N. Anciaux, P. Bonnet, L. Bouganim, B. Nguyen, I. Sandu-popa et al., Trusted Cells: A Sea Change for Personal Data Services, 2013.

A. Arasu and R. Kaushik, Oblivious Query Processing, 2014.

S. Bajaj and R. Sion, TrustedDB, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, pp.205-216, 2011.
DOI : 10.1145/1989323.1989346

E. Blass, G. Noubir, and T. V. Huu, EPiC: Efficient Privacy-Preserving Counting for MapReduce, IACR Cryptology ePrint Archive, p.452, 2012.

E. O. Blass, R. D. Pietro, R. Molva, and M. Önen, PRISM ??? Privacy-Preserving Search in MapReduce, PETS, 2012.
DOI : 10.1007/978-3-642-31680-7_10

A. Ceselli, E. Damiani, S. De-capitani-di-vimercati, S. Jajodia, S. Paraboschi et al., Modeling and assessing inference exposure in encrypted databases, ACM Transactions on Information and System Security, vol.8, issue.1, pp.119-152, 2005.
DOI : 10.1145/1053283.1053289

E. Damiani, C. Vimercati, S. Jajodia, S. Paraboschi, S. Samarati et al., Balancing confidentiality and efficiency in untrusted relational DBMSs, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.93-102, 2003.
DOI : 10.1145/948109.948124

J. Dean and S. Ghemawat, MapReduce, Communications of the ACM, vol.51, issue.1, pp.107-113, 2008.
DOI : 10.1145/1327452.1327492

C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009.
DOI : 10.1145/1536414.1536440

H. Herodotou and S. Babu, Profiling, What-if Analysis, and Cost-based Optimization of MapReduce Programs, PVLDB, vol.4, issue.11, pp.1111-1122, 2011.

S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984.
DOI : 10.1016/0022-0000(84)90070-9

H. Y. Lam, G. S. Fung, L. , and W. K. , A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signaturesof, IEEE Transactions on Consumer Electronics, vol.53, issue.2, pp.653-660, 2007.
DOI : 10.1109/TCE.2007.381742

M. Mun, S. Hao, and N. Mishra, Personal data vaults, Proceedings of the 6th International COnference on, Co-NEXT '10, 2010.
DOI : 10.1145/1921168.1921191

Y. De-montjoye, S. S. Wang, and A. Pentland, On the Trusted Use of Large-Scale Personal Data, IEEE Data Eng. Bull, vol.35, issue.4, pp.5-8, 2012.

R. A. Popa, C. M. Redfield, and N. Zeldovich, CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.85-100, 2011.
DOI : 10.1145/2043556.2043566

H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, Executing SQL over encrypted data in database service provider model, Wisconsin, pp.216-227, 2002.

Q. C. To, B. Nguyen, and P. Pucheral, Privacy-Preserving Query Execution using a Decentralized Architecture and Tamper Resistant Hardware, pp.487-498, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01096639

S. Tu, M. F. Kaashoek, S. Madden, and N. Zeldovich, Processing analytical queries over encrypted data, PVLDB, pp.289-300, 2013.
DOI : 10.14778/2535573.2488336

W. Wei, J. Du, T. Yu, and X. Gu, SecureMR: A Service Integrity Assurance Framework for MapReduce, 2009 Annual Computer Security Applications Conference, pp.73-82, 2009.
DOI : 10.1109/ACSAC.2009.17

K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan, Sedic, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.515-526
DOI : 10.1145/2046707.2046767

C. Zhang, E. Chang, and R. Yap, Tagged-MapReduce: A General Framework for Secure Computing with Mixed-Sensitivity Data on Hybrid Clouds, 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp.31-40, 2014.
DOI : 10.1109/CCGrid.2014.96

X. Zhang, L. T. Yang, C. Liu, and J. Chen, A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud. Parallel and Distributed Systems, IEEE Transactions on, vol.25, issue.2, pp.363-373, 2014.

X. Zhang, C. Liu, S. Nepal, S. Pandey, C. et al., A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud, IEEE Transactions on Parallel and Distributed Systems, issue.6, pp.24-1192, 2013.

J. Wang and Z. Wang, A Survey on Personal Data Cloud. The Scientific World Journal, 2014.

J. Katz and Y. Lindell, Introduction to Modern Cryptography: Principles and Protocols. Chapman and Hall/CRC, 2007.

M. Bellare, A. Boldyreva, O. Neill, and A. , Deterministic and Efficiently Searchable Encryption, In CRYPTO. Lecture Notes in Computer Science, vol.4622, pp.535-552, 2007.
DOI : 10.1007/978-3-540-74143-5_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.377.2792

A. Arasu, K. Eguro, R. Kaushik, R. , and R. , Querying Encrypted Data (Tutorial ), ACM SIGMOD Conference, 2014.