Fig. 2From: User authentication and access control to blockchain-based forensic log dataAuthentication key generation and storing processBack to article page