Service Innovation of Insurance Data Based on Cloud Computing in the Era of Big Data

,


Introduction
Insurance is a tool to control the environmental risk of market economy and plays an important role in the social security mechanism. Insurance has the characteristics of economy, commodity, mutual assistance, science, and so on. Insurance services are provided by insurance companies to customers and consist of contract services and policy services [1]. e former includes insurance consultation, underwriting physical examination, and other services, while the latter is the renewal service, filing, and claim settlement service provided by the insurance company after the customer has insured [2]. e core of insurance service is insurance protection, and insurance service has the characteristics of intangibility, interactivity, nonstorability, difference, integrity, and dual attributes [3]. With the advent of the era of big data, insurance services have entered the Internet field, and Internet insurance has developed rapidly [4]. From the perspective of economics, insurance belongs to economic and financial behavior and can also be regarded as a financial arrangement to share the damage. erefore, the realization of insurance service innovation is a comprehensive system service innovation based on the premise of ensuring the privacy of insurance data [5,6]. At the same time, insurance data is the core information of insurance companies. Insurance companies not only need to strictly guarantee the security of insurance data, but also need to accurately and quickly retrieve relevant information on the premise of ensuring data privacy, so as to realize the service innovation of insurance data, achieve the purpose of providing real value insurance services to customers accurately, efficiently and quickly, and increase insurance coverage.
is is the core competitiveness of insurance companies.
With the development of insurance industry and the increase of insurance service types, accident insurance has been widely concerned. Heller and other scholars found that the gap of accident insurance has a direct impact on the families of policy holders, including radiologists [7]. In addition, dental insurance has become a new focus of insurance services at this stage. Scholar Clouston explained the importance of dental insurance in detail and proved whether parents' dental insurance directly affects their children's oral health care and called on the government to expand the dental coverage of children's oral insurance [8]. Yhya and other researchers found that the cost of medical insurance for prisoners in China was significantly higher than that for ordinary people [9]. ese results suggest that insurance service is the most extensive choice for most people to protect their own rights and interests, and insurance service should provide different kinds of services according to the actual situation of the insured. At this stage, the insurance service industry is developing rapidly. Baggio and his team have done relevant research on the situation of young criminals who cannot obtain normal insurance. e results show that the uninsured young criminals are facing major obstacles in medical care, that is, the high medical expenses in the future, which also directly affects the future health status of such people [10].
Insurance data is the basis for insurance companies to carry out business. Only through the statistics, mining, and analysis of insurance related data can insurance companies provide more targeted insurance services to policy holders and enhance their competitiveness. With the advent of the era of big data, the threat and attack of Internet data are increasing, and data leakage is common. How to accurately obtain the required insurance data on the premise of maintaining the privacy of insurance data is an important link in formulating targeted insurance services and innovating insurance services. Yang et al. proposed a keyword extraction measurement method based on specific text spatial distribution, which extracts the required information from encrypted documents to ensure the security of data information [11]. Vm and his team found that communication links and interfaces have become the target platform of security attacks, and these attacks are often concentrated in a variety of deceptive packets and submerged packets [12]. Hu, a scholar, compared the encryption and decryption effects of double encryption algorithm and traditional encryption algorithm under different data volumes. e results show that double encryption algorithm can shorten the encryption and decryption time of data, but its effect on decryption integrity is not good [13]. Big data analysis technology can be widely used in different fields. Shanmugapriya and other researchers proposed to build a secure private medical insurance database in the cloud through fog computing technology and realize secure access to the database and data storage through bait technology [14].
okchom and other scholars have designed an effective dynamic data integrity checking scheme for untrusted cloud storage, which allows third-party auditors to audit customer data while protecting data privacy [15]. e above research has made great progress in insurance, insurance services, insurance data, and retrieval application under the protection of data privacy, but there is still a lack of research on how to quickly and accurately retrieve relevant insurance information under the premise of ensuring the security of insurance data and then provide targeted insurance service innovation for policy holders. Under the background of big data, insurance service innovation is realized through the innovation of insurance data retrieval and storage, and a ciphertext retrieval based on attribute encryption is designed.

Service Innovation of Insurance Data
Based on Cloud Computing

Ciphertext Retrieval Based on Attribute Encryption.
After insured, the relevant insurance data contains some privacy information that is not allowed to be disclosed. In order to achieve fine-grained access control of data, resist keyword guessing attacks, and perform complex retrieval operations by cloud server, this section proposes a keyword retrieval scheme based on attribute encryption (hidden policy-ciphertext policy attribute-based encryption with keyword Search (HP-CPABKS)) [16,17]. e HP-CPABKS model shown in Figure 1 consists of trusted authority, cloud server, and cloud tenant (data owner and data user). e trusted authority initializes the public parameters of the system and distributes the private key according to the properties of the cloud tenant; the cloud server provides storage and computing services; the data owner encrypts the data file and keyword index and uploads it to the cloud server; the data user generates the corresponding retrieval token of the pre-Search keyword and uploads it to the cloud server [18].
HP-CPABKS mainly includes six algorithms. Given the security parameter λ, a secure hash function H k : 0, 1 { } * ⟶ Z p with key is defined, and the key K is secret shared by the data owner and user [19]. For different attributes i, 1 ≤ i ≤ n, generate the corresponding random value PP � e, p, g 1 , Formula (1) is the calculation formula of the public parameter PP of the system, and formula (2) is the calculation formula of the main private key MSK of the system, where i is the attribute and g 1 ∈ G 1 , g 2 ∈ G 2 , and G 1 , G 2 are prime order cyclic groups of order P. Set the user attribute list L � L 1 , L 2 , ..., L n � u 1,t 1 , u 2,t 2 , ..., u n,t n . When the cloud tenant U registration request appears, the trusted authorization center randomly selects x u ← R Z p and calculates 2 Complexity X � Y xu . At this time, X is a part of the public parameter.
e specific operation is as follows: randomly select β← R Z p , , there is L i � u l,t l , the corresponding cloud tenant's private key settings are shown in e cloud server maintains a tenant list U List . Whenever a new tenant is added, the corresponding execution steps of the data owner are as follows: randomly select r← R Z p and calculate C U � X − r ; request the cloud server to add (U, C U ) in U List ; make P � P 1 , P 2 , ..., P n act as an access control r← R Z p policy and encrypt it before uploading it to the cloud server, and the specific steps are as follows: calculate C � Y r and 2 act as a random number in G 1 , and the ciphertext expression is shown in the following formula: After encryption, upload to the cloud server, enter the keyword w and private key sk, and select s← R Z p .
Formula (5) is the keyword Search token expression, where the attribute i, 1 ≤ i ≤ n, s← R Z p ; then, T � x u + s, When the server receives the retrieval token from the cloud tenant u, it immediately determines whether the tenant u belongs to the list U List . If it is not the list U List user, the cloud server rejects the request. When it belongs to list U List user, calculate and otherwise output 0. Under the background of big data, the insurance industry has a high risk. e collection, storage, and analysis of customer information is a scientific way to effectively reduce insurance risk and tap the real needs of policyholders [20]. Taking automobile insurance as an example, after running HP-CPABKS model, the insurance company (data user) can extract the relevant information of the policyholder, as shown in Figure 2.
According to Figure 2, after HP-CPABKS is running, the insurance company can obtain the basic personal information of the applicant (including age, occupation, mobile phone number, vehicle type, vehicle collection year, etc.), obtain the consumption behavior through the applicant's  Complexity browsing time, product characteristics, and purchase time, and obtain the insured's out of danger and driving behavior through the number of accidents and claims.

Insurance Service Innovation Scheme under Cloud
Computing. With the advent of the era of big data, it has become a trend for the insurance industry to integrate cloud computing, Internet of things, and other technologies into traditional industries such as insurance industry and realize the "ecological integration" of information technology and insurance business. e content described in Section 2.1 can ensure that the insurance related data can be obtained quickly and accurately on the premise of not disclosing the insurance customer information. en the insurance company establishes the corresponding credit evaluation model according to the obtained customer information, obtains the customer's credit score, and formulates the targeted insurance service according to the actual situation of the customer (Figure 3). e credit evaluation management of insurance customers in Figure 3 can promote the steady development of the insurance industry. Firstly, the insurance data is preprocessed. It is assumed that the variable f has NF states. e sequence of each state is 1, ..., N f , and the rank of e weight of insurance data is realized by (6). en the decimal point is characterized.
Equation (7) is the expression of normalizing X the value of F to X ′ , where j is the smallest integer, so that Max (x') < 1.
rough the software MATLAB combined with the improved BP neural network algorithm to establish customer credit evaluation model, the momentum method and learning rate adaptive method are introduced to improve the traditional BP neural network algorithm. e momentum method alleviates the local sensitivity of the network to the error surface, and the momentum factor is c ∈ [0, 1].
Formula (8) is the weight adjustment formula of the improved BP algorithm, e is the error function, t is the training times, and η refers to the learning rate. When η is changed, check the reduction effect of the correction value of the weight in the error function. other.
Equation (9) is the adjustment formula, where α, β is the ratio factor, E is the error function, t is the training times,   Complexity and η is the learning rate. When the attribute index of customer data is 9, the number of neuron nodes is 9, and the number of output layer nodes is 1, then the number of hidden nodes n is determined according to In (10), a represents the constant in the range of [1,10], n i , n 0 refers to the number of hidden nodes corresponding to a specific neural network, and the insurance data has nonlinear characteristics, so SSE is selected as the error function and sigmoid function as the excitation function.
Equation (11) is the expression of output bit O j of unit J, and net j is the neural network layer corresponding to unit J. e credit evaluation model is used to evaluate the credit of the insured, and the targeted insurance services are formulated according to the evaluation results, so as to realize the innovation of insurance services [21]. Figure 4 shows the evaluation standard system of insurance companies for policyholders (customers), which mainly focuses on personal variables, economic variables, and risk variables. e economic variables of policyholders are mainly reflected in monthly income and bank deposits [22]. In the era of big data, the domestic insurance industry should make rational use of cloud computing, develop accurate and targeted solutions on the basis of full analysis of policyholders (customers), and realize the innovation of insurance services. See Figure 5 for details. Figure 5 shows the overall situation of the scheme. It can be seen that, under the background of big data, the innovation of insurance service should start from cloud computing. On the premise of ensuring the security of customer information, accurately retrieve customer data, establish customer information map according to relevant data, evaluate customer credit rating by map, and formulate accurate service scheme according to different customer situations to complete the innovation of insurance service New.

Effect Analysis of HP-CPABKS Scheme.
Firstly, the HP-CPABKS scheme is analyzed from the aspect of time complexity, mainly from bilinear pairing operation (P), exponential operation (E 1 ) on prime order cyclic group G 1 with order P, exponential operation (E 2 ) on prime order cyclic group G 2 with order P, and exponential operation (E T ) on prime order cyclic group G T with order P. Suppose there are n attributes and then there are N i possible values for any attribute i. In Table 1, setup refers to the algorithm for generating public parameters and master private key; Keygen refers to the setting algorithm for u private key of cloud tenant under the operation of trusted authority; Enclndex refers to the encryption algorithm for files before uploading to the cloud server (encryption algorithm); Gentoken refers to the setting algorithm for keyword retrieval token; search refers to the algorithm for searching and checking user retrieval token (retrieval algorithm).
As can be seen from Figure 6, when the number of attributes is 1, the running time of setup algorithm, Keygen algorithm, Enclndex algorithm, Gentoken algorithm, and Search algorithm is 0.025 s, 0.048 s, 0.018 s, 0.039 s, and 0.120 s, respectively; when the number of attributes is 50, the running time of setup algorithm, Keygen algorithm, Enclndex algorithm, Gentoken algorithm, and Search algorithm is 0.150 s, 1.382 s, 0.581 s, and 1.375 s, respectively 958 s; the cost of encrypting Enclndex algorithm is much lower than that of Search algorithm; the complexity of different algorithms of HP-CPABKS increases linearly with the number of corresponding attributes. Next, the protection efficiency of HP-CPABKS scheme for data security is detected, and four test data sets (data sets A, B, C, and D) are set. ere are 415 test data in data set A, 405 of which belong to the rejected users and 10 to the passed users; there are 1543 test data in data set B, 1528 of which belong to the rejected users and 15 to the passed users; and there are 1543 test data in data set C. ere are 13,278 test data, of which 13,271 are rejected users and 7 are passed users; there are 589 test data in data set D, of which 574 are rejected users and 15 are passed users. HP-CPABKS is used to access and test data in different data sets. e test results are shown in Figure 7.
As can be seen from Figure 7, in test data set A, 404 were successfully identified, accounting for 97.35%; in test data set B, 1524 were successfully identified, accounting for 98.77%; in test data set C, 13,268 were successfully identified, accounting for 99.92%; in test data set D, 571 were successfully identified, accounting for 97.11%. HP-CPABKS scheme can successfully identify more than 97% of rejected users in different test data sets, which indicates that the scheme has good protection effect in maintaining the security of insurance data of insurance companies. Take one million data blocks as privacy protection objects, set different number of challenges to challenge them, and analyze the change of the number of modified data blocks, as shown in Figure 8.
As can be seen from Figure 8, with the increase of the number of challenges, the proportion of modified data blocks accepting different number of challenges is gradually increasing; the more challenges, the proportion of modified data blocks in the data blocks that are the objects of privacy protection is also gradually increasing; when the number of challenges is 120, the modified data blocks only account for about 2%; when the number of challenges is 360, the modified data blocks are gradually increasing. e modified data block is less than 4%; when the number of challenges is 720, the modified data block is less than 9%. e above results show that the proposed ciphertext retrieval scheme based on attribute encryption (HP-CPABKS scheme) can effectively protect the information and data security of insurance customers and reduce the loss of customers caused by insurance data leakage.

Application Effect Analysis.
Taking two insurance companies as an example, this paper compares the complaints before and after using HP-CPABKS algorithm, so as to analyze the feasibility of the proposed insurance service innovation scheme.
As can be seen from Figure 9, within one year after the insurance company ran the insurance service innovation scheme based on HP-CPABKS algorithm, the total number of complaints dropped from 1300 to 249; among them, the number of contract disputes dropped from 218 to 96; the number of insurance contract disputes dropped from 52 to 13; and the number of claims/payment disputes dropped from 180 to 21. is is because in the design of insurance service innovation scheme based on HP-CPABKS algorithm, the number of customer complaints has been reduced. Before the operation of the scheme, the proportion of surrender disputes accounted for the largest proportion of the total complaints, reaching 36%; after the operation of the scheme, the proportion of surrender disputes decreased from 45% to 18%, with a significant decline. ese results show that the proposed insurance service innovation scheme based on HP-CPABKS algorithm can effectively reduce the number of complaints, suggesting that the insurance service innovation scheme can develop a more targeted service, which is easier to meet the real needs of customers. In order to obtain the practical application effect of the insurance service innovation scheme based on HP-CPABKS algorithm proposed in the study, apply it to different types of insurance companies in a certain region, and compare the changes in the number of policyholders of each type of insurance within one year before and after the application of the scheme, as shown in Figure 10.
As can be seen from Figure 10, after the application of the insurance service innovation scheme based on HP-CPABKS algorithm, the number of policyholders of different types of insurance increased to a certain extent; the number of policyholders of property insurance increased from 1246 to 1811, an increase of about 45.35%; the number of policyholders of agricultural insurance increased from 967 to 1384, an increase of about 43.12%; the number of policyholders of engineering insurance increased from 133 cases to 168 cases, an increase of 26.32%; the number of insured enterprises' property insurance rose from 246 cases to 310 cases, an increase of 26.02%; the rest of the automobile insurance, guarantee insurance, credit insurance, liability insurance, freight insurance, and ship insurance rose by 29.69%, 40.11%, 21.99%, 24.90%, 23.43%, and 15.44%,   respectively. e above results show that the proposed insurance service innovation scheme based on HP-CPABKS algorithm can help insurance companies obtain more insured customers, which reflects that the proposed insurance service innovation scheme based on cloud computing insurance data (insurance service innovation scheme based on HP-CPABKS algorithm) has good service effect and can increase the corresponding service cost on the basis of stabilizing the original customer source. Insurance companies should be more attractive to policy holders, improve the core competitiveness of insurance companies, and expand the insurance customer groups. e higher the satisfaction of the insured customers, the higher the recognition of the corresponding insurance services, the higher the loyalty of the customers to the insurance company, and the greater the competitiveness of the insurance company. erefore, next, we use the questionnaire survey method, set up 1000 questionnaires, and randomly select the policyholders who accept the insurance service innovation scheme based on cloud computing insurance data and the policyholders who do not accept the innovative insurance service scheme to conduct the survey. ere are 988 valid questionnaires, and the specific results are shown in Figure 11. As shown in Figure 11, the number of valid questionnaires for policyholders who accept the insurance service innovation scheme based on cloud computing insurance data is 493, and the number of valid questionnaires for policyholders who do not accept the innovative insurance service scheme (traditional insurance service) is 495. Comparing the results of the two questionnaires, it can be seen that, among the policyholders who accepted the insurance service innovation scheme based on cloud computing, 32.45% (160) of the insurance customers were very satisfied with the innovative insurance service, 41.99% (207) of the insurance customers were satisfied with the innovative insurance service, 13.59% (67) of the customers were relatively satisfied, and only 0.81% of the customers were not satisfied. Compared with the survey results of traditional insurance services (19.60%, 97), it decreased by 18.79%, indicating that the proposed insurance innovation service has realized the targeted insurance service for insurance customers and enhanced the applicability to different customers. On the other hand, the survey results of the policyholders who accepted the traditional insurance services showed that only 4.44% of the customers were very satisfied, 5.45% of the customers were satisfied, 19  8 Complexity customers were generally satisfied, and more than 50% (253 cases) of the customers were relatively satisfied. e above results show that the proposed insurance service innovation scheme based on cloud computing insurance data can significantly improve the satisfaction of insurance customers; that is, the service innovation mode is more successful.

Conclusion
Insurance data is an important part of the development of insurance industry. In order to realize the innovative service of the insurance industry in the big data environment, a service innovation scheme based on cloud computing insurance data (HP-CPABKS insurance innovation service) is designed. e cost of Enclndex algorithm is much lower than that of Search algorithm; the complexity of the algorithm increases linearly with the number of attributes. e above results show that the insurance service innovation scheme based on cloud computing insurance data proposed in this paper improves the traditional insurance service, improves customer satisfaction, and improves the competitiveness of the company. With the continuous saturation of the Internet market, insurance companies are bound to face a severe test. Precision marketing under big data is the development trend of insurance industry. erefore, further research in this field will be carried out in the next step.

Data Availability
e data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest
e authors declare that they have no conflicts of interest.