Fig. 5From: Secure end-to-end processing of smart metering dataSecure KVS: Comparing the raw storage requirements of different data protection policies, namely, replication, erasure coding and hybrid policiesBack to article page