T. Akidau, R. Bradshaw, C. Chambers, S. Chernyak, R. J. Fernández-moctezuma et al., The Dataflow Model: A Practical Approach to Balancing Correctness, Latency, and Cost in Massivescale, Unbounded, Out-of-order Data Processing, Proc. VLDB Endow, vol.8, issue.12, pp.1792-1803, 2015.

R. Bird and P. Wadler, Introduction to Functional Programming, 1988.

C. , F. Bolz, and L. Tratt, The impact of meta-tracing on vm design and implementation, Science of Computer Programming, vol.98, pp.408-421, 2015.

S. Brenner, C. Wulf, D. Goltzsche, N. Weichbrodt, M. Lorenz et al., SecureKeeper: Confidential ZooKeeper Using Intel® SGX, Proceedings of the 17th International Middleware Conference, Middleware '16, vol.14, pp.1-14, 2016.
DOI : 10.1007/978-3-319-59665-5_13

V. Costan and S. Devadas, Intel® SGX explained, Cryptology ePrint Archive, 2016.

E. Curry, Message-Oriented Middleware, pp.1-28, 2005.
DOI : 10.1002/0470862084.ch1

C. Dwork, F. Mcsherry, K. Nissim, and A. Smith, Calibrating noise to sensitivity in private data analysis, Theory of Cryptography Conference, pp.265-284, 2006.

A. Freier, P. Karlton, and P. Kocher, The secure sockets layer (SSL) protocol version 3.0, 2011.

S. Gueron, A Memory Encryption Engine Suitable for General Purpose Processors. IACR Cryptology ePrint Archive, p.204, 2016.

R. Ierusalimschy, L. Henrique-de-figueiredo, and W. C. Filho, Lua-An Extensible Extension Language. Software: Practice and Experience, vol.26, pp.635-652, 1996.
DOI : 10.1002/(sici)1097-024x(199606)26:6<635::aid-spe26>3.0.co;2-p

J. Kreps, N. Narkhede, and J. Rao, A distributed messaging system for log processing, Proceedings of the NetDB, pp.1-7, 2011.

S. Kulkarni, N. Bhagat, M. Fu, V. Kedigehalli, C. Kellogg et al., Twitter Heron: Stream Processing at Scale, Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, SIGMOD '15, pp.239-250, 2015.

L. Leonini, P. Etiennerivì-ere, and . Felber, Splay: Distributed systems evaluation made simple (or how to turn ideas into live systems in a breeze), Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, NSDI'09, pp.185-198, 2009.

T. Lindholm, F. Yellin, G. Bracha, and A. Buckley, The Java Virtual Machine Specification: Java SE 8 Edition, 2014.

F. Mckeen, I. Ilya-alexandrovich, D. Anati, S. Caspi, R. Johnson et al., Intel® software guard extensions (intel® sgx) support for dynamic memory management inside an enclave, Proceedings of the Hardware and Architectural Support for Security and Privacy, vol.2016, pp.1-10, 2016.

M. Migliavacca, I. Papagiannis, D. M. Eyers, B. Shand, J. Bacon et al., Defcon: High-performance event processing with information security, Proceedings of the 2010 USENIX Conference on USENIX Annual Technical Conference, USENIXATC'10, pp.1-1, 2010.

P. Mohan, A. Thakurta, E. Shi, D. Song, and D. Culler, GUPT: Privacy Preserving Data Analysis Made Easy, Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, SIGMOD '12, pp.349-360, 2012.

P. R. Pietzuch, S. Arnautov, B. Trach, F. Gregor, T. Knauth et al., SCONE: Secure Linux Containers with Intel SGX, 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2016. USENIX, 2016.

R. Pires, M. Pasin, P. Felber, and C. Fetzer, Secure content-based routing using intel® software guard extensions, Proceedings of the 17th International Middleware Conference, Middleware '16, vol.10, pp.1-10, 2016.
DOI : 10.1145/2988336.2988346

URL : http://arxiv.org/pdf/1701.04612

I. Roy, T. V. Srinath, A. Setty, V. Kilzer, E. Shmatikov et al., Airavat: Security and Privacy for MapReduce, Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI'10, pp.20-20, 2010.

Y. Shafranovich, Common Format and MIME Type for Comma-Separated Values (CSV) Files. RFC 4180, 2005.

S. Y. Shah, B. Paulovicks, and P. Zerfos, Data-atrest security for Spark, 2016 IEEE International Conference on Big Data (Big Data), pp.1464-1473, 2016.

J. Stephen, S. Savvides, V. Sundaram, M. Saeida-ardekani, and P. Eugster, STYX: Stream Processing with Trustworthy Cloud-based Execution, Proceedings of the Seventh ACM Symposium on Cloud Computing, SoCC '16, pp.348-360, 2016.

C. Szallies, On using the observer design pattern, XP, vol.9, p.2323533, 1997.

M. Sai-deep-tetali, R. Lesani, T. Majumdar, and . Millstein, Mrcrypt: Static analysis for secure cloud computations, ACM Sigplan Notices, vol.48, issue.10, pp.271-286, 2013.

T. Uustalu and V. Vene, The Essence of Dataflow Programming, pp.135-167, 2006.

X. Xu and X. Zhao, A framework for privacy-aware computing on hybrid clouds with mixed-sensitivity data, IEEE International Symposium on Big Data Security on CloudIEEE International Symposium on Big Data Security on Cloud, pp.1344-1349, 2015.

M. Zaharia, T. Das, H. Li, T. Hunter, S. Shenker et al., Discretized streams: Fault-tolerant streaming computation at scale, Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, SOSP '13, pp.423-438, 2013.

K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan, Sedic: privacyaware data intensive computing on hybrid clouds, Proceedings of the 18th ACM conference on Computer and communications security, pp.515-526, 2011.