**3. Design of Secured Cloud Storage Mechanism**

The architecture of a secure cloud TRA is explained in **Figure 2**. Movable equipment and the remote systems are connected to the mobile machinist and wireless access point. These are connected to either an entry point or satellite via the base station. The mobile user's request and response are delivered to cloud banking through the presently available SSL VPN with an additional layer of protection from ECC. **Figure 2** Architecture of secure TRA [1].

Central processors that are linked to the mobile network receive the mobile users' requests as well as send details such as user IDs and user location to banking database storage. The projected security theory enhances the level of protection that currently supports mobile banking and facilitates the realization of P2P networks.

The following are the objectives of the proposed framework:

• Assuring information security and privacy protection of entire mobile/remote user's activities in the cloud. ECC-based SSL VPN.

**Figure 2.** *Architecture of secure TRA.*

• ECC encryption helps to provide less bandwidth, computing power, and memory for creating customized security for data packets.
