International Journal of Electrical and Computer Engineering (IJECE) Vol. 12, No. 3, June 2022, pp. 3238~3248 ISSN: 2088-8708, DOI: 10.11591/ijece.v12i3.pp3238-3248 3238 Journal homepage: http://ijece.iaescore.com An authenticated key management scheme for securing big data environment Thoyazan Sultan Algaradi, Boddireddy Rama Department of Computer Science, Kakatiya University, Warangal, India Article Info ABSTRACT Article history: Received Dec 17, 2020 Revised Jan 19, 2022 Accepted Feb 8, 2022 If data security issues in a big data environment are considered, then the distribution of keys, their management, and the ability to transfer them between server users in a public channel will be one of the most critical issues that must consider on. In which the importance of keys management may outweigh the importance of the encryption algorithm strength. Therefore, this paper raised a new proposed scheme called authenticated key management scheme (AKMS) that works through two levels of security. First, to concerns how the user communicates with the server with preventing any attempt to penetrate senders/receivers. Second, to make the data sent vague by encrypting it, and unreadable by others except for the concerned receiver, thus the server function be limited only as a passageway for communication between the sender and receiver. In the presented work some concepts discussed related to analysis and evaluation as keys security, data security, public channel transmission, and security isolation inquiry which demonstrated the rich value that AKMS scheme carried. As well, AKMS scheme achieved very satisfactory results about computation cost, communication cost, and storage overhead which proved that AKMS scheme is appropriate, secure, and practical to use and protect the user's private data in big data environments. Keywords: Authenticated Big data environment Diffie–Hellman Key exchange Key management Security This is an open access article under the CC BY-SA license. Corresponding Author: Thoyazan Sultan Algaradi, Boddireddy Rama Department of Computer science, Kakatiya University Warangal City, Telangana State, 506001, India Email: yaz.sul77@gmail.com, rama.abbidi@gmail.com 1. INTRODUCTION The remarkable progress in the development of data production has made data processing difficult [1]. However, due to the rapid development in environmental technologies, the transmission of sensitive information through the internet has become easy using the new technologies that come under big data today [2], [3]. Where it became an important and modern topic racing towards researchers as a rich field of research areas and come out with the most prominent researches and thoughts and innovative ways to deal with the problem and cover its gaps [4]. Big data networks today occupy great importance through the offer of usefulness that can be seized by the user in a big data environment [5], [6] where the user can store his data in the cloud service and share it with others [7]. Also, companies and employees can get great convenience by using cloud computing as modern and exclusive technology that is considered as a big data environment. From this standpoint, it becomes clear the great importance of the security of this environment [8] and the preservation of the privacy of its users through full studies of the most prominent problems of this dilemma [9]. That create the need to find appropriate solutions that ensure privacy, credibility, and validation of the security that preserves the rights well [10], [11]. By considering how users are authenticated to ensure a more reliable connection, it encrypts and sends data to the other party to make it difficult for attacks to