Return to Article Details Securing Hadoop using OAuth 2.0 and Real Time Encryption Algorithm Download Download PDF