Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/SP.2014.37guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Permacoin: Repurposing Bitcoin Work for Data Preservation

Published: 18 May 2014 Publication History

Abstract

Bit coin is widely regarded as the first broadly successful e-cash system. An oft-cited concern, though, is that mining Bit coins wastes computational resources. Indeed, Bit coin's underlying mining mechanism, which we call a scratch-off puzzle (SOP), involves continuously attempting to solve computational puzzles that have no intrinsic utility. We propose a modification to Bit coin that repurposes its mining resources to achieve a more broadly useful goal: distributed storage of archival data. We call our new scheme Perm coin. Unlike Bit coin and its proposed alternatives, Perm coin requires clients to invest not just computational resources, but also storage. Our scheme involves an alternative scratch-off puzzle for Bit coin based on Proofs-of-Retrievability (PORs). Successfully minting money with this SOP requires local, random access to a copy of a file. Given the competition among mining clients in Bit coin, this modified SOP gives rise to highly decentralized file storage, thus reducing the overall waste of Bit coin. Using a model of rational economic agents we show that our modified SOP preserves the essential properties of the original Bit coin puzzle. We also provide parameterizations and calculations based on realistic hardware constraints to demonstrate the practicality of Perm coin as a whole.

Cited By

View all
  • (2024)Exploring Blockchain Technology through a Modular Lens: A SurveyACM Computing Surveys10.1145/365728856:9(1-39)Online publication date: 11-Apr-2024
  • (2023)A Survey of Blockchain Consensus ProtocolsACM Computing Surveys10.1145/357984555:13s(1-35)Online publication date: 13-Jul-2023
  • (2022)A Study on Blockchain Architecture Design Decisions and Their Security Attacks and ThreatsACM Transactions on Software Engineering and Methodology10.1145/350274031:2(1-45)Online publication date: 1-Apr-2022
  • Show More Cited By

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
SP '14: Proceedings of the 2014 IEEE Symposium on Security and Privacy
May 2014
694 pages
ISBN:9781479946860

Publisher

IEEE Computer Society

United States

Publication History

Published: 18 May 2014

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Exploring Blockchain Technology through a Modular Lens: A SurveyACM Computing Surveys10.1145/365728856:9(1-39)Online publication date: 11-Apr-2024
  • (2023)A Survey of Blockchain Consensus ProtocolsACM Computing Surveys10.1145/357984555:13s(1-35)Online publication date: 13-Jul-2023
  • (2022)A Study on Blockchain Architecture Design Decisions and Their Security Attacks and ThreatsACM Transactions on Software Engineering and Methodology10.1145/350274031:2(1-45)Online publication date: 1-Apr-2022
  • (2021)Token-based incentive schemes in decentralized P2P storage networksProceedings of the 22nd International Middleware Conference: Doctoral Symposium10.1145/3491087.3493681(23-24)Online publication date: 6-Dec-2021
  • (2021)Detecting Compromised Edge Smart Cameras using Lightweight Environmental Fingerprint ConsensusProceedings of the 19th ACM Conference on Embedded Networked Sensor Systems10.1145/3485730.3493684(505-510)Online publication date: 15-Nov-2021
  • (2021)Audita: A Blockchain-based Auditing Framework for Off-chain StorageProceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing10.1145/3457977.3460293(5-10)Online publication date: 24-May-2021
  • (2021)Survey on Blockchain NetworkingACM Computing Surveys10.1145/345316154:5(1-34)Online publication date: 25-May-2021
  • (2021)Regulating Storage Overhead in Existing PoW-based BlockchainsProceedings of the 26th ACM Symposium on Access Control Models and Technologies10.1145/3450569.3463564(131-142)Online publication date: 11-Jun-2021
  • (2021)Proof-of-Prestige: A Useful Work Reward System for Unverifiable TasksACM Transactions on Internet Technology10.1145/341948321:2(1-27)Online publication date: 15-Jun-2021
  • (2020)A game-theoretic approach to storage offloading in PoC-based mobile blockchain miningProceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing10.1145/3397166.3409136(171-180)Online publication date: 11-Oct-2020
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media