of Auvergne-Rh
ˆ
one-Alpes, the support of the “Di-
gital Trust” Chair from the University of Auvergne
Foundation, the Indo-French Centre for the Promo-
tion of Advanced Research (IFCPAR) and the Cen-
ter Franco-Indien Pour La Promotion De La Re-
cherche Avanc
´
ee (CEFIPRA) through the project
DST/CNRS 2015-03 under DST-INRIA-CNRS Tar-
geted Programme.
REFERENCES
Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y. (2004).
Order-Preserving Encryption for Numeric Data. In
Proceedings of the ACM SIGMOD International Con-
ference on Management of Data, pages 563–574.
Alghamdi, W. Y., Wu, H., and Kanhere, S. S. (2017). Reli-
able and Secure End-to-End Data Aggregation Using
Secret Sharing in WSNs. In 2017 IEEE Wireless Com-
munications and Networking Conference, WCNC, pa-
ges 1–6.
Blass, E., Pietro, R. D., Molva, R., and
¨
Onen, M. (2012).
PRISM - Privacy-Preserving Search in MapReduce.
In Privacy Enhancing Technologies - 12th Internatio-
nal Symposium, PETS, pages 180–200.
Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A.,
McMahan, H. B., Patel, S., Ramage, D., Segal, A.,
and Seth, K. (2017). Practical Secure Aggregation
for Privacy-Preserving Machine Learning. In Pro-
ceedings of the 2017 ACM SIGSAC Conference on
Computer and Communications Security, CCS, pages
1175–1191.
Bultel, X., Ciucanu, R., Giraud, M., and Lafourcade, P.
(2017). Secure Matrix Multiplication with MapRe-
duce. In Proceedings of the 12th International Confe-
rence on Availability, Reliability and Security, pages
11:1–11:10.
Ciucanu, R., Giraud, M., Lafourcade, P., and Ye, L.
(2018). Secure grouping and aggregation with mapre-
duce. Cryptology ePrint Archive, Report 2018/501.
https://eprint.iacr.org/2018/501.
Dean, J. and Ghemawat, S. (2004). MapReduce: Simpli-
fied Data Processing on Large Clusters. In 6th Sym-
posium on Operating System Design and Implementa-
tion OSDI, pages 137–150.
Derbeko, P., Dolev, S., Gudes, E., and Sharma, S. (2016).
Security and privacy aspects in MapReduce on clouds:
A survey. Computer Science Review, 20:1–28.
Dolev, S., Gilboa, N., and Li, X. (2015). Accumula-
ting Automata and Cascaded Equations Automata for
Communicationless Information Theoretically Secure
Multi-Party Computation: Extended Abstract. In Pro-
ceedings of the 3rd International Workshop on Secu-
rity in Cloud Computing, SCC@ASIACCS ’15, pages
21–29.
Dolev, S., Li, Y., and Sharma, S. (2016). Private and Se-
cure Secret Shared MapReduce. In Data and Appli-
cations Security and Privacy XXX - 30th Annual IFIP
WG 11.3 Conference, DBSec, pages 151–160.
Gentry, C. (2009). Fully Homomorphic Encryption Using
Ideal Lattices. In Proceedings of the Forty-first Annual
ACM Symposium on Theory of Computing, STOC ’09,
pages 169–178. ACM.
Leskovec, J., Rajaraman, A., and Ullman, J. D. (2014).
Mining of Massive Datasets. Cambridge University
Press.
Macedo, R., Paulo, J., Pontes, R., Portela, B., Oliveira, T.,
Matos, M., and Oliveira, R. (2017). A practical fra-
mework for privacy-preserving nosql databases. In
36th IEEE Symposium on Reliable Distributed Sys-
tems, SRDS 2017, Hong Kong, Hong Kong, September
26-29, 2017, pages 11–20.
Mayberry, T., Blass, E., and Chan, A. H. (2013). PIRMAP:
Efficient Private Information Retrieval for MapRe-
duce. In Financial Cryptography and Data Security
- 17th International Conference, FC, pages 371–385.
Naccache, D. and Stern, J. (1998). A New Public Key Cryp-
tosystem Based on Higher Residues. In Proceedings
of the 5th ACM Conference on Computer and Commu-
nications Security, CCS ’98, pages 59–66, New York,
NY, USA. ACM.
Okamoto, T. and Uchiyama, S. (1998). A New Public-key
Cryptosystem as Secure as Factoring, pages 308–318.
Springer Berlin Heidelberg.
Paillier, P. (1999). Public-Key Cryptosystems Based on
Composite Degree Residuosity Classes. In Advan-
ces in Cryptology - EUROCRYPT ’99, International
Conference on the Theory and Application of Crypto-
graphic Techniques, pages 223–238.
Popa, R. A., Redfield, C. M. S., Zeldovich, N., and Bala-
krishnan, H. (2011). Cryptdb: protecting confidentia-
lity with encrypted query processing. In Proceedings
of the 23rd ACM Symposium on Operating Systems
Principles 2011, SOSP 2011, Cascais, Portugal, Oc-
tober 23-26, 2011, pages 85–100.
Shamir, A. (1979). How to Share a Secret. Commun. ACM,
22(11):612–613.
Vo-Huu, T. D., Blass, E., and Noubir, G. (2015). EPiC: Effi-
cient Privacy-Preserving Counting for MapReduce. In
Networked Systems - Third International Conference,
NETYS, pages 426–443.
Secure Grouping and Aggregation with MapReduce
355