mazon S3, etc.
Cloud storage services have completely transformed the way we interact with our work, both at home and at the workplace. This is because of the flexibility or conveniences cloud storage services provides. We can store our data on a cloud storage service and the data will be synchronised across multiple devices and platforms (i.e. PCs, Mobile, Windows, MacOS etc.). This ensures that data can be accessed and shared wherever you are in the world regardless of the device or platform you use, providing you have a reliable internet connection. However, as the world is becoming more mobile and cloud driven this has only increased the scope of cyber-criminal activities. Cyber criminals target cloud storage services to obtain what they regard as valuable information. For instance, this may include user login credentials (i.e. usernames/passwords), credit card numbers or personal files/documents (i.e. pictures). This has motivated Digital forensic examiners and researchers to conduct investigations on popular cloud storage platforms (i.e. Google Drive, OneDrive, S3, etc.) to see what digital artifacts can be recovered from them, if a cyber-attack was to occur. In this project, a cloud storage service of your choice will be investigated. Data remnants (or artifacts) can be collected and examined after conducting the following tasks; Installation of cloud client software , monitoring file system changes in the cloud application directory, browser activity(i.e. Login/sign-out) ,capturing the machine / browser memory dump, and uninstallation of the client software. This study will provide digital forensic examiners and researchers with the knowledge and tools to conduct sound and effective cloud storage forensic investigations.