Differential Privacy Meets Federated Learning Under Communication Constraints
نویسندگان
چکیده
The performance of federated learning systems is bottlenecked by communication costs and training variance. overhead problem usually addressed three communication-reduction techniques, namely, model compression, partial device participation, periodic aggregation, at the cost increased Different from traditional distributed systems, suffers data heterogeneity (since devices sample their possibly different distributions), which induces additional variance among during training. Various variance-reduced algorithms have been introduced to combat effects heterogeneity, while they resources deliver necessary control information. Additionally, privacy remains a critical issue in FL and, thus, there attempts bringing Differential Privacy this framework as mediator between utility requirements. This article investigates tradeoffs under resource-constrained system theoretically experimentally, studies how reduction techniques interplay differentially private setting. results provide important insights into designing practical privacy-aware systems.
منابع مشابه
Minimum spanning tree release under differential privacy constraints
We investigate the problem of nodes clustering under privacy constraints when representing a dataset as a graph. Our contribution is threefold. First we formally define the concept of differential privacy for structured databases such as graphs, and give an alternative definition based on a new neighborhood notion between graphs. This definition is adapted to particular frameworks that can be m...
متن کاملDifferential Privacy Under Fire
Anonymizing private data before release is not enough to reliably protect privacy, as Netflix and AOL have learned to their cost. Recent research on differential privacy opens a way to obtain robust, provable privacy guarantees, and systems like PINQ and Airavat now offer convenient frameworks for processing arbitrary userspecified queries in a differentially private way. However, these systems...
متن کاملEstimation Efficiency Under Privacy Constraints
We investigate the problem of estimating a random variable Y ∈ Y under a privacy constraint dictated by another correlated random variable X ∈ X , where estimation efficiency and privacy are assessed in terms of two different loss functions. In the discrete case, we use the Hamming loss function and express the corresponding utility-privacy tradeoff in terms of the privacy-constrained guessing ...
متن کاملInformation Extraction Under Privacy Constraints
A privacy-constrained information extraction problem is considered where for a pair of correlated discrete random variables (X,Y ) governed by a given joint distribution, an agent observes Y and wants to convey to a potentially public user as much information about Y as possible without compromising the amount of information revealed about X . To this end, the so-called rate-privacy function is...
متن کاملTesting Under Communication Constraints
The problem of fault diagnosis with communication constraints is considered. Most approaches to fault diagnosis have been focused on detecting and isolating a fault under cost constraints such as economic factors and computational time. But in some systems, such as remote monitoring (e.g., satellite, sensor field) systems, there is a communication constraint between the system being monitored a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2022
ISSN: ['2372-2541', '2327-4662']
DOI: https://doi.org/10.1109/jiot.2021.3101991