{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T19:26:36Z","timestamp":1771529196858,"version":"3.50.1"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"University of Piraeus"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Cybercriminals continually advance their tactics, exploit novel attack vectors, and target emerging technologies. To mitigate these risks, cyber insurance policies must remain abreast of the latest technological developments. Staying technologically updated enables an Insurance Company (IC) to assess risks more precisely, tailor policies to a potential potential Policyholder (PH), and accurately calculate fair premiums. By incorporating innovative risk assessment methodologies, robust Know-Your-Customer protocols, and automated claims-handling processes, ICs can offer tailored and cost-effective solutions to their PHs. Embracing technological advancements enables the field of cyber insurance to adapt to the ever-changing landscape of cyber threats, providing comprehensive protection to organizations. This article introduces , an innovative privacy-preserving framework designed to deliver robust security and privacy assurances to PHs against honest but inquisitive entities within the cyber insurance ecosystem.  also equips ICs with automated processes for claims management. At the core of  lies Hyperledger Aries, leveraging verifiable credentials to empower PHs with identity ownership and data control. Our framework is complemented by Hyperledger Fabric, which imbues  with intelligent functionalities enabling PHs and ICs to autonomously execute actions related to cyber insurance and gather historical cybersecurity data. In this direction, we have successfully implemented the key components of  and conducted a quantitative performance assessment. We also substantiate its security and privacy attributes, confirming that  effectively achieves its objectives. In summary,  represents a forward-thinking solution poised to enhance cyber insurance in an era of ever-evolving cyber threats, offering a promising avenue for safeguarding organizations and policyholders in the digital landscape.<\/jats:p>","DOI":"10.1007\/s10586-026-05996-z","type":"journal-article","created":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T18:55:58Z","timestamp":1771527358000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PINSA: Privacy-preserving cyber insurance framework"],"prefix":"10.1007","volume":"29","author":[{"given":"Georgios","family":"Paparis","sequence":"first","affiliation":[]},{"given":"Apostolis","family":"Zarras","sequence":"additional","affiliation":[]},{"given":"Aristeidis","family":"Farao","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Xenakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,19]]},"reference":[{"key":"5996_CR1","unstructured":"Swiss Re Group. What you need to know about the Cyber insurance market. https:\/\/rb.gy\/xg2pl7, (2023). Online; Last Accessed: 03\/2025"},{"key":"5996_CR2","unstructured":"World Economic Forum. Global risks: Today\u2019s crisis. https:\/\/rb.gy\/6gevz9. (2023) Online; Last Accessed: 11\/2025"},{"key":"5996_CR3","unstructured":"World Economic Forum. Global risks: Insight report. https:\/\/shorturl.at\/L9Uwo. (2024) Online; Last Accessed: 11\/2025"},{"key":"5996_CR4","unstructured":"World Economic Forum. Global risks: Insight report. https:\/\/shorturl.at\/H7gnV. (2025) Online; Last Accessed: 11\/2025"},{"key":"5996_CR5","unstructured":"TechTarget. Solarwinds hack explained: Everything you need to know. https:\/\/rb.gy\/4cvzcs. Online; Last Accessed: 11\/2025"},{"key":"5996_CR6","unstructured":"SOCRadar. Microsoft exchange server cyberattack timeline. https:\/\/rb.gy\/zhsvf3. Online; Last Accessed: 11\/2025"},{"key":"5996_CR7","unstructured":"TechTarget. Colonial pipeline hack explained: Everything you need to know. https:\/\/rb.gy\/npu4cr. Online; Last Accessed: 11\/2025"},{"key":"5996_CR8","doi-asserted-by":"crossref","unstructured":"Charalambous, M., Farao, A., Kalantzantonakis, G., Kanakakis, P., Salamanos, N., Kotsifakos, E., Froudakis, E.: Analyzing coverages of cyber insurance policies using ontology. In Proceedings of the 17th International Conference on Availability, Reliability and Security, pages 1\u20137, (2022)","DOI":"10.1145\/3538969.3544453"},{"key":"5996_CR9","unstructured":"Cybersecurity Pulse. Throwback attack: How notpetya accidentally took down global shipping giant maersk. https:\/\/rb.gy\/924sig. Online; Last Accessed: 11\/2025"},{"key":"5996_CR10","unstructured":"Insurance Journal. Insurance to fully cover sony\u2019s cyber attack, says ceo. https:\/\/rb.gy\/rje9i0. Online; Last Accessed: 11\/2025"},{"key":"5996_CR11","unstructured":"Inside Privacy. Cyber insurer seeks to void data breach coverage because of purported misstatements in policy application. https:\/\/rb.gy\/8vcxlt. Online; Last Accessed: 11\/2025"},{"key":"5996_CR12","unstructured":"Microsoft. Hackers hit norsk hydro with ransomware. the company responded with transparency. https:\/\/rb.gy\/gbt85i. Online; Last Accessed: 11\/2025"},{"key":"5996_CR13","unstructured":"threat post. Insurance pays out a sliver of norsk hydro\u2019s cyberattack damages. https:\/\/rb.gy\/95lg1m. Online; Last Accessed: 11\/2025"},{"key":"5996_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00741-8","author":"A Farao","year":"2023","unstructured":"Farao, A., Paparis, G., Panda, S., Panaousis, E., Zarras, A., Xenakis, C.: Inchain: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain. International Journal of Information Security (1), 25 (2023). https:\/\/doi.org\/10.1007\/s10207-023-00741-8","journal-title":"International Journal of Information Security"},{"key":"5996_CR15","unstructured":"Hyperledger Foundation. Hyperledger Fabric. https:\/\/www.lfdecentralizedtrust.org\/projects\/fabric, (2023). Online; Last Accessed: 11\/2025"},{"key":"5996_CR16","unstructured":"Hyperledger Foundation. Hyperledger Aries. https:\/\/www.lfdecentralizedtrust.org\/projects\/aries, (2023). Online; Last Accessed: 11\/2025"},{"key":"5996_CR17","doi-asserted-by":"crossref","unstructured":"Franco, M., Berni, N., Scheid, E., Killer, C., Rodrigues, B., Stiller, B.: Saci: A blockchain-based cyber insurance approach for the deployment and management of a contract coverage. In Economics of Grids, Clouds, Systems, and Services: 18th International Conference, GECON 2021, Virtual Event, September 21\u201323, Proceedings 18, pages 79\u201392. Springer, (2021)","DOI":"10.1007\/978-3-030-92916-9_7"},{"key":"5996_CR18","doi-asserted-by":"crossref","unstructured":"Lepoint, T., Ciocarlie, G., Eldefrawy, K.: Blockcis\u2013a blockchain-based cyber insurance system. In 2018 IEEE International Conference on Cloud Engineering (IC2E), pages 378\u2013384. IEEE, (2018)","DOI":"10.1109\/IC2E.2018.00072"},{"key":"5996_CR19","doi-asserted-by":"crossref","unstructured":"Farao, A., Panda, S., Menesidou, S.A., Veliou, E., Episkopos, N., Kalatzantonakis, G., Mohammadi, F., Georgopoulos, N., Sirivianos, M., Salamanos, N., et\u00a0al.: Secondo: A platform for cybersecurity investments and cyber insurance decisions. In International Conference on Trust and Privacy in Digital Business, pages 65\u201374. Springer, (2020)","DOI":"10.1007\/978-3-030-58986-8_5"},{"key":"5996_CR20","doi-asserted-by":"crossref","unstructured":"Kalderemidis, I., Farao, A., Bountakas, P., Panda, S., Xenakis, C.: Gtm: Game theoretic methodology for optimal cybersecurity defending strategies and investments. In Proceedings of the 17th International Conference on Availability, Reliability and Security, pages 1\u20139, (2022)","DOI":"10.1145\/3538969.3544431"},{"key":"5996_CR21","doi-asserted-by":"crossref","unstructured":"Vakilinia, I., Badsha, S., Sengupta, S.: Crowdfunding the insurance of a cyber-product using blockchain. In 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pages 964\u2013970. IEEE, (2018)","DOI":"10.1109\/UEMCON.2018.8796515"},{"key":"5996_CR22","doi-asserted-by":"crossref","unstructured":"Xu, J., Wu, Y., Luo, X., Yang, D.: Improving the efficiency of blockchain applications with smart contract based cyber-insurance. In ICC 2020-2020 IEEE International Conference on Communications (ICC), pages 1\u20137. IEEE, (2020)","DOI":"10.1109\/ICC40277.2020.9149301"},{"key":"5996_CR23","doi-asserted-by":"crossref","unstructured":"Nemade, S., Kamble, A., Sopal, S., Bhale, P., Pachghare, V.: Blockchain-based crowdfunding for cyber-product insurance. In 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT), 1\u20135. IEEE, (2022)","DOI":"10.1109\/CISCT55310.2022.10046520"},{"key":"5996_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101593","volume":"87","author":"S Panda","year":"2019","unstructured":"Panda, S., Woods, D.W., Laszka, A., Fielder, A., Panaousis, E.: Post-incident audits on cyber insurance discounts. Computers & Security 87, 101593 (2019)","journal-title":"Computers & Security"},{"key":"5996_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00660-8","author":"A Tsohou","year":"2023","unstructured":"Tsohou, A., Diamantopoulou, V., Gritzalis, S., Lambrinoudakis, C.: Cyber insurance: state of the art, trends and future directions. Int. J. Inf. Secur. (2023). https:\/\/doi.org\/10.1007\/s10207-023-00660-8","journal-title":"Int. J. Inf. Secur."},{"key":"5996_CR26","unstructured":"Insurance Fraud Bureau New Zealand Sophos News. Claiming with multiple insurers. https:\/\/rb.gy\/dmczym. Online; Last Accessed: 11\/2025"},{"key":"5996_CR27","unstructured":"ENISA. Identity theft: Enisa threat landscape"},{"issue":"17","key":"5996_CR28","doi-asserted-by":"publisher","DOI":"10.3390\/s22176527","volume":"22","author":"G Suciu","year":"2022","unstructured":"Suciu, G., Farao, A., Bernardinetti, G., Palam\u00e0, I., Sachian, M.-A., Vulpe, A., Vochin, M.-C., Muresan, P., Bampatsikos, M., Mu\u00f1oz, A., et al.: Samgrid: Security authorization and monitoring module based on sealedgrid platform. Sensors 22(17), 6527 (2022)","journal-title":"Sensors"},{"key":"5996_CR29","unstructured":"Amwins. How Cyber and Crime Insurance Policies Respond to Social Engineering. https:\/\/rb.gy\/of063c, (2024). Online; Last Accessed: 11\/2025"},{"key":"5996_CR30","unstructured":"Coalition. Funds Transfer Fraud Insurance. https:\/\/rb.gy\/bxvy5c, . Online; Last Accessed: 11\/2025"},{"key":"5996_CR31","unstructured":"Corvus Insurance Holdings, LLC. Cyber Coverage Explained: Social Engineering Attacks and Cyber Crime. https:\/\/shorturl.at\/Q3Jxt, (2021). Online; Last Accessed: 11\/2025"},{"key":"5996_CR32","doi-asserted-by":"crossref","unstructured":"Leonidou, P., Salamanos, N., Farao, A., Aspri, M., Sirivianos, M.: A qualitative analysis of illicit arms trafficking on darknet marketplaces. In Proceedings of the 18th International Conference on Availability, Reliability and Security, 1\u20139 (2023)","DOI":"10.1145\/3600160.3605087"},{"key":"5996_CR33","doi-asserted-by":"crossref","unstructured":"Pantelakis, V., Bountakas, P., Farao, A., Xenakis, C.: Adversarial machine learning attacks on multiclass classification of iot network traffic. In Proceedings of the 18th International Conference on Availability, Reliability and Security, 1\u20138 (2023)","DOI":"10.1145\/3600160.3605086"},{"key":"5996_CR34","doi-asserted-by":"crossref","unstructured":"Petihakis, G., Kiritsis, D., Farao, A., Bountakas, P., Panou, A., Xenakis, C.: A bring your own device security awareness survey among professionals. In Proceedings of the 18th International Conference on Availability, Reliability and Security, 1\u201310 (2023)","DOI":"10.1145\/3600160.3605072"},{"key":"5996_CR35","unstructured":"PWC. Blockchain, a catalyst for new approaches in insurance"},{"key":"5996_CR36","unstructured":"ZYEN. Interexchainz research project. https:\/\/rb.gy\/fgb6pd. Online; Last Accessed: 11\/2025"},{"key":"5996_CR37","volume-title":"Digital asset valuation and cyber risk measurement: Principles of cybernomics","author":"K Ruan","year":"2019","unstructured":"Ruan, K.: Digital asset valuation and cyber risk measurement: Principles of cybernomics. Academic Press (2019)"},{"key":"5996_CR38","unstructured":"B\u00f6hme, R., Schwartz, G., et\u00a0al.: Modeling cyber-insurance: towards a unifying framework. In WEIS, 1\u201336 (2010)"},{"key":"5996_CR39","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.cosrev.2017.01.001","volume":"24","author":"A Marotta","year":"2017","unstructured":"Marotta, A., Martinelli, F., Nanni, S., Orlando, A., Yautsiukhin, A.: Cyber-insurance survey. Computer Science Review 24, 35\u201361 (2017)","journal-title":"Computer Science Review"},{"key":"5996_CR40","unstructured":"Majuca, R.P., Yurcik, W., Kesan, J.P.: The evolution of cyberinsurance. arXiv preprint cs\/0601020, (2006)"},{"issue":"1","key":"5996_CR41","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz002","volume":"5","author":"S Romanosky","year":"2019","unstructured":"Romanosky, S., Ablon, L., Kuehn, A., Jones, T.: Content analysis of cyber insurance policies: How do carriers price cyber risk? Journal of Cybersecurity 5(1), tyz002 (2019)","journal-title":"Journal of Cybersecurity"},{"key":"5996_CR42","doi-asserted-by":"crossref","unstructured":"Dambra, S., Bilge, L., Balzarotti, D.: Sok: Cyber insurance\u2013technical challenges and a system security roadmap. In 2020 IEEE Symposium on Security and Privacy (SP), 1367\u20131383. IEEE, (2020)","DOI":"10.1109\/SP40000.2020.00019"},{"key":"5996_CR43","unstructured":"B\u00f6hme, R., Kataria, G.: Models and measures for correlation in cyber-insurance. In WEIS, 2, 3 (2006)"},{"key":"5996_CR44","unstructured":"B\u00f6hme, R.: Cyber-insurance revisited. In Weis, 1\u201317 (2005)"},{"key":"5996_CR45","doi-asserted-by":"crossref","unstructured":"Aziz, B., et\u00a0al.: A systematic literature review of cyber insurance challenges. In 2020 International Conference on Information Technology Systems and Innovation (ICITSI), pages 357\u2013363. IEEE, (2020)","DOI":"10.1109\/ICITSI50517.2020.9264966"},{"key":"5996_CR46","volume-title":"Cyber insurance \u2013 models and methods and the use of ai","author":"S Weber","year":"2024","unstructured":"Weber, S., Scherer, M., Pascu, C., Louren\u00e7o, M.B.: Cyber insurance \u2013 models and methods and the use of ai. Technical report, European Union Agency for Cybersecurity (ENISA) (2024)"},{"key":"5996_CR47","unstructured":"Guo, J., Quan, Z., Zhang, L.: Entity?specific cyber risk assessment using insurtech empowered risk factors. arXiv preprint arXiv:2507.08193, (2025). Submitted 10 Jul 2025; revised 14 Jul 2025"},{"key":"5996_CR48","doi-asserted-by":"crossref","unstructured":"Byrd, D., Polychroniadou, A.: Differentially private secure multi?party computation for federated learning in financial applications. arXiv preprint arXiv:2010.05867, (2020)","DOI":"10.1145\/3383455.3422562"},{"key":"5996_CR49","unstructured":"Lopez, O., Denuit, M., Ghossoub, M., Trufin, J., Kher, J., Maillart, A., Raes, E., Rapior, H., Skoubani, M.-A., Spoorenberg, B.: Cyber risk: Research paper on cyber insurance. Technical report, Casualty Actuarial Society (CAS), (2025)"},{"key":"5996_CR50","doi-asserted-by":"crossref","unstructured":"Hao, M., Qian, K., Chau, S.C.-K.: Privacy?preserving blockchain?enabled parametric insurance via remote sensing and iot. arXiv preprint arXiv:2305.08384, (2023)","DOI":"10.1145\/3575813.3576880"},{"issue":"3","key":"5996_CR51","doi-asserted-by":"publisher","DOI":"10.3390\/jcp5030044","volume":"5","author":"Z Nie","year":"2025","unstructured":"Nie, Z., Tyndall, B., Brannock, D., Gentles, E., Parish, E., Banger, A.: A framework for the design of privacy?preserving record linkage systems. Journal of Cybersecurity and Privacy 5(3), 44 (2025)","journal-title":"Journal of Cybersecurity and Privacy"},{"key":"5996_CR52","volume-title":"Cyber risk accumulation: Fully tackling the insurability challenge","author":"D Pain","year":"2023","unstructured":"Pain, D.: Cyber risk accumulation: Fully tackling the insurability challenge. Technical report, The Geneva Association (2023)"},{"key":"5996_CR53","unstructured":"Moody\u2019s Analytics Cyber Risk Team. Insurance cyber risk: Moody\u2019s insights. https:\/\/www.moodys.com\/web\/en\/us\/capabilities\/cyber-risk\/insurance-cyber-risk.html, (2024). Accessed: 25 November 2025"},{"key":"5996_CR54","first-page":"1","volume-title":"Encyclopedia of Cryptography, Security and Privacy","author":"S Panda","year":"2021","unstructured":"Panda, S., Farao, A., Panaousis, E., Xenakis, C.: Cyber-insurance: Past, present and future. In: Encyclopedia of Cryptography, Security and Privacy, pp. 1\u20134. Springer (2021)"},{"key":"5996_CR55","unstructured":"Hyperledger Foundation. Hyperledger caliper. https:\/\/www.hyperledger.org\/use\/caliper, (2023). Online; Last Accessed: 03\/2025"},{"key":"5996_CR56","unstructured":"Hyperledger Foundation. Hyperledger Aries Cloud Agent Python. https:\/\/github.com\/hyperledger\/aries-cloudagent-python, (2023). Online; Last Accessed: 11\/2025"},{"key":"5996_CR57","unstructured":"SQLite. SQLite. https:\/\/www.sqlite.org, (2023). Online; Last Accessed: 11\/2025"},{"key":"5996_CR58","first-page":"1","volume":"L119","author":"European Union","year":"2016","unstructured":"European Union: Regulation (eu) 2016\/679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec (general data protection regulation). Official Journal of the European Union L119, 1\u201388 (2016)","journal-title":"Official Journal of the European Union"},{"key":"5996_CR59","first-page":"73","volume":"L257","author":"European Union","year":"2014","unstructured":"European Union: Regulation (eu) no 910\/2014 of the european parliament and of the council of 23 july 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing directive 1999\/93\/ec (eidas regulation). Official Journal of the European Union L257, 73\u2013114 (2014)","journal-title":"Official Journal of the European Union"},{"key":"5996_CR60","first-page":"1","volume":"L335","author":"European Union","year":"2009","unstructured":"European Union: Directive 2009\/138\/ec of the european parliament and of the council of 25 november 2009 on the taking-up and pursuit of the business of insurance and reinsurance (solvency ii). Official Journal of the European Union L335, 1\u2013155 (2009)","journal-title":"Official Journal of the European Union"},{"key":"5996_CR61","first-page":"19","volume":"L26","author":"European Union","year":"2016","unstructured":"European Union: Directive (eu) 2016\/97 of the european parliament and of the council of 20 january 2016 on insurance distribution (insurance distribution directive, idd). Official Journal of the European Union L26, 19\u201359 (2016)","journal-title":"Official Journal of the European Union"},{"key":"5996_CR62","unstructured":"European Union. European insurance and occupational pensions authority (eiopa). EIOPA is the EU authority responsible for supporting the stability of the insurance and occupational pensions sectors, protecting policyholders, and promoting transparency\u00a0(2025)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05996-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-026-05996-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05996-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T18:56:06Z","timestamp":1771527366000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-026-05996-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,19]]},"references-count":62,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["5996"],"URL":"https:\/\/doi.org\/10.1007\/s10586-026-05996-z","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,19]]},"assertion":[{"value":"3 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"172"}}