Return to Article Details Secure and duplication detection in cloud using cryptographic hashing method Download Download PDF