Presented herein are techniques that involve utilizing a blockchain-based methodology that provides a defense against rollback attacks on a virtual machine and is scalable for other application areas. In one example, a solution is provided to avoid rollback attacks during restoration of a virtual machine under the assumption of a malicious host and hypervisor. Techniques presented herein also address problems associated with an untrusted host under certain assumptions.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.