Cover image for Cloud storage forensics
Title:
Cloud storage forensics
Personal Author:
Publication Information:
Amsterdam ; Boston : Elsevier, 2014
Physical Description:
xviii, 189 pages ; 24 cm.
ISBN:
9780124199705

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010329095 HV8079.C65 Q85 2014 Open Access Book Book
Searching...

On Order

Summary

Summary

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing.

Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you how their framework can be used to undertake research into the data remnants on both cloud storage servers and client devices when a user undertakes a variety of methods to store, upload, and access data in the cloud. By determining the data remnants on client devices, you gain a better understanding of the types of terrestrial artifacts that are likely to remain at the Identification stage of an investigation. Once it is determined that a cloud storage service account has potential evidence of relevance to an investigation, you can communicate this to legal liaison points within service providers to enable them to respond and secure evidence in a timely manner.


Author Notes

Darren Quick is an Electronic Evidence Specialist in the Electronic Crime Section of the South Australia Police, and a PhD Scholar at the University of South Australia.
Ben Martini is the Digital Forensics Research Administrator in the Information Assurance Research Group and PhD Scholar at the University of South Australia.
Kim-Kwang Raymond Choo is a Fulbright Scholar and Senior Lecturer at the University of South Australia. He currently serves as the Research Director at Cloud Security Alliance, Australia Chapter.


Table of Contents

Acknowledgmentsp. xiii
About the Authorsp. xv
Forewordsp. xvii
Chapter 1 Introductionp. 1
Introductionp. 1
Cybercrime and the cloudp. 3
Challenges faced by law enforcement and government agenciesp. 5
Summaryp. 7
Structure of book and contributions to knowledgep. 8
Referencesp. 9
Chapter 2 Cloud Storage Forensic Frameworkp. 13
Introductionp. 13
Cloud (storage) forensic frameworkp. 13
Commence (Scope)p. 15
Preparationp. 15
Evidence source identification and preservationp. 16
Collectionp. 17
Examination and analysisp. 18
Presentationp. 19
Completep. 19
Framework summaryp. 20
Referencesp. 20
Chapter 3 Microsoft SkyDrive Cloud Storage Forensic Analysisp. 23
Introductionp. 23
SkyDrive forensics: Windows 7 PCp. 24
Commence (Scope)p. 24
Preparationp. 25
Evidence source identification and preservationp. 26
Collectionp. 26
Examination and analysisp. 27
Presentationp. 47
Completep. 48
SkyDrive forensics: Apple iPhone 3Gp. 51
Commence (Scope)p. 52
Preparationp. 52
Evidence source identification and preservationp. 52
Collectionp. 52
Examination and analysisp. 53
Presentationp. 53
Completep. 55
Case studyp. 55
Step 1 Commence (Scope)p. 55
Step 2 Preparationp. 56
Step 3 Evidence source identification and preservationp. 56
Step 4 Collectionp. 56
Step 5 Examination and analysisp. 56
Step 6 Presentationp. 57
Step 7 Completep. 59
Conclusionp. 59
Referencesp. 60
Chapter 4 Dropbox Analysis: Data Remnants on User Machinesp. 63
Introductionp. 63
Dropbox forensics: Windows 7 PCp. 64
Commence (Scope)p. 65
Preparationp. 65
Evidence source identification and preservationp. 69
Collectionp. 69
Examination and analysisp. 70
Presentationp. 79
Completep. 83
Dropbox forensics: Apple iPhone 3Gp. 84
Commence (Scope)p. 84
Preparationp. 84
Evidence source identification and preservationp. 84
Collectionp. 84
Examination and analysisp. 85
Presentationp. 86
Completep. 88
Case studyp. 88
Step 1 Commence (Scope)p. 88
Step 2 Preparationp. 88
Step 3 Evidence source identification and preservationp. 89
Step 4 Collectionp. 89
Step 5 Examination and analysisp. 89
Step 6 Presentationp. 90
Step 7 Completep. 90
Conclusionp. 90
Referencesp. 92
Chapter 5 Google Drive: Forensic Analysis of Cloud Storage Data Remnantsp. 95
Introductionp. 95
Google drive forensics: Windows 7 PCp. 96
Commence (Scope)p. 96
Preparationp. 96
Evidence source identification and preservationp. 98
Collectionp. 98
Examination and analysisp. 98
Presentationp. 111
Completep. 115
Google drive forensics: Apple iPhone 3Gp. 115
Commence (Scope)p. 116
Preparationp. 116
Evidence source identification and preservationp. 116
Collectionp. 116
Examination and analysisp. 117
Presentationp. 117
Completep. 117
Google drive case studyp. 118
Step 1 Commence (Scope)p. 118
Step 2 Preparationp. 118
Step 3 Evidence source identification and preservationp. 119
Step 4 Collectionp. 120
Step 5 Examination and analysisp. 121
Step 6 Presentationp. 121
Step 7 Completep. 121
Conclusionp. 121
Summary of Microsoft SkyDrive, Dropbox, and Google Drive findingsp. 122
Referencesp. 123
Appendix Ap. 124
Chapter 6 Open Source Cloud Storage Forensics: ownCloud as a Case Studyp. 127
Introductionp. 127
Cloud forensics frameworkp. 129
Outlinep. 130
Experiment setupp. 130
ownCloud overviewp. 130
Environment configurationp. 131
Findingsp. 132
Client forensicsp. 132
Evidence source identification and preservation, and collectionp. 133
Examination and analysis of client devicesp. 134
Reporting and presentationp. 138
Server forensicsp. 138
Evidence source identification and preservationp. 139
Collectionp. 141
Server examination and analysisp. 143
Summary of findingsp. 147
Conclusionp. 148
Referencesp. 150
Chapter 7 Forensic Collection of Cloud Storage Data: Does the Act of Collection Result in Changes to the Data or its Metadata?p. 153
Introductionp. 153
Cloud storage providersp. 154
Dropboxp. 154
Google Drivep. 155
Microsoft SkyDrivep. 156
Data collection via Internet access to a user accountp. 156
Dropboxp. 159
Google Drivep. 162
Microsoft SkyDrivep. 164
Research findings: discussionp. 168
File contentsp. 168
Dates and timesp. 169
Client software dates and timesp. 169
Browser dates and timesp. 169
Verification of findingsp. 170
Summaryp. 171
Conclusionp. 172
Referencesp. 173
Chapter 8 Conclusion and Future Workp. 175
Research summaryp. 175
Future workp. 178
Glossaryp. 179
Indexp. 183