{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T12:24:02Z","timestamp":1771244642792,"version":"3.50.1"},"reference-count":36,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSAN"],"abstract":"<jats:p>Big data has significantly transformed data processing and analytics across various domains. However, ensuring security and data confidentiality in distributed platforms such as Hadoop remains a challenging task. Distributed environments face major security issues, particularly in the management and protection of large-scale data. In this article, we focus on the cost of secure information transmission, implementation complexity, and scalability. Furthermore, we address the confidentiality of information stored in Hadoop by analyzing different AES encryption modes and examining their potential to enhance Hadoop security. At the application layer, we operate within our Hadoop environment using an extended, secure, and widely used MQTT protocol for large-scale data communication. This approach is based on implementing MQTT with TLS, and before connecting, we add a hash verification of the data nodes\u2019 identities and send the JWT. This protocol uses TCP at the transport layer for underlying transmission. The advantage of TCP lies in its reliability and small header size, making it particularly suitable for big data environments. This work proposes a triple-layer protection framework. The first layer is the assessment of the performance of existing AES encryption modes (CTR, CBC, and GCM) with different key sizes to optimize data confidentiality and processing efficiency in large-scale Hadoop deployments. Afterwards, we propose evaluating the integrity of DataNodes using a novel verification mechanism that employs SHA-3-256 hashing to authenticate nodes and prevent unauthorized access during cluster initialization. At the third tier, the integrity of data blocks within Hadoop is ensured using SHA-3-256. Through extensive performance testing and security validation, we demonstrate integration.<\/jats:p>","DOI":"10.3390\/jsan15010022","type":"journal-article","created":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T11:11:28Z","timestamp":1771240288000},"page":"22","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced MQTT Protocol for Securing Big Data\/Hadoop Data Management"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2525-984X","authenticated-orcid":false,"given":"Ferdaous","family":"Kamoun-Abid","sequence":"first","affiliation":[{"name":"New Technologies and Communication Systems Laboratory, National School of Electronics and Telecommunications, Sfax 3018, Tunisia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0551-4927","authenticated-orcid":false,"given":"Amel","family":"Meddeb-Makhlouf","sequence":"additional","affiliation":[{"name":"New Technologies and Communication Systems Laboratory, National School of Electronics and Telecommunications, Sfax 3018, Tunisia"}]}],"member":"1968","published-online":{"date-parts":[[2026,2,16]]},"reference":[{"key":"ref_1","unstructured":"Kala, K., Makhloga, K., Khan, A., Pandey, A., and Mittal, S. (2024, January 15\u201316). A Framework for Big Data Security Using MapReduce in IoT Enabled Computing. Proceedings of the 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India."},{"key":"ref_2","unstructured":"DemandSage (2025, September 10). Google Search Statistics: How Many Google Searches Per Day?. Available online: https:\/\/www.demandsage.com\/google-search-statistics."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Yassein, M.B., Shatnawi, M.Q., Aljwarneh, S., and Al-Hatmi, R. (2017). Internet of Things: Survey and open issues of MQTT protocol. Proceedings of the 2017 International Conference on Engineering & MIS (ICEMIS), Monastir, Tunisia, 8\u201310 May 2017, IEEE.","DOI":"10.1109\/ICEMIS.2017.8273112"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Azzedin, F., and Alhazmi, T. (2023). Secure data distribution architecture in IoT using MQTT. Appl. Sci., 13.","DOI":"10.3390\/app13042515"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Shan, Y., Su, Y., Lin, J., and Shan, T. (2024). IoT Communication Based on MQTT and OneNET Cloud Platform in Big Data Environment. Preprints, 2024011250.","DOI":"10.20944\/preprints202401.1250.v1"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1186\/s40537-025-01271-x","article-title":"A distributed architecture for MQTT messaging: The case of TBMQ","volume":"12","author":"Shvaika","year":"2025","journal-title":"J. Big Data"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"106203","DOI":"10.1016\/j.rineng.2025.106203","article-title":"A Comprehensive Survey on Big Data Privacy and Hadoop Security: Insights into Encryption Mechanisms and Emerging Trends","volume":"27","author":"Filaly","year":"2025","journal-title":"Results Eng."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.future.2021.06.003","article-title":"Big data driven internet of things for credit evaluation and early warning in finance","volume":"124","author":"Wen","year":"2021","journal-title":"Future Generat. Comput. Syst."},{"key":"ref_9","first-page":"5525009","article-title":"Hadoop-based medical image storage and access method for examination series","volume":"2021","author":"Huang","year":"2021","journal-title":"Math. Probl. Eng."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.dcan.2023.01.014","article-title":"Hadoop-based secure storage solution for big data in cloud computing environment","volume":"10","author":"Guan","year":"2024","journal-title":"Digit. Commun. Netw."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1399","DOI":"10.1016\/j.procs.2020.04.150","article-title":"A novel MQTT security framework in generic IoT model","volume":"171","author":"Patel","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Barton, M., Budjac, R., Tanuska, P., Sladek, I., and Nemeth, M. (2024). Advancing small and medium-sized enterprise manufacturing: Framework for IoT-based data collection in Industry 4.0 concept. Electronics, 13.","DOI":"10.3390\/electronics13132485"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Sarkar, S., Kumar, S.S., Giri, A., and Dammur, A. (2024). Advancing Urban Evacuation Management: A Real-Time, Adaptive Model Leveraging Cloud-Enabled Big Data and IoT Surveillance. Proceedings of the 2023 4th International Conference on Intelligent Technologies (CONIT), Bangalore, India, 21\u201323 June 2024, IEEE.","DOI":"10.1109\/CONIT61985.2024.10626540"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1016\/j.procs.2018.05.020","article-title":"Big Data and Machine Learning Based Secure Healthcare Framework","volume":"132","author":"Kaur","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_15","first-page":"47","article-title":"Using Hadoop to analyze big data for multiple purposes: An applied study according to the map-reduce model","volume":"14","year":"2023","journal-title":"Int. J. Nonlinear Anal. Appl."},{"key":"ref_16","first-page":"1297","article-title":"Hybrid encryption algorithm for information security in Hadoop","volume":"14","author":"Filaly","year":"2023","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Fashakh, A., and Ibrahim, A.A. (2023). A proposed secure and efficient Big Data (Hadoop) security mechanism using encryption algorithm. Proceedings of the 2023 International Conference on Electrical, Computer and Energy Technologies (ICECET), Cape Town, South Africa, 8\u201310 June 2023, IEEE.","DOI":"10.1109\/HORA58378.2023.10155777"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.21817\/indjcse\/2021\/v12i4\/211204132","article-title":"An efficient approach for BigData security based on Hadoop system using cryptographic techniques","volume":"12","author":"Saritha","year":"2021","journal-title":"Indian J. Comput. Sci. Eng."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1016\/j.jksuci.2020.05.005","article-title":"A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment","volume":"34","author":"Narayanan","year":"2022","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Alabdulatif, A., Thilakarathne, N.N., and Kalinaki, K. (2023). A Novel Cloud Enabled Access Control Model for Preserving the Security and Privacy of Medical Big Data. Electronics, 12.","DOI":"10.3390\/electronics12122646"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Josphineleela, R., Kaliappan, S., Natrayan, L., and Garg, A. (2023). Big Data Security through Privacy\u2014Preserving Data Mining (PPDM): A Decentralization Approach. Proceedings of the Second International Conference on Electronics and Renewable Systems (ICEARS-2023), Tuticorin, India, 2\u20134 March 2023, IEEE.","DOI":"10.1109\/ICEARS56392.2023.10085646"},{"key":"ref_22","unstructured":"Nayini, S., and Kandlakunta, A.R. (2026, February 11). Big Data Hadoop: Security, Privacy, Performance and Scalability. Available online: https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=5071036."},{"key":"ref_23","unstructured":"Palit, S., and Roy, C.S. (2024). Securing Big Data with Hadoop in enterprise information systems. Proceedings of the International Conference on Research in Education and Science (ICRES 2024), ISTES, Antalya, Turkey, 27\u201330 April 2024, ISTES."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Dandekar, M., Lote, S., and Dandekar, P. (2024). Implementing the power of Big Data analytics. Proceedings of the 2024 IEEE 3rd International Conference on Electrical Power and Energy Systems (ICEPES), MANIT Bhopal, India, 21\u201322 June 2024, IEEE.","DOI":"10.1109\/ICEPES60647.2024.10653580"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1767","DOI":"10.1007\/s11277-021-08969-0","article-title":"Challenges and developments in secure routing protocols for healthcare in WBAN: A comparative analysis","volume":"122","author":"Singla","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Kawaguchi, R., and Bandai, M. (2020). Edge based MQTT broker architecture for geographical IoT applications. Proceedings of the 2020 International Conference on Information Networking (ICOIN), Barcelona, Spain, 7\u201310 January 2020, IEEE.","DOI":"10.1109\/ICOIN48656.2020.9016528"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Nayak, M., Patro, P., Awotunde, J.B., and Gupta, S.K. (2025). IoT Security Architectures and Protocols. Security Paradigms in 6G Smart Cities and IoT Ecosystems, CRC Press.","DOI":"10.1201\/9781003564645-6"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Nadeem, M., Mustafa, R., Abi-Char, P.E., and Tucker, R.S. (2025). A Study of Security Threats in IoT Network Layer using MQTT and TLS. Proceedings of the 2025 12th International Conference on Information Technology (ICIT), Amman, Jordan, 27\u201330 May 2025, IEEE.","DOI":"10.1109\/ICIT64950.2025.11049210"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Sharma, A., Malviya, R., and Gupta, R. (2022). Big data analytics in healthcare. Cognitive Intelligence and Big Data in Healthcare, John Wiley & Sons, Inc.","DOI":"10.1002\/9781119771982.ch10"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"116912","DOI":"10.1016\/j.eswa.2022.116912","article-title":"Big Data for Healthcare Industry 4.0: Applications, challenges and future perspectives","volume":"200","author":"Karatas","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Chien, H.Y., Shih, A.T., and Huang, Y.M. (2025). Exploring MQTT Broker-Based, End-to-End Models for Security and Efficiency. Sensors, 25.","DOI":"10.3390\/s25175308"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Alharbi, S., Awad, W., and Bell, D. (2025). HECS4MQTT: A Multi-Layer Security Framework for Lightweight and Robust Encryption in Healthcare IoT Communications. Future Internet, 17.","DOI":"10.3390\/fi17070298"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1186\/s40537-021-00505-y","article-title":"IoT Big Data provenance scheme using blockchain on Hadoop ecosystem","volume":"8","author":"Pajooh","year":"2021","journal-title":"J. Big Data"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Dworkin, M.J. (2001). Recommendation for Block Cipher Modes of Operation: The CBC, CFB, OFB, CTR, and XTS Modes. NIST.","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Vidhya, S. (2024, January 16\u201318). Enhancing Cloud Security for Structured Data: An AES-GCM Based Format-Preserving Encryption Approach. Artificial Intelligence Based Smart and Secured Applications, Proceedings of the International Conference on Advancements in Smart Computing and Information Security, Rajkot, India.","DOI":"10.1007\/978-3-031-86305-9_14"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Dworkin, M.J. (2007). Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC. NIST.","DOI":"10.6028\/NIST.SP.800-38d"}],"container-title":["Journal of Sensor and Actuator Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2224-2708\/15\/1\/22\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T11:49:43Z","timestamp":1771242583000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2224-2708\/15\/1\/22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,16]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,2]]}},"alternative-id":["jsan15010022"],"URL":"https:\/\/doi.org\/10.3390\/jsan15010022","relation":{},"ISSN":["2224-2708"],"issn-type":[{"value":"2224-2708","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,16]]}}}