A technique for verifying data structure consistency across computing environments includes computing a first signature for a data structure of an application subject to checkpointing corresponding to a first computing environment residing on a first computer. A second signature for the data structure of the application corresponding to a second computing environment residing on a second computer is computed. The first and second signatures are compared to determine whether a change to the data structure exists. Responsive to a lack of change to the data structure based on the comparison, a mobility operation is enabled for the application between the first computer and the second computer.