest encryption is usually correct here — you trade some security for features (real-time collaboration, preview, search):
A dedicated secure file-sharing service is usually better than cloud storage for one-way transfers:
I covered the transfer side in depth in 9 Best WeTransfer Alternatives and how to send large files securely.
| Provider | Free | Paid (entry) | Encryption | Zero-knowledge? | Best for |
|---|---|---|---|---|---|
| Google Drive | 15 GB | $1.99/mo (100 GB) | AES-256 at rest | No | Collaboration in Workspace |
| Dropbox | 2 GB | $9.99/mo (2 TB) | AES-256 at rest | No (consumer); customer keys on Enterprise | Design teams |
| OneDrive | 5 GB | $1.99/mo (100 GB) | AES-256 at rest | No (Personal Vault adds extra protection) | Microsoft 365 users |
| iCloud Drive | 5 GB | $0.99/mo (50 GB) | AES-256 at rest; E2EE optional via Advanced Data Protection | Optional (must enable ADP) | Apple users |
| Proton Drive | 5 GB | $4.99/mo (200 GB) | E2EE / zero-knowledge | Yes | Privacy-first general use |
| Tresorit | none | $11.99/mo (1 TB) | E2EE / zero-knowledge | Yes | Regulated / business |
| Sync.com | 5 GB | $8/mo (2 TB) | E2EE / zero-knowledge | Yes | Personal sensitive docs |
| Mega | 20 GB | €4.99/mo (400 GB) | E2EE / zero-knowledge | Yes | Large free quota |
| Uploadex (file transfer, not full storage) | 50 GB / 2 GB per file | $4.99/mo (Pro) | AES-256-GCM at rest, TLS 1.3 | No (server-side); password-protected share links | Sending large files |
Anyone can put a lock icon on a homepage. Three things to check on any encrypted cloud storage provider:
If you can't find the mode, the key management story, and at least one audit framework on a provider's security page, walk away.
Tresorit, Proton Drive, and Sync.com are the three most-recommended zero-knowledge encrypted cloud storage providers for 2026 — meaning the provider cannot read your files even if compelled to. For Apple users, iCloud Advanced Data Protection (enabled manually in Settings) is also zero-knowledge for most file types. For consumer Google Drive / Dropbox / OneDrive, the provider can read your files.
Yes — but at-rest, not end-to-end. Google Drive uses AES-256 encryption at rest and TLS in transit. Google holds the encryption keys, which means Google can technically read your files (and is legally compelled to in response to valid law-enforcement requests). For zero-knowledge encryption on top of Google Drive, use Cryptomator as an overlay or migrate to Proton Drive / Tresorit.
At rest: the provider encrypts your files on disk but holds the decryption keys themselves. They can read your files if needed. End-to-end (zero-knowledge): files are encrypted on your device before upload using keys derived from your password — the provider never has the keys and cannot read your files. End-to-end is stronger; at-rest is more feature-flexible.
Partially. By default, iCloud uses at-rest encryption with Apple holding the keys. Apple's Advanced Data Protection feature (introduced 2022, available globally as of 2024) extends end-to-end encryption to most iCloud data including iCloud Drive, Photos, Notes, and Backup — but you must manually enable it in Settings → Apple ID → iCloud → Advanced Data Protection. Without ADP, iCloud is at-rest only.
If the encryption is at rest only: yes, the provider holds the keys and can decrypt your files. If the encryption is end-to-end / zero-knowledge: no, the provider holds only ciphertext and cannot decrypt. Check the provider's security page for "zero-knowledge" or "the provider cannot read your files" language — if it's absent, assume at-rest only.
It can be, but encryption alone is not enough. HIPAA compliance requires a signed Business Associate Agreement (BAA) with the provider, plus appropriate access controls, audit logs, and breach-response procedures. Encrypted cloud storage providers that offer HIPAA-eligible BAAs include Tresorit, Box, Google Workspace (with BAA), Microsoft 365 (with BAA), and AWS S3. Consumer Dropbox, consumer Google Drive, and Proton Drive (personal) do not sign BAAs.
Your files are mathematically unrecoverable. There is no "forgot password" reset because the provider does not have your encryption key — only you do, and it's derived from your password. This is the strongest form of data ownership but also the strongest form of self-foot-gun. Always store the zero-knowledge password in a password manager (separate from the account it locks) and consider exporting a recovery key if the provider offers one.
Encrypted cloud storage is a spectrum, not a binary. At-rest encryption (Google Drive, Dropbox, OneDrive) protects against the most common threats — stolen hardware, leaked backups, careless permissions — but the provider can read your files. End-to-end / zero-knowledge (Proton Drive, Tresorit, Sync.com) extends that to "even the provider cannot read your files" — at the cost of preview, search, and password recovery.
The right answer depends on your data and your threat model:
For the encryption fundamentals — what AES-256 actually protects against, how key management works, why the mode of operation matters — see my deep-dive on AES-256 encryption. For the file-transfer side, 9 Best WeTransfer Alternatives and how to send large files securely walk through the everyday workflow.
Sources:
- NIST FIPS 197 — Advanced Encryption Standard
- Apple Advanced Data Protection for iCloud
- Proton Drive security architecture
- Tresorit security whitepaper
Author
Surya Prakash is the founder of Uploadex. He writes about secure file sharing, large file workflows, and the engineering decisions behind running a fast, global delivery network. Previously built tools for creators across India, the US, and Southeast Asia.