Reference Hub1
A Blockchain-Based Privacy Protection Application for Logistics Big Data

A Blockchain-Based Privacy Protection Application for Logistics Big Data

Huabin Duan, Jie Yang, Huanjun Yang
Copyright: © 2022 |Volume: 24 |Issue: 5 |Pages: 12
ISSN: 1548-7717|EISSN: 1548-7725|EISBN13: 9781668453926|DOI: 10.4018/JCIT.295249
Cite Article Cite Article

MLA

Duan, Huabin, et al. "A Blockchain-Based Privacy Protection Application for Logistics Big Data." JCIT vol.24, no.5 2022: pp.1-12. http://doi.org/10.4018/JCIT.295249

APA

Duan, H., Yang, J., & Yang, H. (2022). A Blockchain-Based Privacy Protection Application for Logistics Big Data. Journal of Cases on Information Technology (JCIT), 24(5), 1-12. http://doi.org/10.4018/JCIT.295249

Chicago

Duan, Huabin, Jie Yang, and Huanjun Yang. "A Blockchain-Based Privacy Protection Application for Logistics Big Data," Journal of Cases on Information Technology (JCIT) 24, no.5: 1-12. http://doi.org/10.4018/JCIT.295249

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Logistics business is generally managed by logistics orders in plain text, and there is a risk of disclosure of customer privacy information in every business link. In order to solve the problem of privacy protection in logistics big data system, a new kind of logistics user privacy data protection scheme is proposed. First of all, an access rights management mechanism is designed by combining block chain and anonymous authentication to realize the control and management of users' access rights to private data. Then, the privacy and confidentiality protection between different services is realized by dividing and storing the data of different services. Finally, the participants of the intra-chain private data are specified by embedding fields in the logistics information. The blockchain node receiving the transaction is used as the transit node to synchronize the intra-chain privacy data, so as to improve the intra-chain privacy protection within the business. Experimental results show that the proposed method can satisfy the privacy requirements and ensure considerable performance.