TY - BOOK AU - Quick,Darren AU - Martini,Ben AU - Choo,Kim-Kwang Raymond AU - Shavers,Brett TI - Cloud storage forensics SN - 0124199917 AV - HV8079.C65 Q53 2014 U1 - 363.250285363.25028546782 PY - 2014///] CY - Amsterdam PB - Elsevier KW - Computer crimes KW - Investigation KW - Forensic sciences KW - Data processing KW - Cloud computing KW - Information storage and retrieval systems KW - Criminalit�e informatique KW - Enqu�etes KW - Criminalistique KW - Informatique KW - Infonuagique KW - Syst�emes d'information KW - fast N1 - Description based upon print version of record; Includes bibliographical references and index; Introduction -- Cloud storage forensic framework -- Microsoft Skydrive cloud storage forensic analysis -- Dropbox analysis : data remnants on user machines -- Google drive : forensic analysis of cloud storage data remnants -- Open source cloud storage forensics : owncloud as a case study -- Forensic collection of cloud storage data : does the act of collection result in changes to the data or its metadata? -- Conclusion N2 - To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing. Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors sh ER -