C. C. Aggarwal, N. Ashish, and A. Sheth, The Internet of Things: A Survey from the Data-Centric Perspective, Managing and mining sensor data, pp.383-428, 2013.
DOI : 10.1007/978-1-4614-6309-2_12

D. Agrawal, D. Ganesan, R. Sitaraman, Y. Diao, and S. Singh, Lazy-Adaptive Tree, Proc. of the VLDB, pp.361-372, 2009.
DOI : 10.14778/1687627.1687669

D. Agrawal, B. Li, Z. Cao, D. Ganesan, Y. Diao et al., Exploiting the Interplay between Memory and Flash Storage in Embedded Sensor Devices, 2010 IEEE 16th International Conference on Embedded and Real-Time Computing Systems and Applications, pp.227-236, 2010.
DOI : 10.1109/RTCSA.2010.10

N. Anciaux, P. Bonnet, L. Bouganim, B. Nguyen, I. Sandu-popa et al., Trusted cells: A sea change for personal data services, CIDR, 2013.

N. Anciaux, L. Bouganim, P. Pucheral, Y. Guo, L. L. Folgoc et al., MILo-DB: a personal, secure and portable database machine, Distributed and Parallel Databases, vol.32, issue.1, pp.37-63, 2014.
DOI : 10.1145/320473.320484

URL : https://hal.archives-ouvertes.fr/hal-00768355

N. Anciaux, S. Lallali, I. Sandu-popa, and P. Pucheral, A scalable search engine for mass storage smart objects, Proceedings of the VLDB Endowment, vol.8, issue.9, pp.910-921, 2015.
DOI : 10.14778/2777598.2777600

URL : https://hal.archives-ouvertes.fr/hal-01176462

B. André, N. Anciaux, P. Pucheral, T. Van, and P. , A Root of Trust for the Personal Cloud, ERCIM News, issue.106, pp.2016-2016

M. Athanassoulis, M. S. Kester, L. M. Maas, R. Stoica, S. Idreos et al., Designing Access Methods: The RUM Conjecture, EDBT, vol.2016, pp.461-466, 2016.

A. Yeung, C. Kagal, L. Gibbins, N. Shadbolt, and N. , Providing Access Control to Online Photo Albums Based on Tags and Linked Data, AAAI Spring Symposium on Social Semantic Web: Where Web 2.0 Meets Web 3, pp.9-14, 2009.

P. A. Bernstein, C. W. Reid, and S. Das, Hyder -a transactional record manager for shared flash, CIDR, pp.9-20, 2011.

E. Bertino, Data Security and Privacy in the IoT, EDBT, vol.2016, pp.1-3, 2016.

M. Bjorling, P. Bonnet, L. Bouganim, B. T. Jonsson, and . Uflip, Understanding the energy consumption of flash devices, IEEE Data Eng. Bull, vol.33, issue.4, pp.48-54, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00552170

B. Debnath, S. Sengupta, L. , and J. , SkimpyStash, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, pp.25-36, 2011.
DOI : 10.1145/1989323.1989327

Y. Diao, D. Ganesan, G. Mathur, and P. J. Shenoy, Rethinking data management for storage-centric sensor networks, CIDR, pp.22-31, 2007.

J. H. Ehlers and S. A. Jassim, Wavelet library for constrained devices Mobile Multimedia/Image Processing for Military and Security Applications, Proc. SPIE 6579, pp.65790-65800, 2007.

Y. Huang and Y. Lai, Distributed Energy Management System within Residential Sensor-Based Heterogeneous Network Structure, Wireless Sensor Networks and Ecological Monitoring, pp.35-60, 2013.
DOI : 10.1007/978-3-642-36365-8_2

H. V. Jagadish, P. P. Narayan, S. Seshadri, S. Sudarshan, and R. Kanneganti, Incremental organization for data recording and warehousing, Proc. of VLDB, pp.16-25, 1997.

C. Jermaine, A. Datta, and E. Omiecinski, A novel index supporting high volume data warehouse insertion, Proc. of VLDB, pp.235-246, 1999.

C. Jermaine, E. Omiecinski, Y. , and W. G. , The partitioned exponential file for database storage management, The VLDB Journal, vol.10, issue.1, pp.417-437, 2007.
DOI : 10.1007/s00778-005-0171-7

J. Y. Kim and W. B. Croft, Retrieval experiments using pseudo-desktop collections, Proceeding of the 18th ACM conference on Information and knowledge management, CIKM '09, 2009.
DOI : 10.1145/1645953.1646117

P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur et al., Tag, you can see it!, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, pp.377-386, 2012.
DOI : 10.1145/2207676.2207728

S. Lallali, N. Anciaux, I. Sandu-popa, and P. Pucheral, A Secure Search Engine for the Personal Cloud, Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, SIGMOD '15, pp.1445-1450
DOI : 10.1145/1132956.1132959

URL : https://hal.archives-ouvertes.fr/hal-01176473

T. Le, N. Anciaux, S. Guilloton, S. Lallali, P. Pucheral et al., Distributed Secure Search in the Personal Cloud, EDBT, vol.2016, pp.652-655
URL : https://hal.archives-ouvertes.fr/hal-01293409

Y. Li, B. He, R. J. Yang, Q. Luo, Y. et al., Tree indexing on solid state drives, Proceedings of the VLDB Endowment, vol.3, issue.1-2, pp.1195-1206, 2010.
DOI : 10.14778/1920841.1920990

T. Li, Y. Liu, Y. Tian, S. Shen, and W. Mao, A Storage Solution for Massive IoT Data Based on NoSQL, 2012 IEEE International Conference on Green Computing and Communications, pp.50-57, 2012.
DOI : 10.1109/GreenCom.2012.18

H. Lim, B. Fan, D. G. Andersen, and M. Kaminsky, SILT, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.1-13, 2011.
DOI : 10.1145/2043556.2043558

M. L. Mazurek, J. P. Arsenault, J. Bresee, N. Gupta, I. Ion et al., Access control for home data sharing, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.645-654, 2010.
DOI : 10.1145/1753326.1753421

M. L. Mazurek, P. F. Klemperer, R. Shay, H. Takabi, L. Bauer et al., Exploring reactive access control, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.2085-2094, 2011.
DOI : 10.1145/1978942.1979245

M. L. Mazurek, Y. Liang, W. Melicher, M. Sleeper, L. Bauer et al., Toward Strong, Usable Access Control for Shared Distributed Data, Proceedings of the 12th USENIX conference on File and Storage Technologies, pp.89-103, 2014.

O. Neil, P. E. Cheng, E. Gawlick, D. O-'neil, and E. J. , The Log-Structured Merge-Tree (LSM-Tree), Acta Informatica, vol.33, issue.4, pp.351-385, 1996.

R. Sears and R. Ramakrishnan, bLSM, Proceedings of the 2012 international conference on Management of Data, SIGMOD '12, pp.217-228, 2012.
DOI : 10.1145/2213836.2213862

C. C. Tan, B. Sheng, H. Wang, L. , and Q. , Microsearch: When Search Engines Meet Small Devices, Pervasive Computing, pp.93-110, 2008.
DOI : 10.1145/1098918.1098937

C. C. Tan, B. Sheng, H. Wang, L. , and Q. , Microsearch, ACM Transactions on Embedded Computing Systems, vol.9, issue.4, pp.1-29, 2010.
DOI : 10.1145/1721695.1721709

Q. To, B. Nguyen, and P. Pucheral, Privacy-Preserving Query Execution using a Decentralized Architecture and Tamper Resistant Hardware, EDBT, vol.2014, pp.487-498
URL : https://hal.archives-ouvertes.fr/hal-01096639

N. Tsiftes and A. Dunkels, A database in every sensor, Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, SenSys '11, pp.316-332, 2011.
DOI : 10.1145/2070942.2070974

H. T. Vo, S. Wang, D. Agrawal, G. Chen, and B. C. Ooi, LogBase, Proc. of the VLDB Endowment, pp.1004-1015, 2012.
DOI : 10.14778/2336664.2336673

B. Wang and J. S. Baras, HybridStore: An Efficient Data Management System for Hybrid Flash-Based Sensor Devices, Proceedings of the 10th European Conference on Wireless Sensor Networks, EWSN'13, pp.50-66, 2013.
DOI : 10.1007/978-3-642-36672-7_4

H. Wang, C. C. Tan, L. , and Q. , Snoogle: A Search Engine for Pervasive Environments, IEEE Transactions on Parallel and Distributed Systems, vol.21, issue.8, pp.1188-1202, 2010.
DOI : 10.1109/TPDS.2009.145

C. Wu, T. Kuo, C. , and L. , An efficient B-tree layer implementation for flash-memory storage systems, ACM Transactions on Embedded Computing Systems, vol.6, issue.3, 2007.
DOI : 10.1145/1275986.1275991

T. Yan, D. Ganesan, and R. Manmatha, Distributed image search in camera sensor networks, Proceedings of the 6th ACM conference on Embedded network sensor systems, SenSys '08, pp.155-168, 2008.
DOI : 10.1145/1460412.1460428

K. Yap, V. Srinivasan, M. Motani, and . Max, Wide area human-centric search of the physical world, ACM Transactions on Sensor Networks, vol.426, issue.4, pp.1-34, 2008.

J. Zobel and A. Moffat, Inverted files for text search engines, ACM Computing Surveys, vol.38, issue.2, 2006.
DOI : 10.1145/1132956.1132959