Cloud Storage Forensics and over 2 million other books are available for Amazon Kindle . Learn more

Sign in to turn on 1-Click ordering.
More Buying Choices
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Image not available

Start reading Cloud Storage Forensics on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Cloud Storage Forensics [Paperback]

Darren Quick , Ben Martini , Raymond Choo
5.0 out of 5 stars  See all reviews (1 customer review)
RRP: 42.99
Price: 41.95 & FREE Delivery in the UK. Details
You Save: 1.04 (2%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 3 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Want it Saturday, 23 Aug.? Choose Express delivery at checkout. Details


Amazon Price New from Used from
Kindle Edition 39.85  
Paperback 41.95  

Book Description

15 Jan 2014

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing.

Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you how their framework can be used to undertake research into the data remnants on both cloud storage servers and client devices when a user undertakes a variety of methods to store, upload, and access data in the cloud. By determining the data remnants on client devices, you gain a better understanding of the types of terrestrial artifacts that are likely to remain at the Identification stage of an investigation. Once it is determined that a cloud storage service account has potential evidence of relevance to an investigation, you can communicate this to legal liaison points within service providers to enable them to respond and secure evidence in a timely manner.

  • Learn to use the methodology and tools from the first evidenced-based cloud forensic framework
  • Case studies provide detailed tools for analysis of cloud storage devices using popular cloud storage services
  • Includes coverage of the legal implications of cloud storage forensic investigations
  • Discussion of the future evolution of cloud storage and its impact on digital forensics

Product details

  • Paperback: 208 pages
  • Publisher: Syngress (15 Jan 2014)
  • Language: English
  • ISBN-10: 0124199704
  • ISBN-13: 978-0124199705
  • Product Dimensions: 23.6 x 19.3 x 1 cm
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: 1,364,701 in Books (See Top 100 in Books)
  • See Complete Table of Contents

More About the Author

Discover books, learn about writers, and more.

Product Description

About the Author

Darren Quick is an Electronic Evidence Specialist with the South Australia Police, and a PhD Scholar at the Information Assurance Research Group, Advanced Computing Research Centre at the University of South Australia. He has undertaken over 550 forensic investigations involving thousands of digital evidence items including; computers, hard drives, mobile telephones, servers, and portable storage devices. He holds a Master of Science degree in Cyber Security and Forensic Computing, and has undertaken formal training in a range of forensic software and analysis techniques. In 2012 Darren was awarded membership of the Golden Key International Honour Society. Darren has co-authored a number of publications in relation to digital forensic analysis and cloud storage, and is a member of the Board of Referees for Digital Investigation - The International Journal of Digital Forensics & Incident Response. He still has his first computer, a VIC20 in the original box.

Ben Martini is the Digital Forensics Research Administrator, a Course Coordinator and a PhD Scholar at the Information Assurance Research Group, Advanced Computing Research Centre at the University of South Australia. His PhD research focus is in the field of Digital Forensics looking at the implications of Cloud Computing. He has a broad range of research interests in the Information Technology sector with a focus on computer security and digital forensics issues. Ben has worked actively in the South Australian IT industry in sectors including government departments, education and electronics across various organisations and continues to deliver occasional invited presentations to industry organisations in his area of expertise. He holds a Masters degree in Business Information Systems and a Bachelor degree in Information Technology (Networking and Security). He is supported by scholarships from both the University of South Australia and the Defence Systems Innovation Centre.

Dr Kim-Kwang Raymond Choo is a Fulbright Scholar and Senior Lecturer at the University of South Australia. He has (co)authored a number of publications in the areas of anti-money laundering, cyber and information security, and digital forensics including a book published in Springer's "Advances in Information Security” book series and six Australian Government Australian Institute of Criminology refereed monographs. He has been an invited speaker for a number of events (e.g. 2011 UNODC-ITU Asia-Pacific Regional Workshop on Fighting Cybercrime and 2011 KANZ Broadband Summit 2011), and delivered Keynote/Plenary Speeches at ECPAT Taiwan 2008 Conference on Criminal Problems and Intervention Strategy, 2010 International Conference on Applied Linguistics and 2011 Economic Crime Asia Conference, and Invited Lecture at the Bangladesh Institute of International and Strategic Studies. He was one of over 20 international (and one of two Australian) experts consulted by the research team preparing McAfee's commissioned report entitled "Virtual Criminology Report 2009: Virtually Here: The Age of Cyber Warfare”; and his opinions on cyber crime and cyber security are regularly published in the media. In 2009, he was named one of 10 Emerging Leaders in the Innovation category of The Weekend Australian Magazine / Microsoft's Next 100 series. He is also the recipient of several awards including the 2010 Australian Capital Territory (ACT) Pearcey Award for "Taking a risk and making a difference in the development of the Australian ICT industry”, 2008 Australia Day Achievement Medallion in recognition of my dedication and contribution to the Australian Institute of Criminology, and through it to the public service of the nation, British Computer Society's Wilkes Award for the best paper published in the 2007 volume of the Computer Journal, and the Best Student Paper Award by the 2005 Australasian Conference on Information Security and Privacy.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

4 star
3 star
2 star
1 star
5.0 out of 5 stars
5.0 out of 5 stars
Most Helpful Customer Reviews
Format:Paperback|Verified Purchase
If you are looking at increasing your knowledge of how Skydrive, GoogleDrive and Dropbox work and what digital artifacts are created as a result of their installation and used then this book is an essential reference. The book also provides a solid methodology which can be used or built upon if you are interested in researching Cloud Service Provider Clients (CSP). The book should be an essential read for any computer forensic examiner in the field. The research that the book is based upon concentrates on CSP clients in a Windows 7 environment but much of it remains relevant to anyone examining a Windows 8 installation that CSP client desktop programs that have been installed upon it.
Comment | 
Was this review helpful to you?
Most Helpful Customer Reviews on (beta) 5.0 out of 5 stars  1 review
5.0 out of 5 stars Well worth the read 20 Dec 2013
By Brett Shavers - Published on
I was humbled to be asked to tech edit this book, but that is not the reason I give it 5 stars. The reason I give it a great rating is because there is some really good information presented and documented by the authors. The book itself is attractive, as is what to expect from Syngress. The content goes well beyond the appearance. If, as a forensic examiner, you have not yet conducted an analysis of cloud storage, you either have overlooked it or will be facing it tomorrow (or this afternoon).

The details of the 'how to' is what I really enjoyed reading. Even more informative than the 'how to' is the extreme level of documentation of the authors' research. Given daily changes with technology, the authors' methods can be reproduced for examiners to replicate and validate their findings just by following the steps taken in the book. Each chapter is methodical in presentation and in each chapter, you will find information not found elsewhere.

Today's forensics books keep getting better and better. This one is no exception. I'd suggest buying it now to read before you have to buy it for your next analysis.
Was this review helpful?   Let us know
Search Customer Reviews
Only search this product's reviews

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category