T. B. , T. Le, N. Anciaux, S. Gilloton, S. Lallali et al., Distributed secure search in the personal cloud, 19th International Conference on Extending Database Technology, pp.652-655, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01293409

S. Lee, E. L. Wong, and D. Goel, Mike Dahlin, and Vitaly Shmatikov. 2013. ? Box: A Platform for Privacy-Preserving Apps, NSDI, pp.501-514

P. Maymounkov and D. Mazieres, Kademlia: A peer-to-peer information system based on the xor metric, International Workshop on Peer-to-Peer Systems, pp.53-65, 2002.
DOI : 10.1007/3-540-45748-8_5

URL : http://www.cs.rice.edu/Conferences/IPTPS02/109.pdf

A. Menezes, P. C. Van-oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, 1996.
DOI : 10.1201/9781439821916

. Midata, The midata vision of consumer empowerment, 2011.

. Nextcloud, Protecting your data, Retrieved October 12, 2016.

E. Parliament, General Data Protection Regulation. Law, pp.32016-0679, 2016.

A. Raluca, A. J. Popa, H. Blumberg, F. Balakrishnan, and . Li, Privacy and accountability for location-based aggregate statistics, Proceedings of the 18th ACM conference on Computer and communications security, pp.653-666, 2011.

C. Priebe, K. Vaswani, and M. Costa, EnclaveDB: A Secure Database using SGX, EnclaveDB: A Secure Database using SGX, p.0, 2018.
DOI : 10.1109/sp.2018.00025

S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A scalable content-addressable network, vol.31, 2001.
DOI : 10.1145/383059.383072

URL : http://www.cs.utexas.edu/users/browne/CS395Tf2002/Papers/Can-p161-ratnasamy.pdf