Freshly Printed - allow 10 days lead
Cloud Storage Forensics
The most comprehensive coverage of cloud storage forensics available for researchers and field practitioners.
Darren Quick (Author), Ben Martini (Author), Raymond Choo (Author)
9780124199705, Elsevier Science
Paperback, published 15 January 2014
208 pages, 30 illustrations
23.5 x 19 x 1.4 cm, 0.43 kg
"The authors discuss the challenges that the use of cloud computing presents for investigators, and propose a framework to support forensic investigations that involve cloud storage…This is a good, concise work on a subject of growing importance." --Computing Reviews,July 21 2014 "...excellently written and categorized for each facet of forensics and security issues...Rarely is a book a valuable addition to your collection from both research and industrial perspectives." --Computing Reviews,July 23 2014
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing. Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you how their framework can be used to undertake research into the data remnants on both cloud storage servers and client devices when a user undertakes a variety of methods to store, upload, and access data in the cloud. By determining the data remnants on client devices, you gain a better understanding of the types of terrestrial artifacts that are likely to remain at the Identification stage of an investigation. Once it is determined that a cloud storage service account has potential evidence of relevance to an investigation, you can communicate this to legal liaison points within service providers to enable them to respond and secure evidence in a timely manner.
Subject Areas: Computer security [UR]