Return to Article Details Secure Data Deduplication by Using Convergent Key Technique Download Download PDF