L. L. Rivest, L. Adleman, and L. M. Dertouzos, On data banks and privacy homomorphisms, 1978.

H. Kadhen, T. Amagasa, and H. Kitagawa, A novel framework for database security based on mixed cryptography, 2009.

R. A. Popa, C. M. Redfield, N. Zeldovich, and H. Balakrishnan, CryptDB :Processing queries on an encrypted database, ACM, vol.103, p.111, 2012.

B. Schneier, Description of a new variable-length key,64-bit block cipher (blowfish), pp.191-204, 1993.

D. Liu, Securing outsourced databases in the cloud .In security, privacy and trust in cloud systems, pp.259-282, 2014.

P. Wang and C. V. Ravishankar, Secure and efficient range queries on outsourced databases using Rp-Trees, 29th IEEE international conference on data engineering, 2013.

R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Order preserving encryption for numeric data, pp.13-18, 2004.

B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, Secure multidimensional range queries over outsourced data, The VLDB Journal, pp.333-358, 2012.
DOI : 10.1007/s00778-011-0245-7

H. Kathen, T. Amagasa, and H. Kitagawa, MV-OPES : Multivalued-order preserving encryption schemes :A novel scheme for encrypting integer value to many different values, IEIC Trans, 2010.

A. Bessami, M. Correia, B. Quaresma, F. André, and P. Sousa, DepSky :dependable and secure storage in the cloud-of-clouds, processings of the sixth conference on coputer systems, pp.31-46, 2011.

C. Caclin, R. Haas, and M. Vukolic, Dependable storage in the intercloud, IBM rechearch, vol.3783, pp.1-6, 2010.

F. Alsolami and C. E. Chow, N-cloud: improving performance and security in cloud storage, high performance switching and routing (HPSR), 2013.

F. Alsolai and T. Boult, Cloud Stash: using secret sharing scheme to secure data, not keys, multi-clouds. 11th international conference on information technology: new generations, 2014.

S. Adi, how to share a secret, Communication of the ACM novembre, vol.22, 1979.

A. Varunya, N. Harbi, and J. Darmont, A novel multi secret sharing approach for secure data warehousing and On-Line analysis processing in the cloud, IGI, 2015.

M. O. Rabin, Efficient dispersal of information for security load balancing, and fault tolerance, 1989.

A. G. Mahadewan and T. Kamesh, Horns : A homomorphic encryption schema for cloud computing using residue number system, IEEE , 45th Annual Conference on Information Sciences and Systems, 2011.

F. B. Ervest and Y. Yacov, , 1987.