N. Leavitt, Will NoSQL databases live up to their promise?, Computer, issue.2, p.43, 2010.

R. Cattell, Scalable SQL and NoSQL data stores, ACM SIGMOD Record, vol.39, issue.4, pp.12-27, 2011.

F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach et al.,

R. E. Gruber, Bigtable: A distributed storage system for structured data, ACM Transactions on Computer Systems (TOCS), vol.26, issue.2, p.4, 2008.

G. Weintraub, Dynamo and BigTable-Review and comparison, Proceedings of the 28th Convention of the Electrical & Electronics Engineers in Israel, pp.1-5, 2014.

H. Hacigms, B. Iyer, and S. Mehrotra, Providing database as a service, Proceedings of the 18th International Conference on Data Engineering, pp.29-38, 2002.

R. C. Merkle, A certified digital signature, Proceedings of the Conference on the Theory and Application of Cryptology, pp.218-238, 1989.

P. Devanbu, M. Gertz, C. Martel, and S. G. Stubblebine, Authentic data publication over the internet, Journal of Computer Security, vol.11, issue.3, pp.291-314, 2003.

F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, Dynamic authenticated index structures for outsourced databases, Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pp.121-132, 2006.

Y. Yang, D. Papadias, S. Papadopoulos, and P. Kalnis, Authenticated join processing in outsourced databases, Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp.5-18, 2009.

F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, Authenticated index structures for aggregation queries, ACM Transactions on Information and System Security (TISSEC), vol.13, issue.4, p.32, 2010.

W. Wei and T. Yu, Integrity assurance for outsourced databases without DBMS modification, Proceedings of the 28th conference on Data and Applications Security and Privacy, pp.1-16, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01284838

E. Mykletun, M. Narasimha, and G. Tsudik, Authentication and integrity in outsourced databases, ACM Transactions on Storage (TOS), vol.2, issue.2, pp.107-138, 2006.

M. Narasimha and G. Tsudik, DSAC: integrity for outsourced databases with signature aggregation and chaining, Proceedings of the 14th ACM international conference on Information and knowledge management, pp.235-236, 2005.

M. Xie, H. Wang, J. Yin, and X. Meng, Integrity auditing of outsourced data, Proceedings of the 33rd international conference on Very large data bases, pp.782-793, 2007.

H. Wang, J. Yin, C. S. Perng, and P. S. Yu, Dual encryption for query integrity assurance, Proceedings of the 17th ACM conference on Information and knowledge management, pp.863-872, 2008.

W. Wei, T. Yu, and R. Xue, iBigTable: practical data integrity for bigtable in public cloud, Proceedings of the third ACM conference on Data and application security and privacy, pp.341-352, 2013.

R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

URL : http://people.csail.mit.edu/rivest/pubs/RSA78.pdf

B. H. Bloom, Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970.
DOI : 10.1145/362686.362692

M. Mitzenmacher, Compressed bloom filters, IEEE/ACM Transactions on Networking (TON), vol.10, issue.5, pp.604-612, 2002.
DOI : 10.1145/383962.384004

S. H. Standard, FIPS Publication 180-2. National Institute of Standards and Technology (NIST), 2002.

A. Doan, R. Ramakrishnan, and A. Y. Halevy, Crowdsourcing systems on the world-wide web, Communications of the ACM, vol.54, issue.4, pp.86-96, 2011.
DOI : 10.1145/1924421.1924442

URL : http://dl.acm.org/ft_gateway.cfm?id=1924442&type=pdf

L. Von-ahn and L. Dabbish, Labeling images with a computer game, Proceedings of the SIGCHI conference on Human factors in computing systems, pp.319-326, 2004.

N. F. Pub, Advanced encryption standard (AES). Federal Information Processing Standards Publication, vol.197, pp.441-0311, 2001.

H. Krawczyk, R. Canetti, and M. Bellare, HMAC: Keyed-hashing for message authentication, 1997.
DOI : 10.17487/rfc2104

URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc2104.txt.pdf

B. Atikoglu, Y. Xu, E. Frachtenberg, S. Jiang, and M. Paleczny, Workload analysis of a large-scale key-value store, ACM SIGMETRICS Performance Evaluation Review, vol.40, issue.1, pp.53-64, 2012.

B. F. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears, Benchmarking cloud serving systems with YCSB, Proceedings of the 1st ACM symposium on Cloud computing, pp.143-154, 2010.
DOI : 10.1145/1807128.1807152

G. Weintraub and E. Gudes, Crowdsourced Data Integrity Verification for Key-Value Stores in the Cloud, Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp.498-503, 2017.

-. Bigtable,