E. Amazon and . Service, Building a Secure System using TrustZone® Technology, ARM Limited, issue.2, 2009.

D. Comopse, https://docs.docker.com/compose/. [11] Docker Swarm

. Infinispan, Intel Core? i7-6700. http://ark.intel.com/products Intel-Core-i7-6700-Processor-8M-Cache-up-to-4 00-GHz

T. Akidau, R. Bradshaw, C. Chambers, S. Chernyak, R. J. Fernández-moctezuma et al., The dataflow model, Proc. VLDB Endow, pp.1792-1803, 2015.
DOI : 10.14778/2824032.2824076

R. Bird and P. Wadler, Introduction to Functional Programming, 1988.

C. Friedrich, B. , and L. Tratt, The impact of meta-tracing on VM design and implementation, Science of Computer Programming, vol.98, pp.408-421, 2015.

S. Brenner, C. Wulf, D. Goltzsche, N. Weichbrodt, M. Lorenz et al., SecureKeeper, Proceedings of the 17th International Middleware Conference on, Middleware '16, pp.1-14, 2016.
DOI : 10.1145/2541940.2541949

V. Costan and S. Devadas, Intel SGX explained, 2016.

E. Curry, Message-Oriented Middleware, pp.1-28, 2005.
DOI : 10.1002/0470862084.ch1

C. Dwork, F. Mcsherry, K. Nissim, and A. Smith, Calibrating Noise to Sensitivity in Private Data Analysis, Theory of Cryptography Conference, pp.265-284, 2006.
DOI : 10.1007/11681878_14

A. Freier, P. Karlton, and P. Kocher, The secure sockets layer (SSL) protocol version 3, 2011.
DOI : 10.17487/rfc6101

S. Gueron, A Memory Encryption Engine Suitable for General Purpose Processors, IACR Cryptology ePrint Archive, vol.2016, p.204, 2016.
DOI : 10.1109/msp.2016.124

R. Ierusalimschy, L. Henrique-de-figueiredo, and W. C. Filho, Lua???An Extensible Extension Language, Software: Practice and Experience, vol.26, issue.6, pp.635-652, 1996.
DOI : 10.1002/(SICI)1097-024X(199606)26:6<635::AID-SPE26>3.0.CO;2-P

URL : ftp://ftp.tecgraf.puc-rio.br/pub/lhf/doc/lua.ps.gz

J. Kreps and . Neha-narkhede-rao, Kafka: A distributed messaging system for log processing, Proceedings of the NetDB, pp.1-7, 2011.

S. Kulkarni, N. Bhagat, M. Fu, V. Kedigehalli, C. Kellogg et al., Twitter Heron, Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, SIGMOD '15, pp.239-250, 2015.
DOI : 10.1145/2588555.2595641

T. Lindholm, F. Yellin, G. Bracha, and A. Buckley, The Java Virtual Machine Specification: Java SE 8 Edition, 2014.

F. Mckeen, I. Alexandrovich, I. Anati, D. Caspi, S. Johnson et al., 2016. Intel&Reg ; Software Guard Extensions (Intel&Reg; SGX) Support for Dynamic Memory Management Inside an Enclave, Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, p.2954331, 2016.

P. Mohan, A. Thakurta, E. Shi, D. Song, and D. Culler, GUPT, Proceedings of the 2012 international conference on Management of Data, SIGMOD '12, pp.349-360, 2012.
DOI : 10.1145/2213836.2213876

R. Pires, M. Pasin, P. Felber, and C. Fetzer, Secure Content-Based Routing Using Intel Software Guard Extensions, Proceedings of the 17th International Middleware Conference on, Middleware '16, 2010.
DOI : 10.1109/SFCS.1986.25

I. Roy, T. V. Srinath, A. Setty, V. Kilzer, E. Shmatikov et al., Airavat: Security and Privacy for MapReduce, Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation (NSDI'10), 2010.

Y. Shafranovich, Common Format and MIME Type for Comma-Separated Values (CSV) Files. RFC 4180. DOI:https
DOI : 10.17487/rfc4180

S. Y. Shah, B. Paulovicks, and P. Zerfos, Data-at-rest security for spark, 2016 IEEE International Conference on Big Data (Big Data), 2016.
DOI : 10.1109/BigData.2016.7840754

J. Stephen, S. Savvides, V. Sundaram, M. Saeida-ardekani, and P. Eugster, STYX, Proceedings of the Seventh ACM Symposium on Cloud Computing, SoCC '16, pp.348-360, 2016.
DOI : 10.14778/2535573.2488336

C. Szallies, On using the observer design pattern. XP-002323533, 1997.

M. Sai-deep-tetali, R. Lesani, T. Majumdar, and . Millstein, MrCrypt, ACM SIGPLAN Notices, vol.48, issue.10, pp.271-286, 2013.
DOI : 10.1145/2544173.2509554

T. Uustalu and V. Vene, The Essence of Dataflow Programming, pp.135-167, 2006.

X. Xu and X. Zhao, A Framework for Privacy-Aware Computing on Hybrid Clouds with Mixed-Sensitivity Data, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, pp.1344-1349, 2015.
DOI : 10.1109/HPCC-CSS-ICESS.2015.110

M. Zaharia, T. Das, H. Li, T. Hunter, S. Shenker et al., Discretized Streams: Faulttolerant Streaming Computation at Scale, Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles (SOSP '13, pp.423-438, 2013.
DOI : 10.1145/2517349.2522737

K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan, Sedic, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.515-526, 2011.
DOI : 10.1145/2046707.2046767