Fig. 3From: A secure data deduplication system for integrated cloud-edge networksa Performance comparison of proposed MECC with existing techniques in terms of encryption time. b Performance comparison of proposed MECC with existing techniques in terms of encryption timeBack to article page