{"id":"https://openalex.org/W4415002590","doi":"https://doi.org/10.1109/tsc.2025.3570857","title":"Privacy-Preserving Blockchain-Enabled Parametric Insurance via Remote Sensing and IoT","display_name":"Privacy-Preserving Blockchain-Enabled Parametric Insurance via Remote Sensing and IoT","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W4415002590","doi":"https://doi.org/10.1109/tsc.2025.3570857"},"language":null,"primary_location":{"id":"doi:10.1109/tsc.2025.3570857","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2025.3570857","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091985200","display_name":"Mingyu Hao","orcid":"https://orcid.org/0000-0002-0601-6631"},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Mingyu Hao","raw_affiliation_strings":["School of Computing, Australian National University, Canberra, ACT, Australia"],"raw_orcid":"https://orcid.org/0000-0002-0601-6631","affiliations":[{"raw_affiliation_string":"School of Computing, Australian National University, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I118347636"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091957386","display_name":"Keyang Qian","orcid":null},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Keyang Qian","raw_affiliation_strings":["Faculty of Information Technology, Monash University, Clayton, VIC, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Monash University, Clayton, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023916531","display_name":"Chi-Kin Chau","orcid":"https://orcid.org/0000-0003-0362-2844"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sid Chi-Kin Chau","raw_affiliation_strings":["Data61, CSIRO, Sydney, NSW, Australia"],"raw_orcid":"https://orcid.org/0000-0003-0362-2844","affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5091985200"],"corresponding_institution_ids":["https://openalex.org/I118347636"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39859376,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"5","first_page":"3093","last_page":"3105"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9269000291824341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/underwriting","display_name":"Underwriting","score":0.6251999735832214},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.5238000154495239},{"id":"https://openalex.org/keywords/parametric-statistics","display_name":"Parametric statistics","score":0.5066999793052673},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.503600001335144},{"id":"https://openalex.org/keywords/inefficiency","display_name":"Inefficiency","score":0.4964999854564667},{"id":"https://openalex.org/keywords/openness-to-experience","display_name":"Openness to experience","score":0.3621000051498413},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.32100000977516174},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.30799999833106995}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7426000237464905},{"id":"https://openalex.org/C26503482","wikidata":"https://www.wikidata.org/wiki/Q1898080","display_name":"Underwriting","level":2,"score":0.6251999735832214},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.5238000154495239},{"id":"https://openalex.org/C117251300","wikidata":"https://www.wikidata.org/wiki/Q1849855","display_name":"Parametric statistics","level":2,"score":0.5066999793052673},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.503600001335144},{"id":"https://openalex.org/C2778869765","wikidata":"https://www.wikidata.org/wiki/Q6028363","display_name":"Inefficiency","level":2,"score":0.4964999854564667},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38909998536109924},{"id":"https://openalex.org/C84976871","wikidata":"https://www.wikidata.org/wiki/Q2015673","display_name":"Openness to experience","level":2,"score":0.3621000051498413},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3589000105857849},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3237999975681305},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.32100000977516174},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.30799999833106995},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.30239999294281006},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2980000078678131},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.29420000314712524},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.29159998893737793},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2833000123500824},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2745000123977661},{"id":"https://openalex.org/C68799949","wikidata":"https://www.wikidata.org/wiki/Q977871","display_name":"Insurance policy","level":2,"score":0.26269999146461487},{"id":"https://openalex.org/C12590798","wikidata":"https://www.wikidata.org/wiki/Q3933199","display_name":"Replication (statistics)","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.25780001282691956}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2025.3570857","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2025.3570857","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Traditional":[0],"Insurance,":[1],"a":[2,21,56,65,79,91,106,129,163,167],"popular":[3],"approach":[4],"of":[5,14,23,52,61,67,117,124,170],"financial":[6],"risk":[7],"management,":[8],"has":[9],"suffered":[10],"from":[11],"the":[12,47,59,71,115,122,137,156],"issues":[13,44],"high":[15],"operational":[16],"costs,":[17],"opaqueness,":[18],"inefficiency":[19],"and":[20,38,49,121,150,179],"lack":[22],"trust.":[24],"Recently,":[25],"blockchain-enabled":[26],"<italic":[27],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[28],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">parametric":[29],"insurance</i>":[30],"through":[31],"authorized":[32],"data":[33,74,126,148],"sources":[34,127,149],"(e.g.,":[35],"remote":[36],"sensing":[37],"IoT)":[39],"aims":[40],"to":[41,84,128,140,154],"overcome":[42],"these":[43],"by":[45,160],"automating":[46],"underwriting":[48],"claim":[50,120],"processes":[51],"insurance":[53,76,94,119,173],"policies":[54],"on":[55,78,97,174],"blockchain.":[57],"However,":[58],"openness":[60],"blockchain":[62,80,130,176],"platforms":[63],"raises":[64],"concern":[66],"user":[68,73],"privacy,":[69],"as":[70],"private":[72,112],"in":[75],"claims":[77],"may":[81],"be":[82],"exposed":[83],"outsiders.":[85],"In":[86],"this":[87],"paper,":[88],"we":[89,135,165],"propose":[90],"privacy-preserving":[92],"parametric":[93,172],"framework":[95],"based":[96],"succinct":[98],"zero-knowledge":[99,107],"proofs":[100],"(zk-SNARKs),":[101],"whereby":[102],"an":[103,118],"insuree":[104],"submits":[105],"proof":[108],"(without":[109],"revealing":[110],"any":[111],"data)":[113],"for":[114,131,145],"validity":[116],"authenticity":[123],"its":[125,152],"transparent":[132],"verification.":[133],"Moreover,":[134],"extend":[136],"recent":[138],"zk-SNARKs":[139],"support":[141],"robust":[142],"privacy":[143],"protection":[144],"multiple":[146],"heterogeneous":[147],"improve":[151],"efficiency":[153],"cut":[155],"incurred":[157],"gas":[158],"cost":[159],"80%.":[161],"As":[162],"proof-of-concept,":[164],"implemented":[166],"working":[168],"prototype":[169],"bushfire":[171],"real-world":[175],"platform":[177],"Ethereum,":[178],"present":[180],"extensive":[181],"empirical":[182],"evaluations.":[183]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-22T00:00:00"}
