A Blockchain-Based Privacy Protection Application for Logistics Big Data

A Blockchain-Based Privacy Protection Application for Logistics Big Data

Huabin Duan, Jie Yang, Huanjun Yang
Copyright: © 2022 |Pages: 12
DOI: 10.4018/JCIT.295249
Article PDF Download
Open access articles are freely available for download

Abstract

Logistics business is generally managed by logistics orders in plain text, and there is a risk of disclosure of customer privacy information in every business link. In order to solve the problem of privacy protection in logistics big data system, a new kind of logistics user privacy data protection scheme is proposed. First of all, an access rights management mechanism is designed by combining block chain and anonymous authentication to realize the control and management of users' access rights to private data. Then, the privacy and confidentiality protection between different services is realized by dividing and storing the data of different services. Finally, the participants of the intra-chain private data are specified by embedding fields in the logistics information. The blockchain node receiving the transaction is used as the transit node to synchronize the intra-chain privacy data, so as to improve the intra-chain privacy protection within the business. Experimental results show that the proposed method can satisfy the privacy requirements and ensure considerable performance.
Article Preview
Top

1 Introduction

In order to facilitate the receiving, distribution and delivery of goods by logistics enterprises, the senders need to fill in a lot of logistics privacy data on the logistics bill. In the whole process of logistics, these logistics privacy data are visible in plain text, which will cause the leakage of logistics privacy data (Rivero-García et al., 2019)(Ahmad et al., 2021)(Li et al., 2016)(Liu et al., 2016). Some websites clearly list the price of logistics order information and provide the service of “generating the back order”. In the process of using logistics services, senders are also passive in preventing the leakage of logistics privacy data. While senders can protect their names by filling in pseudonyms, other logistics privacy data cannot be protected, such as telephone information and address information. The countermeasures for the logistics privacy data leakage in the logistics industry are as follows. On the one hand, try to deal with it at the level of management system. On the other hand, the privacy data of logistics users can be protected through technology, such as the application of two-dimensional code technology in information packaging. In the process of logistics transfer, the staff of logistics enterprises can scan the QR code through a special QR code scanner to obtain the logistics privacy data (Zhang et al., 2016)(Zhao & Zhang, 2019). However, the scanned data is still the plaintext information on the logistics bill, and the problem of leakage of logistics privacy data has not been completely solved (Chen et al., 2019). There are two main reasons. (1) Logistics enterprises do not pay attention to the protection of users' logistics privacy data. (2) In the process of logistics transfer, it is also necessary to complete the transfer process by manpower, so that the staff of logistics enterprises can still get all the plaintext information. Therefore, it is very important to study the privacy data protection technology in logistics

In the field of data protection of logistics privacy, literature (Qian et al., 2014) proposes a form that does not use logistics orders in the logistics process. Imagine encrypting and storing the addressee information that the deliveryman needs to deliver the parcels on that day in the Android phone, and using the home address as the file name of the encrypted information to deliver to the addressee address. However, this scheme has some limitations in practical application, as follows. (1) Give up the use of logistics bill, unable to realize the logistics transfer function. (2) The recipient's information is encrypted and stored in the mobile phone, which still fails to fully realize the hidden encryption of logistics privacy. Literature (Feng, 2021) proposed a logistics information privacy protection system based on QR code technology. The system uses segmented encryption technology to encrypt the logistics user's private data, and stores the encrypted cipher text in the two-dimensional code. It designs different levels of authorization mechanism to decrypt the corresponding information, so as to complete the logistics business operation. But the system does not give the concrete implementation and the implementation details of the hierarchical encryption technology. As can be seen from the above studies, existing researches still have the following shortcomings in the protection of logistics users' privacy. (1) User privacy data is still stored in the third party that is not fully trusted, and user privacy cannot be guaranteed. (2) Users cannot control and manage the access rights of logistics privacy data, and their control process lacks transparency and traceability, and they cannot control the partial reading of private data by third parties.

Complete Article List

Search this Journal:
Reset
Volume 26: 1 Issue (2024)
Volume 25: 1 Issue (2023)
Volume 24: 5 Issues (2022)
Volume 23: 4 Issues (2021)
Volume 22: 4 Issues (2020)
Volume 21: 4 Issues (2019)
Volume 20: 4 Issues (2018)
Volume 19: 4 Issues (2017)
Volume 18: 4 Issues (2016)
Volume 17: 4 Issues (2015)
Volume 16: 4 Issues (2014)
Volume 15: 4 Issues (2013)
Volume 14: 4 Issues (2012)
Volume 13: 4 Issues (2011)
Volume 12: 4 Issues (2010)
Volume 11: 4 Issues (2009)
Volume 10: 4 Issues (2008)
Volume 9: 4 Issues (2007)
Volume 8: 4 Issues (2006)
Volume 7: 4 Issues (2005)
Volume 6: 1 Issue (2004)
Volume 5: 1 Issue (2003)
Volume 4: 1 Issue (2002)
Volume 3: 1 Issue (2001)
Volume 2: 1 Issue (2000)
Volume 1: 1 Issue (1999)
View Complete Journal Contents Listing