Article Preview
Top1 Introduction
In order to facilitate the receiving, distribution and delivery of goods by logistics enterprises, the senders need to fill in a lot of logistics privacy data on the logistics bill. In the whole process of logistics, these logistics privacy data are visible in plain text, which will cause the leakage of logistics privacy data (Rivero-García et al., 2019)(Ahmad et al., 2021)(Li et al., 2016)(Liu et al., 2016). Some websites clearly list the price of logistics order information and provide the service of “generating the back order”. In the process of using logistics services, senders are also passive in preventing the leakage of logistics privacy data. While senders can protect their names by filling in pseudonyms, other logistics privacy data cannot be protected, such as telephone information and address information. The countermeasures for the logistics privacy data leakage in the logistics industry are as follows. On the one hand, try to deal with it at the level of management system. On the other hand, the privacy data of logistics users can be protected through technology, such as the application of two-dimensional code technology in information packaging. In the process of logistics transfer, the staff of logistics enterprises can scan the QR code through a special QR code scanner to obtain the logistics privacy data (Zhang et al., 2016)(Zhao & Zhang, 2019). However, the scanned data is still the plaintext information on the logistics bill, and the problem of leakage of logistics privacy data has not been completely solved (Chen et al., 2019). There are two main reasons. (1) Logistics enterprises do not pay attention to the protection of users' logistics privacy data. (2) In the process of logistics transfer, it is also necessary to complete the transfer process by manpower, so that the staff of logistics enterprises can still get all the plaintext information. Therefore, it is very important to study the privacy data protection technology in logistics
In the field of data protection of logistics privacy, literature (Qian et al., 2014) proposes a form that does not use logistics orders in the logistics process. Imagine encrypting and storing the addressee information that the deliveryman needs to deliver the parcels on that day in the Android phone, and using the home address as the file name of the encrypted information to deliver to the addressee address. However, this scheme has some limitations in practical application, as follows. (1) Give up the use of logistics bill, unable to realize the logistics transfer function. (2) The recipient's information is encrypted and stored in the mobile phone, which still fails to fully realize the hidden encryption of logistics privacy. Literature (Feng, 2021) proposed a logistics information privacy protection system based on QR code technology. The system uses segmented encryption technology to encrypt the logistics user's private data, and stores the encrypted cipher text in the two-dimensional code. It designs different levels of authorization mechanism to decrypt the corresponding information, so as to complete the logistics business operation. But the system does not give the concrete implementation and the implementation details of the hierarchical encryption technology. As can be seen from the above studies, existing researches still have the following shortcomings in the protection of logistics users' privacy. (1) User privacy data is still stored in the third party that is not fully trusted, and user privacy cannot be guaranteed. (2) Users cannot control and manage the access rights of logistics privacy data, and their control process lacks transparency and traceability, and they cannot control the partial reading of private data by third parties.