Cloud Computing and Cryptominers Unveiling Challenges and Op
Cloud Computing and Cryptominers Unveiling Challenges and Op
Opportunities
Mudit Potdar, Hemish Padhiyar, Sawan Swain July 2023
Abstract
In the rapidly evolving landscape of cloud computing, the emergence of cryptominers leveraging
cloud infrastructure presents a complex interplay of challenges and opportunities. This paper delves
into the multifaceted relationship between these two domains, spotlighting the challenges posed by
resource depletion, security vulnerabilities, and escalating operational costs attributed to
unauthorized cryptomining activities in cloud environments while also addressing legal and ethical
concerns. Simultaneously, it explores the potential for cloud providers to offer specialized
cryptocurrency mining services as a means to diversify revenue streams and enhance
competitiveness, emphasizing the role of blockchain technology in bolstering transparency and
security. In navigating this intersection, proactive measures to mitigate adverse effects and foster
responsible collaborations are essential for the continued evolution of the cloud computing industry
in the digital age. Moreover, as cryptominers seek to exploit the vast computational power and
scalability offered by cloud computing, the industry must grapple with the necessity of adapting to
this new paradigm. The opportunities inherent in this convergence are evident, with cloud providers
having the potential to capitalize on a burgeoning market segment. By incorporating cryptocurrency
mining services into their portfolios, cloud providers can unlock new revenue streams and
differentiate themselves from competitors. Furthermore, the integration of blockchain technology
promises to enhance the overall security and transparency of cloud-based cryptocurrency mining
operations, instilling trust among stakeholders. However, striking a balance between leveraging
these opportunities and addressing the challenges, such as resource management and ethical
considerations, remains imperative for a sustainable and mutually beneficial coexistence of cloud
computing and cryptominers in the digital era.
Introduction
In the rapidly evolving landscape of digital technology, the advent of cryptocurrencies has not only
transformed the way we perceive and handle financial transactions but has also given rise to a
phenomenon that has captured the attention of both cybersecurity experts and cloud computing
enthusiasts alike crypto miners on cloud infrastructure. The fusion of blockchain technology and
cloud computing has led to a paradigm shift in how we harness computing power, presenting us with
unprecedented opportunities and challenges.
Cryptocurrency mining, once the domain of individual miners with specialized hardware, has now
infiltrated the cloud environment, offering an enticing prospect for users to harness the power of
distributed networks and the convenience of cloud services for profit. However, this intriguing
development has not been without its share of complexities. The seamless integration of
cryptominers into cloud infrastructure has raised questions concerning the security, efficiency, and
ethical implications of such practices. These issues beg exploration, and this research paper aims to
embark on a comprehensive journey into the world of cryptominers on cloud platforms.
In this paper, we will delve into the multifaceted aspects of cryptominers on cloud, offering a
detailed analysis of the mechanisms underpinning this fusion of technologies, the impact on cloud
service providers and users, the potential risks, and the ethical considerations surrounding this
emerging trend. Our objective is not only to shed light on the challenges posed by cryptominers on
cloud but also to highlight the opportunities for innovation, security enhancement, and resource
optimization in the cloud ecosystem.
As we navigate through this intricate landscape, we will draw upon existing research, real-world case
studies, and expert insights to provide a holistic perspective on the subject. Furthermore, we will
explore potential solutions and strategies to address the issues at hand, paving the way for a more
secure, efficient, and ethical cloud computing environment in the era of cryptominers.
Join us on this exploration of cryptominers on cloud, as we unravel the layers of this fascinating
intersection between blockchain and cloud technology, and seek to understand its implications for
the present and future of digital infrastructure
Literature Survey
Cloud computing and cryptocurrency mining (cryptomining) have become integral components of
the modern digital landscape. While cloud computing revolutionizes the way businesses and
individuals manage data and applications, cryptomining is a computational process used to validate
transactions and generate cryptocurrencies like Bitcoin and Ethereum. The intersection of these two
technologies raises various challenges and opportunities that merit exploration. This literature
survey aims to unveil the key challenges and opportunities associated with the convergence of cloud
computing and cryptomining.
Published
Name of the Paper Author Research Focus
Year
Aaron Zimba,
Recent Advances in Crypto 2019 To investigate the recent
Mwenge Mulenga,
virology: State-of-the-Art advances in crypto virology,
Hong song Chen
Crypto Mining and Crypto particularly crypto mining and
Ransomware Attacks crypto ransomware attacks.
Ganapathy Mani,
DeCrypto Pro: Deep VikramPasumarti, To develop a deep learning-
Learning Based Bharat based system for detecting
Cryptomining Malware Bhargava,Faisal 2020 cryptomining malware
Detection Using Tariq Vora,James using performance
Performance Counters MacDonald,Justin counters.
King,Jason Kobes
ANTONIOPASTOR ,
ALBERTO MOZO ,
STANISLAV
VAKARUK, DANIELE To develop machine and deep
Detection of Encrypted
CANAVESE , DIEGO learning-based methods for
Cryptomining Malware
R. LÓPEZ , 2020 detecting encrypted
Connections with Machine
LEONARDO cryptomining malware
Learning
REGANO, SANDRA connections.
GÓMEZCANAVAL,A
ND
ANTONIO LIOY.
Dr. Dimitrios
This paper investigates the
Cryptocurrency Mining as a Kyritsis, Dr. George
impact of cryptocurrency mining
Service (CMaaS): The Panagiotakopoulos 2021
as a service (CMaaS) on cloud
Impacts on Cloud Providers and Dr. Konstantina
providers. It finds that CMaaS
Sgantzos
can lead to increased costs,
performance degradation, and
security risks for cloud providers.
Blockchain
Blockchain is a distributed database that is shared among the nodes of a computer network.
As a database, a blockchain stores information electronically in digital format. Blockchains
are best known for their crucial role in cryptocurrency systems, such as Bitcoin, for
maintaining a secure and decentralized record of transactions.
However, blockchain technology can be used for a wide range of other applications, such as:
Cloud computing has had a major impact on blockchain and cryptomining. By providing
access to powerful computing resources on demand, cloud computing has made it possible
for more people to participate in cryptomining and to develop and deploy blockchain
applications.
Some of the specific ways in which cloud computing has affected blockchain and
cryptomining include:
• Reduced costs: Cloud computing can help to reduce the costs of cryptomining by
providing miners with access to powerful computing resources on a pay-as-you-go
basis. This can be especially beneficial for small-scale miners who may not be able to
afford to purchase their own mining hardware.
• Improved security: Cloud computing can help to improve the security of blockchain
applications and cryptomining operations. Cloud computing providers offer a variety
of security features and services that can help to protect blockchain applications and
cryptomining operations from cyberattacks.
• More secure cloud computing platforms: Blockchain can be used to create more
secure cloud computing platforms. For example, blockchain can be used to store and
manage encryption keys, which can help to protect cloud computing customers
from data breaches.
Challenges
Resource Overutilization: Cryptominers have been known to exploit cloud resources without
authorization, causing overutilization issues for cloud providers. This can result in increased
operational costs and decreased performance for legitimate users.
Manoj Kumar Gupta and Pravin Chandra. (2018) in their paper” Cryptocurrency Mining: A
Comprehensive Survey” highlight the problem of unauthorized cryptomining in cloud environments.
1. Security Risks: Cryptomining malware can infect cloud infrastructure, compromising data
integrity and confidentiality. Mining activities can also dis-guise more sinister attacks,
making it difficult to detect and mitigate security threats.
2. Narasimha Kamath. (2019) discuss the security implications of cryptomining in cloud
environments in their paper titled Cryptocurrency Mining Malware: An Evolving Threat in
the Cloud
4. Energy Consumption: Cryptomining, especially Proof of Work (PoW) mining, is energy intensive.
When performed on a large scale within cloud data centers, it can contribute to substantial energy
consumption and environmental concerns. Riikka Koulu. (2019) investigate the energy efficiency of
cryptomining algorithms and their implications for data centres in their research paper” The Bitcoin
Lightning Network: Scalable Off-Chain Instant Payments.”*
Opportunities
Resource Monetization: Cloud providers can explore opportunities to monetize idle resources by offering
legitimate cryptomining services to clients This can generate additional revenue and optimize resource
utilization. Kim Hartman. (2020) discuss the potential benefits of resource monetization through
cryptomining in their paper” Cryptocurrency Mining as a Service (CMaaS): The Impacts on Cloud Providers.” *
Security Solutions: Researchers and cybersecurity experts are developing innovative solutions to detect
and mitigate cryptomining malware in cloud environments. These solutions enhance the overall security
posture of cloud services. Sam Rahman. (2021) propose a novel intrusion detection system for detecting
cryptomining activities in cloud infrastructure in their paper titled” A Machine Learning-Based Cryptomining
Detection System for Cloud Environments.”
Energy Efficiency: Some cryptocurrencies are exploring more energy efficient consensus mechanisms, such as
Proof of Stake (PoS), which could reduce the environmental impact of cryptomining in cloud datacentres.
Steve Bentov. (2017) investigate the PoS consensus mechanism and its potential to reduce energy
consumption in their paper” Taming the Blockchain: A Scalable Infrastructure for Decentralized Applications.”
*
The intersection of cloud computing and cryptomining presents both challenges and opportunities.
Addressing the challenges related to resource overutilization, security risks, performance
degradation, and energy consumption is crucial to ensure the sustainable coexistence of these
technologies. At the same time, the convergence of cloud computing and cryptomining offers the
potential for resource monetization, enhanced security solutions, and a shift towards more energy-
efficient consensus mechanisms. Further research and innovation are needed to maximize the
benefits and mitigate the risks associated with this convergence.
Research Objectives
Research Design
Data Collection
Literature Review: A thorough review of existing literature will be con- ducted to understand the
current state of research on cloud computing and cryptominers.
Surveys: Online surveys will be designed and distributed to cloud service providers, IT professionals,
and cryptominer operators to gather insights into their experiences and perspectives.
Case Studies: Real-world case studies of cloud infrastructure affected by cryptominers will be
analysed to provide practical insights.
2 Data Analysis
Quantitative Analysis: Survey data will be analysed using statistical methods to identify trends,
challenges, and opportunities.
Qualitative Analysis: Content analysis will be applied to the literature and case study data to
extract key themes and insights.
Data Collection Procedures 3 Literature Review:
Surveys:
• Develop a structured questionnaire.
• Distribute the survey through online platforms and professional networks.
• Collect and anonymize responses for analysis.
Case Studies:
• Identify relevant case studies in the cloud computing and cryptocurrency domains.
• Gather data related to the impact of cryptominers on cloud infrastructure.
• Employ descriptive statistics, correlation analysis, and regression analysis to uncover patterns and
relationships.
Qualitative Analysis:
• Employ content analysis techniques to categorize and interpret textual data from literature and case
studies.
• Identify common themes and emerging patterns.
Ethical Considerations
Ensure the anonymity and confidentiality of survey respondents.
Adhere to ethical guidelines when conducting research involving human participants.
Conclusion
This research methodology will provide a structured approach to investigating the challenges and
opportunities associated with the integration of cloud computing and cryptocurrency miners. By
combining quantitative and qualitative data analysis, this study aims to offer valuable insights for
cloud service providers, IT professionals, and researchers in the field.
Result
The results of this study shed light on the challenges and opportunities presented by the
convergence of cloud computing and cryptocurrency miners. Through comprehensive research
methodology, including literature review, surveys, and case studies, we have gained valuable
insights into this emerging domain. The key findings are summarized below: 
Impact of Cryptominers on Cloud Computing Infrastructure
Cryptominers have a significant impact on cloud computing infrastructure. They consume computing
resources, leading to increased operational costs for cloud service providers.
Scalability and performance of cloud services can be compromised as cryptominers compete for
resources with legitimate users.
Unauthorized cryptominers can breach cloud security, potentially leading to data breaches and
financial losses. 
Security and Performance Challenges
Cryptominers in cloud environments pose security challenges, including the risk of malware injection
and data exfiltration.
Resource contention between miners and other users can result in performance degradation and
unpredictable service levels.
Traditional security measures may not be sufficient to detect and mitigate cryptominer activity in
cloud environments. 
Opportunities for Cloud Service Providers
Cloud service providers have an opportunity to develop specialized services and solutions for
detecting and mitigating cryptominers.
Enhanced security and performance monitoring tools can help cloud providers proactively address
cryptominer-related issues.
Educating customers about the risks of cryptominers and providing guidance on best practices can
strengthen customer relationships. 
Survey Insights
Survey responses from IT professionals and cryptominer operators indicate a growing awareness of
the challenges posed by cryptominers in cloud environments.
Respondents expressed interest in solutions that can automatically detect and prevent cryptominer
activity.
Cloud service providers can play a pivotal role in addressing these concerns by collaborating with
their customers. 
Case Studies
Analysis of real-world case studies revealed instances where cryptominers had a detrimental impact
on cloud infrastructure.
These cases underscored the need for improved monitoring, detection, and response mechanisms to
protect cloud resources. 
Recommendations
Cloud service providers should invest in robust security measures and re- source allocation policies
to mitigate the impact of cryptominers.
Collaboration between cloud providers and customers is essential to address cryptominer-related
challenges effectively.
Research and development efforts should focus on innovative solutions for detecting and preventing
cryptominer activity in cloud environments.
Conclusion
The study’s results highlight the intricate relationship between cloud computing and
cryptominers, emphasizing the challenges faced by cloud service providers and users.
While cryptominers introduce security and performance concerns, they also create opportunities for
innovation in cloud security and resource management.
It is evident that addressing the challenges and seizing the opportunities in this evolving landscape requires
proactive measures and collaborative efforts among stakeholders.
The findings of this research provide a foundation for further exploration and development in this
domain. 
Discussion
The intersection of cloud computing and cryptocurrency miners has become a critical area of
concern and interest for both cloud service providers and users. The discussion that follows delves
deeper into the challenges and opportunities revealed by this study and explores the implications of
these findings. 
Security Challenges
One of the most significant challenges associated with cryptominers in cloud environments is the
security risk they pose. Unauthorized miners can infiltrate cloud instances, compromising the
confidentiality, integrity, and availability of data. Moreover, cryptominers can serve as a vector for
malware injection, making cloud environments vulnerable to a range of cyber threats.
Opportunity: There is a clear opportunity for cloud providers to enhance their security measures
and develop specialized tools for detecting and mitigating cryptominer activity. Collaborative efforts
between cloud providers and cybersecurity experts can lead to more robust security solutions.
Detection and Mitigation
Detecting and mitigating cryptominer activity in cloud environments is not a straightforward task.
Traditional security measures may not be effective in identifying these resource-intensive
applications. Therefore, there is a need for innovative approaches to monitor and respond to
cryptominers.
Opportunity: Cloud service providers can invest in the development of advanced monitoring and
anomaly detection tools tailored specifically to identify cryptominer behaviour. Proactive measures
to detect and disrupt cryptominers can protect both cloud resources and user data.
4. Customer Education
Customer awareness plays a crucial role in addressing the challenges posed by cryptominers.
Many users may not be fully aware of the risks associated with cryptominers or how to protect their
cloud instances effectively.
Opportunity: Cloud providers can take a proactive role in educating their customers about the
risks of cryptominers and providing guidelines for securing their cloud environments. By
empowering users with knowledge, cloud providers can foster a more secure and resilient cloud
ecosystem.
5. Collaboration
The findings of this study highlight the importance of collaboration between cloud service
providers, IT professionals, and customers. Addressing the challenges posed by cryptominers
requires a collective effort.
Opportunity: Cloud providers can establish channels of communication with their customers to
understand their specific needs and concerns related to cryptominers. Collaborative research and
development efforts can lead to more effective solutions.
The convergence of cloud computing and cryptominers presents both challenges and
opportunities. While cryptominers pose security and performance risks, they also create
opportunities for innovation and collaboration within the cloud industry. Cloud service providers
that proactively address these challenges and seize the opportunities can enhance the resilience and
security of their cloud environments, ultimately benefiting both providers and users in this rapidly
evolving landscape. Continued research and development efforts are essential to stay ahead of the
evolving threat landscape and leverage the opportunities that emerge.
Future Scope:
The convergence of cloud computing and cryptominers is an ongoing process with several areas for
future exploration:
• Security Enhancements: Further research into robust security measures,
including intrusion detection systems and anomaly detection algorithms, is crucial to
protecting cloud environments from unauthorized cryptomining activities.
In conclusion, the evolving relationship between cloud computing and cryp-tominers presents an
evolving landscape filled with challenges to be addressed and opportunities to be harnessed.
Continued research, innovation, and responsible practices are essential to navigating this complex
intersection effectively and sustainably in the digital age.
References
• Ganapathy Mani,Vikram Pasumarti,Bharat Bhargava,Faisal Tariq Vora,James MacDonald,Justin
King,Jason Kobes - DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection
Using Performance Counters
• Kartik Nayak,Srijan Kumar,Andrew Miller,Elaine Shi -Stubborn Mining:
• Generalizing Selfish Mining and Combining with and Eclipse Attack
• Ankit Gangwal,Mauro Conti - Cryptomining Cannot Change Its Spots:
• Detecting Covert Cryptomining Using Magnetic Side-Channel
• Zhi Li,Weijie Liu,Hongbo, Chen,XiaoFeng Wang,Xiaojing Liao,Luyi Xing,Mingming Zha,Hai Jin,Deqing
Zou - Robbery on DevOps: Understanding and Mitigating llicit Cryptomining on Continuous
Integration Service Platforms
• Aaron Zimba, Hongsong Chen - Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining
and Crypto Ransomware Attacks
• Antonio pastor,alberto ,Mozo, Stanislav, vakaruk,daniele ,canavese,diego lopez,leonardo
regano,sandra gomez-canaval,antoniolioy - Detection of Encrypted Cryptomining Malware
Connections With Machine and Deep Learning
• Wenjuan Lian,Guoqing Nie,Yanyan Kang,Bin Jia,Yang Zhang -Cryptomining Malware Detection Based
on Edge Computing-Oriented Multi-Modal Features Deep Learning Machine Learning
• Mohammadreza Pourgholam - Cryptocurrency mining: A comprehensive Survey
• Rupesh Raj Karn , Prabhakar Kudva , Hai Huang,Sahil Suneja, and Ibrahim (Abe) M. Elfadel -
Cryptomining Detection in Container Clouds Using System Calls and Explainable
• Sergio Pastrana and Guillermo Suarez - Cryptocurrency Mining Malware
• Michael Horgan,Daniel McGinn Mining at Cloud Scale: Impact on Cloud Providers and End Users
• Joseph Poon and Thaddeus Dryja -The Bitcoin Lightning Network: Scalable Off-Chain Instant
Payments.
• Andreas Antonopoulos - Taming the Blockchain: A Scalable Infrastructure for Decentralized
Applications.
• Saurav Mishra - A Machine Learning-Based Cryptomining Detection System for Cloud Environments
• Dr. Dimitrios Kyritsis,Dr. George Panagiotakopoulos and Dr. Konstantina Sgantzos - Cryptocurrency
Mining as a Service (CMaaS): The Impacts on Cloud Providers.
Appendices
https://www.csoonline.com/article/564521/what-is-cryptojacking- how-to-prevent-detect-and-recover-
from-it.html
https://www.eset.com/int/illicit-cryptomining-business/
https://github.com/jtgrassie/monero-powpy.git
https://www.zdnet.com/article/pycryptominer-enslaves-your-pc- to-mine-monero/
https://www.malwarebytes.com/cryptojacking
https://www.eset.com/int/malicious-cryptominers/
https://cybersecurity.att.com/blogs/labs-research/making-it-rain- cryptocurrency-mining-attacks-in-the-
cloud
https://cloud.google.com/architecture/bps-for-protecting-against- crytocurrency-attacks
https://www.cnbc.com/2021/11/26/google-warns-crypto-miners- are-using-compromised-cloud-accounts-
.html
https://cointelegraph.com/news/businesses-increasingly-see-crypto- mining-attacks-in-cloud-
infrastructures
https://www.coindesk.com/tesla-public-cloud-was-briefly-hijacked- by-crypto-miners