318 Hits in 9.6 sec

Lagrange Coded Computing: Optimal Design for Resiliency, Security and Privacy [article]

Qian Yu, Songze Li, Netanel Raviv, Seyed Mohammadreza Mousavi Kalan, Mahdi Soltanolkotabi, Salman Avestimehr
2019 arXiv   pre-print
Furthermore, we prove the optimality of LCC by showing that it achieves the optimal tradeoff between resiliency, security, and privacy, i.e., in terms of tolerating the maximum number of stragglers and  ...  We propose Lagrange Coded Computing (LCC), a new framework to simultaneously provide (1) resiliency against stragglers that may prolong computations; (2) security against Byzantine (or malicious) workers  ...  We prove the optimality of LCC by showing that it achieves the optimal tradeoff between resiliency, security, and privacy.  ... 
arXiv:1806.00939v4 fatcat:qy4eglfqa5c65eiwt42pfs572u

Single to Distributed Cloud Computing Security

Neha N., S.B. Waykar
2015 International Journal of Computer Applications  
security and different probably vulnerable areas became a priority for organizations acquiring with a cloud computing provide,.and it's relating to With additional organizations exploitation cloud computing  ...  This paper addresses doable solutions, for that surveys that is recent analysis associated with single and multi-cloud security. it's found that the analysis into the employment of multi-cloud suppliers  ...  Tessaro, "Optimal resilience for erasurecoded Byzantine distributed storage", We analyze the problem of efficient distributed storage of information in a messagepassing environment where both less than  ... 
doi:10.5120/ijca2015906773 fatcat:kj4lqbyrqbbn5g6xjjefmcjmsy

Coded Computing for Secure Boolean Computations [article]

Chien-Sheng Yang, A. Salman Avestimehr
2021 arXiv   pre-print
In terms of the security threshold, we show that the proposed coded ANF and coded DNF are optimal by providing a matching outer bound.  ...  However, the security threshold (i.e., the maximum number of adversarial workers can be tolerated such that the correct results can be obtained) provided by the recent proposed Lagrange Coded Computing  ...  resiliency, security, and privacy.  ... 
arXiv:2001.08720v2 fatcat:m4xwdsl5lndibd2dxw2vsobm2u

Private Secure Coded Computation [article]

Minchul Kim, Jungwoo Lee
2019 arXiv   pre-print
We introduce a variation of coded computation that ensures data security and master's privacy against workers, which is referred to as private secure coded computation.  ...  We propose a private secure coded computation scheme for matrix multiplication, namely private secure polynomial codes, based on private polynomial codes for private coded computation.  ...  Avestimehr, “Lagrange Coded Computing: outperforms the previous works when considering both of data Optimal Design for Resiliency, Security and Privacy,” arXiv preprint  ... 
arXiv:1902.00167v1 fatcat:bo6beavwz5eidbpnjj7vhz346m

Adaptive Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning [article]

Tingting Tang, Ramy E. Ali, Hanieh Hashemi, Tynan Gangwani, Salman Avestimehr, Murali Annavaram
2022 arXiv   pre-print
AVCC leverages coded computing just for handling stragglers and privacy, and then uses an orthogonal approach that leverages verifiable computing to mitigate Byzantine workers.  ...  Our experiments show that AVCC achieves up to 4.2× speedup and up to 5.1% accuracy improvement over the state-of-the-art Lagrange coded computing approach (LCC).  ...  Narayanan, “Deep Avestimehr, “Lagrange coded computing: Optimal design for resiliency, learning with limited numerical precision,” in International Conference security, and privacy  ... 
arXiv:2107.12958v2 fatcat:f4zr6cymjray3mwdcin2dsyqoi

A Survey of Coded Distributed Computing [article]

Jer Shyuan Ng, Wei Yang Bryan Lim, Nguyen Cong Luong, Zehui Xiong, Alia Asheralieva, Dusit Niyato, Cyril Leung, Chunyan Miao
2020 arXiv   pre-print
Then, we review and analyze a number of CDC approaches proposed to reduce the communication costs, mitigate the straggler effects, and guarantee privacy and security.  ...  Therefore, CDC may significantly reduce communication load, alleviate the effects of stragglers, provide fault-tolerance, privacy and security.  ...  privacy [20] and for some studies, security against malicious workers [21] , [176] .  ... 
arXiv:2008.09048v1 fatcat:riy4dxvuc5ae3krz7lf25zkg6m

LevioSA: Lightweight Secure Arithmetic Computation [article]

Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam
2020 IACR Cryptology ePrint Archive  
In this work, we design, optimize, and implement an actively secure protocol for secure two-party arithmetic computation.  ...  OLE is a commonly used primitive for secure arithmetic computation, analogously to the role of oblivious transfer in secure computation for Boolean circuits.  ...  We thank Leo de Castro, Chiraag Juvekar and Vinod Vaikuntanathan for helpful discussions and for sharing their code of their OLE implementation.  ... 
dblp:journals/iacr/HazayIMV20 fatcat:qoxbzhgsaray7piw7fhnvsde3a

Edge Computing in the Dark: Leveraging Contextual-Combinatorial Bandit and Coded Computing [article]

Chien-Sheng Yang, Ramtin Pedarsani, A. Salman Avestimehr
2021 arXiv   pre-print
We propose an online learning policy called online coded edge computing policy, which provably achieves asymptotically-optimal performance in terms of regret loss compared with the optimal offline policy  ...  With recent advancements in edge computing capabilities, there has been a significant increase in utilizing the edge cloud for event-driven and time-sensitive computations.  ...  Lagrange Coded Computing For the data storage of edge devices, we leverage a linear coding scheme called the Lagrange coding scheme [4] which is demonstrated to simultaneously provide resiliency, security  ... 
arXiv:1912.09512v2 fatcat:pmmrbuez6jdslanm6jtws7opv4

Security and efficiency trade-offs for cloud computing and storage

Jian Li, Kai Zhou, Jian Ren
2015 2015 Resilience Week (RWS)  
For online computing, we investigate outsourcing of general computational problems and propose efficient Cost-Aware Secure Outsourcing (CASO) schemes for problem transformation and outsourcing so that  ...  Cloud computing provides centralized data storage and online computing.  ...  In the recent years, the security of the regenerating code has been studied. In [2] , the authors analyzed the error resilience of the regenerating code in the network with errors and erasures.  ... 
doi:10.1109/rweek.2015.7287434 fatcat:7azj677joncqxhqsqouxmjiafa

List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier [article]

Mahdi Soleymani, Ramy E. Ali, Hessam Mahdavifar, A. Salman Avestimehr
2021 arXiv   pre-print
We further propose folded Lagrange coded computing (FLCC) to incorporate the developed techniques into a specific coded computing setting.  ...  More specifically, we leverage list-decoding techniques for folded Reed-Solomon codes and propose novel algorithms to recover the correct codeword using side information.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewer for providing a simple and short proof for Theorem 1.  ... 
arXiv:2101.11653v2 fatcat:4isjif2jpvainhpus4umdvz3j4

Breaking Blockchain's Communication Barrier with Coded Computation [article]

Canran Wang, Netanel Raviv
2022 arXiv   pre-print
the computation and storage benefits of sharding.  ...  Second, with the adoption of techniques from Information Dispersal and State Machine Replication, the system is resilient to Byzantine faults and achieves linear message complexity.  ...  LCC achieves the optimal tradeoff between resiliency, security and privacy.  ... 
arXiv:2204.00979v1 fatcat:r23g6gn255cjfgojxtlv6vcbbi

Entangled Polynomial Codes for Secure, Private, and Batch Distributed Matrix Multiplication: Breaking the "Cubic" Barrier [article]

Qian Yu, A. Salman Avestimehr
2020 arXiv   pre-print
Such block-partitioning based designs have been widely studied under the topics of secure, private, and batch computation, where the state of the arts all require computing at least "cubic" (pmn) number  ...  Entangled polynomial codes, first presented for straggler mitigation, provides a powerful method for breaking the cubic barrier.  ...  optimal tradeoff between straggler resiliency, security, and privacy.  ... 
arXiv:2001.05101v2 fatcat:5kk3mqfvfnfexbfa326p2ntxoi

Private Retrieval, Computing and Learning: Recent Progress and Future Challenges [article]

Sennur Ulukus, Salman Avestimehr, Michael Gastpar, Syed Jafar, Ravi Tandon, Chao Tian
2021 arXiv   pre-print
(privacy in distributed computing), and how to learn/train machine learning models from private data spread across multiple users (privacy in distributed (federated) learning).  ...  The article motivates each privacy setting, describes the problem formulation, summarizes breakthrough results in the history of each problem, and gives recent results and discusses some of the major ideas  ...  Challenges and open problems in private distributed computing: • Optimal coding for block matrix multiplication: In a standard coded computing setup, we aim to find coding designs to minimize the recovery  ... 
arXiv:2108.00026v1 fatcat:6guz4ejeuvfffi6e46abosf7vq

Preserving Data Security in Distributed Fog Computing

Hassan Noura, Ola Salman, Ali Chehab, Raphaël Couturier
2019 Ad hoc networks  
Moreover, the proposed cryptographic solution is based on the dynamic key-dependent approach, which allows for a good compromise between the security level and computational complexity.  ...  In this paper, a novel cryptographic solution is proposed to secure data in fog computing.  ...  authority, the provided security options, the computational overhead, and performance optimization.  ... 
doi:10.1016/j.adhoc.2019.101937 fatcat:ig2twapbineile5colqybvxpyu

Fog Computing Based on Machine Learning: A Review

Fady Esmat Fathel Samann, Adnan Mohsin Abdulazeez, Shavan Askar
2021 International Journal of Interactive Mobile Technologies  
This technology complements the cloud computing by providing processing power and storage to the edge of the network. However, it still suffers from performance and security issues.  ...  Fog computing's (FC) promising technology can solve the issue of computing and networking bottlenecks in large-scale IoT applications.  ...  ML for security and privacy preservation The studies in this subsection are centered around the security enhancement of FC or the network in general.  ... 
doi:10.3991/ijim.v15i12.21313 fatcat:ztfuzrshq5eavduujcrhp3unhu
« Previous Showing results 1 — 15 out of 318 results