Fig. 2From: Feasibility study on security deduplication of medical cloud privacy dataRequest authorization processBack to article page