Cloud computing service is still an evolving computing feature over the Internet due to the essential characteristics of the cloud. Cybercriminals effortlessly intercept and access the user’s personal information over the Internet. Even though the forensic investigation assists to find the suspect, there is also the possibility of invariably violating the legitimate users’ data privacy while suspecting the related information. Hence, it is essential to acquire the log files of a real suspect from the CSP with privacy preservation during the cloud forensics.