Figure 1 Literature of digital forensic investigation process (see online version for colours) Grobauer et al. (2011) investigate the vulnerabilities that the cloud network possesses. The three areas of innovation, cloud, and security controls are where and e-system categorises the most critical risks as existing. With an emphasis on the SaaS model, Subashini and Kavitha (2011) look at the security concerns connected to various cloud service delivery methods. Teing et al. (2018) had success using the user endpoint system to recover crucial forensic evidence pertaining to the CloudMe storage service. The authors collected a wide range of information from a personal desktop PC, Ubuntu, or macOS§, such as the cache database, which housed the audience and synchronised data folder, the operating system registry, log files, software directories, and web objects, visited URL and folder information, and metadata in the machine’s physical memory. The authors discovered user IDs, details about files and folders (including their sizes, contents, and metadata), Web cache information, operating system, and a download directory on Android and iOS mobile devices. Hong et al. (2013) conducted a study of law enforcement officers who were involved in the on-site search and seizure of digital evidence and proposed an unique triage model that matches to the needs of selection and seizure of electronic evidence. This methodology was created to address the demands of The most well-known challenges with cloud and edge computer in the field of computer investigations are covered during this review process. The evaluation is crucial in a number of crucial ways since it clarifies the shortcomings and restrictions of the several ideas that have been put forth. There are still certain research gaps that need to be filled in relation to other concepts for further investigation and application. The stages that are used the most frequently in a digital theoretical model have been chosen for this study, claim the authors of Chen et al. (2019). Chen et al. (2019) utilised this model. Figure 1 shows information from Casey (2011).