T. Allard, N. Anciaux, L. Bouganim, Y. Guo, L. L. Folgoc et al., Secure personal data servers: a vision paper, Proceedings of the VLDB Endowment, vol.3, pp.25-35, 2010.
DOI : 10.14778/1920841.1920850

URL : https://hal.archives-ouvertes.fr/inria-00551875

T. Allard, G. Hébrail, F. Masseglia, and E. Pacitti, Chiaroscuro: Transparency and privacy for massive personal time-series clustering, Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pp.779-794, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01136686

T. Allard, B. Nguyen, and P. Pucheral, METAP: revisiting Privacy-Preserving Data Publishing using secure devices. Distributed and Parallel Databases, vol.32, pp.191-244, 2014.
DOI : 10.1007/s10619-013-7122-x

URL : https://hal.archives-ouvertes.fr/hal-00934586

N. Anciaux, P. Bonnet, L. Bouganim, B. Nguyen, P. Pucheral et al., Personal Data Management Systems: The security and functionality standpoint, Information Systems, vol.80, pp.13-35, 2019.
DOI : 10.1016/j.is.2018.09.002

URL : https://hal.archives-ouvertes.fr/hal-01898705

N. Anciaux, L. Bouganim, P. Pucheral, and Y. Guo, MILo-DB: a personal, secure and portable database machine. Distributed and Parallel Databases, vol.32, pp.37-63, 2014.
DOI : 10.1007/s10619-012-7119-x

URL : https://hal.archives-ouvertes.fr/hal-00768355

A. Arasu, S. Blanas, K. Eguro, M. Joglekar, R. Kaushik et al., Secure database-as-a-service with cipherbase, Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, pp.1033-1036, 2013.
DOI : 10.1145/2463676.2467797

Y. Aumann and Y. Lindell, Security against covert adversaries: Efficient protocols for realistic adversaries, Theory of Cryptography Conference, pp.137-156, 2007.
DOI : 10.1007/978-3-540-70936-7_8

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-70936-7_8.pdf

M. Backes, P. Druschel, A. Haeberlen, and D. Unruh, CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable, NDSS, vol.9, pp.341-353, 2009.

. Blue-button, Find Your Health Data, 2010.

Y. Cao, M. Yoshikawa, Y. Xiao, and L. Xiong, Quantifying Differential Privacy under Temporal Correlations, 33rd IEEE International Conference on Data Engineering, pp.821-832, 2017.
DOI : 10.1109/icde.2017.132

URL : http://europepmc.org/articles/pmc5584619?pdf=render

M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, Secure routing for structured peer-to-peer overlay networks, ACM SIGOPS Operating Systems Review, vol.36, pp.299-314, 2002.
DOI : 10.1145/1060289.1060317

URL : http://www.comp.nus.edu.sg/~cs6203/guidelines/topic6/Secure routing for structured peer-to-peer overlay networks.pdf

C. Cloud, Your digital home, 2013.

G. Cormode, S. Jha, T. Kulkarni, N. Li, D. Srivastava et al., Privacy at Scale: Local Differential Privacy in Practice, Proceedings of the 2018 International Conference on Management of Data, SIGMOD Conference, pp.1655-1658, 2018.

Y. De-montjoye, E. Shmueli, S. Samuel, A. S. Wang, and . Pentland, openpds: Protecting the privacy of metadata through safeanswers, PloS one, vol.9, p.98790, 2014.

J. Bolin-ding, S. Kulkarni, and . Yekhanin, Collecting Telemetry Data Privately, Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems, pp.3574-3583, 2017.

. Fing, The mesinfos project explores the self data concept in france, 2013.

D. Frey, R. Guerraoui, A. Kermarrec, A. Rault, F. Taïani et al., Hide & Share: Landmark-based Similarity for Private KNN Computation, Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on. IEEE, pp.263-274, 2015.
DOI : 10.1109/dsn.2015.60

URL : https://hal.archives-ouvertes.fr/hal-01171492

J. González, M. Hölzl, and P. Riedl, A practical hardware-assisted approach to customize trusted boot for mobile devices, International Conference on Information Security, pp.542-554, 2014.

A. , M. Kermarrec, and F. Taïani, Want to scale in centralized systems? Think P2P, J. Internet Services and Applications, vol.6, p.12, 2015.
DOI : 10.1186/s13174-015-0029-1

URL : https://hal.archives-ouvertes.fr/hal-01199734

S. Lallali and N. Anciaux, Supporting secure keyword search in the personal cloud, Information Systems, vol.72, pp.1-26, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01660599

T. B. , T. Le, N. Anciaux, S. Gilloton, S. Lallali et al., Distributed secure search in the personal cloud, 19th International Conference on Extending Database Technology, pp.652-655, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01293409

S. Lee, E. L. Wong, and D. Goel, Mike Dahlin, and Vitaly Shmatikov. 2013. ? Box: A Platform for Privacy-Preserving Apps, NSDI, pp.501-514

P. Maymounkov and D. Mazieres, Kademlia: A peer-to-peer information system based on the xor metric, International Workshop on Peer-to-Peer Systems, pp.53-65, 2002.
DOI : 10.1007/3-540-45748-8_5

URL : http://www.cs.rice.edu/Conferences/IPTPS02/109.pdf

A. Menezes, P. C. Van-oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, 1996.
DOI : 10.1201/9781439821916

. Midata, The midata vision of consumer empowerment, 2011.

. Nextcloud, Protecting your data, Retrieved October 12, 2016.

E. Parliament, General Data Protection Regulation. Law, pp.32016-0679, 2016.

A. Raluca, A. J. Popa, H. Blumberg, F. Balakrishnan, and . Li, Privacy and accountability for location-based aggregate statistics, Proceedings of the 18th ACM conference on Computer and communications security, pp.653-666, 2011.

C. Priebe, K. Vaswani, and M. Costa, EnclaveDB: A Secure Database using SGX, EnclaveDB: A Secure Database using SGX, p.0, 2018.
DOI : 10.1109/sp.2018.00025

S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A scalable content-addressable network, vol.31, 2001.
DOI : 10.1145/383059.383072

URL : http://www.cs.utexas.edu/users/browne/CS395Tf2002/Papers/Can-p161-ratnasamy.pdf

, Processing over encrypted data: between theory and practice, ACM SIGMOD Record, vol.45, pp.5-16, 2016.

A. Shamir, How to share a secret, Commun. ACM, vol.22, pp.612-613, 1979.

, Solid empowers users and organizations to separate their data from the applications that use it, 2018.

I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, ACM SIGCOMM Computer Communication Review, vol.31, pp.149-160, 2001.

. Arm-security-technology, Building a Secure System using TrustZone Technology, 2008.

, PAMPAS: Privacy-Aware Mobile Participatory Sensing Using Secure Probes, Proceedings of the 28th International Conference on Scientific and Statistical Database Management, p.4, 2016.

Q. To, B. Nguyen, and P. Pucheral, Private and scalable execution of SQL aggregates on a secure decentralized architecture, ACM Transactions on Database Systems (TODS), vol.41, p.16, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01296432

B. Jordi-creus-tomàs, N. Amann, D. Travers, and . Vodislav, RoSeS: a continuous query processor for large-scale RSS filtering and aggregation, Proceedings of the 20th ACM Conference on Information and Knowledge Management, pp.2549-2552, 2011.

G. Urdaneta, G. Pierre, and M. Van-steen, A survey of DHT security techniques, ACM Computing Surveys (CSUR), vol.43, p.8, 2011.

Q. Wang and N. Borisov, Octopus: A secure and anonymous DHT lookup, IEEE 32nd International Conference on. IEEE, pp.325-334, 2012.