Cryptocurrency Mining – Transition to Cloud
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 9
Abstract
Cryptocurrency, a form of digital currency that has an open and decentralized system and uses cryptography to enhance security and control the creation of new units, is touted to be the next step from conventional monetary transactions. Many cryptocurrencies exist today, with Bitcoin being the most prominent of them. Cryptocurrencies are generated by mining, as a fee for validating any transaction. The rate of generating hashes, which validate any transaction, has been increased by the use of specialized machines such as FPGAs and ASICs, running complex hashing algorithms like SHA-256 and Scrypt, thereby leading to faster generation of cryptocurrencies. This arms race for cheaper-yet-efficient machines has been on since the day the first cryptocurrency, Bitcoin, was introduced in 2009. However, with more people venturing into the world of virtual currency, generating hashes for this validation has become far more complex over the years, with miners having to invest huge sums of money on employing multiple high performance ASICs. Thus the value of the currency obtained for finding a hash did not justify the amount of money spent on setting up the machines, the cooling facilities to overcome the enormous amount of heat they produce and electricity required to run them. The next logical step in this is to utilize the power of cloud computing. Miners leasing super computers that generate hashes at astonishing rates that have a high probability of profits, with the same machine being leased to more than one person on a time bound basis is a win-win situation to both the miners, as well as the cloud service providers. This paper throws light on the nuances of cryptocurrency mining process, the traditional machines used for mining, their limitations, about how cloud based mining is the logical next step and the advantage that cloud platform offers over the traditional machines.
Authors and Affiliations
Hari R. , Sai Y. , Venkata M.
Bayesian Network Analysis for the Questionnaire Investigation on the Needs at Fuji Shopping Street Town under the View Point of Service Engineering
Shopping streets at local city in Japan became old and are generally declining. In this paper, the area rebirth and/or regional revitalization of shopping street are handled. Fuji city in Japan is focused. Four big festi...
Design and Development of AlgoWBIs
AlgoWBIs has been developed to support algorithm learning. The goal to develop this tool is to empower educators and learners with an interactive learning tool to improving algorithm’s skills. The paper focuses on how to...
Attacking Misaligned Power Tracks Using Fourth-Order Cumulant
Side channel attacks (SCA) use the leaked confidential data to reveal the cipher key. Power consumptions, electromagnetic emissions, and operation timing of cryptographic hardware are examples of measurable parameters (a...
Insights on Error-Resilient Image Transmission Schemes on Wireless Network
Usage of image as data (or signal) is quite frequent in majority of the user-centric application. However, transmission of image over non-concrete communication medium like air is still vulnerable due to inherent weaknes...
ZeroX Algorithms with Free crosstalk in Optical Multistage Interconnection Network
Multistage interconnection networks (MINs) have been proposed as interconnecting structures in various types of communication applications ranging from parallel systems, switching architectures, to multicore systems and...