DPBalance: Efficient and Fair Privacy Budget Scheduling for Federated Learning as a Service (2402.09715v1)
Abstract: Federated learning (FL) has emerged as a prevalent distributed machine learning scheme that enables collaborative model training without aggregating raw data. Cloud service providers further embrace Federated Learning as a Service (FLaaS), allowing data analysts to execute their FL training pipelines over differentially-protected data. Due to the intrinsic properties of differential privacy, the enforced privacy level on data blocks can be viewed as a privacy budget that requires careful scheduling to cater to diverse training pipelines. Existing privacy budget scheduling studies prioritize either efficiency or fairness individually. In this paper, we propose DPBalance, a novel privacy budget scheduling mechanism that jointly optimizes both efficiency and fairness. We first develop a comprehensive utility function incorporating data analyst-level dominant shares and FL-specific performance metrics. A sequential allocation mechanism is then designed using the Lagrange multiplier method and effective greedy heuristics. We theoretically prove that DPBalance satisfies Pareto Efficiency, Sharing Incentive, Envy-Freeness, and Weak Strategy Proofness. We also theoretically prove the existence of a fairness-efficiency tradeoff in privacy budgeting. Extensive experiments demonstrate that DPBalance outperforms state-of-the-art solutions, achieving an average efficiency improvement of $1.44\times \sim 3.49 \times$, and an average fairness improvement of $1.37\times \sim 24.32 \times$.
- European Commission, “General data protection regulation,” May 2018. [Online]. Available: https://gdpr-info.eu/
- M. Chen, R. Mathews, T. Ouyang, and F. Beaufays, “Federated learning of out-of-vocabulary words,” arXiv, Apr. 2019.
- S. Ramaswamy, R. Mathews, K. Rao, and F. Beaufays, “Federated learning for emoji prediction in a mobile keyboard,” arXiv, Jun. 2019.
- T. Yang, G. Andrew, H. Eichner, H. Sun, W. Li, N. Kong, D. Ramage, and F. Beaufays, “Applied federated learning: Improving google keyboard query suggestions,” arXiv, Jan. 2018.
- D. Leroy, A. Coucke, T. Lavril, T. Gisselbrecht, and J. Dureau, “Federated learning for keyword spotting,” in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP), May 2019, pp. 6341–6345.
- W. De Brouwer, “The federated future is ready for shipping,” Mar. 2019. [Online]. Available: https://medium.com/@_doc_ai/the-federated-future-is-ready-for-shipping-d17ff40f43e3
- C. He, S. Li, J. So, M. Zhang, H. Wang, X. Wang, P. Vepakomma, A. Singh, H. Qiu, L. Shen, P. Zhao, Y. Kang, Y. Liu, R. Raskar, Q. Yang, M. Annavaram, and S. Avestimehr, “Fedml: A research library and benchmark for federated machine learning,” arXiv, Jun. 2020.
- The FATE Authors, “Federated ai technology enabler,” 2019. [Online]. Available: https://www.fedai.org/
- N. Kourtellis, K. Katevas, and D. Perino, “Flaas: Federated learning as a service,” in Proc. Workshop Distrib. Mach. Learn., Dec. 2020, pp. 7–13.
- M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang, “Deep learning with differential privacy,” in Proc. ACM SIGSAC conf. comput. commun. secur., Oct. 2016, pp. 308–318.
- K. Wei, J. Li, M. Ding, C. Ma, H. H. Yang, F. Farokhi, S. Jin, T. Q. S. Quek, and H. V. Poor, “Federated learning with differential privacy: Algorithms and performance analysis,” IEEE Trans. Inf. Forensics Secur., vol. 15, no. 1, pp. 3454–3469, Jun. 2020.
- L. Sun, J. Qian, and X. Chen, “LDP-FL: practical private aggregation in federated learning with local differential privacy,” in Proc. Int. Joint Conf. Artif. Intell. (IJCAI), 19-27, Aug. 2021, pp. 1571–1578.
- A. Ghodsi, M. Zaharia, B. Hindman, A. Konwinski, S. Shenker, and I. Stoica, “Dominant resource fairness: Fair allocation of multiple resource types,” in Proc. USENIX Symp. Netw. Syst. Des. Implementation (NSDI), Mar. 2011.
- W. Li, L. Xiang, B. Guo, Z. Li, and X. Wang, “Dplanner: A privacy budgeting system for utility,” IEEE Trans. Inf. Forensics Secur., vol. 18, no. 1, pp. 1196–1210, Feb. 2023.
- P. Tholoniat, K. Kostopoulou, M. Chowdhury, A. Cidon, R. Geambasu, M. Lécuyer, and J. Yang, “Packing privacy budget efficiently,” arXiv, Jan. 2022.
- J. Yuan, S. Wang, S. Wang, Y. Li, X. Ma, A. Zhou, and M. Xu, “Privacy as a resource in differentially private federated learning,” in Proc. IEEE Int. Conf. Comp. Commun. (INFOCOM), May 2023.
- N. Küchler, E. Opel, H. Lycklama, A. Viand, and A. Hithnawi, “Cohere: Privacy management in large scale systems,” arXiv, Jan. 2023.
- T. Luo, M. Pan, P. Tholoniat, A. Cidon, R. Geambasu, and M. Lécuyer, “Privacy budget scheduling,” in Proc. USENIX Symp. Oper. Syst. Des. Implementation (OSDI), Aug. 2021, pp. 55–74.
- C. T. Dinh, N. H. Tran, M. N. H. Nguyen, C. S. Hong, W. Bao, A. Y. Zomaya, and V. Gramoli, “Federated learning over wireless networks: Convergence analysis and resource allocation,” IEEE/ACM Trans. Netw., vol. 29, no. 1, pp. 398–409, Oct. 2021.
- W. Shi, S. Zhou, Z. Niu, M. Jiang, and L. Geng, “Joint device scheduling and resource allocation for latency constrained wireless federated learning,” IEEE Trans. Wirel. Commun., vol. 20, no. 1, pp. 453–467, Dec. 2021.
- T. Li, M. Sanjabi, A. Beirami, and V. Smith, “Fair resource allocation in federated learning,” in Proc. Int. Conf. Learn. Representations (ICLR), Apr. 2020, pp. 1–27.
- W. Y. B. Lim, J. S. Ng, Z. Xiong, J. Jin, Y. Zhang, D. Niyato, C. Leung, and C. Miao, “Decentralized edge intelligence: A dynamic resource allocation framework for hierarchical federated learning,” IEEE Trans. Parallel Distributed Syst., vol. 33, no. 3, pp. 536–550, Sep. 2022.
- A. M. Girgis, D. Data, and S. N. Diggavi, “Renyi differential privacy of the subsampled shuffle model in distributed learning,” in Proc. Adv. Neural Inf. Process. Syst. (NeurIPS), Dec. 2021, pp. 29 181–29 192.
- I. Mironov, “Rényi differential privacy,” in Proc. IEEE Comput. Secur. Found. Symp. (CSF), Aug. 2017, pp. 263–275.
- M. Uchida and J. Kurose, “An information-theoretic characterization of weighted alpha-proportional fairness,” in Proc. IEEE Int. Conf. Comp. Commun. (INFOCOM), Apr. 2009, pp. 1053–1061.
- T. Lan, D. T. H. Kao, M. Chiang, and A. Sabharwal, “An axiomatic theory of fairness in network resource allocation,” in Proc. IEEE Int. Conf. Comp. Commun. (INFOCOM), Mar. 2010, pp. 1343–1351.
- C. Joe-Wong, S. Sen, T. Lan, and M. Chiang, “Multiresource allocation: Fairness–efficiency tradeoffs in a unifying framework,” IEEE/ACM Trans. Netw., vol. 21, no. 6, pp. 1785–1798, May 2013.
- R. Shokri, M. Stronati, C. Song, and V. Shmatikov, “Membership inference attacks against machine learning models,” in Proc. IEEE Symp. Secur. Privacy (S&P), Jun. 2017, pp. 3–18.
- N. Carlini, C. Liu, Ú. Erlingsson, J. Kos, and D. Song, “The secret sharer: Evaluating and testing unintended memorization in neural networks,” in Proc. USENIX Secur. Symp. (USENIX Security), Aug. 2019, pp. 267–284.
- F. Lai, X. Zhu, H. V. Madhyastha, and M. Chowdhury, “Oort: Efficient federated learning via guided participant selection,” in Proc. USENIX Symp. Oper. Syst. Des. Imple., (OSDI), Jul. 2021, pp. 19–35.
- E. Altman, K. Avrachenkov, and A. Garnaev, “Generalized a-fair resource allocation in wireless networks,” in Proc. Conf. Decis. Control (CDC), Dec. 2008, pp. 2414–2419.
- Gurobi Optimization, LLC, “Gurobi optimizer reference manual,” 2022. [Online]. Available: https://www.gurobi.com/documentation/current/refman/index.html
- A. Tang, J. Wang, and S. H. Low, “Counter-intuitive throughput behaviors in networks under end-to-end control,” IEEE/ACM Trans. Netw., vol. 14, no. 2, pp. 355–368, Jul. 2006.
- A. Rényi, “On measures of entropy and information,” in Proc. Berkeley Symp. Math. Statist. Probability, Volume 1: Contributions to the Theory of Statistics, vol. 4, 1961, pp. 547–562.
- C. F. Menezes and D. L. Hanson, “On the theory of risk aversion,” Int. Econ. Rev., vol. 11, no. 3, pp. 481–487, 1970.