Fig. 5From: A secure data deduplication system for integrated cloud-edge networksPerformance analysis of the proposed deduplication scheme with existing techniques in terms of deduplication rateBack to article page