Fig. 2From: A secure data deduplication system for integrated cloud-edge networksStructure of the SHA-512 algorithm [35]Back to article page