24/7/2014

Computing Reviews, the leading online review service for computing literature.

Search Cloud storage forensics Quick D., Martini B., C hoo R., Syngress Publishing, Amsterdam, the Netherlands, 2013. 208 pp. Type: Book (978-0-124199-70-5) Date Reviewed: Jul 21 2014

Also Reviewed by

In recent years, there has been rapid growth in the take up of cloud services, from simple personal use of cloud storage to significant cloud service uptake by large organizations. Like everyone else, criminals also recognize the potential benefits of cloud computing. If used for illegal activities, cloud computing introduces complications for subsequent investigations by law enforcement. How, for example, do law enforcement agencies gather and preserve evidence that may be spread across data centers in other countries outside of their jurisdiction? The authors discuss the challenges that the use of cloud computing presents for investigators, and propose a framework to support forensic investigations that involve cloud storage. C hapter 1 gives a brief introduction to cloud computing and explains the complications that cloud use by criminals present for law enforcement. In chapter 2, the authors outline their proposed framework for dealing with these issues. A framework of processes is described for identifying, collecting, and preserving evidence from cloud storage in a manner suitable for use in forensic investigations.

C loud computing (C .2.4 ... ) Security and Protection (K.6.5 )

C hapters 3 through 6 present four case studies that use this proposed framework to examine each of four cloud storage services in detail. Microsoft SkyDrive, Dropbox, Google Drive, and ownC loud (an open-source cloud offering) all go under the microscope. Each of these chapters details the remnants that are left on computers to indicate that cloud components have been used, helps to identify which cloud services have been involved, and details the steps that can be taken to preserve and secure evidence in a timely fashion. The processes that can be employed to identify, collect, and preserve data located on cloud storage are discussed in more detail in chapter 7. Techniques for the analysis of cloud-based data are also briefly discussed, covering topics such as the interpretation of dates and times associated with data fragments, files, and logs. C hapter 8 provides a brief summary of the authors’ work and future research goals. Each chapter concludes with a summary and list of references. There is a detailed table of contents, a glossary of technical terms, and a thorough index. Those pressed for time could simply read chapters 1 and 8 to gain an overall understanding of the issues. There are several other books that deal with cloud forensics, but in this case, the authors focus on cloud storage. They propose practical processes for gathering evidence from cloud storage and validate their framework by employing it in several case studies. This is a good, concise work on a subject of growing importance.

Reviewer: David B. Henderson

Would you recommend this review?

Review #: C R142530

yes

no

Other reviews under "Cloud computing":

Date

C loud storage forensics Quick D., Martini B., C hoo R., Syngress Publishing, Amsterdam, the Netherlands, 2013. 208 pp. Type: Book (978-0-124199-70-5), Reviews: (2 of 2)

Jul 23 2014

Firewall placement in cloud data centers Lee S., Purohit M., Saha B. SOC C 2013 (Proceedings of the 4th Annual Symposium on C loud C omputing, Santa C lara, C A, Oct 1-3, 2013) 1-2, 2013. Type: Proceedings

Jul 21 2014

http://www.computingreviews.com/review/Review_review.cfm?review_id=142530&listname=search

1/2

24/7/2014

Computing Reviews, the leading online review service for computing literature.

A tensor-based distributed discovery of missing association rules on the cloud Elayyadi I., Benbernou S., Ouziri M., Younas M. Future Generation C omputer Systems 354956, 2014. Type: Article

May 19 2014

more... E-Mail This

Select Language

Printer-Friendly

Pow ered by

Translate

Reproduction in whole or in part without permission is prohibited. C opyright © 2000-2014 ThinkLoud, Inc. Terms of Use | Privacy Policy

http://www.computingreviews.com/review/Review_review.cfm?review_id=142530&listname=search

2/2

2014 (Computing Reviews) Book review - Cloud storage forensics ...

2014 (Computing Reviews) Book review - Cloud storage forensics [David B. Henderson].pdf. 2014 (Computing Reviews) Book review - Cloud storage forensics ...

218KB Sizes 1 Downloads 203 Views

Recommend Documents

Book review - Cloud storage forensics [ Mariam Kiran].pdf
Discussing with appropriate use cases, the authors also analyze some open-source ... The book gives great research findings on file contents, software and ...

A Secured Cost-effective Multi-Cloud Storage in Cloud Computing ...
service business model known as cloud computing. Cloud data storage redefines the security issues targeted on customer's outsourced data (data that is not ...

digital-forensics-for-network-internet-and-cloud-computing-a-forensic ...
... Infosecurity. Page 3 of 339. digital-forensics-for-network-internet-and-cloud-comp ... e-for-moving-targets-and-data.9781597495370.52476.pdf.

Enabling Data Storage Security in Cloud Computing for ... - wseas.us
important aspect of quality of service, Cloud. Computing inevitably poses ... also proposed distributed protocols [8]-[10] for ensuring storage .... Best practices for managing trust in private clouds ... information they're hosting on behalf of thei

storage as a service in cloud computing pdf
storage as a service in cloud computing pdf. storage as a service in cloud computing pdf. Open. Extract. Open with. Sign In. Main menu.

Enabling Data Storage Security in Cloud Computing for ... - wseas.us
Cloud computing provides unlimited infrastructure to store and ... service, paying instead for what they use. ... Due to this redundancy the data can be easily modified by unauthorized users which .... for application purposes, the user interacts.

Data Storage Security Model for Cloud Computing
CDO's signature for later verification. SearchWord .... cryptographic primitives such as digital signature which can be used to authenticate the CDO/CDU by CSP.

Google Cloud Storage Cloud Platform
Store application data Google Cloud Storage provides fast access to application data, such as images for a photo editing app. • Share data with colleagues and ...

the cloud computing book pdf
Loading… Page 1. Whoops! There was a problem loading more pages. the cloud computing book pdf. the cloud computing book pdf. Open. Extract. Open with.

Cloud Computing Jan 2016 (2014 Scheme).pdf
Try one of the apps below to open or edit this item. Cloud Computing Jan 2016 (2014 Scheme).pdf. Cloud Computing Jan 2016 (2014 Scheme).pdf. Open.

Cloud Computing Jan 2016 (2014 Scheme).pdf
Explain the case study of the Grep The Web application. a. Briefly explain architectural styles used in cloud applications. b. Differentiate between various types of ...

Cloud Computing Jan 2016 (2014 Scheme).pdf
With a block diagram, explain AWS management console offered by Amazon. (12 Mar*s) ... cloud? (tS Marks). b. Explain the security risks faced by cloud users.

Cloud computing - SeniorNet Wellington
Google Search. •. Google 'Cloud' listings showing 'most popular' blog links. •. FeedBurner which provides free email updates. •. Publications o Class Application Form 2010 o Events Diary o Information Booklet o Manuals Available o Newsletters o

Cloud Computing
called cloud computing, and it could change the entire computer industry. .... master schedules backup execution of the remaining in-progress tasks. Whenever the task is .... You wouldn't need a large hard drive because you'd store all your ...

Cloud Computing
There are three service models of cloud computing namely Infrastructure as a .... applications too, such as Google App Engine in combination with Google Docs.

CLOUD STORAGE FORENSICS.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. CLOUD ...

Cloud Computing
[10]. VMware finds cloud computing as, “is best under- stood from the perspective of the consumer .... cations and other items among user's devices, like laptop,.