Preprint
Review

Comprehensive Study of The Cloud Computing Service Providers

Altmetrics

Downloads

264

Views

113

Comments

0

This version is not peer-reviewed

Submitted:

02 March 2023

Posted:

06 March 2023

You are already at the latest version

Alerts
Abstract
Whether it’s cellphones, personal computers, or gaming consoles, technology is a part of everyone’s everyday lives, and storage is frequently a problem. One of the solutions we have for this difficulty is the on-demand accessibility of computer framework assets, which enables cloud storage and makes it accessible in any format and from any device. It is a major benefit of cloud computing. Amazon Web Administrations (or basically AWS) may be a secure cloud services stage advertising about everything businesses ought to construct advanced applications with adaptability, versatility, and unwavering quality. Another advantage is that it is significantly less expensive than purchasing items with comparable functionality, such as an SSD storage device. For many enterprises, it is also preferable to host their servers in the cloud using services like Google Cloud and Oracle Cloud. Our main topic of the paper is to compare three different major cloud computing services—AWS, Google, and Azure. Since there are different types of cloud computing services available, we would compare them to determine which is best for usage by individuals or organizations. We can also look at the services’ shared features and unique aspects that they provide to consumers.
Keywords: 
Subject: Computer Science and Mathematics  -   Information Systems

1. Introduction

This paper aims to provide a comparison of three cloud computing platforms: AWS, Google, and Azure. [1] To achieve this objective, this paper will provide a detailed overview of each mentioned platform. The adoption of cloud computing by a business provides them with an affordable choice. As a result of this decision, they benefit from improved efficiency, security, remote access, flexibility, scalability, mobility, and agility. Unlike in the case of investing in computer hardware, cloud computing allows businesses to use applications that improve their ability to process loads. This mechanism allows businesses to save on infrastructural, innovation, and technical costs by using cloud applications that allow them to meet their demands. Importantly, it becomes easy to use and access business information from anywhere because of the data security guarantee in cloud computing services. [2,3,4] As a new concept, cloud computing has revolutionized how businesses manage their information systems. For instance, through cloud storage, companies maintain their databases in secure locations, which eliminates the hustle of data security. Most importantly, the computing performance of cloud computing is high and can operate with limited hardware resources, for instance, in the case of a distributed system. In that light, the motivation of this study is to understand how cloud computing solves engineering concerns for businesses. Such include risk management, operational flexibility, and regular network upgrades.[5] In that case, the shift to cloud computing provides businesses with a virtual infrastructure, which demands low maintenance compared to traditional systems. More so, the failure of a component does not affect access to shared resources. Instead, operating on cloud clusters allows business to meet their on-demand computing needs. [6,7,8] In this paper, we will introduce a comprehensive analysis of three cloud computing service providers, AWS, Google, and Azure.

2. Models and Services

Cloud computing allows businesses to prioritize what matters using different operating models and on-demand services. In that case, to realize the benefits of this technology, enterprises must identify the models and services they need.[9,10,11]

2.1. Microsoft Azure Services

The Azure cloud stage is made up of more than 200 items and cloud administrations that can be utilized to create modern arrangements, address current issues, and predict long-term. Utilizing your favored apparatuses and systems, you’ll make, execute, and oversee apps over different clouds, on-premises, and at the edge. Azure is in charge of safeguarding the network, data center, and host infrastructure. While customers are in charge of safeguarding their data, endpoints, accounts, and access control.[12,13,14]

2.2. Microsoft Azure Models

The provision of services and applications on demand via the internet is known as cloud computing. Services are offered for servers, apps, data, and other resources. The user does not see the service’s specifics. [15,16,17,18] You can use the service with little management and instantly provision computing resources. Cloud computing is not the same as a data center that is accessible online. With the use of virtualization, affordable technology, and automated procedures, cloud computing offers users a self-service user experience that is akin to that of a public utility. There are there 3 cloud models in Microsoft Azure:
1)
public
2)
private
3)
hybrid cloud
By choosing one of them over the other, you can alter the pricing, upkeep needs, and security of the services you.

2.2.1. Public Cloud

The foremost prevalent strategy of conveying cloud computing is through open clouds. Anybody who needs to buy administrations has got to them through the common web. A third-party cloud benefit supplier claims and runs the servers and capacity that make up the cloud assets, which are at that point provided through the web. Free or on-demand administrations are accessible, permitting clients to pay as they were for the CPU time, capacity space, or transmission capacity they require. A prime outline of an open cloud is Microsoft Purplish blue. [19,20,21,22]

2.2.2. Private cloud

Computing resources utilized only by users from a single company or organization make up a private cloud. It may be physically situated at the on-site data center of your company, or it may be facilitated by a distinctive benefit supplier. Private clouds should not be mistaken for conventional on-premises data centers that have been given a new name. A private cloud offers similar advantages to a public cloud by utilizing infrastructure and services already present on-site. It makes use of an abstraction platform to offer comprehensive cloud environments like Azure Stack or cloud-like services like Kubernetes clusters. The company is in charge of selecting, setting up, and maintaining the hardware. The business’s owner and maintained network infrastructure, such as a private inside arrangement or a devoted fiber optic association between buildings, are typically used for communication between the systems. [23,24,25,26]

2.2.3. A hybrid cloud

combines the advantages of both public and private clouds. Organizations can smoothly extend their on-premises infrastructure to handle any overflow without providing third-party data centers access to all their data. Businesses benefit from the public cloud’s flexibility and processing power for routine and non-sensitive computing chores while retaining business-critical applications and data behind a company firewall.

2.3. AWS Services

Amazon Web Services (AWS) is the foremost total and widely used cloud stage in the world. AWS is made to empower providers, ISVs, and application suppliers to have your apps. To get to AWS’s application facilitating stage, utilize the AWS Administration Comfort or well-documented web administration APIs. [27,28,29,30]

2.3.1. Infrastructure as a Service (IaaS)

The basic components of cloud computing, too known as IaaS or IaaS, incorporate get to organizing capabilities, computers (virtual or on devoted equipment), and data capacity space. With the foremost adaptability and administration control over your IT assets, Foundation as a Benefit is most comparable to the current IT assets that numerous IT offices and designers are acclimated to nowadays.

2.3.2. Platforms as a service (PaaS)

Stages as a Benefit permit you to concentrate on the sending and organization of your applications by expelling the requirement for companies to oversee the fundamental foundation (regular equipment and working frameworks). As a result, you’ll be able to run your application more efficiently as you won’t have to bargain almost things like asset procurement, capacity arranging, computer program upkeep, fixing, or any other undifferentiated overwhelming lifting.

2.3.3. software as a service (SaaS)

With a computer program as a benefit, the benefits supplier gives you a wrapped-up item that’s worked and overseen for your sake. The lion’s share of the time when a program as a benefit is specified, end-user applications are implied. With a SaaS solution, you merely ought to consider how you may utilize that particular piece of a computer program; you are doing not have to consider how the benefit is overseen or how the basic framework is kept up. Web-based e-mail may be a normal case of a SaaS application since it permits you to send and get emails without having to oversee include upgrades or upkeep for the servers and working frameworks that the e-mail program is utilizing.

2.4. AWS Models

There are there 3 cloud models in AWS

2.4.1. Cloud

An entire cloud-based application is installed there, and the entire application functions there. In order to benefit from cloud computing, applications in the cloud have either been built there or have been moved there from another infrastructure. The architecture, design, and scaling requirements of core infrastructure can be abstracted from by using higher-level services, or by using low-level infrastructure components.

2.4.2. Hybrid

A hybrid deployment is a means to link current resources that are not in the cloud with existing infrastructure and applications. The most popular hybrid deployment strategy involves extending and growing an organization’s on-premises foundation into the cloud while interfacing cloud assets with inside frameworks. Visit our crossbreed site for extra details on how AWS can support your hybrid implementation.[31,32,33,34]

2.4.3. On-premises

The term "private cloud" is occasionally used to describe resource deployment using virtualization and resource management software on-premises. In spite of the fact that on-premises arrangement needs numerous of focal points of cloud computing, it is occasionally preferred because it can offer specialized resources. The majority of the time, this deployment methodology is the same as traditional IT infrastructure while attempting to maximize resource consumption by utilizing application management and virtualization technologies.

2.5. Google Cloud Models and Services

Google Cloud (too known as Google Cloud Stage or GCP) may be a supplier of computer assets for developing, conveying, and working applications on the Internet. In expansion to cloud administration, security, and engineering instruments, Google Cloud gives administrations for computing, capacity, organizing, enormous information, machine learning, and the Web of Things. Your choice of cloud computing service model will depend on how much control, adaptability, and management your company needs. There are three primary types of cloud computing service models:
  • Access to IT infrastructure services like computation, capacity, organizing, and virtualization is given through framework as a benefit (IaaS). It gives you the foremost control over your IT resources and is the foremost comparative to ordinary on-premises IT
  • All the computer hardware and software capital required for the creation of cloud applications are provided via the platform as a service (PaaS). With PaaS, businesses can completely concentrate on developing applications without having to worry about managing and maintaining the supporting infrastructure.
  • Software as a Service (SaaS) offers the whole application stack, from the supporting foundation to upkeep and overhauls for the app computer program, as a benefit. A SaaS arrangement is as often as possible an end-user application where the cloud benefit supplier oversees and keeps up both the foundation and the benefit.[35,36,37,38]

3. Load Balancing

The method of the similarly scattering stack (approaching arrange activity) among a collection of backend assets or servers is alluded to as stack adjusting. [39,40,41]

3.1. Azure Load Balancing

Layer 4 of the Open Frameworks Interconnection (OSI) show is where Purplish blue Stack Balancer capacities. It serves as the client’s sole point of contact. The stack balancer disperses inbound streams to backend pool occasions that arrive at the stack balancer’s front conclusion. These streams are decided by load-balancing rules and well-being tests. The occasions within the backend pool may well be Purplish blue Virtual Machines or occasions from a virtual machine scale set.
Types of load balancers are shown in Figure 1
  • Public load balancer: Connections for virtual machines within a virtual network can be made using a public load balancer. This feature is enabled by converting private IP addresses into public ones. The load balancer is then used to balance the traffic between your virtual machines and the internet.
  • Internal (or private) load balancer Private IPs are required at the front end when using an internal load balancer. These are then used inside a virtual network to carry out load-balancing operations. A load balancer can be accessed from a hybrid network
Importance of AZURE load balancing You can measure your apps and establish highly available services with Azure Load Balancer. Load balancers may hold both incoming and outgoing traffic. Load balancers provide low latency and high throughput for all TCP and UDP applications, and can scale up to millions of flows.

3.2. AWS Load Balancing

Versatile Stack Adjusting consequently equalizations your approaching activity over various targets in one or more Accessibility Zones, such as EC2 occasions, holders, and IP addresses. It checks the well-being of its enrolled targets and sends activity as it were to those that are in great condition. Flexible Stack Adjusting consequently alters your stack balancer capacity in reaction to varieties in approaching activity.
Advantages of a load balancer Workloads are conveyed among various computing assets, such as virtual servers, through a stack balancer. Employing a stack balancer progresses your apps’ accessibility and blame tolerance. As your needs alter, you’ll include and subtract computing assets from your stack balancer without hindering the overall stream of demands to your apps. You will characterize wellbeing checks, which screen the wellbeing of computing assets so that the load balancer as it were conveys demands to those that are in great well-being. You’ll too designate encryption and decoding to your stack balancer, permitting your computational assets to center on their essential tasks. Application Stack Balancers, Arrange Load Balancers, Door Stack Balancers, and Classic Stack Balancers are all upheld by Versatile Stack Adjusting. You will select the stack balancer that best meets your requirements.
Features of a load balancer
Security: You will construct and oversee security bunches related to Flexible Stack Adjusting when utilizing Amazon Virtual Private Cloud (VPC) to grant additional organizing and security choices for Application Stack Balancer and Classic Stack Balancer. Any of the Stack Balancers may be designed to be Web confronting, otherwise, you can establish a stack balancer without open IP addresses to operate as an inside (non-internet confronting) stack balancer.
High level of availability: Flexible Stack Balancers are broadly open. Approaching activity may be dispersed among your Amazon EC2 occurrences in a single or numerous Accessibility Zones. In reaction to approaching application activity, a Versatile Stack Balancer consequently alters its ask-preparing capability. Versatile Stack Balancer performs well-being checks on targets on a configurable cycle to ensure that they are accessible and sound.
High Throughput: Versatile Stack Balancer with Tall Throughput is expected to oversee developing activity and can stack adjust millions of demands per moment. It can too bargain with fluctuating activity designs.
Health checks: As it were solid targets, such as EC2 occasions, holders, IP addresses, microservices, Lambda capacities, and apparatuses, are directed by a Versatile Stack Balancer. You get superior perceivability into the well-being of your applications with Flexible Stack Adjusting in two ways: (1) well-being check upgrades that permit you to set particular blame codes. The well-being checks empower you to screen the well-being of each of your administrations behind the stack balancer; and (2) unused measurements that give activity understanding for each of the administrations working on an EC2 occasion.

3.3. Google Cloud Load Balancing

A load balancer shown in Figure 2 divides user traffic across numerous instances of your apps. Load balancing decreases the likelihood of performance difficulties in your applications by distributing the load. Cloud Stack Adjusting is based on the same innovation that bolsters Google’s frontend. It can handle 1 million or more demands per moment while keeping up reliable tall execution and moo inactivity. Cloud Stack Adjusting activity enters through 80+ partitioned around the world stack adjusting focuses, optimizing the remove traveled on Google’s quick private arrange spine. You’ll give substance as close to your clients as conceivable by utilizing Cloud Stack Adjusting.
The following load-balancing capabilities are available on Google Cloud:
A single anycast IP address. With Cloud Stack Adjusting, a single anycast IP address serves as the frontend for all of your backend occurrences in several nations over the world. It offers cross-region stack adjusting, as well as mechanized multi-region failover, which diverts activity to failover backends in the event that your essential backends fall flat. Cloud Stack Adjusting reacts right away to changes in clients, activity, organization, backend wellbeing, and other related circumstances.
Software-defined stack adjusting Cloud Stack Adjusting could be a totally conveyed, software-defined, overseen arrangement for all of your activity. Since it is neither an instance-based or device-based arrangement, you may not be bound into a physical stack-adjusting framework or endure the HA, scaling, and organization challenges related to instance-based stack balancers.
Smooth autoscaling. Cloud Stack Adjusting can grow as your clients and activity create, counting the capacity to handle gigantic, startling, and quick spikes by steering activity to other regions over the world that can handle it. Autoscaling does not require pre-warming: you’ll be able to go from to full activity in seconds.
Load adjusting on Layers 4 and 7. To coordinate activity based on information from organize and transport layer conventions such as TCP, UDP, ESP, GRE, ICMP, and ICMPv6, utilize Layer 4-based stack adjusting. Include ask-directing choices based on traits such as the HTTP header and the uniform asset distinguishing proof utilizing Layer 7 stack adjusting.
Balancing of outside and inside loads. Whereas your clients get to your apps through the web, you’ll be able to utilize outside stack adjusting, and when your clients are inside Google Cloud, you’ll be able to utilize inside stack adjusting. - Load adjusting at the worldwide and territorial levels. Disseminate your load-balanced assets over different locales in arrange-to-end associations close to your clients and fulfill your tall accessibility needs.
Support for progressed highlights. The IPv6 worldwide stack adjusting, source-IP-based activity directing, WebSockets, user-defined ask headers, and convention sending for private VIPs are highlights backed by cloud stack adjusting.

4. Cloud Security

4.1. Security in Google Cloud

Because many standard security solutions cannot be installed in cloud environments or are ineffective there, protecting the cloud can be challenging. Google cloud platform(GCP) offers a range of integrated cloud security products to address this problem, including:
1-
Virtual Private Cloud (VPC): With virtual networking, networks may be segmented and secured more effectively.
2-
Data Encryption: In GCP, data is encrypted both in transit and at rest.
3-
Access to logs in almost real-time to improve security visibility.
4-
Only trusted containers are allowed to be installed on the Kubernetes Engine due to binary authorization. Intrusion Detection System (IDS): Cloud-native threat detection.
5-
Protect sensitive data from leakage by preventing data loss.
6-
Web app and API protection: DDoS mitigation, WAF, bot defense, and API security

4.2. Security in AWS

AWS offers administrations to help you in avoiding unauthorized get to to your information, accounts, and workloads. Encryption, key administration, and danger location are all highlights of AWS information assurance administrations that ceaselessly screen and protect your workloads and accounts. [42,43,44,45]
  • Identify and access management: You’ll be able safely oversee personalities, resources, and authorizations at scale with the assistance of AWS Character Administrations. To urge begun rapidly and control get to to your workloads and apps, AWS offers personality administrations for your workforce and customer-facing applications.
  • Detection: By persistently watching the arrange action and account behavior inside your cloud environment, AWS recognizes dangers.
  • Network and application protection: You’ll actualize fine-grained security approach at arrange control focuses all through your organization by utilizing organize and application protection administrations. You’ll be able utilize AWS administrations to look at and channel activity at the have-, arrange-, and application-level boundaries to halt illicit asset get to.
  • Data Protection: You’ll utilize AWS administrations to defend your information, accounts, and workloads against illicit get to. In arrange to persistently screen and protect your accounts and workloads, AWS information security administrations offer encryption, key administration, and risk location.
  • Compliance: Based on the AWS best hones and industry measures your organization follows to, AWS gives you with a careful see of your compliance status and persistently screens your environment.

5. Database Technology

5.1. AWS

There are 15 specifically designed databases available in AWS, including relational, key-value, document, in-memory, graph, time-series, and ledger databases. AWS’s relational databases operate 3-5 times faster than other common choices. Additionally, you won’t have to worry about management responsibilities with these databases.

5.2. Azure

The majority of database management operations, such as upgrading, backing up, fixing, and observing, are robotized by the stage as a benefit (PaaS) database motor known as Sky blue SQL Database, Figure 3. Sky blue gives a determination of completely overseen social, NoSQL, and in-memory databases, traversing restrictive and open-source motors, to coordinate the desires of advanced app engineers. Mechanization in foundation administration guarantees versatility, steadfastness, and security whereas sparing you time and cash. [46,47,48,49]

5.3. Google

Oracle databases are only one of the many applications that may be managed and run using the tools and services that are provided by (GCP). While some features might not be accessible at first. BigTable, Spanner, Google Cloud SQL, MySQL, Dremel, Millwheel, Firestore, Memorystore Firebase, Cloud Dataflow, BigQuery, and a number of other tools are used by Google.

6. Conclusions

We looked into the features of GCP, Azure, and AWS in order to compare which of the three is the best choice for your needs. We believe that the service that the customer wants to use is the one that will determine which one of them is the best. Each service has a price, and the more distinguished the service, the higher the price.

Acknowledgments

Special thanks to Osama Hosameldeen for providing his research which helped me a lot to come up with the idea for this paper.

References

  1. Ucuz, D.; others. Comparison of the IoT platform vendors, microsoft Azure, Amazon web services, and Google cloud, from users’ perspectives. 2020 8th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2020, pp. 1–4.
  2. Gorelik, E. Cloud computing models. PhD thesis, Massachusetts Institute of Technology, 2013.
  3. Abousamra, R.; Hosam, O. Quantitative Classification of Cognitive Behaviors for Industrial Projects’ Managers in the MENA Region. 8th International Conference on Information Technology Trends (ITT. IEEE, 2022. [CrossRef]
  4. Hosam, O.; Abousamra, R. Enhancing Deep Training of Image Landmarking with Image CAPTCHA. 8th International Conference on Information Technology Trends (ITT. IEEE, 2022. [CrossRef]
  5. Kundra, V. Federal cloud computing strategy. White House 2011. [Google Scholar]
  6. Gupta, P.; Seetharaman, A.; Raj, J.R. The usage and adoption of cloud computing by small and medium businesses. International journal of information management 2013, 33, 861–874. [Google Scholar] [CrossRef]
  7. Hosam, O.; BinYuan, F. A Comprehensive Analysis of Trusted Execution Environments. 8th International Conference on Information Technology Trends (ITT. IEEE, 2022. [CrossRef]
  8. Hosam, O. An earthquake query system based on hidden Markov models. International Journal of Embedded Systems 2022, 15, 149–157. [Google Scholar] [CrossRef]
  9. Berisha, B.; Mëziu, E.; Shabani, I. Big data analytics in Cloud computing: an overview. Journal of Cloud Computing 2022, 11, 1–10. [Google Scholar] [CrossRef] [PubMed]
  10. Liu, B.; Xiao, L.; Long, J.; Tang, M.; Hosam, O. Secure Digital Certificate-Based Data Access Control Scheme in Blockchain. IEEE Access 2020, 8, 91751–91760. [Google Scholar] [CrossRef]
  11. Lei, Q.; Xiao, L.; Hosam, O.; Luo, H. A novel watermarking algorithm based on characteristics model of local fragmentary images. International Journal of Embedded Systems 2020, 12, 11–21. [Google Scholar] [CrossRef]
  12. Copeland, M.; Soh, J.; Puca, A.; Manning, M.; Gollob, D. Microsoft azure and cloud computing. In Microsoft Azure; Springer, 2015; pp. 3–26.
  13. Hosam, O. Intelligent Risk Management using Artificial Intelligence. Advances in Science and Engineering Technology International Conferences (ASET, 2022, pp. 1–9. [CrossRef]
  14. Hu, J.; Liang, W.; Hosam, O.; Hsieh, M.; Su, X. 5GSS: a framework for 5G-secure-smart healthcare monitoring. Connection Science 2021, p. 1–23. [CrossRef]
  15. Youssef, A.E. Exploring cloud computing services and applications. Journal of Emerging Trends in Computing and Information Sciences 2012, 3, 838–847. [Google Scholar]
  16. Ali, M.; Jung, L.T.; Hosam, O. A new text-based w-distance metric to find the perfect match between words. Journal of Intelligent and Fuzzy Systems 2019, 9, 1–12. [Google Scholar] [CrossRef]
  17. Hany, M.; Youssef, B.; Darwish, S.; Hosam, O. Intelligent Watermarking System Based on Soft Computing. International Conference on Advanced Intelligent Systems and Informatics; Springer: Cham, 2019; pp. 24–34. [Google Scholar] [CrossRef]
  18. Hosam, O.; M, H. Modified Fast Gray Level Grouping Approach for Enhancing Image Contrast. Journal of Theoretical and Applied Information Technology 2019, 97.
  19. Wankhede, P.; Talati, M.; Chinchamalatpure, R. Comparative study of cloud platforms-microsoft azure, google cloud platform and amazon EC2. J. Res. Eng. Appl. Sci 2020, 5, 60–64. [Google Scholar] [CrossRef]
  20. Huang, W.; Li, R.; Xu, J.; Huang, Y.; Hosam, O. Intellectual property protection for FPGA designs using the public key cryptography. Advances in Mechanical Engineering 2019, 11, 16–22. [Google Scholar] [CrossRef]
  21. Hosam, O. Hiding Bitcoins in Steganographic Fractals. 2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT. IEEE, 2018. [CrossRef]
  22. Hosam, O. Toxic Comments Identification in Arabic Social Media. International Journal of Computer Information Systems and Industrial Management Applications 2019, 11, 219–226. [Google Scholar]
  23. Azure, M. What is a private cloud? Retrieved July 7, 2017.
  24. Chen, Y.; Xiao, L.; Hosam, O. A Performance Evaluation Method of Coal-Fired Boiler Based on Neural Network. International Conference on Smart Computing and Communication; Springer: Cham, 2019; pp. 277–285. [Google Scholar] [CrossRef]
  25. Ahmad, M.H.; Hosam, O. Hybrid design for cloud data security using combination of AES, ECC and LSB steganography. International Journal of Computational Science and Engineering (IJCSE 2019, 19. [Google Scholar] [CrossRef]
  26. Zhu, W.; Hosam, O.; Zheng, X. A secure hierarchical community detection algorithm. International Journal of Computational Science and Engineering (IJCSE) 2019, 19. [Google Scholar] [CrossRef]
  27. Golden, B. Amazon web services for dummies; John Wiley & Sons, 2013.
  28. Liang, W.; Xie, Y.; Chen, X.; Hosam, O.; Chen. A Two-step MF Signal Acquisition Method for Wireless Underground Sensor Networks. Computer Science and Information Systems 2016, 13. [CrossRef]
  29. Hosam, O.; Ben Halima, N. Adaptive block-based pixel value differencing steganography. Security Comm. Networks 2016. [Google Scholar] [CrossRef]
  30. Hosam, O. Colored Texture Classification with Support Vector Machine and Wavelet Multiresolution Analysis. The IEEE Symposium on Signal Processing and Information Technology (ISSPIT’05, 2015. Abu Dabhi, UAE. [CrossRef]
  31. Wang, L.C.; Chen, C.C.; Liu, J.L.; Chu, P.C. Framework and deployment of a cloud-based advanced planning and scheduling system. Robotics and Computer-Integrated Manufacturing 2021, 70, 102088. [Google Scholar] [CrossRef]
  32. Halima, N.B.; Hosam, O. Bag of Words Based Surveillance System Using Support Vector Machines. International Journal of Security and Its Applications 2016, 10, 331–346. [Google Scholar] [CrossRef]
  33. Hosam, O.; Halima, N.B. A HYBRID ROI-EMBEDDINGBASED WATERMARKING TECHNIQUE USING DWT AND DCT TRANSFORMS. Journal of Theoretical and Applied Information Technology 2015, 81. [Google Scholar]
  34. Halima, N.B.; Hosam, O. Embedding Image ROI Watermark Into Median DCT Coefficients. IRECOS 2015, 10. [Google Scholar] [CrossRef]
  35. Varia, J.; Mathew, S.; et al. Overview of amazon web services. Amazon Web Services 2014, 105. [Google Scholar]
  36. Hosam, O. Car License Plate Localization Using Hole Filling and Support Vector Machine. International Review on Computers and Software (IRECOS 2014, 9. [Google Scholar] [CrossRef]
  37. Hosam, O.; Halima, N.B.; Dakroury, S.; Abdel-Rahman, E.O. RECONSTRUCTING, AUGMENTING AND MANIPULATING 3D SCENE FROM SEQUENCE OF IMAGES. Journal of Theoretical and Applied Information Technology 2017, 73, 12–17. [Google Scholar]
  38. Hosam, O.; Malki, Z. Steganography Technique for Embedding Secure Data into the Image Regions with Abrupt Changes. Life Sci J 2014, 11, 126–130. [Google Scholar]
  39. Anupama, K.; Nagaraja, R.; Jaiganesh, M. A Perspective view of Resource-based Capacity planning in Cloud computing. 2019 1st International Conference on Advances in Information Technology (ICAIT). IEEE, 2019, pp. 358–363.
  40. Hosam, O.; Yang, L.; Liang, W.; Sun, X. Watermarking 3D Triangular Mesh with High Visual Quality. JDCTA: International Journal of Digital Content Technology and its Applications 2010, 4, 107–116. [Google Scholar] [CrossRef]
  41. O. Hosam, X.S. Three Dimensional Reconstruction Using Enhanced Shape From Stereo Technique. the proceeding of “2009 Eight IEEE/ACIS International Conference on Computer and Information Science”, 2009, p. 627–632. [CrossRef]
  42. Alam, T. Cloud Computing and its role in Information Technology. IAIC Transactions on Sustainable Digital Innovation (ITSDI) 2020, 1, 108–115. [Google Scholar] [CrossRef]
  43. O. Hosam, W.; Youssef, B.A.; Abdou, M. Public Watermarking Scheme for 3Ds Laser Scanned Archeological Models. The Seventeenth IEEE Symposium on Computers and Communications (ISCC’12); Cappadocia: Turkey, 2012. [CrossRef]
  44. Hosam, O. Motion Compensation for Video Codec Based on Disparity Estimation. The Seventeenth IEEE Symposium on Computers and Communications (ISCC’12); Cappadocia: Turkey, 2012. [CrossRef]
  45. O. Hosam, X.S. Stereo Image Reconstruction Using Adaptive Window Approach. the proceeding of 2nd International Conference on Advanced Computer Theory and Engineering, ICACTE2009, 2009, p. 33–41. [CrossRef]
  46. Perumal, K.; Mohan, S.; Frnda, J.; Divakarachari, P.B. Dynamic resource provisioning and secured file sharing using virtualization in cloud azure. Journal of Cloud Computing 2022, 11, 1–12. [Google Scholar] [CrossRef]
  47. Liang, W.; Zhang, D.; You, Z.; Li, W.; Hosam, O. A Survey of Techniques for VLSI IP Protection. Information Technology Journal 2013. published June 12, 2013.
  48. Hosam, O.; Alraddadi, A.S. Novel Image Watermarking Technique Based on Adjacent Pixel Position Switch. JNIT 2013, 4, 81–88. [Google Scholar] [CrossRef]
  49. Hosam, O. Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain. The Open Signal Processing Journal 2013, 5, 1–6. [Google Scholar] [CrossRef]
Figure 1. : Balancing multi-tier applications by using both public and internal Load Balancer.
Figure 1. : Balancing multi-tier applications by using both public and internal Load Balancer.
Preprints 69337 g001
Figure 2. Simple overview of load balancing.
Figure 2. Simple overview of load balancing.
Preprints 69337 g002
Figure 3. The architecture of Microsoft Azure database services.
Figure 3. The architecture of Microsoft Azure database services.
Preprints 69337 g003
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2024 MDPI (Basel, Switzerland) unless otherwise stated