A Key Rotation Management System: Design and Implementation for Improved Data Security

Authors

DOI:

https://doi.org/10.34190/iccws.21.1.4493

Keywords:

key rotation, cybersecurity automation, cryptographic key managementement, secure data sharing, key lifecycle management

Abstract

Organizations in today’s rapidly changing digital world use various channels, such as secure APIs and encrypted communications, to enhance collaborations and information sharing. While these systems assist in enhancing productivity, innovation and collaboration, they can also introduce major security risks for protecting sensitive information. The core of data protection depends on cryptographic key management, with key rotation playing a vital role, yet often neglected. Key rotation, a well-established cryptographic practice, is essential for minimizing data exposure, mitigating key compromise risks and ensuring regulatory compliance. However, inconsistent implementation of key rotation policies across organizations often results in varied security practices. The proposed Key Rotation Management System functions as a solution that automates and standardizes all stages of the key lifecycle process. The system implements a three-tier Model-View-Controller framework which combines different functional components that include user authentication together with role-based control, automated key generation, secure storage and distribution, periodic rotation, dashboard visualization and proactive alert systems. The proposed system resolves fundamental problems which arise from human involvement in administration and irregular scheduling and insufficient user understanding and insecure distribution methods. The solution provides real-time key ageing visibility through its dashboard interface, while its scheduling and reminder features assist in automated rotation interval execution. It includes a centralized service request-response module together with automated email notification to help organizations maintain effective communication and monitor compliance standards. The evaluation results show that the proposed system enhances user responsiveness and decreases expired key occurrences while decreasing manual work and assisting organizations in meeting industry international standards. The system design with role-based access controls provides both security measures and system accountability features. The proposed Key Rotation Management System combines automation, visualization and security to offer a scalable solution that can strengthen the cryptographic strength of digital infrastructures.

Author Biographies

Malibongwe Ntalali

Malibongwe Ntalali is an Honours student in the Academy of Computer Science and Software Engineering at the University of Johannesburg.

Noluntu Mpekoa

Prof Mpekoa is an Associate Professor at the Institute for Sustainability and Corporate Citizenship (ISCC), at the University of South Africa and an NRF Y-rated researcher. She has taught modules such as Information Security and Networking.  Prof Mpekoa has a driven robust passion in Mobile Technologies, M-Services, and mobile security.

Sheethal Tom, The Independent Institute of Education, Varsity College

Dr Sheethal Tom is a Senior Lecturer and Head of Programme for the PhD in IT at The Independent Institute of Education, Emeris, Cape Town. She holds a PhD in Information Technology from the Central University of Technology, South Africa. Her research spans machine learning, human–computer interaction, health informatics, and the design and governance of secure digital systems.

Downloads

Published

19-02-2026