R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Orderpreserving encryption for numeric data, SIGMOD Conf, pp.563-574, 2004.
DOI : 10.1145/1007568.1007632

URL : http://rakesh.agrawal-family.com/papers/sigmod04opes.pdf

Y. Chang and M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, ACNS, pp.442-455, 2005.
DOI : 10.1007/11496137_30

S. Choi, G. Ghinita, H. Lim, and E. Bertino, Secure knn query processing in untrusted cloud environments, IEEE TKDE, pp.2818-2831, 2014.
DOI : 10.1109/tkde.2014.2302434

C. Coles and J. Yeoh, Cloud adoption practices and priorities survey report, 2015.

X. Ding, P. Liu, and H. Jin, Privacy-preserving multi-keyword top-k similarity search over encrypted data, IEEE TDSC, issue.99, pp.1-14, 2017.
DOI : 10.1109/tdsc.2017.2693969

Y. Elmehdwi, B. K. Samanthula, and W. Jiang, Secure k-nearest neighbor query over encrypted data in outsourced environments, ICDE Conf, 2014.

R. Fagin, Combining fuzzy information from multiple systems, J. Comput. Syst. Sci, vol.58, issue.1, pp.83-99, 1999.
DOI : 10.1006/jcss.1998.1600

URL : https://doi.org/10.1006/jcss.1998.1600

R. Fagin, A. Lotem, and M. Naor, Optimal aggregation algorithms for middleware, J. Comput. Syst. Sci, vol.66, issue.4, pp.614-656, 2003.

B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, Secure multidimensional range queries over outsourced data, VLDB J, vol.21, issue.3, pp.333-358, 2012.

B. Hore, S. Mehrotra, and G. Tsudik, A privacy-preserving index for range queries, VLDB Conf, pp.720-731, 2004.

M. S. Islam, M. Kuzu, and M. Kantarcioglu, Inference attack against encrypted range queries on outsourced databases, ACM CODASPY, pp.235-246, 2014.

H. Kim, H. Kim, and J. Chang, A privacy-preserving top-k query processing algorithm in the cloud computing, GECON Conf, pp.277-292, 2017.

R. Li, A. X. Liu, A. L. Wang, and B. Bruhadeshwar, Fast range query processing with strong privacy protection for cloud computing, vol.7, 2014.

X. Liao and J. Li, Privacy-preserving and secure top-k query in two-tier wireless sensor network, Global Communications Conference (GLOBECOM), pp.335-341, 2012.

S. Mahboubi, R. Akbarinia, and P. Valduriez, Top-k Query Processing Over Outsourced Encrypted Data, INRIA, 2017.
URL : https://hal.archives-ouvertes.fr/lirmm-01502142

C. Sahin, T. Allard, R. Akbarinia, A. E. Abbadi, and E. Pacitti, A differentially private index for range query processing in clouds, ICDE Conf, 2018.
URL : https://hal.archives-ouvertes.fr/lirmm-01886725

D. X. Song, D. Wagner, and A. Perrig, Practical techniques for searches on encrypted data, IEEE S&P, pp.44-55, 2000.

J. Vaidya and C. Clifton, Privacy-preserving top-k queries, ICDE Conf, pp.545-546, 2005.

W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, Secure knn computation on encrypted databases, SIGMOD Conf, pp.139-152, 2009.

X. Haohan-zhu, G. Meng, and . Kollios, Top-k query processing on encrypted databases with strong security guarantees, ICDE Conf, 2018.