Key Management for Deduplication

This scheme is intended to be used in a scenario where multiple users are using a storage system to store data.

Security Primitive: 
Key Management
Security Requirements Addressed: