Main Article Content
Abstract
Cloud computing has significantly transformed the IT landscape over the past two decades, evolving from basic virtualization technology into a sophisticated, multi-layered ecosystem that serves as the backbone of modern digital infrastructure. This research examines the progression of cloud computing from 2003 to the present, highlighting key technological advancements such as virtualization, containerization, artificial intelligence (AI), and edge computing. The study also addresses major challenges within the cloud computing realm, including security, data sovereignty, and environmental concerns, which continue to impact the evolution of cloud services. Furthermore, it explores emerging trends like quantum computing, 5G integration, and green cloud initiatives, all of which are poised to influence the future of the cloud industry. This paper underscores the transformative role of cloud technology in delivering scalable and cost- effective solutions for businesses, while also emphasizing the necessity of addressing security and sustainability issues to ensure its long-term viability. Through a comprehensive review of current and future advancements in cloud computing, this research enhances our understanding of the critical factors driving cloud adoption, the ongoing challenges it faces, and its potential to foster a sustainable digital ecosystem.
Keywords
Article Details
Copyright (c) 2025 Muhammad Awaluddin, Ika Safitri Windiarti

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.

References
- Abed, Y., & Chavan, M. (2019). The challenges of institutional distance: Data privacy issues in cloud computing. Science, Technology and Society, 24(1), 161–181. https://doi.org/10.1177/0971721818806088
- Ahamad, S., Mohseni, M., Shekher, V., Smaisim, G., Tripathi, A., & Alanya-Beltran, J. (2022). A detailed analysis of the critical role of artificial intelligence in enabling high-performance cloud computing systems (p. 159). https://doi.org/10.1109/ICACITE53722.2022.9823679
- Alouffi, B., Hasnain, M., Alharbi, A., Alosaimi, W., Alyami, H., & Ayaz, M. (2021). A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies. IEEE Access, 9, 57792–57807. https://doi.org/10.1109/ACCESS.2021.3073203
- Ashouri, M., Davidsson, P., & Spalazzese, R. (2021). Quality attributes in edge computing for the Internet of Things: A systematic mapping study. Internet of Things, 13, 100346. https://doi.org/10.1016/j.iot.2020.100346
- Bharany, S., Sharma, S., Khalaf, O. I., Abdulsahib, G. M., Al Humaimeedy, A. S., Aldhyani, T. H. H., Maashi, M., & Alkahtani, H. (2022). A Systematic Survey on Energy-Efficient Techniques in Sustainable Cloud Computing. Sustainability, 14(10), 6256. https://doi.org/10.3390/su14106256
- Bourechak, A., Zedadra, O., Kouahla, M. N., Guerrieri, A., Seridi, H., & Fortino, G. (2023). At the Confluence of Artificial Intelligence and Edge Computing in IoT-Based Applications: A Review and New Perspectives. Sensors, 23(3), 1639. https://doi.org/10.3390/s23031639
- Das, K., Mandal, A., Das, D., & Mukherjee, R. (2023). Contribution of AWS on Cloud Computing Technology. International Journal of Applied Engineering Research, 18(3), 203–209. https://doi.org/10.37622/IJAER/18.3.2023.203-209
- Dashora, S. (2023). Cloud-based Data Analytics for Business Intelligence. International Journal for Research in Applied Science and Engineering Technology, 11(11), 2758–2765. https://doi.org/10.22214/ijraset.2023.57219
- Docter, Q., Buhagiar, J., & Parker, J. (2019). CompTIA A+ complete review guide: Exam 220‐1001 and exam 220‐1002 4e (1st ed.). Wiley. https://doi.org/10.1002/9781119575900
- Efozia, N. F., Ariwa, E., Asogwa, D. C., Awonusi, O., & Anigbogu, S. O. (2017). A review of threats and vulnerabilities to cloud computing existence. 2017 Seventh International Conference on Innovative Computing Technology (INTECH), 197–204. https://doi.org/10.1109/INTECH.2017.8102448
- Géczy, P., Izumi, N., & Hasida, K. (2013). Hybrid cloud management: Foundations and strategies. 4(1).
- Hellerstein, J. M., Faleiro, J., Gonzalez, J. E., Schleier-Smith, J., Sreekanti, V., Tumanov, A., & Wu, C. (2018). Serverless Computing: One Step Forward, Two Steps Back (arXiv:1812.03651). arXiv. http://arxiv.org/abs/1812.03651
- Hsu, C.-H., Parashar, M., & Rana, O. (2020). Guest editorial: Special section on advances of utility and cloud computing technologies and services. IEEE Transactions on Cloud Computing, 8(4), 972–974. https://doi.org/10.1109/TCC.2019.2936075
- Jaluka, R., Meliksetian, D., & Gupta, M. (2016). Enterprise IT as a service: Transforming the delivery model of IT services. 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), 32–39. https://doi.org/10.1109/CCEM.2016.015
- Jung, J. J., Chang, Y.-S., Liu, Y., & Wu, C.-C. (2012). Advances in intelligent grid and cloud computing. Information Systems Frontiers, 14(4), 823–825. https://doi.org/10.1007/s10796-012-9349-x
- Kaaniche, N., & Laurent, M. (2017). Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 111, 120-141. https://doi.org/10.1016/j.comcom.2017.07.006
- Lins, S., Pandl, K. D., Teigeler, H., Thiebes, S., Bayer, C., & Sunyaev, A. (2021). Artificial Intelligence as a Service: Classification and Research Directions. Business & Information Systems Engineering, 63(4), 441–456. https://doi.org/10.1007/s12599-021-00708-w
- Monserrate, S. G. (2022). The cloud is material: On the environmental impacts of computation and data storage. MIT Case Studies in Social and Ethical Responsibilities of Computing, Winter 2022. https://doi.org/10.21428/2c646de5.031d4553
- Nieuwenhuis, L. J. M., Ehrenhard, M. L., & Prause, L. (2018). The shift to Cloud Computing: The impact of disruptive technology on the enterprise software business ecosystem. Technological Forecasting and Social Change, 129, 308–313. https://doi.org/10.1016/j.techfore.2017.09.037
- Pahl, C., Brogi, A., Soldani, J., & Jamshidi, P. (2019). Cloud container technologies: A state-of-the- art review. IEEE Transactions on Cloud Computing, 7(3), 677–692. https://doi.org/10.1109/TCC.2017.2702586
- Rinkey, Dr., & Bhatia, Dr. R. (2023). AI cloud computing in education. International Journal of Research In Science & Engineering, 34, 37–42. https://doi.org/10.55529/ijrise.34.37.42
- Rios, E., Iturbe, E., Larrucea, X., Rak, M., Mallouli, W., Dominiak, J., Muntés, V., Matthews, P., & Gonzalez, L. (2019). Service level agreement‐based GDPR compliance and security assurance in(multi)Cloud‐based systems. IET Software, 13(3), 213–222. https://doi.org/10.1049/iet-sen.2018.5293
- Shafiei, H., Khonsari, A., & Mousavi, P. (2021). Serverless Computing: A Survey of Opportunities, Challenges and Applications (arXiv:1911.01296). arXiv. http://arxiv.org/abs/1911.01296
- Shallal, Q., & Bokhari, M. (2016). Cloud computing service models: A comparative study. IEEE Network, 16–18.
- Sun, P. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications, 160, 102642. https://doi.org/10.1016/j.jnca.2020.102642
- Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data Security and Privacy in Cloud Computing. International Journal of Distributed Sensor Networks, 10(7), 190903. https://doi.org/10.1155/2014/190903
- Surbiryala, J., & Rong, C. (2019). Cloud computing: History and overview. 2019 IEEE Cloud Summit, 1–7. https://doi.org/10.1109/CloudSummit47114.2019.00007
- Vilasan, K. P., R, A. K. A., & B, R. (2023). An Overview of Virtualization and Cloud Computing. International Journal for Research in Applied Science and Engineering Technology, 11(3), 1630–1633. https://doi.org/10.22214/ijraset.2023.49760
- Vogels, W. (2008). Eventually Consistent: Building reliable distributed systems at a worldwide scale demands trade-offs?between consistency and availability. Queue, 6(6), 14–19. https://doi.org/10.1145/1466443.1466448
- Wulf, F., Lindner, T., Westner, M., & Strahringer, S. (2021). IaaS, PaaS, or SaaS? The Why of Cloud Computing Delivery Model Selection – Vignettes on the Post-Adoption of Cloud Computing. Hawaii International Conference on System Sciences. https://doi.org/10.24251/HICSS.2021.758
References
Abed, Y., & Chavan, M. (2019). The challenges of institutional distance: Data privacy issues in cloud computing. Science, Technology and Society, 24(1), 161–181. https://doi.org/10.1177/0971721818806088
Ahamad, S., Mohseni, M., Shekher, V., Smaisim, G., Tripathi, A., & Alanya-Beltran, J. (2022). A detailed analysis of the critical role of artificial intelligence in enabling high-performance cloud computing systems (p. 159). https://doi.org/10.1109/ICACITE53722.2022.9823679
Alouffi, B., Hasnain, M., Alharbi, A., Alosaimi, W., Alyami, H., & Ayaz, M. (2021). A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies. IEEE Access, 9, 57792–57807. https://doi.org/10.1109/ACCESS.2021.3073203
Ashouri, M., Davidsson, P., & Spalazzese, R. (2021). Quality attributes in edge computing for the Internet of Things: A systematic mapping study. Internet of Things, 13, 100346. https://doi.org/10.1016/j.iot.2020.100346
Bharany, S., Sharma, S., Khalaf, O. I., Abdulsahib, G. M., Al Humaimeedy, A. S., Aldhyani, T. H. H., Maashi, M., & Alkahtani, H. (2022). A Systematic Survey on Energy-Efficient Techniques in Sustainable Cloud Computing. Sustainability, 14(10), 6256. https://doi.org/10.3390/su14106256
Bourechak, A., Zedadra, O., Kouahla, M. N., Guerrieri, A., Seridi, H., & Fortino, G. (2023). At the Confluence of Artificial Intelligence and Edge Computing in IoT-Based Applications: A Review and New Perspectives. Sensors, 23(3), 1639. https://doi.org/10.3390/s23031639
Das, K., Mandal, A., Das, D., & Mukherjee, R. (2023). Contribution of AWS on Cloud Computing Technology. International Journal of Applied Engineering Research, 18(3), 203–209. https://doi.org/10.37622/IJAER/18.3.2023.203-209
Dashora, S. (2023). Cloud-based Data Analytics for Business Intelligence. International Journal for Research in Applied Science and Engineering Technology, 11(11), 2758–2765. https://doi.org/10.22214/ijraset.2023.57219
Docter, Q., Buhagiar, J., & Parker, J. (2019). CompTIA A+ complete review guide: Exam 220‐1001 and exam 220‐1002 4e (1st ed.). Wiley. https://doi.org/10.1002/9781119575900
Efozia, N. F., Ariwa, E., Asogwa, D. C., Awonusi, O., & Anigbogu, S. O. (2017). A review of threats and vulnerabilities to cloud computing existence. 2017 Seventh International Conference on Innovative Computing Technology (INTECH), 197–204. https://doi.org/10.1109/INTECH.2017.8102448
Géczy, P., Izumi, N., & Hasida, K. (2013). Hybrid cloud management: Foundations and strategies. 4(1).
Hellerstein, J. M., Faleiro, J., Gonzalez, J. E., Schleier-Smith, J., Sreekanti, V., Tumanov, A., & Wu, C. (2018). Serverless Computing: One Step Forward, Two Steps Back (arXiv:1812.03651). arXiv. http://arxiv.org/abs/1812.03651
Hsu, C.-H., Parashar, M., & Rana, O. (2020). Guest editorial: Special section on advances of utility and cloud computing technologies and services. IEEE Transactions on Cloud Computing, 8(4), 972–974. https://doi.org/10.1109/TCC.2019.2936075
Jaluka, R., Meliksetian, D., & Gupta, M. (2016). Enterprise IT as a service: Transforming the delivery model of IT services. 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), 32–39. https://doi.org/10.1109/CCEM.2016.015
Jung, J. J., Chang, Y.-S., Liu, Y., & Wu, C.-C. (2012). Advances in intelligent grid and cloud computing. Information Systems Frontiers, 14(4), 823–825. https://doi.org/10.1007/s10796-012-9349-x
Kaaniche, N., & Laurent, M. (2017). Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 111, 120-141. https://doi.org/10.1016/j.comcom.2017.07.006
Lins, S., Pandl, K. D., Teigeler, H., Thiebes, S., Bayer, C., & Sunyaev, A. (2021). Artificial Intelligence as a Service: Classification and Research Directions. Business & Information Systems Engineering, 63(4), 441–456. https://doi.org/10.1007/s12599-021-00708-w
Monserrate, S. G. (2022). The cloud is material: On the environmental impacts of computation and data storage. MIT Case Studies in Social and Ethical Responsibilities of Computing, Winter 2022. https://doi.org/10.21428/2c646de5.031d4553
Nieuwenhuis, L. J. M., Ehrenhard, M. L., & Prause, L. (2018). The shift to Cloud Computing: The impact of disruptive technology on the enterprise software business ecosystem. Technological Forecasting and Social Change, 129, 308–313. https://doi.org/10.1016/j.techfore.2017.09.037
Pahl, C., Brogi, A., Soldani, J., & Jamshidi, P. (2019). Cloud container technologies: A state-of-the- art review. IEEE Transactions on Cloud Computing, 7(3), 677–692. https://doi.org/10.1109/TCC.2017.2702586
Rinkey, Dr., & Bhatia, Dr. R. (2023). AI cloud computing in education. International Journal of Research In Science & Engineering, 34, 37–42. https://doi.org/10.55529/ijrise.34.37.42
Rios, E., Iturbe, E., Larrucea, X., Rak, M., Mallouli, W., Dominiak, J., Muntés, V., Matthews, P., & Gonzalez, L. (2019). Service level agreement‐based GDPR compliance and security assurance in(multi)Cloud‐based systems. IET Software, 13(3), 213–222. https://doi.org/10.1049/iet-sen.2018.5293
Shafiei, H., Khonsari, A., & Mousavi, P. (2021). Serverless Computing: A Survey of Opportunities, Challenges and Applications (arXiv:1911.01296). arXiv. http://arxiv.org/abs/1911.01296
Shallal, Q., & Bokhari, M. (2016). Cloud computing service models: A comparative study. IEEE Network, 16–18.
Sun, P. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications, 160, 102642. https://doi.org/10.1016/j.jnca.2020.102642
Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data Security and Privacy in Cloud Computing. International Journal of Distributed Sensor Networks, 10(7), 190903. https://doi.org/10.1155/2014/190903
Surbiryala, J., & Rong, C. (2019). Cloud computing: History and overview. 2019 IEEE Cloud Summit, 1–7. https://doi.org/10.1109/CloudSummit47114.2019.00007
Vilasan, K. P., R, A. K. A., & B, R. (2023). An Overview of Virtualization and Cloud Computing. International Journal for Research in Applied Science and Engineering Technology, 11(3), 1630–1633. https://doi.org/10.22214/ijraset.2023.49760
Vogels, W. (2008). Eventually Consistent: Building reliable distributed systems at a worldwide scale demands trade-offs?between consistency and availability. Queue, 6(6), 14–19. https://doi.org/10.1145/1466443.1466448
Wulf, F., Lindner, T., Westner, M., & Strahringer, S. (2021). IaaS, PaaS, or SaaS? The Why of Cloud Computing Delivery Model Selection – Vignettes on the Post-Adoption of Cloud Computing. Hawaii International Conference on System Sciences. https://doi.org/10.24251/HICSS.2021.758