“…There is, however, no perfect security and when a security incident involving cloud services occurs, digital investigation will require the identification, preservation and analysis of evidential data (Ab Rahman and Choo 2015;Quick, Martini and Choo 2013). Therefore, it is unsurprising that cloud security has seen significant research interest recently (Al Said and Rana 2014;Choo, Domingo-Ferrer and Zhang 2016;Li et al 2015;Rahulamathavan et al 2014). …”