R. Nithiavathy, Data Integrity and Data Dynamics with Secure Storage Service in Cloud, Proceedings of the 2015 International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp.125-131, 2015.

T. Clement-gagnon, The security in the cloud computing, 2012.

R. Nithiavathy, Data Integrity and Data Dynamics with Secure Storage Service in Cloud, Proceedings of the 2013, 2013.

, International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp.133-130, 2013.

, protection of data and cloud computing Europe septembre, 2011.

A. Kumbhare, Y. Simmhan, and V. Prasanna, Cryptonite: A Secure and Performant Data, IEEE 5th International Conference on. IEEE, pp.510-519, 2016.

H. Huang and K. Liu, Efficient key management for preserving HIPAA regulations, The Journal of Systems and Software, vol.84, pp.221-122, 2015.

A. Gupta, A. Verma, P. Kalra, and L. Kumar, Big Data: A security compliance model, Industry and Government (CSIBIG), pp.1-5, 2014.

, Cigref,cloud computing and protection of data, 2015.

H. Idrissi, A. Kartit, and M. E. Marraki, A taxonomy and survey of Cloud computing, pp.1-5, 2013.

R. C. Merkle, A Certified Digital Signature, Advances in Cryptology -CRYPTO '89, 9th Annual International Cryptology Conference, vol.435, pp.218-238, 1989.

D. Benslimane, M. Barhamgi, and F. Cuppens, PAIRSE: A Privacy-Preserving Service-Oriented Data Integration System, SIGMOD Record, vol.42, issue.3, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01124429

O. Heffetz and K. Ligett, Privacy and data-based research. No. w19433, National Bureau of Economic Research, 2013.

D. Chen and H. Zhao, Data Security and Privacy Protection Issues in CC, IEEE International Conference on Computer Science and Electronics Engineering (ICCSEE), 2015.

A. Petit, B. Mokhtar, L. Brunie, and H. Kosch, Towards Efficient and Accurate Privacy Preserving Web Search, MW4NG, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01301099