Adaptive Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning

被引:15
作者
Tang, Tingting [1 ]
Ali, Ramy E. [2 ]
Hashemi, Hanieh [2 ]
Gangwani, Tynan [2 ]
Avestimehr, Salman [2 ]
Annavaram, Murali [2 ]
机构
[1] Univ Southern Calif, Comp Sci Dept, Los Angeles, CA 90007 USA
[2] Univ Southern Calif, Elect Engn Dept, Los Angeles, CA 90007 USA
来源
2022 IEEE 36TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS 2022) | 2022年
关键词
coded computing; verifiable computing; machine learning; straggler mitigation; Byzantine robustness; privacy;
D O I
10.1109/IPDPS53621.2022.00067
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Stragglers, Byzantine workers, and data privacy are the main bottlenecks in distributed cloud computing. Some prior works proposed coded computing strategies to jointly address all three challenges. They require either a large number of workers, a significant communication cost or a significant computational complexity to tolerate Byzantine workers. Much of the overhead in prior schemes comes from the fact that they tightly couple coding for all three problems into a single framework. In this paper, we propose Adaptive Verifiable Coded Computing (AVCC) framework that decouples the Byzantine node detection challenge from the straggler tolerance. AVCC leverages coded computing just for handling stragglers and privacy, and then uses an orthogonal approach that leverages verifiable computing to mitigate Byzantine workers. Furthermore, AVCC dynamically adapts its coding scheme to trade-off straggler tolerance with Byzantine protection. We evaluate AVCC on a compute-intensive distributed logistic regression application. Our experiments show that AVCC achieves up to 4.2x speedup and up to 5.1% accuracy improvement over the state-of-the-art Lagrange coded computing approach (LCC). AVCC also speeds up the conventional uncoded implementation of distributed logistic regression by up to 7.6x, and improves the test accuracy by up to 12.1%.
引用
收藏
页码:628 / 638
页数:11
相关论文
共 41 条
[1]  
Ali RE, 2024, Arxiv, DOI arXiv:2011.05530
[2]  
Ananthanarayanan Ganesh, 2013, Proceedings of NSDI '13: 10th USENIX Symposium on Networked Systems Design and Implementation. NSDI '13, P185
[3]  
Ananthanarayanan G., 2010, Osdi, V10, P24
[4]  
[Anonymous], 2004, Advances in Neural Information Processing Systems
[5]  
Apache Hadoop, 2021, About us
[6]  
Berlekamp ElwynR., 1966, Non-binary BCH decoding
[7]  
Blanchard P, 2017, ADV NEUR IN, V30
[8]  
Chen L., 2018, INT C MACHINE LEARNI, V80, P903
[9]   Coded Computing for Secure Boolean Computations [J].
Yang, Chien-Sheng ;
Avestimehr, A. Salman .
IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY, 2021, 2 (01) :326-337
[10]  
Costan Victor, 2016, IACR Cryptol. ePrint Arch., V2016, P1