Fig. 5From: Cloud-based blockchain technology to identify counterfeitsData Flow from User to ApplicationBack to article page