**4. Performance analysis for the cloud-based TRA**

Cloud computing is characterized by accessibility at whichever instance is desired, with the reason for the reduction in costs and increase in operational efficiency. The ECC VPN that connects to cloud computing should possess the above-mentioned characteristics. The network atmosphere should be trouble-free to set up, modernize, or erase connections based on the demand for cloud computing, to ease the complex system management.

The below **Figure 6** shows the most vulnerable cyber-attack on the bank in the cloud environment; in this measurement, a high percentage of cybercriminals risk occurs in web applications and web services in the cloud environment. Many banks have identified and reported 89% of breaches in the last few years. Many a time, SQL injection and malware have accessed sensitive information in Cloud storage mechanisms like DB, web applications, and web services. It is hard to find web application attacks because banks have millions of users accessing their sites at the same point in time. So, spotting cybercriminals is a difficult task. The second highest-rated risk is the DoS attack; it completely 58 hacks down a system, and shuts down a machine/ network, making it inaccessible to its intended users. The rest of the other attacks is very minimal to the overall bank attacks in the cloud enlivenment.

In **Table 1**, most of the efforts in the below-mentioned checklist talk about the number of vulnerabilities and threats focused on Cloud Computing. It describes the analysis report that is related to the analysis, and test used in cloud environments, and it specifies that the cloud service representations are open to these vulnerabilities and threats. More prominence on threats has been applied that are allied with statistics being stocked up and practiced remotely, sharing resources, and the usage of virtualization [3, 4].

This section presents the result and performance analysis for the proposed secure cloud storage mechanism for TRA. The design has experimented with java coding and an inbuilt ECC algorithm, which is deployed in a cloud environment. SOAP UI tool has been applied for performance analysis; it is deployed into the cloud web

**Figure 6.** *Vulnerable analysis report to cyber-attack for the bank.*

