International Journal on Science and Technology

E-ISSN: 2229-7677     Impact Factor: 9.88

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 16 Issue 3 July-September 2025 Submit your research before last 3 days of September to publish your research paper in the issue of July-September.

Securing Cloud Infrastructure Through Ancestry Tracking in Machine Images

Author(s) Devashish Ghanshyambhai Patel
Country United States
Abstract Cloud infrastructure has become the backbone of modern digital services, offering on-demand scalability, flexibility, and automation. As enterprises accelerate their migration to cloud platforms, ensuring the security and integrity of virtualized resources becomes paramount. Among these, machine images—such as Amazon Machine Images (AMIs), Azure Managed Images, and Google Cloud VM templates—play a foundational role by encapsulating operating systems, applications, configurations, and runtime environments into reusable components. However, the reuse and propagation of these images across teams and organizations often occur without visibility into their origin, integrity, or vulnerability history. This lack of transparency introduces a hidden attack vector for adversaries, who may exploit vulnerable or malicious images to compromise entire cloud workloads.
This paper introduces a novel approach to strengthening cloud infrastructure security through ancestry tracking in machine images. Ancestry tracking involves capturing the complete lineage of an image, including its base, all intermediate modifications, and associated security scans. By integrating cryptographic signatures, policy enforcement, and immutable logging into the image lifecycle, our proposed framework—Ancestry-Aware Machine Image Security (AAMIS)—provides a robust mechanism for verifying image authenticity and preventing unauthorized deployments.
The implementation of AAMIS is designed to work seamlessly with existing DevOps pipelines and CI/CD tooling, ensuring minimal performance overhead. Through experimental validation in AWS and Azure environments, we demonstrate that ancestry tracking significantly enhances traceability, enforces compliance, and reduces the propagation of vulnerabilities. Moreover, we explore the integration of this framework with industry standards like SLSA (Supply Chain Levels for Software Artifacts), SBOMs (Software Bill of Materials), and Zero Trust Architecture principles to extend its utility across container and hybrid cloud ecosystems
Keywords Cloud Security, Image Ancestry Tracking, Virtual Machine Templates, DevSecOps, Cryptographic Verification, Cloud Infrastructure
Field Engineering
Published In Volume 16, Issue 3, July-September 2025
Published On 2025-07-12
DOI https://doi.org/10.71097/IJSAT.v16.i3.6805
Short DOI https://doi.org/g9s9wb

Share this