Fig. 3From: User authentication and access control to blockchain-based forensic log dataDialogue between user and edge serverBack to article page