Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers
Distributed computing has emerged as a promising solution for accelerating machine learning training processes on large-scale datasets by leveraging the parallel processing capabilities of multiple workers. However, there remain two major issues that still need to be addressed: 1) Byzantine attacks...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2024, Vol.19, p.4344-4357 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 4357 |
---|---|
container_issue | |
container_start_page | 4344 |
container_title | IEEE transactions on information forensics and security |
container_volume | 19 |
creator | Hong, Sangwoo Yang, Heecheol Yoon, Youngseok Lee, Jungwoo |
description | Distributed computing has emerged as a promising solution for accelerating machine learning training processes on large-scale datasets by leveraging the parallel processing capabilities of multiple workers. However, there remain two major issues that still need to be addressed: 1) Byzantine attacks from malicious workers; and 2) the effect of slow workers, commonly referred to as stragglers. In this paper, we address both issues concurrently by introducing Group-wise Verifiable Coded Computing (GVCC), a novel approach that combines coding techniques and group-wise verification to enhance robustness against Byzantine attacks and resilience to straggler effects in distributed computing. The key idea of GVCC is to verify a group of computation results from workers at a time, while providing resilience to stragglers through encoding tasks assigned to workers with Group-wise Verifiable Codes. We evaluate the performance of GVCC through experiments conducted on Amazon EC2 clouds and the results show that GVCC outperforms the existing methods in terms of overall processing time and verification time while maintaining the verification performance. This study highlights the potential of GVCC as an effective solution for overcoming the challenges of Byzantine attacks and stragglers in distributed computing for executing matrix multiplication. |
doi_str_mv | 10.1109/TIFS.2024.3377929 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_10473190</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10473190</ieee_id><sourcerecordid>3053297064</sourcerecordid><originalsourceid>FETCH-LOGICAL-c246t-de067afe402b99915c59d9fa8842f8e08f99984fbe008c7ba36bcf0d5023fd293</originalsourceid><addsrcrecordid>eNpNkEtPwkAUhSdGExH9ASYumrgu3nm0nVkiESQhcQHocjLt3CFFaOtMu4BfbwnEuLmvnHNu8hHySGFEKaiX1Xy6HDFgYsR5limmrsiAJkkap8Do9d9M-S25C2ELIARN5YAsZr7umvirDBh9oi9dafIdRpPaou3rvunastpE68qij14PR1P1O0bjtjXFd4hMZaNl681ms0Mf7smNM7uAD5c-JOvp22ryHi8-ZvPJeBEXTKRtbBHSzDgUwHKlFE2KRFnljJSCOYkgXX-VwuUIIIssNzzNCwc2AcadZYoPyfM5t_H1T4eh1du681X_UnNIOFMZpKJX0bOq8HUIHp1ufLk3_qAp6BM0fYKmT9D0BVrveTp7SkT8pxcZpwr4L5TIaEk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3053297064</pqid></control><display><type>article</type><title>Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers</title><source>IEEE Electronic Library (IEL)</source><creator>Hong, Sangwoo ; Yang, Heecheol ; Yoon, Youngseok ; Lee, Jungwoo</creator><creatorcontrib>Hong, Sangwoo ; Yang, Heecheol ; Yoon, Youngseok ; Lee, Jungwoo</creatorcontrib><description>Distributed computing has emerged as a promising solution for accelerating machine learning training processes on large-scale datasets by leveraging the parallel processing capabilities of multiple workers. However, there remain two major issues that still need to be addressed: 1) Byzantine attacks from malicious workers; and 2) the effect of slow workers, commonly referred to as stragglers. In this paper, we address both issues concurrently by introducing Group-wise Verifiable Coded Computing (GVCC), a novel approach that combines coding techniques and group-wise verification to enhance robustness against Byzantine attacks and resilience to straggler effects in distributed computing. The key idea of GVCC is to verify a group of computation results from workers at a time, while providing resilience to stragglers through encoding tasks assigned to workers with Group-wise Verifiable Codes. We evaluate the performance of GVCC through experiments conducted on Amazon EC2 clouds and the results show that GVCC outperforms the existing methods in terms of overall processing time and verification time while maintaining the verification performance. This study highlights the potential of GVCC as an effective solution for overcoming the challenges of Byzantine attacks and stragglers in distributed computing for executing matrix multiplication.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2024.3377929</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Byzantine attacks ; coded computing ; Codes ; Decoding ; Distributed computing ; Distributed processing ; Encoding ; Machine learning ; Parallel processing ; Performance evaluation ; Resilience ; straggler effect ; Task analysis ; Verification</subject><ispartof>IEEE transactions on information forensics and security, 2024, Vol.19, p.4344-4357</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c246t-de067afe402b99915c59d9fa8842f8e08f99984fbe008c7ba36bcf0d5023fd293</cites><orcidid>0000-0002-2802-2143 ; 0000-0002-0270-2781 ; 0000-0002-6804-980X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10473190$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,4010,27900,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10473190$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Hong, Sangwoo</creatorcontrib><creatorcontrib>Yang, Heecheol</creatorcontrib><creatorcontrib>Yoon, Youngseok</creatorcontrib><creatorcontrib>Lee, Jungwoo</creatorcontrib><title>Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>Distributed computing has emerged as a promising solution for accelerating machine learning training processes on large-scale datasets by leveraging the parallel processing capabilities of multiple workers. However, there remain two major issues that still need to be addressed: 1) Byzantine attacks from malicious workers; and 2) the effect of slow workers, commonly referred to as stragglers. In this paper, we address both issues concurrently by introducing Group-wise Verifiable Coded Computing (GVCC), a novel approach that combines coding techniques and group-wise verification to enhance robustness against Byzantine attacks and resilience to straggler effects in distributed computing. The key idea of GVCC is to verify a group of computation results from workers at a time, while providing resilience to stragglers through encoding tasks assigned to workers with Group-wise Verifiable Codes. We evaluate the performance of GVCC through experiments conducted on Amazon EC2 clouds and the results show that GVCC outperforms the existing methods in terms of overall processing time and verification time while maintaining the verification performance. This study highlights the potential of GVCC as an effective solution for overcoming the challenges of Byzantine attacks and stragglers in distributed computing for executing matrix multiplication.</description><subject>Byzantine attacks</subject><subject>coded computing</subject><subject>Codes</subject><subject>Decoding</subject><subject>Distributed computing</subject><subject>Distributed processing</subject><subject>Encoding</subject><subject>Machine learning</subject><subject>Parallel processing</subject><subject>Performance evaluation</subject><subject>Resilience</subject><subject>straggler effect</subject><subject>Task analysis</subject><subject>Verification</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkEtPwkAUhSdGExH9ASYumrgu3nm0nVkiESQhcQHocjLt3CFFaOtMu4BfbwnEuLmvnHNu8hHySGFEKaiX1Xy6HDFgYsR5limmrsiAJkkap8Do9d9M-S25C2ELIARN5YAsZr7umvirDBh9oi9dafIdRpPaou3rvunastpE68qij14PR1P1O0bjtjXFd4hMZaNl681ms0Mf7smNM7uAD5c-JOvp22ryHi8-ZvPJeBEXTKRtbBHSzDgUwHKlFE2KRFnljJSCOYkgXX-VwuUIIIssNzzNCwc2AcadZYoPyfM5t_H1T4eh1du681X_UnNIOFMZpKJX0bOq8HUIHp1ufLk3_qAp6BM0fYKmT9D0BVrveTp7SkT8pxcZpwr4L5TIaEk</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Hong, Sangwoo</creator><creator>Yang, Heecheol</creator><creator>Yoon, Youngseok</creator><creator>Lee, Jungwoo</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-2802-2143</orcidid><orcidid>https://orcid.org/0000-0002-0270-2781</orcidid><orcidid>https://orcid.org/0000-0002-6804-980X</orcidid></search><sort><creationdate>2024</creationdate><title>Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers</title><author>Hong, Sangwoo ; Yang, Heecheol ; Yoon, Youngseok ; Lee, Jungwoo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c246t-de067afe402b99915c59d9fa8842f8e08f99984fbe008c7ba36bcf0d5023fd293</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Byzantine attacks</topic><topic>coded computing</topic><topic>Codes</topic><topic>Decoding</topic><topic>Distributed computing</topic><topic>Distributed processing</topic><topic>Encoding</topic><topic>Machine learning</topic><topic>Parallel processing</topic><topic>Performance evaluation</topic><topic>Resilience</topic><topic>straggler effect</topic><topic>Task analysis</topic><topic>Verification</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hong, Sangwoo</creatorcontrib><creatorcontrib>Yang, Heecheol</creatorcontrib><creatorcontrib>Yoon, Youngseok</creatorcontrib><creatorcontrib>Lee, Jungwoo</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Hong, Sangwoo</au><au>Yang, Heecheol</au><au>Yoon, Youngseok</au><au>Lee, Jungwoo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2024</date><risdate>2024</risdate><volume>19</volume><spage>4344</spage><epage>4357</epage><pages>4344-4357</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>Distributed computing has emerged as a promising solution for accelerating machine learning training processes on large-scale datasets by leveraging the parallel processing capabilities of multiple workers. However, there remain two major issues that still need to be addressed: 1) Byzantine attacks from malicious workers; and 2) the effect of slow workers, commonly referred to as stragglers. In this paper, we address both issues concurrently by introducing Group-wise Verifiable Coded Computing (GVCC), a novel approach that combines coding techniques and group-wise verification to enhance robustness against Byzantine attacks and resilience to straggler effects in distributed computing. The key idea of GVCC is to verify a group of computation results from workers at a time, while providing resilience to stragglers through encoding tasks assigned to workers with Group-wise Verifiable Codes. We evaluate the performance of GVCC through experiments conducted on Amazon EC2 clouds and the results show that GVCC outperforms the existing methods in terms of overall processing time and verification time while maintaining the verification performance. This study highlights the potential of GVCC as an effective solution for overcoming the challenges of Byzantine attacks and stragglers in distributed computing for executing matrix multiplication.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2024.3377929</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-2802-2143</orcidid><orcidid>https://orcid.org/0000-0002-0270-2781</orcidid><orcidid>https://orcid.org/0000-0002-6804-980X</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2024, Vol.19, p.4344-4357 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_ieee_primary_10473190 |
source | IEEE Electronic Library (IEL) |
subjects | Byzantine attacks coded computing Codes Decoding Distributed computing Distributed processing Encoding Machine learning Parallel processing Performance evaluation Resilience straggler effect Task analysis Verification |
title | Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T13%3A47%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Group-Wise%20Verifiable%20Coded%20Computing%20Under%20Byzantine%20Attacks%20and%20Stragglers&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Hong,%20Sangwoo&rft.date=2024&rft.volume=19&rft.spage=4344&rft.epage=4357&rft.pages=4344-4357&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2024.3377929&rft_dat=%3Cproquest_RIE%3E3053297064%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3053297064&rft_id=info:pmid/&rft_ieee_id=10473190&rfr_iscdi=true |