Fig. 27From: User authentication and access control to blockchain-based forensic log dataStructure of a blockBack to article page