A. Philip and . Bernstein, Middleware: A Model for Distributed System Services, Commun. ACM, vol.39, issue.2, pp.86-98, 1996.

L. Brankovic and V. Estivill-castro, Privacy issues in knowledge discovery and data mining, Proc. of Australian Institute of Computer Ethics Conference (AICEC99, pp.89-99, 1999.

A. Cavoukian, Resolution on Privacy by Design, 32nd International Conference of Data Protection and Privacy Commissioners, 2010.
DOI : 10.4018/978-1-61350-501-4.ch007

A. Chaudhry, J. Crowcroft, H. Howard, A. Madhavapeddy, R. Mortier et al., Personal Data: Thinking Inside the Box, 5th decennial Aarhus conferences, 2015.
DOI : 10.7146/aahcc.v1i1.21312

V. Ciriani, S. De-capitani, D. Vimercati, S. Foresti, S. Jajodia et al., Combining fragmentation and encryption to protect privacy in data storage, ACM Transactions on Information and System Security, vol.13, issue.3, pp.1-2233, 2010.
DOI : 10.1145/1805974.1805978

C. Clifton, M. Kantarcio\vglu, A. Doan, G. Schadow, J. Vaidya et al., Privacy-preserving data integration and sharing, Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery , DMKD '04, pp.19-26, 2004.
DOI : 10.1145/1008694.1008698

J. Daemen and V. Rijmen, The design of AES-the Advanced Encryption Standard. Spring{\-}er-Ver{\-}lag, 2002.

G. Danezis, J. Domingo-ferrer, M. Hansen, J. Hoepman, D. L. Métayer et al., Privacy and Data Protection by Design from policy to engineering, European Union Agency for Network and Information Security (ENISA). 1?79 pages, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01097119

Y. De-montjoye, E. Shmueli, S. Samuel, A. S. Wang, and . Pentland, openPDS: Protecting the Privacy of Metadata through SafeAnswers, PLoS ONE, vol.43, issue.7, p.98790, 2014.
DOI : 10.1371/journal.pone.0098790.g005

M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements, Requirements Engineering, vol.18, issue.2, pp.3-32, 2011.
DOI : 10.1007/s00766-010-0115-7

C. Efthymiou and G. Kalogridis, Smart Grid Privacy via Anonymization of Smart Metering Data, 2010 First IEEE International Conference on Smart Grid Communications, pp.238-243, 2010.
DOI : 10.1109/SMARTGRID.2010.5622050

C. Fontaine and F. Galand, A Survey of Homomorphic Encryption for Nonspecialists, EURASIP J. Inf. Secur, vol.15, pp.1-15, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00504233

S. Carl and . French, Data Processing and Information Technology, 1996.

D. Gascon, IoT Security Infographic Privacy, Authenticity, Confidentiality and Integrity of the Sensor Data. The Invisible Asset, 2015.

C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009.
DOI : 10.1145/1536414.1536440

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.7592

J. Girao, D. Westhoff, E. Mykletun, and T. Araki, TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks, Ad Hoc Networks, vol.5, issue.7, pp.1073-1089, 2007.
DOI : 10.1016/j.adhoc.2006.05.004

Y. Gurevich, E. Hudis, and J. Wing, Inverse privacy, Communications of the ACM, vol.59, issue.7, 2014.
DOI : 10.1145/2838730

J. Hoepman, Privacy Design Strategies, ICT Systems Security and Privacy Protection IFIP Advances in Information and Communication Technology, pp.446-459, 2014.
DOI : 10.1007/978-3-642-55415-5_38

URL : https://hal.archives-ouvertes.fr/hal-01370395

M. Howard and S. Lipner, The security development lifecycle: SDL, a process for developing demonstrably more secure software, 2006.

P. Kotzanikolaou, Data Retention and Privacy in Electronic Communications, IEEE Security & Privacy Magazine, vol.6, issue.5, pp.46-52, 2008.
DOI : 10.1109/MSP.2008.114

B. Li, E. Erdin, M. Hadi-güne\cs, G. Bebis, and T. Shipley, Traffic Monitoring and Analysis: Third International Workshop, Proceedings, pp.108-121, 2011.

S. Lindsey, C. Raghavendra, and K. Sivalingam, Data gathering algorithms in sensor networks using energy metrics. Parallel and Distributed Systems, IEEE Transactions on, vol.13, issue.9, pp.924-935, 2002.

W. Lowrance, Learning from experience: privacy and the secondary use of data in health research, Journal of Health Services Research & Policy, vol.8, issue.1, pp.2-7, 2003.
DOI : 10.1258/135581903766468800

Y. Ma, Y. Guo, M. Tian, and . Ghanem, Distributed Clustering-Based Aggregation Algorithm for Spatial Correlated Sensor Networks, IEEE Sensors Journal, vol.11, issue.3, pp.641-648, 2011.
DOI : 10.1109/JSEN.2010.2056916

J. Oates, C. Kelley, and L. Barbusinski, What does granularity mean in the context of a data warehouse and what are the various levels of granularity? information-management, 2002.

E. Pagano, iPrivacy: A Distributed Approach to Privacy on the Cloud, International Journal on Advances in Security, vol.4, p.3, 2011.

C. Perera, C. H. Liu, and S. Jayawardena, The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey, IEEE Transactions on Emerging Topics in Computing, vol.3, issue.4, pp.585-598, 2015.
DOI : 10.1109/TETC.2015.2390034

C. Perera, R. Ranjan, and L. Wang, End-to-End Privacy for Open Big Data Markets, IEEE Cloud Computing, vol.2, issue.4, pp.44-53, 2015.
DOI : 10.1109/MCC.2015.78

URL : http://arxiv.org/abs/1506.08865

C. Perera, R. Ranjan, L. Wang, S. U. Khan, and A. Y. Zomaya, Big Data Privacy in the Internet of Things Era, IT Professional, vol.17, issue.3, pp.32-39, 2015.
DOI : 10.1109/MITP.2015.34

C. Perera, D. Talagala, C. H. Liu, and J. C. Estrella, Energy-Efficient Location and Activity-Aware On-Demand Mobile Distributed Sensing Platform for Sensing as a Service in IoT Clouds, IEEE Transactions on Computational Social Systems, vol.2, issue.4, pp.171-181, 2015.
DOI : 10.1109/TCSS.2016.2515844

C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, Context Aware Computing for The Internet of Things: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.414-454, 2014.
DOI : 10.1109/SURV.2013.042313.00197

S. M. Policicchio, A. Attila, and . Yavuz, Preventing Memory Access Pattern Leakage in Searchable Encryption, iConference 2015 Proceedings. iSchools, 2015.

D. Pyle, Data preparation for data mining, 1999.

R. Rajagopalan and P. Varshney, Data-aggregation techniques in sensor networks: a survey, IEEE Communications Surveys & Tutorials, vol.8, issue.4, pp.48-63, 2006.
DOI : 10.1109/COMST.2006.283821

R. Roman, J. Zhou, and J. Lopez, On the features and challenges of security and privacy in distributed internet of things, Computer Networks, vol.57, issue.10, pp.2266-2279, 2013.
DOI : 10.1016/j.comnet.2012.12.018

S. Spiekermann and L. F. Cranor, Engineering Privacy, IEEE Transactions on Software Engineering, vol.35, issue.1, pp.67-82, 2009.
DOI : 10.1109/TSE.2008.88

M. Stanislav and T. Beardsley, HACKING IoT: A Case Study on Baby Monitor Exposures and Vulnerabilities, 2015.

J. Sun, Adaptive Determination of Data Granularity for QoS-Constraint Data Gathering in Wireless Sensor Networks, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp.401-405, 2009.
DOI : 10.1109/UIC-ATC.2009.35

. Truste, Privacy Assessments & Certifications Overview. Datasheets, 2016.