2015
DOI: 10.14569/ijacsa.2015.060915
|View full text |Cite
|
Sign up to set email alerts
|

Cryptocurrency Mining – Transition to Cloud

Abstract: Abstract-Cryptocurrency, a form of digital currency that has an open and decentralized system and uses cryptography to enhance security and control the creation of new units, is touted to be the next step from conventional monetary transactions. Many cryptocurrencies exist today, with Bitcoin being the most prominent of them. Cryptocurrencies are generated by mining, as a fee for validating any transaction. The rate of generating hashes, which validate any transaction, has been increased by the use of speciali… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(17 citation statements)
references
References 4 publications
0
11
0
Order By: Relevance
“…Banks need a huge infrastructure to generate currency and monitor transactions. But the cryptocurrency that uses the mining system overcomes this need, as it is the responsibility of miners or nodes to verify and monitor transactions [12].…”
Section: E Miningmentioning
confidence: 99%
See 3 more Smart Citations
“…Banks need a huge infrastructure to generate currency and monitor transactions. But the cryptocurrency that uses the mining system overcomes this need, as it is the responsibility of miners or nodes to verify and monitor transactions [12].…”
Section: E Miningmentioning
confidence: 99%
“…To form a block the transactions that take place during a specific period are summarized. The system is designed to merge transparency into it, whereby all transactions made are maintained and recorded in blockchain [12].…”
Section: E Miningmentioning
confidence: 99%
See 2 more Smart Citations
“…Bartino and Nayeem [49] highlighted worms in IoT devices which hijacked them for mining purposes, pointing to the infamous Linux.Darlloz worm that hijacked devices running Linux on Intelx86 chip architecture for mining [50]. Krishnan et al [51] studied a series of computer malware, such as TrojanRansom.Win32.Linkup and HKTL BITCOINMINE, that turned host machines into mining pools. Sari and Kilik [52], used Open Source Intelligence (OSINT) to study vulnerabilities in mining pools with Mirai botnet as case study.…”
Section: Related Workmentioning
confidence: 99%