A. , R. Kiernan, J. Srikant, R. And, X. U. et al., Order preserving encryption for numeric data, International Conference on Management of Data (SIGMOD, pp.563-574, 2004.

A. , R. Pacitti, E. And, V. , and P. , Best position algorithms for top-k queries, Proceedings of the VLDB Endowment, pp.495-506, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00378836

A. , A. And, X. U. , and Z. , Scalable, efficient range queries for grid information services, International Conference on Peer-to-Peer Computing, pp.33-40, 2002.

A. , N. Exarchakos, G. Li, M. And, L. et al., Handbook of Research on P2P and Grid Systems for Service-Oriented Computing: Models, Methodologies and Applications: Models, Methodologies and Applications. Information Science Reference (an imprint of IGI Global), 2010.

A. , Y. And, L. , and Y. , Security against covert adversaries: Efficient protocols for realistic adversaries, Theory of Cryptography Conference (TCC, pp.137-156, 2007.

B. , F. And, O. , and O. , Sorting and searching behind the curtain, International Conference on Financial Cryptography and Data Security (FC) (2015), pp.127-146

B. , A. Chenette, N. Lee, Y. And-o'neill, and A. , Order-preserving symmetric encryption, International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT, pp.224-241, 2009.

B. , D. And-waters, and B. , Conjunctive, subset, and range queries on encrypted data, Theory of Cryptography Conference (TCC, pp.535-554, 2007.

B. , S. Kossmann, D. And, S. , and K. , The skyline operator, International Conference on Data Engineering (ICDE), vol.5, pp.421-430, 2001.

B. , R. Popa, R. A. Tu, S. And, G. et al., Machine learning classification over encrypted data, Network and Distributed System Security Symposium (NDSS, 2015.

B. , Z. Gentry, C. And, V. , and V. , leveled) fully homomorphic encryption without bootstrapping, Transactions on Computation Theory Journal (TOCT), vol.6, p.13, 2014.

B. , N. Gravano, L. And, M. , and A. , Evaluating top-k queries over webaccessible databases, International Conference on Data Engineering (ICDE, pp.369-380, 2002.

B. , M. And, D. , and X. , Fast privacy-preserving top-k queries using secret sharing, International Conference on Computer Communications and Networks (ICCCN) (2010), pp.1-7

C. , P. And, W. , and Z. , Efficient top-k query calculation in distributed networks, ACM Symposium on Principles of Distributed Computing (PODC), pp.206-215, 2004.

C. , P. And, W. , and Z. , Efficient top-k query calculation in distributed networks, ACM Symposium on Principles of Distributed Computing Conference (PODC), pp.206-215, 2004.

C. , Y. And, M. , and M. , Privacy preserving keyword searches on remote encrypted data, International Conference on Applied Cryptography and Network Security (ACNS) (2005), pp.442-455

C. , R. Codes, and C. , , 2002.

C. , E. Fraternali, P. Martinenghi, D. And, T. et al., Crowdsourcing for top-k query processing over uncertain data, Transactions on Knowledge and Data Engineering Journal (TKDE), vol.28, pp.41-53, 2016.

C. , C. And, Y. , and J. , Cloud adoption practices and priorities survey report, 2015.

C. , R. Garay, J. Kamara, S. And, O. et al., Searchable symmetric encryption: improved definitions and efficient constructions, Journal of Computer Security (JCS), vol.19, pp.895-934, 2011.

D. and J. , A provably secure additive and multiplicative privacy homomorphism, International Conference on Information Security (ISC, pp.471-483, 2002.

D. , C. Mcsherry, F. Nissim, K. And, S. et al., Calibrating noise to sensitivity in private data analysis, Theory of Cryptography Conference (TCC, pp.265-284, 2006.

D. , C. , R. , A. , and E. T. Al, The algorithmic foundations of differential privacy, Foundations and Trends R in Theoretical Computer Science Journal, vol.9, pp.211-407, 2014.

E. , Y. Samanthula, B. K. And, J. , and W. , Secure k-nearest neighbor query over encrypted data in outsourced environments, International Conference on Data Engineering, pp.664-675, 2014.

F. and R. , Combining fuzzy information from multiple systems, Journal of Computer and System Sciences, vol.58, pp.83-99, 1999.

F. , R. Lotem, A. And, N. , and M. , Optimal aggregation algorithms for middleware, SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pp.102-113, 2001.

F. , R. Lotem, A. And, N. , and M. , Optimal aggregation algorithms for middleware, Journal of Computer and System Sciences (JCSS), vol.66, pp.614-656, 2003.

G. and C. , Fully homomorphic encryption using ideal lattices, ACM Symposium on Theory of Computing Conference (STOC, pp.169-178, 2009.

G. , G. Kalnis, P. Khoshgozaran, A. Shahabi, C. And et al., Private queries in location based services: anonymizers are not necessary, International Conference on Management of Data (SIGMOD), pp.121-132, 2008.

G. and G. , Query evaluation techniques for large databases, Computing Surveys Journal (CSUR), vol.25, pp.73-169, 1993.

G. , M. Gao, J. Yan, X. , C. et al., Top-k interesting subgraph discovery in information networks, International Conference on Data Engineering (ICDE), pp.820-831, 2014.

H. Hacigümü¸s, H. Iyer, B. Li, C. And, M. et al., Executing sql over encrypted data in the database-service-provider model, International Conference on Management of Data (SIGMOD, pp.216-227, 2002.

H. , H. Mehrotra, S. And-iyer, and B. , Providing database as a service, International Conference on Data Engineering (ICDE, pp.29-40, 2002.

H. , M. And, T. , and K. , On the geometry of differential privacy, ACM Symposium on Theory of Computing Conference (STOC) (2010), pp.705-714

H. , B. Mehrotra, S. Canim, M. And, K. et al., Secure multidimensional range queries over outsourced data, VLDB Journal, vol.21, pp.333-358, 2012.

H. , B. Mehrotra, S. And, T. , and G. , A privacy-preserving index for range queries, Proceedings of the VLDB Endowment, pp.720-731, 2004.

H. U. , H. Xu, J. Ren, C. And, C. et al., Processing private queries over untrusted data cloud through privacy homomorphism, International Conference on Data Engineering (ICDE, pp.601-612, 2011.

K. , S. Papamanthou, C. And, R. , and T. , Dynamic searchable symmetric encryption, ACM Conference on Computer and Communications Security (CCS, pp.965-976, 2012.

K. , M. Kaul, A. Naldurg, P. Patranabis, S. Singh et al., Efficient secure k-nearest neighbours over encrypted data, International Conference on Extending Database Technology (EDBT, pp.264-275, 2018.

K. , M. And, S. , and C. , Voronoi-based k nearest neighbor search for spatial network databases, Proceedings of the VLDB Endowment (PVLDB), pp.840-851, 2004.

K. and D. , The state of the art in distributed query processing, Computing Surveys Journal (CSUR), vol.32, pp.422-469, 2000.

L. and J. , Differentially private m-estimators, Neural Information Processing Systems Conference (NIPS, pp.361-369, 2011.

L. I. , C. Hay, M. Miklau, G. And, W. et al., A data-and workload-aware query answering algorithm for range queries under differential privacy, VLDB Journal, vol.7, pp.341-352, 2014.

L. I. , D. Cao, J. Lu, X. And, C. et al., Efficient range query processing in peer-to-peer systems, Transactions on Knowledge and Data Engineering Journal (TKDE), vol.21, pp.78-91, 2009.

L. I. , J. And, O. , and E. R. , Efficiency and security trade-off in supporting range queries on encrypted databases, ACM Conference on Data and Applications Security and Privacy (CODASPY) (2005), pp.69-83

L. I. , R. Liu, A. X. Wang, A. L. And, B. et al., Fast range query processing with strong privacy protection for cloud computing, VLDB Journal, vol.7, pp.1953-1964, 2014.

L. I. , X. Kim, Y. J. Govindan, R. And, H. et al., Multi-dimensional range queries in sensor networks, International Conference on Embedded Networked Sensor Systems (SenSys) (2003), pp.63-75

L. , D. Lim, E. And, N. G. , and W. , Efficient k nearest neighbor queries on remote spatial databases using range estimation, International Conference on Scientific and Statistical Database Management (SSDBM, pp.121-130, 2002.

L. , D. And, W. , and S. , Programmable order-preserving secure index for encrypted database query, International Conference on Cloud Computing (CLOUD) (2012), pp.502-509

M. , A. Gehrke, J. Kifer, D. And, V. et al., \ell-diversity: Privacy beyond\kappa-anonymity, International Conference on Data Engineering (ICDE, p.24, 2006.

M. , S. Akbarinia, R. And, V. , and P. , Privacy preserving query processing in the cloud, Gestion de données-principes, technologies et applications (BDA) (2016), pp.61-62
URL : https://hal.archives-ouvertes.fr/lirmm-01410395

M. , S. Akbarinia, R. And, V. , and P. , Answering top-k queries over outsourced sensitive data in the cloud, International Conference on Database and Expert Systems Applications (DEXA) (2018), pp.218-231
URL : https://hal.archives-ouvertes.fr/lirmm-01886164

M. , S. Akbarinia, R. And, V. , and P. , Distributed privacypreserving top-k query processing, Gestion de données-principes, technologies et applications (BDA), 2018.
URL : https://hal.archives-ouvertes.fr/lirmm-01886160

M. , S. Akbarinia, R. And, V. , and P. , Privacy-preserving topk query processing in distributed systems, European Conference on Parallel Processing, pp.281-292, 2018.
URL : https://hal.archives-ouvertes.fr/lirmm-01886160

M. , S. Akbarinia, R. And, V. , and P. , Top-k query processing over distributed sensitive data, International Database Engineering & Applications Symposium (IDEAS) (2018), pp.208-216

M. , N. Cheng, K. H. Yiu, M. L. And, C. et al., Efficient aggregation of ranked inputs, International Conference on Data Engineering (ICDE, pp.72-72, 2006.

M. , S. Triantafillou, P. And, W. , and G. Klee, A framework for distributed top-k query algorithms, Proceedings of the VLDB Endowment (PVLDB) (2005), pp.637-648

M. , A. And, J. , and M. , Peersim: A scalable p2p simulator, International Conference on Peer-to-Peer Computing, pp.99-100, 2009.

Ö. , M. T. And, V. , and P. , Principles of Distributed Database Systems, 2011.

P. , B. Six, H. Toben, H. And, W. et al., Towards an analysis of range query performance in spatial data structures, SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, pp.214-221, 1993.

P. and P. , Public-key cryptosystems based on composite degree residuosity classes, International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp.223-238, 1999.

P. , D. Tao, Y. Fu, G. And, S. et al., An optimal and progressive algorithm for skyline queries, International Conference on Management of data (SIGMOD, pp.467-478, 2003.

P. , D. Zhang, J. Mamoulis, N. And, T. et al., Query processing in spatial network databases, Proceedings of the VLDB Endowment, pp.802-813, 2003.

P. , J. Leroy, V. And, A. , and S. , Distributed evaluation of top-k temporal joins, International Conference on Management of Data, pp.1027-1039, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01266188

P. , H. Hellerstein, J. M. And, H. , and W. , Extensible/rule based query rewrite optimization in starburst, Sigmod Record, vol.21, pp.39-48, 1992.

P. , T. Ntarmos, N. And, T. , and P. , Replication, load balancing and efficient range query processing in dhts, International Conference on Extending Database Technology (EDBT, pp.131-148, 2006.

P. , R. A. Li, F. H. And, Z. , and N. , An ideal-security protocol for orderpreserving encoding, IEEE Symposium on Security and Privacy (S&P) (2013), pp.463-477

P. , R. A. Redfield, C. Zeldovich, N. And, and H. Balakrishnan, Cryptdb: protecting confidentiality with encrypted query processing, ACM Symposium on Operating Systems Principles (SOSP, pp.85-100, 2011.

R. , A. And, R. , and T. , Interactive privacy via the median mechanism, ACM Symposium on Theory of Computing Conference (STOC) (2010), pp.765-774

S. , C. Allard, T. Akbarinia, R. Abbadi, A. E. And et al., A differentially private index for range query processing in clouds, International Conference on Data Engineering (ICDE), 2018.
URL : https://hal.archives-ouvertes.fr/lirmm-01886725

S. , P. And, S. , and L. , Generalizing data to provide anonymity when disclosing information, SIGMOD/PODS Conference, p.188, 1998.

S. and B. , Description of a new variable-length key, 64-bit block cipher (blowfish), Fast Software Encryption workshop (FSE), pp.191-204, 1994.

S. , M. Kim, Y. And, K. , and V. , Privacy preserving nearest neighbor search, International Conference on Data Mining Workshops (ICDMW, pp.541-545, 2006.

S. , E. Bethencourt, J. Chan, T. H. Song, D. And et al., Multidimensional range query over encrypted data, IEEE Symposium on Security and Privacy (S&P), pp.350-364, 2007.

S. , J. Wu, D. And, M. , and N. , Top-k relevant semantic place retrieval on spatial RDF data, International Conference on Management of Data (SIGMOD, pp.1977-1990, 2016.

S. , T. Krátk`ykrátk`-krátk`y, M. Pokorn`ypokorn`-pokorn`y, J. And, S. et al., A new range query algorithm for universal b-trees, Information Systems Journal (ISJ), vol.31, issue.6, pp.489-511, 2006.

N. P. Smart, V. And, and F. , Fully homomorphic encryption with relatively small key and ciphertext sizes, International Workshop on Public Key Cryptography (PKC) (2010), pp.420-443

S. , D. X. Wagner, D. And, P. , and A. , Practical techniques for searches on encrypted data, IEEE Symposium on Security and Privacy, pp.44-55, 2000.

S. , D. And, S. , and R. , Faster fully homomorphic encryption, International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT) (2010), pp.377-394

T. , J. Cui, Y. Li, Q. Ren, K. Liu et al., Ensuring security and privacy preservation for cloud data services, Computing Surveys Journal (CSUR), vol.49, p.13, 2016.

V. , J. And, C. , and C. , Privacy-preserving top-k queries, International Conference on Data Engineering (ICDE) (2005), pp.545-546

V. , J. And, C. , and C. W. , Privacy-preserving kth element score over vertically partitioned data, Transactions on Knowledge and Data Engineering Journal (TKDE), vol.21, pp.253-258, 2009.

M. Van-dijk, C. Gentry, S. Halevi, V. And, and V. , Fully homomorphic encryption over the integers, International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT) (2010), pp.24-43

P. Van-liesdonk, S. Sedghi, J. Doumen, P. Hartel, J. And et al., Computationally efficient searchable symmetric encryption, Secure Data Management Workshop (SDM) (2010), pp.87-100

W. , X. Zhang, Y. Zhang, W. Lin, X. And et al., SKYPE: top-k spatial-keyword publish/subscribe over sliding window, VLDB Journal, vol.9, pp.588-599, 2016.

W. , W. K. Cheung, D. W. Kao, B. And, M. et al., Secure knn computation on encrypted databases, International Conference on Management of Data (SIGMOD, pp.139-152, 2009.

X. Meng, H. Z. And, K. , and G. , Top-k query processing on encrypted databases with strong security guarantees, International Conference on Data Engineering (ICDE, 2018.

X. , L. And, Y. , and I. , Security analysis for order preserving encryption schemes, Annual Conference on Information Sciences and Systems (CISS) (2012), pp.1-6

X. , L. Chitti, S. And, L. , and L. , Topk queries across multiple private databases, International Conference on Distributed Computing Systems (ICDCS) (2005), pp.145-154

X. U. , J. Fan, J. Ammar, M. H. And, M. et al., Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptographybased scheme, International Conference on Network Protocols (ICNP, pp.280-289, 2002.

Y. , H. Chung, C. And, K. , and M. , An efficient top-k query processing framework in mobile sensor networks, Data & Knowledge Engineering Journal (DKE), vol.102, pp.78-95, 2016.

Y. , B. Li, F. And, X. , and X. , Secure nearest neighbor revisited, International Conference on Data Engineering (ICDE) (2013), pp.733-744

Y. U. , H. Li, H. Wu, P. Agrawal, D. And-el-abbadi et al., Efficient processing of distributed top-k queries, International Conference on Database and Expert Systems Applications (DEXA) (2005), pp.65-74

Z. , J. Zhang, Z. Xiao, X. , Y. et al., Functional mechanism: regression analysis under differential privacy, VLDB Journal, vol.5, pp.1364-1375, 2012.

Z. , X. Li, G. And, F. , and J. , Crowdsourced top-k algorithms: An experimental evaluation, VLDB Journal, vol.9, pp.612-623, 2016.

Z. , Y. Xu, R. And, T. , and T. , Secure k-nn computation on encrypted cloud data without sharing key with query users, International Workshop on Security in Cloud Computing (SCC) (2013), pp.55-60