ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

Minimizing Latency for Secure Coded Computing Using Secret Sharing via Staircase Codes

Bitar, R and Parag, P and El Rouayheb, S (2020) Minimizing Latency for Secure Coded Computing Using Secret Sharing via Staircase Codes. In: IEEE Transactions on Communications, 68 (8). pp. 4609-4619.

[img] PDF
iee_tra_com_68-08_4609-4619_2020.pdf - Published Version
Restricted to Registered users only

Download (1MB) | Request a copy
Official URL: https://dx.doi.org/10.1109/TCOMM.2020.2988506

Abstract

We consider the setting of a Master server, M, who possesses confidential data and wants to run intensive computations on it, as part of a machine learning algorithm for example. The Master wants to distribute these computations to untrusted workers who volunteered to help with this task. However, the data must be kept private in an information theoretic sense. Some of the workers may be stragglers, e.g., slow or busy. We are interested in reducing the delays experienced by the Master. We focus on linear computations as an essential operation in many iterative algorithms. We propose a solution based on new codes, called Staircase codes, introduced previously by two of the authors. Staircase codes allow flexibility in the number of stragglers up to a given maximum, and universally achieve the information theoretic limit on the download cost by the Master, leading to latency reduction. We find upper and lower bounds on the Master's mean waiting time. We derive the distribution of the Master's waiting time, and its mean, for systems with up to two stragglers. We show that Staircase codes always outperform existing solutions based on classical secret sharing codes. We validate our results with extensive implementation on Amazon EC2. © 2020 IEEE.

Item Type: Journal Article
Publication: IEEE Transactions on Communications
Publisher: Institute of Electrical and Electronics Engineers Inc.
Additional Information: The copyright of this article belongs to Institute of Electrical and Electronics Engineers Inc.
Keywords: Codes (symbols); Iterative methods; Learning algorithms; Machine learning; Turing machines, Confidential data; Information-theoretic limits; Iterative algorithm; Latency reduction; Linear computations; Mean waiting time; Secret sharing; Upper and lower bounds, Stairs
Department/Centre: Division of Electrical Sciences > Electrical Communication Engineering
Date Deposited: 27 Oct 2020 06:48
Last Modified: 27 Oct 2020 06:48
URI: http://eprints.iisc.ac.in/id/eprint/66605

Actions (login required)

View Item View Item