Research article Topical Sections

Cellulose kraft pulp reinforced polylactic acid (PLA) composites: effect of fibre moisture content

  • PLA offers a competitive and CO2 neutral matrix to commonly used polyolefin polymer based composites. Moreover, the use of PLA reduces dependency on oil when producing composite materials. However, PLA has a tendency of hydrolytic degradation under melt processing conditions in the presence of moisture, which remains a challenge when processing PLA reinforced natural fibre composites. Natural fibres such as cellulose fibres are hygroscopic with 6–10 wt% moisture content at 50–70% relative humidity conditions. These fibres are sensitive to melt processing conditions and fibre breakage (cutting) also occur during processing. The degradation of PLA, moisture absorption of natural fibres together with fibre cutting and uneven dispersion of fibres in polymer matrix, deteriorates the overall properties of the composite.
    In the given research paper, bleached softwood kraft pulp (BSKP) reinforced PLA compounds were successfully melt processed using BSKP with relatively high moisture contents. The effect of moist BSKP on the molecular weight of PLA, fibre length and the mechanical properties of the composites were investigated. By using moist never-dried kraft pulp fibres for feeding, the fibre cutting was decreased during the melt compounding. Even though PLA degradation occurred during the melt processing, the final damage to the PLA was moderate and thus did not deteriorate the mechanical properties of the composites. However, comprehensive moisture removal is required during the compounding in order to achieve optimal overall performance of the PLA/BSKP composites. The economic benefit gained from using moist BSKP is that the expensive and time consuming drying process steps of the kraft pulp fibres prior to processing can be minimized.

    Citation: Sanna Virtanen, Lisa Wikström, Kirsi Immonen, Upi Anttila, Elias Retulainen. Cellulose kraft pulp reinforced polylactic acid (PLA) composites: effect of fibre moisture content[J]. AIMS Materials Science, 2016, 3(3): 756-769. doi: 10.3934/matersci.2016.3.756

    Related Papers:

    [1] Dawei Li, Enzhun Zhang, Ming Lei, Chunxiao Song . Zero trust in edge computing environment: a blockchain based practical scheme. Mathematical Biosciences and Engineering, 2022, 19(4): 4196-4216. doi: 10.3934/mbe.2022194
    [2] Te-Wei Chiang, Dai-Lun Chiang, Tzer-Shyong Chen, Frank Yeong-Sung Lin, Victor R. L. Shen, Min-Chien Wang . Novel Lagrange interpolation polynomials for dynamic access control in a healthcare cloud system. Mathematical Biosciences and Engineering, 2022, 19(9): 9200-9219. doi: 10.3934/mbe.2022427
    [3] Kittur Philemon Kibiwott , Yanan Zhao , Julius Kogo, Fengli Zhang . Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing. Mathematical Biosciences and Engineering, 2019, 16(5): 3561-3594. doi: 10.3934/mbe.2019178
    [4] Han-Yu Lin, Tung-Tso Tsai, Hong-Ru Wu, Miao-Si Ku . Secure access control using updateable attribute keys. Mathematical Biosciences and Engineering, 2022, 19(11): 11367-11379. doi: 10.3934/mbe.2022529
    [5] Qihui Zhang, Pradeep Chaudhary, Saru Kumari, Zhiyin Kong, Wenfen Liu . Verifier-based anonymous password-authenticated key exchange protocol in the standard model. Mathematical Biosciences and Engineering, 2019, 16(5): 3623-3640. doi: 10.3934/mbe.2019180
    [6] Muhammad Ahmad Nawaz Ul Ghani, Kun She, Muhammad Arslan Rauf, Shumaila Khan, Masoud Alajmi, Yazeed Yasin Ghadi, Hend Khalid Alkahtani . Toward robust and privacy-enhanced facial recognition: A decentralized blockchain-based approach with GANs and deep learning. Mathematical Biosciences and Engineering, 2024, 21(3): 4165-4186. doi: 10.3934/mbe.2024184
    [7] Tao Liu, Shubhangi Vairagar, Sushadevi Adagale, T. Karthick, Catherine Esther Karunya, John Blesswin A, Selva Mary G . Secure multimedia communication: advanced asymmetric key authentication with grayscale visual cryptography. Mathematical Biosciences and Engineering, 2024, 21(3): 4762-4778. doi: 10.3934/mbe.2024209
    [8] Dengzhi Liu, Zhimin Li, Chen Wang, Yongjun Ren . Enabling secure mutual authentication and storage checking in cloud-assisted IoT. Mathematical Biosciences and Engineering, 2022, 19(11): 11034-11046. doi: 10.3934/mbe.2022514
    [9] Song Wan, Guozheng Yang, Lanlan Qi, Longlong Li , Xuehu Yan, Yuliang Lu . Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code. Mathematical Biosciences and Engineering, 2019, 16(6): 6367-6385. doi: 10.3934/mbe.2019318
    [10] Zhibin Zuo, Rongyu He, Xianwei Zhu, Chaowen Chang . A novel software-defined network packet security tunnel forwarding mechanism. Mathematical Biosciences and Engineering, 2019, 16(5): 4359-4381. doi: 10.3934/mbe.2019217
  • PLA offers a competitive and CO2 neutral matrix to commonly used polyolefin polymer based composites. Moreover, the use of PLA reduces dependency on oil when producing composite materials. However, PLA has a tendency of hydrolytic degradation under melt processing conditions in the presence of moisture, which remains a challenge when processing PLA reinforced natural fibre composites. Natural fibres such as cellulose fibres are hygroscopic with 6–10 wt% moisture content at 50–70% relative humidity conditions. These fibres are sensitive to melt processing conditions and fibre breakage (cutting) also occur during processing. The degradation of PLA, moisture absorption of natural fibres together with fibre cutting and uneven dispersion of fibres in polymer matrix, deteriorates the overall properties of the composite.
    In the given research paper, bleached softwood kraft pulp (BSKP) reinforced PLA compounds were successfully melt processed using BSKP with relatively high moisture contents. The effect of moist BSKP on the molecular weight of PLA, fibre length and the mechanical properties of the composites were investigated. By using moist never-dried kraft pulp fibres for feeding, the fibre cutting was decreased during the melt compounding. Even though PLA degradation occurred during the melt processing, the final damage to the PLA was moderate and thus did not deteriorate the mechanical properties of the composites. However, comprehensive moisture removal is required during the compounding in order to achieve optimal overall performance of the PLA/BSKP composites. The economic benefit gained from using moist BSKP is that the expensive and time consuming drying process steps of the kraft pulp fibres prior to processing can be minimized.


    With the development of information technology, the problem of network security is becoming more and more prominent, among which identity authentication and access authorization are particularly important. Since eXtensible Markup Language (XML) has been widely used in many enterprises and organizations for data representation and data exchange [1,2], and has been playing an important role in IT systems and applications, so XML's authentication and access authorization become more and more important [3,4]. In general, XML data used by the enterprises and organizations usually contains privacy information, such as transaction data in the electronic commerce and the document used to record the relationship of customer in company, and some are even the core commercial secrets of enterprises. Therefore, how to use these XML data effectively and safely is becoming the research focus of current database service [5,6].

    At present, there are a number of literatures on XML security and data privacy protection, but most of them have some problems: Some studies only focus on structural protection, and ignore the importance of content; some studies only focus on content, and ignore the influence of structure; some spend too much time on nodes' authorization search, and some take up a lot of time to implement the storage for different access views. In fact, in a shared environment, we need a new privacy protection scheme, It should not only consider the structure, but also pay attention to the content, at the same time, it needs to improve the query efficiency and reduce the storage consumption.

    In this paper, a novel scheme is proposed, which mainly focuses on XML's user authentication and authorization. The main contribution of this paper can briefly be summarized as follows:

    (1) A new XML authorization scheme based on the polynomials is proposed for the first time, and Kerberos authentication scheme is used to identify the user.

    (2) Under the interaction of authorization polynomials and the global structure view, authorization matrix is generated dynamically, its temporary and dynamic characteristics greatly improves the security of the system.

    (3) Transforming the user's search requirement into a search matrix, which is in conjunction with the user's temporary authorization matrix and conditional privilege matrix to finish the user's security query.

    (4) A serial of experiments result shows that the scheme not only saves the server's storage space but also efficiently speeds up the security search, which is convenient to find the information and positioning.

    The rest of this paper is organized as follows. After introducing the main contribution in section 1, the existing access control models and privacy protection mechanisms are introduced for XML data in section 2. Then section 3 presents the idea and the design about the authentication and authorization. In section 4, the security search process is provided. In section 5, a series of experiments are carried out to measure the performance of the scheme. Section 6 summarizes this scheme and makes some suggestions for the next work.

    In recent years, the demand of privacy protection warms up continuously, the domestic and foreign research institutions, enterprises and scholars have devoted to the research of privacy protection. At present, there are many privacy protection schemes for XML, most all of schemes generally use data encryption, access control or digital signature technology et al. [7,8,9,10,11,12,13,14,15,16,17,18].

    In the field of database service, the most direct solution to prevent the illegally access is to encrypt the data. Originally, World Wide Web Consortium (W3C) and the Internet Engineering Task Force Internet (IETF) provide a set of XML secure protocols and technical standards to meet XML security requirements [14,15]. In XML encryption standard, it defines encryption granularity from three aspects. From encryption granularity, we found that there were two problems in this standard: (1) It was impossible to encrypt an ancestor node while leaving the descendants of this node unchanged. (2) Information leakage existed between the users. The element xenc: Encrypted data exposed the initial location of the plaintext, and at same time the intruder could infer the size of plaintext from the size of cipher text. Therefore, there may be information leakage including the position disclosure and the size disclosure of plaintext information. The example of encryption scheme is shown in Figure 1a, the grey node represents the encrypted node. In order to hide the encrypted node's size and position, the literature [19] proposed XML pool encryption scheme. Its basic idea is to encrypt each node separately, and then move all the encrypted nodes into a pool from their original positions. In this scheme, before pushing the encrypted nodes into the pool, it need bind the original position information with the encrypted node. Because it need reconstruct the document once upon the user gets the nodes' decryption keys. In XML pool encryption scheme, the moving of encrypted nodes breaks down the structure of XML document, which makes its reconstruction difficult and time-consuming. The example of this scheme is shown in Figure 1b.

    Figure 1.  Examples of XML privacy protection scheme.

    Access control is one of effective methods to protect the privacy. Several researches have been done to specify a fine-grained access control on XML data. The literature [20] first proposed a Hippocratic XML model based on the ancestor's authorization. In this model, it solved the problem of finding the nearest ancestor nodes' authorization and proposes an efficient access control mechanism that used the authorization index and the nearest neighbor search technique, the example is displayed in Figure 1c, here, '+' denotes permit and '−' denotes deny. The literature [21] proposed a view-based access control mechanism, which was named as ViewAC. This mechanism created and maintained a separate view for each user, which contained exactly the set of data elements authorized to access. So this mechanism suffered from high maintenance and storage costs especially for a large number of users. Angela et al. [22] put forward a privacy model called Privacy for All (P4A). In this model, a privacy policy considered two major elements: Data and the purpose of use. This model offered more flexibility than current approaches in that it allowed unconditional and conditional access. However, this model only considered the leaf nodes' authorization and ignored the protection of structure information. In other words, it only provided the authorization of leaf nodes and ignored the authorization of intermediate nodes. The literature [23] proposed a new protection mechanism based on the modified and enlarged theory of Shamir's secret. It can effectively protect the core data, at same time, this method can effectively authenticate user's identity. But the distributing of the secret is difficult and complex, which impacts on its efficiency. The literature [24] proposed a data access control model for individual users, through the semantic visual range of inverted XML structure is realized. It extended the authority by the semantic dependency association, and obtained the XML view semantically dependent on inverted index. XML access control based on ontology semantic dependency is a difficult research direction, which need further consideration and research.

    In summary, although above-mentioned methods can accomplish the protection of the underlying data and effectively prevent the external enemy to access the data, but there are still some problems in them. Like the relational database, encrypted XML document makes queries difficult, and spending too much time in encryption and decryption directly affects the system's efficiency. Although many access control schemes have been proposed, these schemes either ignore the protection of content or ignore the protection of structure. In fact, an XML document needs dual protection for the content and the structure. Facing with the non-absolute secure environment, we need to find the better data protection scheme, which brings great challenges to traditional XML data protection.

    In this section, we propose a new user authentication and authorization scheme based on the polynomial. Kerberos authentication is to ensure the legal identity of the user, and only legitimate user can obtain the corresponding authorization polynomial. Then the authorization polynomial combines with the global structure view to generate the temporary authorization matrix. Based on it, we can complete a series of security information search for XML document.

    From the structural features of XML document, we know its tree structure determines the skeleton of information, and the content of leaf node is the core information that need to be protected. For example, in an XML document that stores electronic medical records, the structure information represents that this is the electronic medical records, but from the content of leaf node, we can get detailed personal medical records including the name, address, medicine data, etc. Therefore, the content is the core information, but the structural characteristics of XML also determine that its structure hides some useful information, so both of them need to be focused on. In this scheme, inspired by the idea of separating structure and content in XML document, the encoding of structure and the content information are stored respectively in the server, and the auxiliary information is the foundation of information search, with the help of them, the structure and content can be combined into useful information by some algorithm.

    Figure 2 shows the architecture of new scheme. To better present the idea of the scheme, we take the electronic medical records as an XML example to describe patients' information. The system consists of three components: Kerberos authentication module, client module and the server module. Kerberos authentication module includes authentication server (AS) and ticket-granting server (TGS), its goal is to provide powerful authentication services for client and the server by the key system [25]. Client is the user who wants to get some useful information from the server. The server module is the core component; it is responsible for the user's authorization and feedback of security information.

    Figure 2.  The architecture of new scheme.

    Kerberos is an authentication protocol that is used to verify the identity of a user or host. It is widely used in many fields [26,27]. In the literature [28], it focuses on the improvement of mobile application security mechanism. This paper proposes a security model of mobile application which is based on Kerberos authentication. In this improved security model, every query request from the client will be authenticated by the Kerberos server, but the authentication will be different between users with different access purpose. In our system, Kerberos is used to identify different users. It provides a means of verifying the identities of principals in an open network environment [29]. The authentication process proceeds as follows:

    (1) Get the tgs ticket

    CAS:IDC||IDtgs||Times||Nonces1ASC:IDc||Tickettgs||EKc[Kc,tgs||Times||Nounces1||IDtgs]
    Tickettgs=EKtgs[Kc,tgs||IDc||ADc||Times]

    A client sends a request to the AS requesting "Service Ticket" for a given server. The message contains client's identity IDc, TGS server's identity IDtgs, Times and random value Nounces1. The AS responds with the request, the respond message contains a ticket-granting ticket (TGT) which can later be used with the TGS.

    (2) Get the server's ticket

    CTGS:IDs||Times||Nonces2||Tickettgs||AuthenticatorcTGSC:IDc||Tickets||EKc,,tgs[Kc,s||Times||Nounces2||IDs]
    Tickets=EKs[Kc,s||IDc||ADc||Times]
    Authenticatorc=EKc,tgs[IDc||TS1]

    In the second step, the client sends a request to the TGS. The client sends TGT to the TGS in the same manner as if it were contacting any other server, which requires Kerberos credentials. The reply is encrypted in the session key from the TGT. Once obtained, credentials may be used to verify the identity of the principals in a transaction, to ensure the integrity of messages, or to preserve privacy of the messages. The application is free to choose whatever protection may be necessary.

    (3) Get the server's service

    CS:Tickets||AuthenticatorcSC:EKc,s[TS2||Subkey||Seq#]
    Authenticatorc=EKc,s[IDc||TS2||Subkey||Seq#]

    The client transmits the ticket (which contains the client's identity and the TGS server's identity copy of the session key, all encrypted in the server's key) to the server. The session key (now shared by the client and server) is used to authenticate the client, and to optionally authenticate the server. At the same time, it can also be used to encrypt further communication between two parties or to exchange a separate sub-session key to be used to encrypt further communication. The server returns the session key to client, and then they can further exchange all kinds of information.

    This is the core module. Only the legal users can obtain the corresponding authorization polynomial, generate the temporary access control matrix, and obtain the security data. Here we use the polynomial to represent the authorization of user. Temporary access control matrix will be created based on his authorization polynomial and the global structure view, due to its temporary characteristic, temporary access control matrix not only saves the storage space, but also ensures the safety of system.

    To create the global authorization polynomial and global structure view, first we adopt the start-end encoding to encode the whole XML document. For example, for the electronic medical records, the encoding example is shown in Figure 3, its detailed process is described in the literature [30,31].

    Figure 3.  Encoding example of an XML document.

    In order to establish a concise and accurate summary of XML structure, we extract the global structure view that adopts the method named as DataGuide [32]. The extracting rule specifies that XML's global structure view describe every unique label path exactly once, regardless of the number of times it appears in XML document. According to the DataGuide's extracting rule, a global structure view corresponding to Figure 3 is displayed in Figure 4. Especially, in this figure, the node 'Patient' and the node 'Record' are the repeated nodes, here labeled*.

    Figure 4.  Global structure view corresponding Figure 3.

    According to the global structure view, we first establish the global polynomial equation f(x). In it, the degree of polynomial is decided by the number of leaf nodes, and at same time the coefficient of polynomial is the encoding (address) of leaf node content by the order of leaf node in global structure view. If a user knows the whole coefficient in the polynomial, which means he can get all the content in this XML document.

    For example, in Figure 4, the number of leaf nodes is 12, from left to right and from top to bottom. 'HosName' is the first leaf node, whose content's address is the coefficient a0 (encoded as 1). 'ID' is the second leaf node, whose content's address is the second coefficient a1 (encoded as 4), and so on. So the global polynomial equation f(x) is Eq (1) corresponding to Figure 4. The real f(x) is Eq (2). (a0 = 1, a1 = 4, a2 = 5, …., a11 = 15).

    f(x)=a0+a1x+a2x2+a3x3+a4x4+a5x5+a6x6+a7x7+a8x8+a9x9+a10x10+a11x11 (1)
    f(x)=1+4x+5x2+6x3+7x4+8x5+10x6+11x7+12x8+13x9+14x10+15x11 (2)

    Correspondingly, the system will create different tailored authorization polynomials for the users with different access purposes. The creation rule is: (1) If the leaf node is inaccessible according to the user's authorization rule, then corresponding coefficient is zero in his authorization polynomial. (2) If all children nodes of some node are inaccessible, we will delete this node. The deletion sequence is from the bottom to top and from the leaf node to this node.

    Example 1: An industrial authorized user wants to know about the diagnose information, whose purpose is to analyze and research the reason of diseases. His access purpose displays that he wants to get the information about 'HosName', 'Birth', 'Depart', 'Diagnose', 'medicine', 'treat', which means that he wants to get the Eq (3). However, after filtered by the protection policy, the final authorization polynomial is displayed in Eq (4).

    f(x)=1+6x3+11x7+13x9+14x10+15x11 (3)
    f(x)=6x3+11x7+13x9+14x10+15x11 (4)

    In this scheme, the system will create an authorization table to record the related authorization information. User authorization table is showed in Table 1.

    Table 1.  User authorization table.
    User name User ID Key Authorization Polynomial
    Alice 0 4532 f(x)
    Mary 12 56322 f(x)(1, 5, 7, 8)
    Bob 34 562254 f(x)(2, 6)
    Smith 78 52362 f(x)(2, 6, 7, 8)

     | Show Table
    DownLoad: CSV

    In table 1, 'User ID' is system ID of the user; 'Key' is used to verify user's identity, which isn't the user's password, but it can be calculated from the user's name and password. 'Authorization Polynomial' describes the user's authorization; f(x) represents the global authorization polynomial, because the polynomial coefficient is the encoding of content, so their values are different from each other. In addition, f(x) (a0, a1, …an) represents the limited polynomial, a0, a1… an are the denied coefficient, whose corresponding items should be deleted from the f(x).

    For example:

    If
    f(x) = a0 + a1x + a2x2 + a3x3 + a4x4 + a5x5 + a6x6 + a7x7 + a8x8 + a9x9 + a10x10 + a11x11
    then
    f(x) (a0, a2, a5) = a1x + a3x3 + a4x4 + a6x6 + a7x7 + a8x8 + a9x9 + a10x10 + a11x11
    then
    f(x) (a2, a6, a7, a8) = a0+ a1x + a3x3 + a4x4 + a5x5 + a9x9 + a10x10 + a11x11

    About the authorization procedure, it is displayed below:

    (1) Get the authorization polynomial

    Login in the system, if the user passes the Kerberos identity authentication, the server will return his corresponding authorization polynomial from the authorization table.

    (2) Generation of temporary access control view

    Based on the user's authorization polynomial and the global structure view, the system will create this user's temporary access control view. We provide some examples to explain the generation procedure of access control view.

    In order to create the user's access control view, apart from the authorization polynomial, it also needs the global structure view. To be conveniently, we adopt the level structure to represent the global structure view, the level structure shows the levels and the tags in each level. Figure 5 shows the level structure corresponding with the global structure view in Figure 4.

    Figure 5.  Creation procedure of of access control view.

    Figure 4 is the global structure view, in which every common node is labeled with (start, end), and the repeated node is labeled with (start, end, frequency). Figure 5a is the corresponding level structure of global structure view, in which every node is labeled with 'self-start value. Parent's-start value' according to global structure view. For example, Node 'HosName' is in the level 1 of the global structure view, it is labeled with (1, 1) and its parent node 'EMR' is encoded as (0, 8604), so in the level structure, Node 'HosName' is labeled as '1.0', '1' represents itself start value, and '0' is its parent's start value. Node 'Patient' is in the level 2 of the global structure view, it is labeled with (3, 88, 100) and its parent node 'Patients' is encoded (2, 8603), so in the level structure, Node 'Patient' is labeled as '3.2'. In the same level, the encoding is sequential in arrangement. Root node is labeled as '0', because it hasn't parent node. The detailed level structure with label is displayed in the left figure of Figure 5a.

    Furthermore, in order to search the information conveniently, we make the level structure change to be access control matrix. From the encoding character in the level structure, we can know the encoding value is different from each other, and is increasing gradually from top to down, from left to right. The encoding of final leaf node has the maximum start value and maximum parent's start value. Therefore, access control matrix is created based on the encoding value of final leaf node. From the left figure of Figure 5a, we know that the final node's encoding is '15.9', because the encoding value begins from value '0', so we will create a 16 × 10 matrix. In matrix, if the leaf node exists in the level structure, then its value is 1, otherwise is 0.

    For example, in Figure 5a, left figure is the level structure, whose node has been encoded with (self-start, parent's-start). The root node '0' is saved in [0, 0] in the matrix, its value is 1. Node 'HosName' (1.0) is saved in [1,0], Node 'Patients' (2.0) is saved in [2,0], …., 'Medicine' (14.9) is saved in [14,9], and 'treat (15.9) is saved in [15,9]. By this method, we complete the creation of access control matrix, transforming the level structure to be an access control matrix. The matrix stands for the user's access control view. The result matrix is the right figure in Figure 5a.

    So far, we know the global structure view is corresponding with the level structure one to one. Now we know the global structure view is changed into an access control matrix. The following section, we will provide some examples to describe the process about how user's authorization polynomial to change to be an access control matrix.

    Example 1: As an industrial registered user Mary, she wants to research the disease situation in different age based on all the electronic records. After the identity authentication, the system will provide her the global structure view and her authorization polynomial according to her user ID.

    For example, Mary gets the authorization polynomial f(x) (1, 5, 7, 8) and the global structure view (corresponding with the level structure). Then her authorization process is showed in Figure 5b.

    In Figure 5b, left figure is the level structure corresponding to the global structure view. The middle figure is the tailored level structure according to Mary's authorization polynomial f(x) (1, 5, 7, 8), in this figure, based on the f(x) (1, 5, 7, 8), the system will delete corresponding node just as start value is 1, 5, 7, 8. Right figure is her access control matrix corresponding to the middle tailored level structure. In Figure 5b, the below figure is Mary's real access control view corresponding to access control matrix.

    In order to complete the information search, the system must contain some core information tables, the main structure encoding table, the content table, etc.

    The structure encoding table is displayed in Table 2 corresponding to Figure 3. The first column is the encoding of all the nodes. The leaf node content is displayed in Table 3 corresponding to Figure 3. In this table, the first column is the content encoding of all leaf nodes in whole XML document, and the second is the specified leaf node's content. Here, because the leaf node's start value is equal to its end value, so we take its start value to encode the leaf node's content, which is just like the address of content, by this encoding, we can obtain the content. For example, in Figure 4, the leaf node 'Name' is encoded as (5, 5), then we label this node's content is '5', through this digit 5, we can obtain the content 'Alice'.

    Table 2.  Structure information table.
    Encoding (Structure view) Node Name
    (0, 8604) EMR
    (1, 1) HosName
    (2, 8603) Patients
    (3, 88, 100) Patient
    (4, 4) ID
    (5, 5) Name
    (6, 6) Birth

     | Show Table
    DownLoad: CSV
    Table 3.  Leaf nodes' content table.
    Encoding Content
    1 People hospital
    4 A1
    5 Alice
    6 1966.12
    7 123–234
    …… ……

     | Show Table
    DownLoad: CSV

    In the use of XML document, it has many repeated nodes with same structure, although the repeated nodes occur only once in global structure view, the content of repeated nodes' is very important. So in order to protect the content and link all the structure and content information we use start-end encoding to encode all the nodes, and take the leaf node encoding as the content's address. Thus, in the processing of search, we can calculate other repeated leaf node content encoding based on the first leaf node encoding in global structure view. We assume that R [0] is the first repeated node, its encoding is (p, q). The repeated node R[i]'s encoding is labeled (m, n), then its calculation formula is present in Eq (5):

    R[i](m,n){m=p+(qp+1)in=m+(qp) (5)

    In this formula, i = 0, 1, 2, 3…., it is the order of repeat node. About the detailed start-end encoding is shown in the literature [30].

    In Table 2, it has two types of encoding, two value encoding is the ordinary node and the 3 value encoding is the repeated node. For example, ordinary node 'HosName' is encoded as (1, 1), and repeated node “Patient” is encoded as (3, 88, 100), digit 3 is the start value, digit 88 is the end value, and digit 100 is the number of repeat. With the help of encoding, the content is linked with its encoding (named address). In the server side, the content stored in disorder, even if the attacker gets the content, he can't link other information and get the meaningful information, so it is meaningless.

    For safety considerations, the content table is saved in a confused form. The detailed search process about repeated structured nodes' content is described in literatures [31].

    Depending on the global structure view, all the information tables, the authentication and authorization method, the system can deal with all kinds of user's search requirements. Because the access control view of user is changed into an access control matrix, so in the process of information search, the user's search requirement also can be representing as a search matrix, from this point we can conclude that the search process is a procedure of matrix calculation. The detailed search procedure is shown in Figure 6a.

    Figure 6.  The procedure of information processing.

    For example 1: In order to simplify the describing process, here considering to use DTD to express access view in an electronic record document, assume that DTD view is in below:

    < !ELEMENT Patient (address, Record*) >

    < !ELEMENT Record (diagnose, treat, date) >

    Root node is 'Patient', it has two son nodes 'address' and 'Record', further node 'Record' has three son nodes 'diagnose', 'treat', and 'date', its DTD view, access view and corresponding access control matrix are displayed in Figure 6b.

    The DTD view's corresponding access control matrix is 'B' in Eq (6). Here we choose XPath [33] as the structured query language, if a user submitted the XPath request 'Patient[0]/address', his corresponding search matrix is A, assume that the conditional privilege matrix is C, and the search result is R, the calculate function is in Eq (6). Here, '*' represents 'and' operation.

    A=[100100000000000000]B=[100100100001001001]C=[100100100001000001]R=ABCR=[100100000000000000] (6)

    In order to test this scheme's efficiency and performance, we have made a series of experiments. It uses Visual C++ 6.0 and Matlab mixed programming technology. In the process of parsing XML document, Document Object Model (DOM) [34] is used to gain the nodes and leaf nodes' content information. In the experiments, we choose four kinds of real test dataset [35]. In the test dataset, the maximum size is 2190 KB, the minimum size is 5 KB. The maximum node number is 48002, and the minimum node number is 127. The maximum depth of XML document tree is 5, and the minimum depth of XML document tree is 3. The number of leaf nodes ranges from 101 to 40001. The detailed dataset information is shown in Table 4.

    Table 4.  Test dataset information.
    Number Dataset name Size Node number Depth Leaf nodes number
    1
    2
    3
    4
    Nation.xml
    Ubid.xml
    Customer.xml
    partsupp.xml
    5 KB
    20 KB
    504 KB
    2190 KB
    127
    342
    13502
    48002
    3
    5
    3
    3
    101
    275
    12001
    40001

     | Show Table
    DownLoad: CSV

    At present, in almost all XML access control models and privacy protection schemes, the storage space, the compression ratio, search time and security degree are often used to evaluate new model's performance. In them, the security degree is the primary goal, while query time is a secondary factor, and the final storage space is one of the factors to judge the advantages and disadvantages of the scheme. In order to evaluate the performance of this new scheme, ViewAC's approach [21] and Matrix storage method [30] are compared with ours.

    Theoretically, we can analyze that in ViewAC's scheme, it creates and maintains many separate different XML documents for different purpose's users, which contain exactly the set of data elements authorized to access, so as the number of different users increases, the demand for storage space becomes larger. Consequently, this scheme suffers from high maintenance and storage costs.

    In Matrix storage scheme, it transforms access view into different storage matrix, so for different purpose's users, we only need to save the matrix message for different user, so as the number of different users increases, the need for storage will slowly increase, but not much, which has very low storage costs.

    In our polynomial scheme, we use the polynomial to represent the authorization, and create the temporary access control view to help the user, so the temporary storage more effectively saves the space than other schemes.

    In the experiments, we test and obtain the size of storage space in several different views. The comparison of storage space in several different views respectively are shown in Figure 7a-f, the horizontal abscissa digit stands for the test document number in Table 4, and the vertical abscissa digit stands for the storage space, whose basic unit is KB.

    Figure 7.  Compare of storage space in different views.

    From the experiment data and the result, we know that in ViewAC's scheme, its space size is the size of entire XML document, which only saves one view for one type of user. For the test document Nation.xml, in one view, ViewAC's storage space is 5 KB, in two views, ViewAC's storage space is 9 KB, and it serves two different types of users, two different types of documents are cut from the original document. In three views, its storage space grows to 12 KB and it is 23 KB in four views. In ten views, its storage space grows to 45 KB and it is 85 KB in twenty views.

    For the test document partsupp.xml, in one view, ViewAC's storage space is 2190 KB; in two views, ViewAC's storage space is 3604 KB. In three views, its storage space grows to 4328 KB and it is 5200 KB in four views. In ten views, its storage space grows to 17450 KB and it is 39004 KB in twenty views. The same analysis is in Matrix and our new polynomial scheme. In a word, from the storage space, it shows that ViewAC's storage space is growing greater than matrix and polynomial schemes', with the increase of different users, ViewAC's storage space follows the rapid growth, and our polynomial scheme has obviously low storage costs.

    The compression ratio is another factor to evaluate the scheme. It is similar to the storage space, the ratio value is from the calculation in storage space data, but they are slightly different, which reflects another size of the problem.

    Compression ratio is the ratio of size after compression to size before compression. For example, a shared XML document, if its source size is 5 KB, and its size is 4 KB after compression, so compression ratio is: 4 KB/5 KB × 100% = 80%.

    Here we take matrix scheme as an example, it uses different matrix to save different access control view. Therefore, with the increasing of different users, its space storage is also slowly increasing. With regard to compression ratio, we compare three schemes using same test dataset. The data source is from Figure 7 and the ratio value is displayed in Table 5.

    Table 5.  Compare in space compression ratio to test dataset.
    Number Dataset Name Scheme Name 1 2 3 4 10 20
    1 Nation.XML ViewAC
    Matrix
    Ours
    100%
    48%
    52%
    90%
    36%
    26%
    80%
    27%
    2%
    95%
    65%
    1%
    90%
    10%
    5%
    85%
    12%
    3%
    2 Ubid.xml ViewAC
    Matrix
    Ours
    100%
    68%
    73%
    85%
    54%
    36%
    83%
    43%
    24%
    94%
    44%
    18%
    93%
    39%
    7%
    80%
    9%
    4%
    3 Customer.xml ViewAC
    Matrix
    Ours
    100%
    48%
    52%
    92%
    35%
    26%
    89%
    27%
    17%
    98%
    40%
    13%
    97%
    38%
    5%
    94%
    7%
    3%
    4 Partsupp.xml ViewAC
    Matrix
    Ours
    100%
    60%
    58%
    82%
    48%
    30%
    66%
    39%
    20%
    59%
    17%
    15%
    80%
    13%
    6%
    89%
    7%
    3%

     | Show Table
    DownLoad: CSV

    From the data, we know that for Nation.xml its compression ratio is from 100 to 80% in ViewAC scheme, the ratio is from 65 to 10% in Matrix scheme, and the ratio is from 52 to 1% in our new scheme. For Ubid.xml its value is from 100 to 80% in ViewAC scheme, the value is from 68 to 9% in Matrix scheme, and the value is from 73 to 4% in our new scheme. The same analysis is for customer.xml and cartsupp.xml documents. Accordingly, can conclude that our new scheme has a good compression ratio.

    In a word, for ViewAC's scheme, the number of different users has the greatest impact, and others have less influence, with the increasing of different users' number, its space storage is growing quickly, so its compression ratio is very high. For matrix scheme, it uses different matrix to save different access control view. Consequently, with the increasing of different users, its space storage is also slowly increasing, and its compression ratio is slowly reducing. In our polynomial scheme, because only a global structure view is saved in the server, so in whatever conditions and in different views, the server can create different temporary access control view for different user, but these temporary access control views are not be saved, so its storage space is always constant. It means that our scheme has obviously low storage costs and low compression ratio especially with the increasing in the number of different users.

    In order to judge the query efficiency of the scheme, we test the execution time from two aspects:

    (1) The resolution time for XML document;

    (2) the specific search time.

    Parsing XML document is the first pre-processing step before searching the information. After parsing XML document, all the different nodes are encoded according to above labeling scheme, and all the content is saved in the content table according to its encoding. Finally, the sever will save all kinds of structure encoding table, content table, etc. In the experiment, DOM technology is used to parse XML documents. The detailed resolution time about test XML documents is list in Table 6.

    Table 6.  Resolution time of XML documents.
    Number Dataset name size Depth Resolution time (sec)
    1
    2
    3
    4
    Nation.xml
    Ubid.xml
    Customer.xml
    Partsupp.xml
    5 KB
    20 KB
    504 KB
    2190 KB
    3
    5
    3
    3
    0.055664
    0.078755
    1.414248
    96.765422

     | Show Table
    DownLoad: CSV

    In this part, we also test and obtain the search time from the following aspects: (1) The query result tree is a single leaf node without any constraint condition. (2) The query result tree is the repeated sub tree without constraint condition. (3) The query result tree is a single leaf node with constraint condition. (4) The query result tree is the repeated sub tree with constraint condition.

    In this experiment, we compare matrix scheme with our polynomial scheme from the search time. In Table 7, XPath is used as the structured query language. 'Condition' column refers to the special condition of the query, as mentioned before the system has some conditional privilege, which is represent as the privilege access. In the procedure of test it is from different aspect and different position to test the efficiency.

    Table 7.  Search time of test XML documents.
    Number Dataset Name XPath Condition Matrix Method Search time(sec) Polynomial Method Search time(sec)
    1 Nation.xml T[10]
    T/N_COMMENT
    /table/T[5]/N_NAME
    /table/T[24]/N_REGIONKEY
    N
    N
    Y
    Y
    0.058062
    0.029287
    0.046891
    0.062530
    0.041907
    0.031675
    0.039087
    0.065283
    2 Ubid.xml memory
    /root/listing[10]
    /root/listing/auction_info
    /root/listing/item_info/description
    N
    Y
    Y
    N
    0.043862
    0.091287
    0.066891
    0.072532
    0.066235
    0.106812
    0.075690
    0.098834
    3 Customer.xml T[1500]
    T/C_COMMENT
    /table/T[0, 1000]/ C_ADDRESS
    /table/T[0, 100]/ MKTSEGMENT
    N
    Y
    N
    Y
    23.380162
    0.912387
    18.236891
    13.132530
    20.120132
    0.665601
    12.236891
    10.156790
    4 partsupp.xml T[4000]
    PS_COMMENT
    /table/T[0, 1200]/ PS_AVAILQTY
    /table/T[0, 8000]/ S_SUPPLYCOST
    N
    N
    Y
    Y
    75.238062
    21.491287
    40.236891
    55.132530
    70.897015
    16.569018
    35.345906
    50.098534

     | Show Table
    DownLoad: CSV

    From the experiment result, we can conclude that our polynomial scheme speeds up the search efficiency for the large XML document, especially with repeated structure in most cases, and it is convenient to find the corresponding information. Combined with the test document and the document's features, we can conclude that the number of leaf nodes and the structure of XML document have the greatest influence in query time, the result tree's position in XML document has greater influence, and the others' influence is relatively small. In some circumstance, the search condition also can cause a certain fluctuation for the execution efficiency.

    From the security standpoint, we compare and analyze the security degree from the structure security, content security and security authentication. In ViewAC scheme, it only considers to create different document for different purpose's user from the viewpoint of access security. It takes the document as a protection object, not considers the protection of structure and content, and not considers security authentication, so this scheme is coarse. In Matrix scheme, it separates the document's structure and content, and prevents the intruder's unauthorized access with a certain extent, but it lacks of security authentication. In polynomial scheme, it considers all the aspects including the structure security (creating the temporary access control view), content security (saving it in a confused table), and security authentication (adopting the polynomial to verify his identity). At the same time, the scheme skillfully adopt the polynomial to represent the authorization, it also can help the user verify his identity. The analysis and comparison about security degree is shown in Table 8.

    Table 8.  Comparison about security degree.
    Security Standpoint ViewAC Scheme Matrix Scheme Our Scheme
    Structure Security
    Content Security
    Security Authentication
    No consider
    No consider
    No consider
    Consider
    Consider
    No consier
    Consider
    Consider
    Consider

     | Show Table
    DownLoad: CSV

    From the security standpoint, we know that our polynomial scheme takes into account all kinds of security factors, it includes the authentication, structure security and content security, and a good access structure is established to achieve a certain degree of security.

    In this paper, we propose a new XML user authentication and authorization scheme. It uses the polynomial to indicate the user's authorization. On the other hand, this polynomial also is used to verify the user's identity to finish the authentication. Temporary access control matrix based on the global access control view and authorization polynomial can speed up the process of data access and ensure the access security. In the experiments, we test this scheme's storage costs, space compression ratio and execution efficiency, the experiment result shows that this scheme has low storage costs, low compression ratio and high execution performance.

    At present, almost all the schemes are based on the hypothesis that the database is running in a trusted server. With the development of cloud services, database service provider is no longer a fully trusted entity, even itself may be a potential enemy. In the face of non-absolute secure database server, it brings great challenges to traditional database protection method. Therefore, we still need to find another good data protection scheme and good search algorithms for XML document [36,37,38,39,40,41].

    This work was supported by the Innovation Funding of Nanjing Institute of Technology (No. CKJB201704), the Scientific Research Funding of Nanjing Institute of Technology (No. ZKJ201612), the National Natural Science Foundation of China (No. 61701221). The authors extend their appreciation to the Deanship of Scientific Research at King Saud University for funding this work through research group (No. RG-1441-331).

    The authors declare no conflict of interest.

    [1] ABC’s of FRP Materials, Automotive Composites Alliance, American Composites Manufacturers Association (2016) Available from: http://www.autocomposites.org/ composites101/abc.cfm.
    [2] Bledzki AK, Jaszkiewicz A (2010) Mechanical performance of biocomposites based on PLA and PHBV reinforced with natural fibres – A comparative study to PP. Compos Sci Technol 70: 1687–1696. doi: 10.1016/j.compscitech.2010.06.005
    [3] Hossain KMZ, Parsons AJ, Rudd CD (2014) Mechanical, crystallisation and moisture absorption properties of melt drawn polylactic acid fibres. Eur Polym J 53: 270–281. doi: 10.1016/j.eurpolymj.2014.02.001
    [4] Document on crystallization and drying of PLA, NatureWorks LLC, 2016. Available from: www.natureworksllc.com.
    [5] Oever MJAVD, Beck B, Müssig J (2010) Agrofibre reinforced poly(lactic acid) composites: Effect of moisture on degradation and mechanical properties. Compos Part A–Appl S 41: 1628–1635. doi: 10.1016/j.compositesa.2010.07.011
    [6] Penjumras P, Rahman RA, Talib RA (2015) Mechanical properties and water absorption behaviour of durian rind cellulose reinforced Poly(lactic acid) biocomposites. Int J Sci Engg Tech 5:343–349.
    [7] Ganster J, Fink HP, Pinnow M (2006) High-tenacity man-made cellulose fibre reinforced thermoplastics – injection moulding compounds with polypropylene and alternative matrices. Compos Part A–Appl S 37: 1796–1804.
    [8] Jonoobi M, Harun J, Mathew AP (2010) Mechanical properties of cellulose nanofiber (CNF) reinforced polylactic acid (PLA) prepared by twin screw extrusion. Compos Sci Technol 70: 1742–1747. doi: 10.1016/j.compscitech.2010.07.005
    [9] Sippola M, Immonen K, Miettinen A (2015) Predicting stiffness and strength of birch pulp- Polylactic acid composites. J Compos Mater.
    [10] Huda MS, Drzal LT, Misra M (2006) Wood–fiber-reinforced poly(lactic acid) composites: evaluation of the physicomechanical and morphological properties. J Appl Polym Sci 102: 4856–4869. doi: 10.1002/app.24829
    [11] Oksman K, Skrifvars M, Selin JF (2003) Natural fibres as reinforcement in polylactic acid (PLA) composites. Compos Sci Technol 63: 1317–1324. doi: 10.1016/S0266-3538(03)00103-9
    [12] Anuar H, Zuraida A, Fuad F (2010) Biodegradable PLA-Kenaf Fibre Biocomposite for Cleaner Environment. In: Malaysian Science and Technology Congress (MSTC 2010), Crystal Crown Hotel, Petaling Jaya, Malaysia.
    [13] Laxmeshwar SS, Viveka S, Madhu Kumar DJ, et al. (2012) Preparation and properties of composite films from modified cellulose fibre-reinforced with PLA. Der Pharma Chem 4: 159–168.
    [14] Fujiura T, Sakamoto K, Tanaka T (2015) A study on preparation and mechanical properties of long jute fiber reinforced polylactic acid by the injection molding process. In: Syngellakis S, Composites: Advances in Manufacture and Characterisation, WIT Transactions on State of the Art in Science and Engineering, WIT Press, 109–118.
    [15] Fu SY, Mai YW, Ching ECY (2002) Correction of the measurement of fiber length of short fiber reinforced thermoplastics. Compos Part A Appl S 33: 1549–1555. doi: 10.1016/S1359-835X(02)00114-8
    [16] Ariño R, Boldizar A (2013) Barrier screw compounding and mechanical properties of EEA copolymer and cellulose fiber composite. Int Polym Process XXVIII 4: 421–428.
    [17] Baillif ML, Oksman K (2009) The effect of processing on fiber dispersion, fiber length, and thermal degradation of bleached sulphite cellulose fiber polypropylene composites. J Thermoplast Compos Mater 22: 115–133. doi: 10.1177/0892705708091608
    [18] Peltola H, Pääkkönen E, Jetsu P (2014) Wood based PLA and PP composites: Effect of fibre type and matrix polymer on fibre morphology, dispersion and composite properties. Compos Part A–Appl S 61: 13–22. doi: 10.1016/j.compositesa.2014.02.002
    [19] Peltola H, Laatikainen E, Jetsu P (2011) Effects of physical treatment of wood fibres on fibre morphology and biocomposite properties. Plast Rubber Compos 40: 86–92. doi: 10.1179/174328911X12988622801016
    [20] Sykacek E, Hrabalova M, Frech H (2009) Extrusion of five biopolymers reinforced with increasing wood flour concentration on a production machine, injection moulding and mechanical performance. Compos Part A–Appl S 40: 1272–1282. doi: 10.1016/j.compositesa.2009.05.023
    [21] Peltola H, Madsen B, Joffe R (2011) Experimental study of fiber length and orientation in injection molded natural fiber/starch acetate composites. Adv Mater Sci Eng 891940: 1–7.
    [22] Barkoula NM, Garkhail SK, Peijs T (2010) Effect of compounding and injection molding on the mechanical properties of flax fiber polypropylene composites. J Reinf Plast Compos 29: 1366–1385. doi: 10.1177/0731684409104465
    [23] Karmarkar A, Chauhan SS, Modak JM (2007) Mechanical properties of wood–fiber reinforced polypropylene composites: effect of a novel compatibilizer with isocyanate functional group. Compos Part A–Appl S 38: 227–233. doi: 10.1016/j.compositesa.2006.05.005
    [24] Amash A, Zugenmaier P (2000) Morphology and properties of isotropic and oriented samples of cellulose fibre–polypropylene composites. Polymer 41: 1589–1596. doi: 10.1016/S0032-3861(99)00273-6
    [25] Stamboulis A, Baillie CA (2000) Environmental durability of flax fibres and their composites based on polypropylene matrix. Appl Compos Mater 7: 273–294. doi: 10.1023/A:1026581922221
    [26] Doan T, Gao S, Mäder E (2006) Jute/polypropylene composites I. Effect of matrix modification. Compos Sci Technol 66: 952–963.
    [27] Fernandes Diniz JMB, Gil MH, Castro JAAM (2004) Hornification – its origin and interpretation in wood pulps. Wood Sci Technol 37: 489–494. doi: 10.1007/s00226-003-0216-2
    [28] Smook GA (1990) Hornification (keyword), In: Wilde A, Handbook of pulp and paper terminology, Vancouver: Angus Wilde 135.
    [29] Minor JL (1994) Hornification – its origin and meaning. Progr Pap Recycling 3: 93–95.
    [30] Retulainen E, Martikainen P, Timofeev O (2015) Drying tension and shrinkage in paper and board: Part 1 Single ply sheets of chemical and mechanical furnishes. Appita J 68: 51–54.
    [31] Weise U (1997) Characterization and mechanisms of changes in wood pulp fibres caused by water removal. Acta Polytechnica Scandinavica, Chemical Technology Series No. 249, Laboratory of Paper Technology, Department of Forest Products Technology, Helsinki University of Technology, 1–141.
    [32] Herrera N, Mathew AP, Oksman K (2015) Plasticized polylactic acid/cellulose nanocomposites prepared using melt-extrusion and liquid feeding: mechanical, thermal and optical properties. Compos Sci Technol 106: 149–155.
    [33] Nikkilä M, Ture T (2014) Method and apparatus for the manufacturing of composite material. WO 2014/181036 A1.
    [34] Eshuis PG, van der Weele K, van der Meer D (2005) Granular Leidenfrost effect: Experiment and theory of floating particle clusters. Phys Rev Lett 95: 258001. doi: 10.1103/PhysRevLett.95.258001
    [35] Eshuis K, van der Weele D, van der Meer D, Lohse D (2005) The granular Leidenfrost effect, In: Garcia-Rojo R, Herrmann HJ, McNamara S, Powders and Grains, Leiden: Balkema Publication, 1155–1158.
    [36] Eshuis P, van der Weele K, van der Meer D (2007) Phase diagram of vertically shaken granular matter. Phys Fluids 19: 123301. doi: 10.1063/1.2815745
    [37] Eshuis P, van der Meer D, Alam M (2010) Onset of convection in strongly shaken granular matter. Phys Rev Lett 104: 038001. doi: 10.1103/PhysRevLett.104.038001
    [38] Masutani K, Kimura Y (2014) Chapter 1: PLA Synthesis. From the Monomer to the Polymer, In: Jiménez A, Peltzer M, Ruseckaite R, Poly(lactic acid) Science and Technology: Processing, Properties, Additives and Applications, RSC Polymer Chemistry Series No. 12, 1–36.
    [39] Garlotta D (2001) A Literature Review of Poly(Lactic Acid). J Polym Environ 9: 63–84. doi: 10.1023/A:1020200822435
    [40] Kuhasalo A, Niskanen J, Paltakari J (2000) Introduction to paper drying and principles and structure of a dryer section, In: Karlsson M, Papermaking Part 2: Drying, Papermaking Science and Technology Series 9, Fapet Oy, Helsinki, 16−53.
    [41] Reduced energy consumption in plastics engineering (2005) European benchmarking survey of energy. Available from: http://ec.europa.eu/energy/intelligent/projects/sites/iee-projects/files/ projects/documents/recipe_benchmarking_report.pdf.
  • Reader Comments
  • © 2016 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(9144) PDF downloads(1602) Cited by(18)

Figures and Tables

Figures(3)  /  Tables(4)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog