
International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 16 Issue 3
July-September 2025
Indexing Partners



















Securing Cloud Infrastructure Through Ancestry Tracking in Machine Images
Author(s) | Devashish Ghanshyambhai Patel |
---|---|
Country | United States |
Abstract | Cloud infrastructure has become the backbone of modern digital services, offering on-demand scalability, flexibility, and automation. As enterprises accelerate their migration to cloud platforms, ensuring the security and integrity of virtualized resources becomes paramount. Among these, machine images—such as Amazon Machine Images (AMIs), Azure Managed Images, and Google Cloud VM templates—play a foundational role by encapsulating operating systems, applications, configurations, and runtime environments into reusable components. However, the reuse and propagation of these images across teams and organizations often occur without visibility into their origin, integrity, or vulnerability history. This lack of transparency introduces a hidden attack vector for adversaries, who may exploit vulnerable or malicious images to compromise entire cloud workloads. This paper introduces a novel approach to strengthening cloud infrastructure security through ancestry tracking in machine images. Ancestry tracking involves capturing the complete lineage of an image, including its base, all intermediate modifications, and associated security scans. By integrating cryptographic signatures, policy enforcement, and immutable logging into the image lifecycle, our proposed framework—Ancestry-Aware Machine Image Security (AAMIS)—provides a robust mechanism for verifying image authenticity and preventing unauthorized deployments. The implementation of AAMIS is designed to work seamlessly with existing DevOps pipelines and CI/CD tooling, ensuring minimal performance overhead. Through experimental validation in AWS and Azure environments, we demonstrate that ancestry tracking significantly enhances traceability, enforces compliance, and reduces the propagation of vulnerabilities. Moreover, we explore the integration of this framework with industry standards like SLSA (Supply Chain Levels for Software Artifacts), SBOMs (Software Bill of Materials), and Zero Trust Architecture principles to extend its utility across container and hybrid cloud ecosystems |
Keywords | Cloud Security, Image Ancestry Tracking, Virtual Machine Templates, DevSecOps, Cryptographic Verification, Cloud Infrastructure |
Field | Engineering |
Published In | Volume 16, Issue 3, July-September 2025 |
Published On | 2025-07-12 |
DOI | https://doi.org/10.71097/IJSAT.v16.i3.6805 |
Short DOI | https://doi.org/g9s9wb |
Share this


CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
