Fig. 4From: A secure data deduplication system for integrated cloud-edge networksa Performance comparison of proposed MECC with existing techniques in terms of key generation time. b Performance comparison of proposed MECC with existing techniques in terms of security levelBack to article page