Return to Article Details Robust Data De-duplication Security in Fog Computing Download Download PDF