Fig. 6From: A secure data deduplication system for integrated cloud-edge networksPerformance comparison of the proposed hash tree with existing binary treeBack to article page