S. Abiteboul, B. André, and D. Kaplan, Managing your digital life, CACM, vol.58, p.5, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01068006

A. Shamir, How to Share a Secret, Commun. ACM, vol.22, issue.11, 1979.

T. Allard, N. Anciaux, L. Bouganim, Y. Guo, L. Le-folgoc et al., Secure personal data servers: a vision paper, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00551875

T. Allard, G. Hébrail, F. Masseglia, and E. Pacitti, Chiaroscuro: Transparency and privacy for massive personal time-series clustering, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01136686

H. Almuhimedi, F. Schaub, N. Sadeh, I. Adjerid, A. Acquisti et al., Your Location has been Shared 5.398 Times!: A Field Study on Mobile App Privacy Nudging. CHI, 2015.

G. Alonso, Data Processing in Modern Hardware, Tutorial at EDBT, 2016.

A. Sani and A. Schrodintext, Strong Protection of Sensitive Textual Content of Mobile Applications, ACM International Conference on Mobile Systems, Applications and Services (MobiSys, 2017.

N. Anciaux, P. Bonnet, L. Bouganim, B. Nguyen, I. S. Popa et al., Trusted Cells: A Sea Change for Personal Data Services, 2013.

N. Anciaux, L. Bouganim, P. Pucheral, Y. Guo, L. Le-folgoc et al., MILo-DB: a personal, secure and portable database machine. Distributed and Parallel Databases, p.32, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00768355

N. Anciaux, L. Bouganim, P. Pucheral, Y. Guo, L. Le-folgoc et al., DB: a personal, secure and portable database machine, DAPD, vol.32, p.1, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00768355

N. Anciaux, S. Lallali, I. S. Popa, and P. Pucheral, A scalable search engine for mass storage smart objects, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01176462

A. Arasu, K. Eguro, M. Joglekar, R. Kaushik, D. Kossmann et al., Transaction processing on confidential data using cipherbase, 2015.

. Arm and . Security, Technology-Building a Secure System using TrustZone Technology. ARM Technical White Paper, 2009.

R. Bahmani, M. Barbosa, F. Brasser, B. Portela, A. R. Sadeghi et al., Secure Multiparty Computation from SGX. IACR Cryptology ePrint Ar, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01898742

S. Bajaj and R. Sion, TrustedDB: A trusted hardware-based database with privacy and data confidentiality, Transactions on Knowledge and Data Engineering, vol.26, p.3, 2014.

M. Barbosa, B. Portela, G. Scerri, and B. Warinschi, Foundations of hardware-based attested computation and application to SGX, EuroS&P, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01417137

M. M. Bazm, M. Lacoste, M. Südholt, and J. M. Menaud, Side Channels in the Cloud: Isolation Challenges, Attacks, and Countermeasures, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01591808

M. Bilal, Towards Secure Stream Processing Using Intel SGX, 2017.

A. Boutet, D. Frey, R. Guerraoui, A. Jégou, and A. M. Kermarrec, Privacy preserving distributed collaborative filtering, Computing, vol.98, 2016.
URL : https://hal.archives-ouvertes.fr/hal-00975137

S. Brenner, Confidential ZooKeeper using Intel SGX. Middleware, 2016.

E. Brickell, J. Camenisch, and L. Chen, Direct anonymous attestation, ACM International Conference on Computer and Communications Security (CCS), 2004.

T. Chajed, J. Gjengset, J. Van-den-hooff, M. F. Kaashoek, J. Mickens et al., Decoupling user data from web applications. 15th Workshop on Hot Topics in Operating Systems (HotOS XV), 2015.

A. Chaudhry, J. Crowcroft, H. Howard, A. Madhavapeddy, R. Mortier et al., D. Personal data: thinking inside the box. Aarhus Conference on Critical Alternatives, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01493559

W. Christl, K. Kopp, and P. U. Riechert, Corporate surveillance in everyday life, 2017.

V. Costan and S. Devadas, Intel SGX Explained. IACR Cryptology ePrint Archive, 2016.

A. P. Dalskov and C. Orlandi, Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's Security, ACM Asia Conference on Computer and Communications Security, 2018.

Y. A. Demontjoye, E. Shmueli, S. S. Wang, and A. S. Pentland, OpenPDS: Protecting the privacy of metadata through safe answers, PloS one, vol.9, p.7, 2014.

D. A. Fernandes, L. F. Soares, J. V. Gomes, M. M. Freire, and P. R. Inácio, Security issues in cloud environments: a survey. Information Security, vol.13, issue.2, 2014.

, Loi n° 51-711 du 7 juin 1951 sur l'obligation, la coordination et le secret en matière de statistiques

H. Harkous, R. Rahman, B. Karlas, and K. Aberer, The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps, 2016.

A. S. Ibrahim, J. Hamlyn-harris, and J. Grundy, Emerging security challenges of cloud virtual infrastructure, 2016.

J. Katz, Universally composable multi-party computation using tamper-proof hardware, International Conference on the Theory and Applications of Cryptographic Techniques, 2007.

S. Lallali, N. Anciaux, I. S. Popa, and P. Pucheral, Supporting Secure Keyword Search in the Personal Cloud, Information Systems, p.72, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01660599

S. Lee, E. L. Wong, D. Goel, M. Dahlin, V. Shmatikov et al., A platform for privacy-preserving apps. NSDI, 2013.

W. Lehner, The data center under your desk: how disruptive is modern hardware for DB system design? Keynote at PVLDB, vol.10, p.12, 2017.

M. Lentz, R. Sen, P. Druschel, B. Bhattacharjee, and . Secloak, ARM Trustzone-based Mobile Peripheral Control, ACM International Conference on Mobile Systems, Applications and Services (MobiSys), 2018.

T. Luu, F. Klemm, I. Podnar, M. Rajman, and K. Aberer, Alvis peers: a scalable full-text peer-to-peer retrieval engine. Int. Workshop on Inf, 2006.

J. M. Mccune, Y. Li, N. Qu, Z. Zhou, A. Datta et al., Efficient TCB reduction and attestation. S&P, 2010.

R. Mortier, H. Haddadi, T. Henderson, D. Mcauley, and J. Crowcroft, Human-data interaction: the human face of the datadriven society, Available at SSRN 2508051, 2014.

S. Palkar and M. Zaharia, DIY Hosting for Online Privacy, ACM Workshop on Hot Topics in Networks, 2017.

R. A. Popa, C. Redfield, N. Zeldovich, and H. Balakrishnan, CryptDB: protecting confidentiality with encrypted query processing, ACM Symposium on Operating Systems Principles (SOSP), 2011.

C. Priebe, K. Vaswani, and M. Costa, EnclaveDB: A Secure Database using SGX, IEEE Symposium on Security & Privacy (S&P), 2018.

S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A scalable content-addressable network, ACM, vol.31, p.4, 2001.

, /679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, 2016.

M. Sabt, M. Achemlal, and A. Bouabdallah, Trusted execution environment: What it is, and what it is not, Trustcom/BigDataSE/ISPA, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01246364

J. Saia and M. Zamani, Recent results in scalable multi-party computation, Int. Conf. on Current Trends in Theory and Practice of Informatics, 2015.

C. Schmidt and M. Parashar, Squid: Enabling search in DHT-based systems, Journal of Parallel and Distributed Computing, vol.68, p.7, 2008.

F. Schuster, M. Costa, C. Fournet, C. Gkantsidis, M. Peinado et al., VC3: trustworthy data analytics in the cloud using SGX, S&P, 2015.

. Stmicroelectronics and . St33jxxx, STM data brief 028629 Revision 3, 2017.

I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, SIGCOMM Computer Communication Review, vol.31, p.4, 2001.

, Task Force on Smart Disclosure. Smart Disclosure and Consumer Decision Making, 2013.

D. H. That, I. S. Popa, K. Zeitouni, C. Borcea, and . Pampas, Privacy-Aware Mobile Participatory Sensing Using Secure Probes. ACM International Conference on Scientific and Statistical Database Management (SSDBM), 2016.
URL : https://hal.archives-ouvertes.fr/hal-01426375

C. Q. To, B. Nguyen, and P. Pucheral, Private and Scalable Execution of SQL Aggregates on a Secure Decentralized Architecture, TODS, vol.41, p.3, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01296432

P. Tran-van, N. Anciaux, and P. Pucheral, A New Sharing Paradigm for the Personal Cloud, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01675091

P. Tran-van, N. Anciaux, and P. Pucheral, SWYSWYK: a Privacy-by-Design Paradigm for Personal Information Management Systems, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01675090

J. Wang and Z. Wang, A survey on personal data cloud, The Scientific World Journal, 2014.

X. Xiao and Y. Tao, , 2006.

L. Zhang, J. Litton, F. Cangialosi, T. Benson, D. Levin et al., Supporting long-lived, mostly-idle applications in cloud environments, ACM European Conference on Computer Systems (EuroCCS), 2016.

C. Zhao, On the Performance of Intel SGX, IEEE Web Inf. Systems and Applications Conf, 2016.