With the advent of internet and technology, cloud computing is globally acceptable for each and every service in the industry. With this huge escalation in implementation, the cloud environment is exposed to an attacker with a large attack surface. So there is an emergent requirement to facilitate forensic investigators to collect, analyze and produce evidence from the cloud environment, which can be used in court cases. Logs maintain useful data regarding activities or events of system, network. This information is very expensive to prove attacks in court cases. So, protection is required and also maintained integrity, confidentially, security of logs. To collect and analyze log messages from different sources like a router, switch, virtual machine, firewalls, operating system. These logs are categorized with a regular expression and to store in particular encrypted format. To overcome threads cost and improve security, an organization should be moved towards the cloud. Using cloud-based log forensics, investigator easily gathers the log and conduct investigation. In cloud computing environment they also used in forensics to prove attacks and increase confidentiality.