Nowadays, everyone has a mobile device on which they save a wealth of personal information. Information about people is a prime target for hackers looking to steal sensitive data. Small CPUs, short battery life, and insufficient storage space constrain mobile devices. However, thanks to cloud computing, customers can access an infinite computer power supply. With SMDs, mobile users gain access to the cloud services offered by an MCC service provider. These users are then charged only for the number of cloud resources consumed (pay-as-you-go). In distributed resource networks, mobile cloud computing (MCC) is quickly emerging as a top research area. Offloading mobile applications to the cloud is simple, and users can access them whenever and wherever they choose. Given how accessible mobile networks are, hackers often target them to steal credentials for use in other apps, both in and out of the cloud. A digital investigator's first order of business while looking into hacker assaults is determining the attack's first point of entry. Virtualization, data dispersion, multi-tenancy, interoperability, and mobility make it challenging to investigate MCC architecture. In this paper, we provide a high-level introduction to digital forensics, emphasizing the critical components of the former and the major forensic issues faced by digital investigators in the latter. This work aims to help researchers better grasp the difficulties of forensic research and refocus their efforts in productive directions. Insights into mobile are provided, as well as a discussion of the many difficulties encountered by the researchers.