Basically cloud computing security is essential nowadays, it has arisen as a technology to allow users as well as clients to access communications, data storage, software as well as exploitation Environment according to pay-as-what-use structure. Conventional digital forensic can’t be investigated due to some technical challenges like environmental as well as technical. The vibrant nature of cloud computing provides massive opportunities to identify malicious request using various security algorithms in cloud environment. Proposed research work identifies the current issues and provides solutions to reduce some challenges in the cloud environment. In this paper system proposed forensic investigation of cloud security for trusted and untrusted environments. System illustrated the various machine learning algorithms for eliminate the malicious request, and investigate the malicious user also. Proposed method generate the user log base snapshot during the active session and manual investigator can verify all logs and identify the malicious user. We offer a skilled technique for forensic examination in the cloud with the help of virtual machine (VM) and generate snapshots. The experimental analysis shows illustration of proposed security of system.