S. Gnesi, I. Matteucci, C. Moiso, P. Mori, M. Petrocchi et al., My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data, Proc. of Privacy Technologies and Policy, ser, pp.154-171, 2014.
DOI : 10.1007/978-3-319-06749-0_11

H. Harkous, R. Rahman, and K. Aberer, C3P: Context-Aware Crowdsourced Cloud Privacy, Proc. of Privacy Enhancing Technologies, ser, pp.102-122, 2014.
DOI : 10.1007/978-3-319-08506-7_6

E. Rader, Awareness of behavioral tracking and information privacy concern in facebook and google, Proc. of Symposium on Usable Privacy and Security (SOUPS), 2014.

A. Khan, M. Othman, S. Madani, and S. Khan, A Survey of Mobile Cloud Computing Application Models, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.393-413, 2014.
DOI : 10.1109/SURV.2013.062613.00160

O. Hasan, B. Habegger, L. Brunie, N. Bennani, and E. Damiani, A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case, 2013 IEEE International Congress on Big Data, 2013.
DOI : 10.1109/BigData.Congress.2013.13

URL : https://hal.archives-ouvertes.fr/hal-01339203

J. Pan, S. Paul, and R. Jain, A survey of the research on future internet architectures, IEEE Communications Magazine, vol.49, issue.7, pp.26-36, 2011.
DOI : 10.1109/MCOM.2011.5936152

]. A. Anand, F. Dogar, D. Han, B. Li, H. Lim et al., XIA, Proceedings of the 10th ACM Workshop on Hot Topics in Networks, HotNets '11, 2011.
DOI : 10.1145/2070562.2070564

T. Anderson, K. Birman, R. Broberg, M. Caesar, D. Comer et al., A brief overview of the NEBULA future internet architecture, ACM SIGCOMM Computer Communication Review, vol.44, issue.3, pp.81-86, 2014.
DOI : 10.1145/2656877.2656889

V. Valancius, N. Laoutaris, L. Massoulié, C. Diot, and P. Rodriguez, Greening the internet with nano data centers, Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT '09, 2009.
DOI : 10.1145/1658939.1658944

P. Ranganathan, From Microprocessors to Nanostores: Rethinking Data-Centric Systems, Computer, vol.44, issue.1, pp.39-48, 2011.
DOI : 10.1109/MC.2011.18

F. Jalali, R. Ayre, A. Vishwanath, K. Hinton, T. Alpcan et al., Energy Consumption Comparison of Nano and Centralized Data Centers, Proc. of Greenmetrics, 2014.

A. Lebre, J. Pastor, M. Bertier, F. Desprez, J. Rouzaud-cornabas et al., Beyond The Clouds, How Should Next Generation Utility Computing Infrastructures Be Designed, Cloud Computing: Challenges, Limitations and R&D Solutions, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01067888

L. M. Vaquero and L. Rodero-merino, Finding your Way in the Fog, ACM SIGCOMM Computer Communication Review, vol.44, issue.5, pp.27-32, 2014.
DOI : 10.1145/2677046.2677052

Z. Ou, B. Pang, Y. Deng, J. Nurminen, A. Yi-jski et al., Energy- and Cost-Efficiency Analysis of ARM-Based Clusters, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012), 2012.
DOI : 10.1109/CCGrid.2012.84

F. P. Tso, D. R. White, S. Jouet, J. Singer, and D. P. Pezaros, The Glasgow Raspberry Pi Cloud: A Scale Model for Cloud Computing Infrastructures, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops, 2013.
DOI : 10.1109/ICDCSW.2013.25

D. Raychaudhuri, K. Nagaraja, and A. Venkataramani, MobilityFirst, ACM SIGMOBILE Mobile Computing and Communications Review, vol.16, issue.3, pp.2-13, 2012.
DOI : 10.1145/2412096.2412098

K. Chard, S. Caton, O. Rana, and K. Bubendorfer, Social Cloud: Cloud Computing in Social Networks, 2010 IEEE 3rd International Conference on Cloud Computing, pp.99-106, 2010.
DOI : 10.1109/CLOUD.2010.28

A. Mohaisen, H. Tran, A. Chandra, and Y. Kim, Trustworthy Distributed Computing on Social Networks, IEEE Transactions on Services Computing, vol.7, issue.3, pp.333-345, 2014.
DOI : 10.1109/TSC.2013.56

M. Coppola, Y. Jegou, B. Matthews, C. Morin, L. P. Prieto et al., Virtual Organization Support within a Grid-Wide Operating System, IEEE Internet Computing, vol.12, issue.2, pp.20-28, 2008.
DOI : 10.1109/MIC.2008.47

URL : https://hal.archives-ouvertes.fr/hal-01271144

A. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa, DepSky, ACM Transactions on Storage, vol.9, issue.4, pp.1-1233, 2013.
DOI : 10.1145/2535929

J. Chow, B. Pfaff, T. Garfinkel, and M. Rosenblum, Shredding your garbage: Reducing data lifetime through secure deallocation, Proc. of 14th USENIX Security Symposium, 2005.

R. Balebako, J. Jung, W. Lu, L. F. Cranor, and C. Nguyen, "Little brothers watching you", Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS '13, 2013.
DOI : 10.1145/2501604.2501616

D. Hardt, The OAuth 2.0 Authorization Framework, IETF RFC, vol.6749, 2012.
DOI : 10.17487/rfc6749

J. Howlett, S. Hartman, H. Tschofenig, E. Lear, and J. Schaad, Application Bridging for Federated Access Beyond Web (ABFAB) Architecture, 2014.
DOI : 10.17487/RFC7831

J. Camenisch, M. Dubovitskaya, and G. Neven, Oblivious transfer with access control, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009.
DOI : 10.1145/1653662.1653679

C. Dwork, Differential Privacy, Proc. of 33rd ICALP conference, ser. LNCS, 2006.
DOI : 10.1007/11787006_1

C. Gentry, Computing arbitrary functions of encrypted data, Communications of the ACM, vol.53, issue.3, pp.97-105, 2010.
DOI : 10.1145/1666420.1666444

M. Nanavati, P. Colp, B. Aiello, and A. Warfield, Cloud security, Communications of the ACM, vol.57, issue.5, pp.70-79, 2014.
DOI : 10.1145/2593686