International Journal of Soft Computing and Software Engineering (JSCSE)
In this paper, the authors presented the new model and analyzed its application in for cloud forensics. There are some significant features already emerged during shown in the investigation process. However, D due to their complexity in the subject area, further a full analytical comparison with to existing analytical work is still in progressing and will be reported next soon. Finally, their new proposed MITM attack detection tool has been represented. Nevertheless, there are still many technical challenges such as the prevention of MITM in security field need to be sorted; their further work is in progress.