S. Berthold, R. Böhme, and S. Köpsell, Data Retention and Anonymity Services, 2009.
DOI : 10.1007/978-3-540-30114-1_22

J. Camenisch and A. Lysyanskaya, An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, pp.93-118, 2001.
DOI : 10.1007/3-540-44987-6_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.6534

Y. Chen, V. Paxson, and R. H. Katz, What's new about cloud computing security? Tech. Rep, 2010.

I. Clarke, S. G. Miller, T. W. Hong, O. Sandberg, and B. Wiley, Protecting free expression online with Freenet, IEEE Internet Computing, vol.6, issue.1, pp.40-49, 2002.
DOI : 10.1109/4236.978368

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.1501

G. Danezis and R. Clayton, Introducing traffic analysis In: Attacks, Defences and Public Policy Issues, 2007.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, Proceedings of the 13th USENIX Security Symposium, 2004.

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, Reclaiming space from duplicate files in a serverless distributed file system, Proceedings 22nd International Conference on Distributed Computing Systems, p.617, 2002.
DOI : 10.1109/ICDCS.2002.1022312

. Dropbox, Dropbox -simplify your life, pp.2011-2016

D. Grolimund, L. Meisser, S. Schmid, and R. Wattenhofer, Cryptree: A Folder Tree Structure for Cryptographic File Systems, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06), pp.189-198, 2006.
DOI : 10.1109/SRDS.2006.15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.67.8835

D. Harnik, B. Pinkas, and A. Shulman-peleg, Side Channels in Cloud Services: Deduplication in Cloud Storage, IEEE Security & Privacy Magazine, vol.8, issue.6, pp.40-47, 2010.
DOI : 10.1109/MSP.2010.187

S. Kamara and K. Lauter, Cryptographic Cloud Storage, Lecture Notes in Computer Science, vol.6054, pp.136-149, 2010.
DOI : 10.1007/978-3-642-14992-4_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.159.4794

S. Kamara, C. Papamanthou, and T. Roeder, CS2: A semantic cryptographic cloud storage system, p.148632, 2011.
DOI : 10.1007/978-3-642-14992-4_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.159.4794

S. Le-blond, Z. Chao, A. Legout, K. W. Ross, and W. Dabbous, I know where you are and what you are sharing, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, p.4039, 2011.
DOI : 10.1145/2068816.2068822

URL : https://hal.archives-ouvertes.fr/inria-00632780

S. Le-blond, A. Legout, F. L. Fessant, W. Dabbous, and M. A. Kâafar, Spying the world from your laptop ? identifying and profiling content providers and big downloaders in bittorrent, p.930, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00470324

P. Mell and T. Grance, The NIST definition of cloud computing http

S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2009.

. Paysafecard, Discover the prepaid solution for the internet : paysafecard.com, pp.2011-2022

D. Slamanig, Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources, Selected Areas in Cryptograph, 2011.
DOI : 10.1007/3-540-48071-4_3

C. Soghoian, Caught in the cloud: Privacy, encryption, and government back doors in the Web 2.0 era, Journal on Telecommunications and High Technology Law, vol.8, issue.2, pp.359-424, 2010.

. Tarsnap, Tarsnap -online backups for the truly paranoid, pp.2010-2015

U. The, . Government-printing, and . Office, Public Law 107 -56 -Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of, 2001.

Z. Wilcox-o-'hearn and B. Warner, Tahoe: the least-authority filesystem In: Proceedings of the 4th ACM International Workshop on Storage Security and Survivability (StorageSS '08), pp.21-26, 2008.

. Wuala, Wuala -secure online storage -backup. sync. share. access everywhere., https, pp.2011-2016