{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T23:46:55Z","timestamp":1777852015565,"version":"3.51.4"},"reference-count":31,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Health Informatics J"],"published-print":{"date-parts":[[2026,1]]},"abstract":"<jats:p>Big Data in Internet of Healthcare Things (IoHT) environments includes large volumes of structured and unstructured clinical information. The Hadoop Distributed File System (HDFS) is widely used for its scalability and ability to run on commodity hardware. However, it offers limited native encryption, leaving data vulnerable to security risks. Although several encryption techniques exist, traditional algorithms still face performance and security limitations with large-scale medical datasets. Therefore, this study introduces a hybrid encryption framework designed to enhance security in IoHT environments that process large-scale medical Big Data. The framework combines Attribute-Based Encryption (ABE) with the Blowfish cipher to secure data generated by heterogeneous medical devices across the IoHT infrastructure. The proposed approach is benchmarked against established hybrid schemes\u2014CP-ABE + HE, HE + BF, and CP-ABE + AES\u2014to provide a comparative assessment of its security strength and computational performance. The performance assessment employed key computational metrics, including system efficiency, encryption latency, and decryption latency. Experimental results demonstrate that the proposed hybrid scheme delivers superior performance compared to existing approaches, attaining a peak efficiency of 98.5%. The method further achieved encryption and decryption times of 6.8\u00a0min and 5.7\u00a0min, respectively, indicating improved computational handling of large-scale IoHT data.<\/jats:p>","DOI":"10.1177\/14604582261417493","type":"journal-article","created":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T14:48:16Z","timestamp":1768834096000},"update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Next-generation security for big data analytics in healthcare IoT using hybrid cryptographic techniques"],"prefix":"10.1177","volume":"32","author":[{"given":"Abdullah","family":"Alharbi","sequence":"first","affiliation":[{"name":"Taif University"}]},{"given":"Wael","family":"Alosaimi","sequence":"additional","affiliation":[{"name":"Taif University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7859-8327","authenticated-orcid":false,"given":"Masood","family":"Ahmad","sequence":"additional","affiliation":[{"name":"GLA University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4244-8076","authenticated-orcid":false,"given":"Mohd","family":"Nadeem","sequence":"additional","affiliation":[{"name":"Shri Ramswaroop Memorial University"}]}],"member":"179","published-online":{"date-parts":[[2026,1,19]]},"reference":[{"key":"e_1_3_4_2_2","first-page":"102398","article-title":"An encryption scheme for securing multiple medical images","volume":"49","author":"Banik A","year":"2019","unstructured":"Banik A, Shamsi Z, Laiphrakpam DS. An encryption scheme for securing multiple medical images. J Inf Secur Appl 2019; 49: 102398.","journal-title":"J Inf Secur Appl"},{"key":"e_1_3_4_3_2","first-page":"1","article-title":"Blockchain technology on smart grid, energy trading, and big data: security issues, challenges, and recommendations","volume":"20","author":"Hasan MK","year":"2022","unstructured":"Hasan MK, Alkhalifah A, Islam S, et al. Blockchain technology on smart grid, energy trading, and big data: security issues, challenges, and recommendations. Wireless Commun Mobile Comput 2022; 20: 1\u201326.","journal-title":"Wireless Commun Mobile Comput"},{"key":"e_1_3_4_4_2","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.10.000C50"},{"key":"e_1_3_4_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.12.004"},{"key":"e_1_3_4_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3148250"},{"issue":"1","key":"e_1_3_4_7_2","first-page":"224","article-title":"Hadoop MapReduce for Mobile clouds","volume":"7","author":"Johnu G","year":"2016","unstructured":"Johnu G, Chen CA, Stoleru R, et al. Hadoop MapReduce for Mobile clouds. IEEE Transactions on Cloud Computing 2016; 7(1): 224\u2013236.","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_3_4_8_2","first-page":"1","article-title":"A low overhead and scalable authentication and encryption scheme for medical wireless sensor networks","volume":"13","author":"Vohra H","year":"2023","unstructured":"Vohra H, Hasan MK, Shukla H, et al. A low overhead and scalable authentication and encryption scheme for medical wireless sensor networks. Human-Centric Computing and Information Sciences 2023; 13: 1\u201318.","journal-title":"Human-Centric Computing and Information Sciences"},{"key":"e_1_3_4_9_2","first-page":"1","article-title":"Big data: hadoop framework vulnerabilities, security issues and attacks","volume":"1","author":"Bhathal GS","year":"2019","unstructured":"Bhathal GS, Singh A. Big data: hadoop framework vulnerabilities, security issues and attacks. Array. 2019; 1: 1\u20138.","journal-title":"Array"},{"key":"e_1_3_4_10_2","doi-asserted-by":"publisher","DOI":"10.36548\/jiip.2021.1.004"},{"issue":"1","key":"e_1_3_4_11_2","first-page":"859","article-title":"Evaluating security of big data through fuzzy based decision-making technique","volume":"2","author":"Hamed N","year":"2022","unstructured":"Hamed N, Nahr JG, Fallah M, et al. Evaluating security of big data through fuzzy based decision-making technique. IEEE Access. 2022; 2(1): 859\u2013872.","journal-title":"IEEE Access"},{"issue":"1","key":"e_1_3_4_12_2","first-page":"92","article-title":"Security attacks on cloud computing with possible solution","volume":"6","author":"Chouhan P","year":"2016","unstructured":"Chouhan P, Singh R. Security attacks on cloud computing with possible solution. Int J Adv Res Comput Sci Software Eng. 2016; 6(1): 92\u201396.","journal-title":"Int J Adv Res Comput Sci Software Eng"},{"issue":"5","key":"e_1_3_4_13_2","first-page":"328","article-title":"A comparison of symmetric key algorithms DES, AES, blowfish, RC4, RC6: a survey","volume":"6","author":"Princy P","year":"2015","unstructured":"Princy P. A comparison of symmetric key algorithms DES, AES, blowfish, RC4, RC6: a survey. Int J Comput Sci Eng Technol. 2015; 6(5): 328\u2013331.","journal-title":"Int J Comput Sci Eng Technol"},{"key":"e_1_3_4_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.07.005"},{"key":"e_1_3_4_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.08.007"},{"key":"e_1_3_4_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-09748-1"},{"key":"e_1_3_4_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3164066"},{"key":"e_1_3_4_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3061710"},{"key":"e_1_3_4_19_2","doi-asserted-by":"publisher","DOI":"10.36548\/jsws.2019.4.002"},{"key":"e_1_3_4_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.10.008"},{"key":"e_1_3_4_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2862425"},{"key":"e_1_3_4_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.10.006"},{"issue":"3","key":"e_1_3_4_23_2","first-page":"379","article-title":"SEEN: a selective encryption method to ensure confidentiality for big sensing data streams","volume":"5","author":"Deepak P","year":"2017","unstructured":"Deepak P, Wu X, Surya N, et al. SEEN: a selective encryption method to ensure confidentiality for big sensing data streams. IEEE Transactions on Big Data 2017; 5(3): 379\u2013392.","journal-title":"IEEE Transactions on Big Data"},{"key":"e_1_3_4_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.423"},{"key":"e_1_3_4_25_2","first-page":"1","article-title":"Attribute based honey encryption algorithm for securing big data: hadoop distributed file system perspective","volume":"6","author":"Gayatri K","year":"2020","unstructured":"Gayatri K, Agrawal A, Attaallah A, et al. Attribute based honey encryption algorithm for securing big data: hadoop distributed file system perspective. Peer Review Journal of Computer Science 2020; 6: 1\u201331.","journal-title":"Peer Review Journal of Computer Science"},{"issue":"9","key":"e_1_3_4_26_2","first-page":"1019","article-title":"Securing messages from brute force attack by combined approach of honey encryption and blowfish","volume":"4","author":"Sahu R","year":"2017","unstructured":"Sahu R, Ansari MS. Securing messages from brute force attack by combined approach of honey encryption and blowfish. International Research Journal of Engineering and Technology 2017; 4(9): 1019\u20131023.","journal-title":"International Research Journal of Engineering and Technology"},{"issue":"2","key":"e_1_3_4_27_2","first-page":"3155","article-title":"A secure access policies based data deduplication system","volume":"3","author":"Prasad R","year":"2018","unstructured":"Prasad R, Shankar H, Maniraj SP. A secure access policies based data deduplication system. International Journal of Innovative Science and Research Technology. 2018; 3(2): 3155\u20133157.","journal-title":"International Journal of Innovative Science and Research Technology"},{"key":"e_1_3_4_28_2","doi-asserted-by":"crossref","DOI":"10.1109\/JBHI.2025.3554032","article-title":"Robust steganography technique for enhancing the protection of medical records in healthcare informatics","author":"Riaz H","year":"2025","unstructured":"Riaz H, Naqvi RA, Ellahi M, et al. Robust steganography technique for enhancing the protection of medical records in healthcare informatics. IEEE J Biomed Health Inform 2025; PP.","journal-title":"IEEE J Biomed Health Inform"},{"key":"e_1_3_4_29_2","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare12242587"},{"key":"e_1_3_4_30_2","doi-asserted-by":"publisher","DOI":"10.3390\/app8071119"},{"key":"e_1_3_4_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103117"},{"key":"e_1_3_4_32_2","doi-asserted-by":"crossref","unstructured":"Nyangaresi VO Ma J. A formally verified message validation protocol for intelligent iot e-health systems. 2022 IEEE world conference on applied intelligence and computing (AIC) Sonbhadra India 17-19 June 2022 pp. 416\u2013422.","DOI":"10.1109\/AIC55036.2022.9848874"}],"container-title":["Health Informatics Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14604582261417493","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14604582261417493","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14604582261417493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T22:29:07Z","timestamp":1777501747000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14604582261417493"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["10.1177\/14604582261417493"],"URL":"https:\/\/doi.org\/10.1177\/14604582261417493","relation":{},"ISSN":["1460-4582","1741-2811"],"issn-type":[{"value":"1460-4582","type":"print"},{"value":"1741-2811","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]},"article-number":"14604582261417493"}}