0
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models

      Preprint
      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Deduplication is a vital preprocessing step that enhances machine learning model performance and saves training time and energy. However, enhancing federated learning through deduplication poses challenges, especially regarding scalability and potential privacy violations if deduplication involves sharing all clients' data. In this paper, we address the problem of deduplication in a federated setup by introducing a pioneering protocol, Efficient Privacy-Preserving Multi-Party Deduplication (EP-MPD). It efficiently removes duplicates from multiple clients' datasets without compromising data privacy. EP-MPD is constructed in a modular fashion, utilizing two novel variants of the Private Set Intersection protocol. Our extensive experiments demonstrate the significant benefits of deduplication in federated learning of large language models. For instance, we observe up to 19.61% improvement in perplexity and up to 27.95% reduction in running time. EP-MPD effectively balances privacy and performance in federated learning, making it a valuable solution for large-scale applications.

          Related collections

          Author and article information

          Journal
          10 July 2024
          Article
          2407.08152
          e347c971-2c59-4bf2-abb2-74fb4e7dd8fa

          http://creativecommons.org/licenses/by/4.0/

          History
          Custom metadata
          cs.CR cs.AI cs.CL cs.LG

          Theoretical computer science,Security & Cryptology,Artificial intelligence
          Theoretical computer science, Security & Cryptology, Artificial intelligence

          Comments

          Comment on this article