Paper 2024/672
Secure Coded Distributed Computing and Extensions to Multiple Access Setting
Abstract
We consider two critical aspects of security in the distributed computing (DC) model: secure data shuffling and secure coded computing. It is imperative that any external entity overhearing the communication does not gain any information about the intermediate values (IVs) exchanged during the shuffling phase of the DC model. Our approach ensures IV confidentiality during data shuffling. Moreover, each node in the system must be able to recover the IVs necessary for computing its output functions but must also remain oblivious to the IVs associated with output functions not assigned to it. We design secure DC methods and establish achievable limits on the tradeoffs between the communication and computation loads to contribute to the advancement of secure data processing in distributed systems. First, we establish that the computation and communication loads stay the same as for non-secure data shuffling. However, implementing secure data shuffling requires additional overhead for storing secret keys at the nodes. Next, we show that for secure coded computation, both the computation and communication loads increase compared to the non-secure scenario, along with the overhead for storing secret keys. Finally, we extend our security results to a novel distributed computing model known as multi-access distributed computing (MADC), which was recently introduced. The MADC model features two distinct sets of nodes, namely mapper and reducer nodes. Unlike the original setting where mapper and reducer nodes were the same, in this model, they are separate entities, and each reducer node is connected to multiple mapper nodes. We show that, for MADC models also, the computation and communication loads remain the same with or without secure data shuffling. However, secure coded computation results in increased computation and communication loads compared to the non-secure case, and both scenarios require overhead for storing secret keys at the reducer nodes.
Metadata
- Available format(s)
- Category
- Foundations
- Publication info
- Preprint.
- Keywords
- distributed computingMapReduce arraysecure distributed computationssecure coded distributed computing
- Contact author(s)
-
shanuja sasi @ liu se
onur gunlu @ liu se - History
- 2024-08-23: revised
- 2024-05-02: received
- See all versions
- Short URL
- https://ia.cr/2024/672
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/672, author = {Shanuja Sasi and Onur Gunlu}, title = {Secure Coded Distributed Computing and Extensions to Multiple Access Setting}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/672}, year = {2024}, url = {https://eprint.iacr.org/2024/672} }