Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers

Distributed computing has emerged as a promising solution for accelerating machine learning training processes on large-scale datasets by leveraging the parallel processing capabilities of multiple workers. However, there remain two major issues that still need to be addressed: 1) Byzantine attacks...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2024, Vol.19, p.4344-4357
Hauptverfasser: Hong, Sangwoo, Yang, Heecheol, Yoon, Youngseok, Lee, Jungwoo
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 4357
container_issue
container_start_page 4344
container_title IEEE transactions on information forensics and security
container_volume 19
creator Hong, Sangwoo
Yang, Heecheol
Yoon, Youngseok
Lee, Jungwoo
description Distributed computing has emerged as a promising solution for accelerating machine learning training processes on large-scale datasets by leveraging the parallel processing capabilities of multiple workers. However, there remain two major issues that still need to be addressed: 1) Byzantine attacks from malicious workers; and 2) the effect of slow workers, commonly referred to as stragglers. In this paper, we address both issues concurrently by introducing Group-wise Verifiable Coded Computing (GVCC), a novel approach that combines coding techniques and group-wise verification to enhance robustness against Byzantine attacks and resilience to straggler effects in distributed computing. The key idea of GVCC is to verify a group of computation results from workers at a time, while providing resilience to stragglers through encoding tasks assigned to workers with Group-wise Verifiable Codes. We evaluate the performance of GVCC through experiments conducted on Amazon EC2 clouds and the results show that GVCC outperforms the existing methods in terms of overall processing time and verification time while maintaining the verification performance. This study highlights the potential of GVCC as an effective solution for overcoming the challenges of Byzantine attacks and stragglers in distributed computing for executing matrix multiplication.
doi_str_mv 10.1109/TIFS.2024.3377929
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_10473190</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10473190</ieee_id><sourcerecordid>3053297064</sourcerecordid><originalsourceid>FETCH-LOGICAL-c246t-de067afe402b99915c59d9fa8842f8e08f99984fbe008c7ba36bcf0d5023fd293</originalsourceid><addsrcrecordid>eNpNkEtPwkAUhSdGExH9ASYumrgu3nm0nVkiESQhcQHocjLt3CFFaOtMu4BfbwnEuLmvnHNu8hHySGFEKaiX1Xy6HDFgYsR5limmrsiAJkkap8Do9d9M-S25C2ELIARN5YAsZr7umvirDBh9oi9dafIdRpPaou3rvunastpE68qij14PR1P1O0bjtjXFd4hMZaNl681ms0Mf7smNM7uAD5c-JOvp22ryHi8-ZvPJeBEXTKRtbBHSzDgUwHKlFE2KRFnljJSCOYkgXX-VwuUIIIssNzzNCwc2AcadZYoPyfM5t_H1T4eh1du681X_UnNIOFMZpKJX0bOq8HUIHp1ufLk3_qAp6BM0fYKmT9D0BVrveTp7SkT8pxcZpwr4L5TIaEk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3053297064</pqid></control><display><type>article</type><title>Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers</title><source>IEEE Electronic Library (IEL)</source><creator>Hong, Sangwoo ; Yang, Heecheol ; Yoon, Youngseok ; Lee, Jungwoo</creator><creatorcontrib>Hong, Sangwoo ; Yang, Heecheol ; Yoon, Youngseok ; Lee, Jungwoo</creatorcontrib><description>Distributed computing has emerged as a promising solution for accelerating machine learning training processes on large-scale datasets by leveraging the parallel processing capabilities of multiple workers. However, there remain two major issues that still need to be addressed: 1) Byzantine attacks from malicious workers; and 2) the effect of slow workers, commonly referred to as stragglers. In this paper, we address both issues concurrently by introducing Group-wise Verifiable Coded Computing (GVCC), a novel approach that combines coding techniques and group-wise verification to enhance robustness against Byzantine attacks and resilience to straggler effects in distributed computing. The key idea of GVCC is to verify a group of computation results from workers at a time, while providing resilience to stragglers through encoding tasks assigned to workers with Group-wise Verifiable Codes. We evaluate the performance of GVCC through experiments conducted on Amazon EC2 clouds and the results show that GVCC outperforms the existing methods in terms of overall processing time and verification time while maintaining the verification performance. This study highlights the potential of GVCC as an effective solution for overcoming the challenges of Byzantine attacks and stragglers in distributed computing for executing matrix multiplication.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2024.3377929</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Byzantine attacks ; coded computing ; Codes ; Decoding ; Distributed computing ; Distributed processing ; Encoding ; Machine learning ; Parallel processing ; Performance evaluation ; Resilience ; straggler effect ; Task analysis ; Verification</subject><ispartof>IEEE transactions on information forensics and security, 2024, Vol.19, p.4344-4357</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c246t-de067afe402b99915c59d9fa8842f8e08f99984fbe008c7ba36bcf0d5023fd293</cites><orcidid>0000-0002-2802-2143 ; 0000-0002-0270-2781 ; 0000-0002-6804-980X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10473190$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,4010,27900,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10473190$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Hong, Sangwoo</creatorcontrib><creatorcontrib>Yang, Heecheol</creatorcontrib><creatorcontrib>Yoon, Youngseok</creatorcontrib><creatorcontrib>Lee, Jungwoo</creatorcontrib><title>Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>Distributed computing has emerged as a promising solution for accelerating machine learning training processes on large-scale datasets by leveraging the parallel processing capabilities of multiple workers. However, there remain two major issues that still need to be addressed: 1) Byzantine attacks from malicious workers; and 2) the effect of slow workers, commonly referred to as stragglers. In this paper, we address both issues concurrently by introducing Group-wise Verifiable Coded Computing (GVCC), a novel approach that combines coding techniques and group-wise verification to enhance robustness against Byzantine attacks and resilience to straggler effects in distributed computing. The key idea of GVCC is to verify a group of computation results from workers at a time, while providing resilience to stragglers through encoding tasks assigned to workers with Group-wise Verifiable Codes. We evaluate the performance of GVCC through experiments conducted on Amazon EC2 clouds and the results show that GVCC outperforms the existing methods in terms of overall processing time and verification time while maintaining the verification performance. This study highlights the potential of GVCC as an effective solution for overcoming the challenges of Byzantine attacks and stragglers in distributed computing for executing matrix multiplication.</description><subject>Byzantine attacks</subject><subject>coded computing</subject><subject>Codes</subject><subject>Decoding</subject><subject>Distributed computing</subject><subject>Distributed processing</subject><subject>Encoding</subject><subject>Machine learning</subject><subject>Parallel processing</subject><subject>Performance evaluation</subject><subject>Resilience</subject><subject>straggler effect</subject><subject>Task analysis</subject><subject>Verification</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkEtPwkAUhSdGExH9ASYumrgu3nm0nVkiESQhcQHocjLt3CFFaOtMu4BfbwnEuLmvnHNu8hHySGFEKaiX1Xy6HDFgYsR5limmrsiAJkkap8Do9d9M-S25C2ELIARN5YAsZr7umvirDBh9oi9dafIdRpPaou3rvunastpE68qij14PR1P1O0bjtjXFd4hMZaNl681ms0Mf7smNM7uAD5c-JOvp22ryHi8-ZvPJeBEXTKRtbBHSzDgUwHKlFE2KRFnljJSCOYkgXX-VwuUIIIssNzzNCwc2AcadZYoPyfM5t_H1T4eh1du681X_UnNIOFMZpKJX0bOq8HUIHp1ufLk3_qAp6BM0fYKmT9D0BVrveTp7SkT8pxcZpwr4L5TIaEk</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Hong, Sangwoo</creator><creator>Yang, Heecheol</creator><creator>Yoon, Youngseok</creator><creator>Lee, Jungwoo</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-2802-2143</orcidid><orcidid>https://orcid.org/0000-0002-0270-2781</orcidid><orcidid>https://orcid.org/0000-0002-6804-980X</orcidid></search><sort><creationdate>2024</creationdate><title>Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers</title><author>Hong, Sangwoo ; Yang, Heecheol ; Yoon, Youngseok ; Lee, Jungwoo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c246t-de067afe402b99915c59d9fa8842f8e08f99984fbe008c7ba36bcf0d5023fd293</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Byzantine attacks</topic><topic>coded computing</topic><topic>Codes</topic><topic>Decoding</topic><topic>Distributed computing</topic><topic>Distributed processing</topic><topic>Encoding</topic><topic>Machine learning</topic><topic>Parallel processing</topic><topic>Performance evaluation</topic><topic>Resilience</topic><topic>straggler effect</topic><topic>Task analysis</topic><topic>Verification</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hong, Sangwoo</creatorcontrib><creatorcontrib>Yang, Heecheol</creatorcontrib><creatorcontrib>Yoon, Youngseok</creatorcontrib><creatorcontrib>Lee, Jungwoo</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Hong, Sangwoo</au><au>Yang, Heecheol</au><au>Yoon, Youngseok</au><au>Lee, Jungwoo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2024</date><risdate>2024</risdate><volume>19</volume><spage>4344</spage><epage>4357</epage><pages>4344-4357</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>Distributed computing has emerged as a promising solution for accelerating machine learning training processes on large-scale datasets by leveraging the parallel processing capabilities of multiple workers. However, there remain two major issues that still need to be addressed: 1) Byzantine attacks from malicious workers; and 2) the effect of slow workers, commonly referred to as stragglers. In this paper, we address both issues concurrently by introducing Group-wise Verifiable Coded Computing (GVCC), a novel approach that combines coding techniques and group-wise verification to enhance robustness against Byzantine attacks and resilience to straggler effects in distributed computing. The key idea of GVCC is to verify a group of computation results from workers at a time, while providing resilience to stragglers through encoding tasks assigned to workers with Group-wise Verifiable Codes. We evaluate the performance of GVCC through experiments conducted on Amazon EC2 clouds and the results show that GVCC outperforms the existing methods in terms of overall processing time and verification time while maintaining the verification performance. This study highlights the potential of GVCC as an effective solution for overcoming the challenges of Byzantine attacks and stragglers in distributed computing for executing matrix multiplication.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2024.3377929</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-2802-2143</orcidid><orcidid>https://orcid.org/0000-0002-0270-2781</orcidid><orcidid>https://orcid.org/0000-0002-6804-980X</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2024, Vol.19, p.4344-4357
issn 1556-6013
1556-6021
language eng
recordid cdi_ieee_primary_10473190
source IEEE Electronic Library (IEL)
subjects Byzantine attacks
coded computing
Codes
Decoding
Distributed computing
Distributed processing
Encoding
Machine learning
Parallel processing
Performance evaluation
Resilience
straggler effect
Task analysis
Verification
title Group-Wise Verifiable Coded Computing Under Byzantine Attacks and Stragglers
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T13%3A47%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Group-Wise%20Verifiable%20Coded%20Computing%20Under%20Byzantine%20Attacks%20and%20Stragglers&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Hong,%20Sangwoo&rft.date=2024&rft.volume=19&rft.spage=4344&rft.epage=4357&rft.pages=4344-4357&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2024.3377929&rft_dat=%3Cproquest_RIE%3E3053297064%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3053297064&rft_id=info:pmid/&rft_ieee_id=10473190&rfr_iscdi=true