Review Article
A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing
Table 3
Issues in current network forensics and MCC network forensics.
| Issues | Current network forensics | MCC network forensics |
| Data acquisition [79] | No | Yes | Access to artifacts [79, 80] | No | Yes | Bandwidth utilization [73] | No | Yes | Chain of custody [14, 74, 75] | No | Yes | Data Integrity [74] | No | Yes | Privacy [81, 82] | No | Yes | Real time Analysis [74] | No | Yes | Volatile data [83, 84] | No | Yes | Forensics tools [14, 75, 79] | No | Yes |
|
|