Cooperative Computing for Autonomous Data Centers

We present a new distributed model for graph computations motivated by limited information sharing. Two or more independent entities have collected large social graphs. They wish to compute the result of running graph algorithms on the entire set of relationships. Because the information is sensitive or economically valuable, they do not wish to simply combine the information in a single location. We consider two models for computing the solution to graph algorithms in this setting: 1) limited-sharing: the two entities can share only a poly logarithmic size subgraph, 2) low-trust: the entities must not reveal any information beyond the query answer, assuming they are all honest but curious. We believe this model captures realistic constraints on cooperating autonomous data centres' have results for both models for s-t connectivity, one of the simplest graph problems that requires global information in the worst case. In the limited-sharing model, our results exploit social network structure. Standard communication complexity gives polynomial lower bounds on s-t connectivity for general graphs. However, if the graph for each data centre has a giant component and these giant components intersect, then we can overcome this lower bound, computing-t connectivity while exchanging O(log2 n) bits for a constant number of data centers. We can also test the assumption that the giant components overlap using O(log2 n) bits provided the (unknown) overlap is sufficiently large. The second result is in the low trust model. We give a secure multi-party computation (MPC) algorithm that 1) does not make cryptographic assumptions when there are 3 or more entities, and 2) is efficient, especially when compared to the usual garbled circuit approach. The entities learn only the yes/no answer. No party learns anything about the others' graph, not even node names. This algorithm does not require any special graph structure. This secure MPC result for s-t connectivity is one of the first that involves a few parties computing on large inputs, instead of many parties computing on a few local values.

[1]  Lisandro Zambenedetti Granville,et al.  Data Center Network Virtualization: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[2]  Avi Wigderson,et al.  The Randomized Communication Complexity of Set Disjointness , 2007, Theory Comput..

[3]  Christos Faloutsos,et al.  Patterns on the Connected Components of Terabyte-Scale Graphs , 2010, 2010 IEEE International Conference on Data Mining.

[4]  E. Todeva Networks , 2007 .

[5]  E. Kushilevitz,et al.  Communication Complexity: Basics , 1996 .

[6]  Jon M. Kleinberg,et al.  Networks, Crowds, and Markets: Reasoning about a Highly Connected World [Book Review] , 2013, IEEE Technol. Soc. Mag..

[7]  Amit Sahai,et al.  Secure Multi-Party Computation , 2013 .

[8]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[9]  Fan Chung Graham,et al.  A Random Graph Model for Power Law Graphs , 2001, Exp. Math..

[10]  F. Chung,et al.  Connected Components in Random Graphs with Given Expected Degree Sequences , 2002 .

[11]  B. Bollobás The evolution of random graphs , 1984 .

[12]  Charalampos E. Tsourakakis,et al.  PEGASUS: mining peta-scale graphs , 2011 .

[13]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[14]  Piotr Sankowski,et al.  Algorithmic Complexity of Power Law Networks , 2015, SODA.

[15]  Michalis Faloutsos,et al.  Power laws and the AS-level internet topology , 2003, TNET.

[16]  Wolfgang Maass,et al.  On the communication complexity of graph properties , 1988, STOC '88.

[17]  P. Erdos,et al.  On the evolution of random graphs , 1984 .

[18]  Christos Faloutsos,et al.  PEGASUS: mining peta-scale graphs , 2011, Knowledge and Information Systems.

[19]  Chris Arney,et al.  Networks, Crowds, and Markets: Reasoning about a Highly Connected World (Easley, D. and Kleinberg, J.; 2010) [Book Review] , 2013, IEEE Technology and Society Magazine.

[20]  A. Rbnyi ON THE EVOLUTION OF RANDOM GRAPHS , 2001 .

[21]  Vitaly Shmatikov,et al.  Privacy-Preserving Graph Algorithms in the Semi-honest Model , 2005, ASIACRYPT.

[22]  Bala Kalyanasundaram,et al.  The Probabilistic Communication Complexity of Set Intersection , 1992, SIAM J. Discret. Math..

[23]  Laurent Lefèvre,et al.  A survey on techniques for improving the energy efficiency of large-scale distributed systems , 2014, ACM Comput. Surv..

[24]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.