Trusted Cells: A Sea Change for Personal Data Services, 2013. ,
Oblivious Query Processing, 2014. ,
TrustedDB, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, pp.205-216, 2011. ,
DOI : 10.1145/1989323.1989346
EPiC: Efficient Privacy-Preserving Counting for MapReduce, IACR Cryptology ePrint Archive, p.452, 2012. ,
PRISM ??? Privacy-Preserving Search in MapReduce, PETS, 2012. ,
DOI : 10.1007/978-3-642-31680-7_10
Modeling and assessing inference exposure in encrypted databases, ACM Transactions on Information and System Security, vol.8, issue.1, pp.119-152, 2005. ,
DOI : 10.1145/1053283.1053289
Balancing confidentiality and efficiency in untrusted relational DBMSs, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.93-102, 2003. ,
DOI : 10.1145/948109.948124
MapReduce, Communications of the ACM, vol.51, issue.1, pp.107-113, 2008. ,
DOI : 10.1145/1327452.1327492
Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009. ,
DOI : 10.1145/1536414.1536440
Profiling, What-if Analysis, and Cost-based Optimization of MapReduce Programs, PVLDB, vol.4, issue.11, pp.1111-1122, 2011. ,
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signaturesof, IEEE Transactions on Consumer Electronics, vol.53, issue.2, pp.653-660, 2007. ,
DOI : 10.1109/TCE.2007.381742
Personal data vaults, Proceedings of the 6th International COnference on, Co-NEXT '10, 2010. ,
DOI : 10.1145/1921168.1921191
On the Trusted Use of Large-Scale Personal Data, IEEE Data Eng. Bull, vol.35, issue.4, pp.5-8, 2012. ,
CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.85-100, 2011. ,
DOI : 10.1145/2043556.2043566
Executing SQL over encrypted data in database service provider model, Wisconsin, pp.216-227, 2002. ,
Privacy-Preserving Query Execution using a Decentralized Architecture and Tamper Resistant Hardware, pp.487-498, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01096639
Processing analytical queries over encrypted data, PVLDB, pp.289-300, 2013. ,
DOI : 10.14778/2535573.2488336
SecureMR: A Service Integrity Assurance Framework for MapReduce, 2009 Annual Computer Security Applications Conference, pp.73-82, 2009. ,
DOI : 10.1109/ACSAC.2009.17
Sedic, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.515-526 ,
DOI : 10.1145/2046707.2046767
Tagged-MapReduce: A General Framework for Secure Computing with Mixed-Sensitivity Data on Hybrid Clouds, 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp.31-40, 2014. ,
DOI : 10.1109/CCGrid.2014.96
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud. Parallel and Distributed Systems, IEEE Transactions on, vol.25, issue.2, pp.363-373, 2014. ,
A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud, IEEE Transactions on Parallel and Distributed Systems, issue.6, pp.24-1192, 2013. ,
A Survey on Personal Data Cloud. The Scientific World Journal, 2014. ,
Introduction to Modern Cryptography: Principles and Protocols. Chapman and Hall/CRC, 2007. ,
Deterministic and Efficiently Searchable Encryption, In CRYPTO. Lecture Notes in Computer Science, vol.4622, pp.535-552, 2007. ,
DOI : 10.1007/978-3-540-74143-5_30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.377.2792
Querying Encrypted Data (Tutorial ), ACM SIGMOD Conference, 2014. ,