Fig. 3From: Access control scheme based on blockchain and attribute-based searchable encryption in cloud environmentAudit case for user accessBack to article page