Return to Article Details A secure deduplication scheme for encrypted data Download Download PDF