Return to Article Details A New Efficient Method for Information Security in Hadoop Download Download PDF