• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Access Control Policy Analysis and Access Denial Method for Cloud Services

    2013-07-14 01:20:16ChiLunLiu

    Chi-Lun Liu

    1. Introduction

    Cloud computing is an important trend in the Internet and computer technologies. In the emerging cloud computing model, servers can be dynamically provisioned and configured to deliver services in a scalable manner[1].In this model, personal applications and data are kept not only on the personal computers of users, but also in the cloud operated by a could computing service provider.Since cloud computing service providers rarely know their users in advance, assigning user roles in access control policies is difficult[2]. Therefore, developing a new access control mechanism for the new context of cloud computing is an important theoretical and practical issue.

    The business use of cloud computing has two essential characteristics: the payment status and service level agreement. The payment status can be defined as an accounting record of one stage in the payment process used by cloud providers. In practice, cloud computing access control models usually consider service accounting records of cloud computing providers[2]. Cloud computing service providers often use a pay-per-use strategy to charge service fees. In contrast, charges in the pay-per-use strategy are based on the quantity used[3]. The above discussion indicates that the payment status for service fees is important for cloud access control.

    A service level agreement (SLA) is a service contract that defines the level of service and controls the use of computing resources[2]. Cloud computing service providers generally use an SLA to guarantee the service level that the enterprise has committed to provide[3]. An SLA should also be considered in cloud computing access control models[2].

    To address cloud computing business characteristics and access control requirements, this work proposes an access control method based on the payment status and service level agreement for the personal data storage. The proposed access control method comprises policy and requirement metadata, policy analysis rules, and access denial rules. The proposed metadata reveal what information should be considered in the access control policy and specify the user requirements. For example, a policy metadata comprises four elements: the payment status, access permission, service level agreement, and cloud computing service. An example of an access control policy is: the paid (payment status) user can access (access permission) a 10 G (service level agreement) personal backup cloud service (cloud computing service). The proposed policy analysis rules reveal redundant or conflicting policies. The proposed access denial rules also inhibit illegal access requests.

    The theoretical foundation of the proposed access control method is the use of ontologies, which is the shared and explicit conceptualization of a domain knowledge structure[4], to provide semantic information needed to execute policy analysis and access denying rules.

    The rest of this paper is structured as follows. Section 2 discusses related works in access control. Section 3 introduces the proposed access control method and its use of metadata and rules. A scenario in Section 4 is used as an example of a personal backup service in cloud computing.Section 5 presents the evaluation of the proposed method.Section 6 discusses the implication of the proposed method from a managerial perspective. The final conclusion section summarizes the contribution of this study.

    2. Related Work

    Table 1 summarizes related works in the literature. Le et al.[5]proposed an access control method for a hospital ubiquitous information system, in which access is authorized according to user activities. Masoumzadeh and Joshi[6]used ontologies and policy rules to control access in online social networks. Hu et al.[7]used a semantic web technology to control cloud computing access. Zhu et al.[8]extended role-based access control (RBAC) to the cloud computing context. Ruj et al.[9]provided an attribute-based access control mechanism in the data storage cloud service.

    Most of the above access control methods focus on cloud computing. However, few of the methods in these works address the relationships between the payment issue and access control mechanism. Few works consider the service level issue as an important element in the access control methods. In contrast, although these methods usually apply ontologies, few existing methods discuss the policy conflict issue. Therefore, this work proposes an ontological access control method based on the payment status and service level agreement to address the above issues.

    3. Proposed Method

    Fig. 1 shows how the proposed access control method is used in a situation involving four actors and six steps,where the actors are the end user, administrator, access control server, and cloud. The six steps of the usage process of the access control method are as follows. In the first step,the end user requests the access control server to provide a specific cloud computing service. The access control server then applies policies for confirming whether the end user has the authority to use this cloud service according to the payment status and service level request in step 2. The policies are managed by the administrator. After confirming that the end user has the authority, the access control server performs step 3 and step 4 to request and acquire the required cloud resources. If the end user has no authority,steps 3 and 4 are skipped, and the access control server records service logs. The final step is service delivery to the end user.

    The proposed metadata have four core elements: the payment status, access permission, service level, and cloud.The metadata (Fig. 2) comprise two cloud policies and one user requirement. The proposed policy analysis rules (Table 2) are used to analyze the four relationships (RPS2-PS2,RAP1-AP2, RSL1-SL2, and RC1-C2) between access control policies ACP1and ACP2to identify conflicts and redundancies in the two policies. The other four relationships among the control policy ACP1and user requirement UR3are used by the proposed access denial rules (in Table 3) to deny and allow access. In Table 2 and Table 3, “∨” denotes “or”, Eq is “equal”, Ex is “exclusion”,K is “kind”, and A is “antonym”.

    Table 1: Related access control method

    Fig. 2. Metadata of paired access control policies and a user requirement.

    Table 2 summarizes the three proposed policy analysis rules for detecting conflicts and redundancies. These rules,which are developed according to the proposed metadata in Fig. 2, are described as follows.

    RulePA1: IF, an equality or kind relationship exists between payment status PS1and PS2; AND IF, an antonym relationship exists between access permission AP1and AP2;AND IF, an equality or kind relationship exists between service levels SL1and SL2; AND IF, an equality or kind relationship exists between clouds C1and C2; and THEN,access control policies ACP1and ACP2are in conflict.

    RulePA2: IF, an exclusion relationship exists between payment status PS1and PS2; AND IF, an equality or kind relationship exists between access permission AP1and AP2;AND IF, an equality or kind relationship exists between service levels SL1and SL2; AND IF, an equality or kind relationship exists between clouds C1and C2; and THEN,access control policies ACP1and ACP2are in conflict.

    RulePA3: IF, an equality or kind relationship exists between payment status PS1and PS2; AND IF, an equality relationship exists between access permission AP1and AP2;AND IF, an equality or kind relationship exists between service levels SL1and SL2; AND IF, an equality or kind relationship exists between clouds C1and C2; and THEN,access control policies ACP1and ACP2are redundant.

    Three rules based on the metadata in Fig. 2 are proposed to deny illegal access. These access denial rules are introduced as follows and summarized in Table 3.

    RuleAD1: IF, a quality or kind relationship exists between payment status PS1and PS3; AND IF, an access action AP3is an antonym of access permission AP1; AND IF, the required service level RSL3equals or is a kind of service level SL1; AND IF, cloud C3is equal to or a kind of cloud C1; and THEN, the user access is denied because the access control policy ACP1inhibits the user requirement UR3.

    RuleAD2: IF, an exclusion relationship exists between payment status PS1and PS3; AND IF, the access action AP3is equal to or a kind of access permission AP1; AND IF, the required service level RSL3equals or is a kind of service level SL1; AND IF, cloud C3is equal to or a kind of cloud C1; and THEN, the user access is denied because the access control policy ACP1excludes the user requirement UR3.

    RuleAD3: IF, an equality or kind relationship exists between payment status PS1and PS3; AND IF, the access action AP3is equal to or a kind of access permission AP1;AND IF, the required service level RSL3exceeds service level SL1; AND IF, the cloud C3is equal to or a kind of cloud C1; and THEN, the user access is denied because the user requirement UR3exceeds the service level limitation of access control policy ACP1.

    4. Cloud Service Data Backup Scenario

    The scenario used as an example in this section is a personal data backup service for cloud computing. This scenario involves four ontologies and six examples for each rule. These ontologies, which include payment status ontology, access permission and action ontology, service level ontology, and data backup service ontology, are depicted in Fig. 3 to Fig. 6.

    Table 3: Access denial rules

    Fig. 3. Payment status ontology.

    Fig. 4. Access permission and action ontology.

    Fig. 5. Service level ontology.

    Fig. 6. Data backup service ontology.

    The above ontologies (Fig. 3 to Fig. 6) and the metadata(Fig. 2) are applied in the following example of a data backup service to demonstrate and validate the proposed rules in Table 2 and Table 3. The example of RulePA1to RulePA3demonstrates the proposed policy analysis rules given in Table 2. In the RulePA1example, ACP1is “the unpaid (PS1) user can not access (AP1) any service level(SL1) personal data backup service (C1)”, and ACP2is “the unpaid (PS2) user can access (AP2) a 1 GB (SL2) personal data backup service (C2)”. Here, PS1equals PS2. Fig. 4 indicates that AP1(can not access) is an antonym of AP2(can access). Fig. 5 reveals that SL2(1 GB) can be any SL1(i.e., any service level). The C1equals C2. According to RulePA1in Table 2, ACP1and ACP2are in conflict.

    The example of RulePA2is a conflict between ACP1and ACP2. The ACP1is “only the paid (PS1) user can access(AP1) 10 GB (SL1) personal data backup service (C1)”. The ACP2is “the unpaid VIP (PS2) user can access (AP2) a 10 GB (SL2) personal data cloud service (C2)”. Fig. 3 shows that, in this case, PS1(only paid) excludes PS2(unpaid).The AP1equals AP2. SL1equals SL2. The C1and C2are the same service. According RulePA2in Table 2, ACP1and ACP2are in conflict.

    RulePA3example is a redundancy between two polices.The ACP1is “only the paid (PS1) user can access (AP1) a 10 GB (SL1) personal data backup service (C1)”. The ACP2is “the paid (PS2) user can upload data to (AP2) a 10 GB(SL2) personal data backup service (C2)”. Here, Fig. 3 indicates that a kind relationship exists between PS1and PS2and between AP1and AP2. Both SL1and SL2are 10 GB.The C1equals C2. According to RulePA3in Table 2, ACP1and ACP2are redundant policies.

    The examples of RuleAD1to RuleAD3demonstrate the proposed access denial rules shown in Table 3. The RuleAD1example shows why access by a user Jason (in Fig. 6) is inhibited by the policy. In this case, ACP1is “the unpaid(PS1) user cannot access (AP1) any service level (SL1)personal data backup service (C1)”. The UR3is “the unpaid(PS3) user Jason download data from (AP3) 10 GB (RSL3)Jason’s data backup service (C3)”. The UR3means “data downloaded by an unpaid user Jason from a 10 GB data backup service”. In the above situation, PS1 equals PS2.Fig. 4 shows that AP1 is an antonym of AP3. Fig. 5 reveals that RSL3 is a kind of SL1. Fig. 6 shows C3is a kind of C1.According to RuleAD1, the access is denied because the policy ACP1inhibits the UR3access.

    The RuleAD2example is a case of access exclusion. In this example, ACP1is “only paid (PS1) user can access(AP1) a 10 GB (SL1) personal data backup service (C1)”.The UR3is “a 30-day free trial (PS3) user, Alice, uploads data to (AP3) 10 GB (RSL3) Alice’s data backup service(C3)”. The UR3 means “30-day free trial for a user Alice to upload 10 GB of data to the data backup service”. Fig. 3 shows that PS3excludes PS1. Fig. 4 reveals that AP3is a kind of AP1. The SL1equals RSL3. Fig. 6 presents that C3is a kind of C1. According to RuleAD2, the user access is denied because the policy ACP1excludes UR3access.

    In the example of RuleAD3, the user requirement exceeds the agreed service level. The ACP1is “only the paid (PS1)user can access (AP1) 10 GB (SL1) personal data backup service (C1)”. The UR3is “a paid (PS3) user John uploads data to (AP3) 15 GB (RSL3) John’s data backup service(C3)”. The PS1(only paid) is a kind of PS3(paid) in Fig. 3.The AP3is a kind of AP1in Fig. 4. RSL3exceeds SL1.Additionally, C3is a kind of C1. According to RuleAD3, the access is denied due to the service level excess problem.

    5. Method Evaluation

    The “service level” and “cloud” are two important classifications of cloud objects. The proposed method classifies objects according to the service “l(fā)evel” and“cloud”. The first formula calculates the object concept number of the proposed method:

    The RBAC mechanism only uses “object” to represent the controlled resource. The RBAC mechanism does not consider the “service level”. A cloud might have several service levels, and a set of service levels might be applied in a set of clouds. The second formula for calculating object concept number in RBAC is

    The following example shows how (1) is applied. In group 1, four service levels are used to describe three clouds. In group 2, two service levels are used to describe another cloud. The three clouds in group 1 are the data backup service, personal computer (PC) data backup service, and mobile device data backup service. The four service levels in group 1 are any service level, 1 GB, 10 GB,and 15 GB. The cloud in group 2 is a game service. Two service levels for the game service in group 2 are the general version and professional version. According to (1),the object concept number of the proposed method is

    Num(Proposed_Method_Object)=(3+4)+(1+2)=10.

    If RBAC is applied in the above example, group 1 needs twelve object concepts and group 2 needs two object concepts. The twelve object concepts in group 1 are “any service level-data backup service”, “1 GB-data backup service”, “10 GB-data backup service”, “15 GB-data backup service”, “any service level-PC data backup service”, “1 GB-PC data backup service”, “10 GB-PC data backup service”, “15 GB-PC data backup service”, “any service level-mobile device data backup service”, “1 GB-mobile device data backup service”, “10 GB-mobile device data backup service”, and “15 GB-mobile device data backup service”. The two object concepts in group 2 are the “general version-game service” and “professional version-game service”. According to (2), the object concept number in RBAC is

    According to the above two formulas and their examples, the proposed method obtains fewer cloud objects compared with RBAC both in term of Num(Cloud(i)) and Num(Service_Level(i))≥2.

    6. Managerial Implications

    The above discussion has three managerial implications for the information systems and marketing departments of cloud service enterprises:

    1) Assigning a specific service level for each customer type is convenient because the proposed access method classifies customers according to the service level and payment status. Cloud service providers can use the proposed method to maintain access control polices used to assign service levels to customers according to payment status.

    2) Access control policies are intuitively aligned with marketing strategies because the proposed method uses payment status and service level based policies to control access. Cloud services are often marketed at different prices and service levels. Therefore, the proposed method intuitively applies the optimal marketing strategy for cloud service providers.

    3) The method alleviates policy conflicts and redundancies because it provides rules for detecting conflicts and redundancies between access control policies.Therefore, it can decrease the cost of managing policy conflicts and redundancy problems.

    7. Conclusions

    The novel approach of the proposed algorithm is based on the ontology theory from both billing and contract perspectives. One theoretical contribution of the method is the application of ontologies to new phenomena. This work proposes an innovative theoretical set of rules for policy analysis and access denial. The practical contribution of the proposed method is to support billing and contract matters,which are essential elements in the cloud computing business model. The proposed method can facilitate cloud service providers in controlling user access according the account receivable, received payment, and agreed service level.

    [1] S. Paquette, P. T. Jaeger, and S. C. Wilson, “Identifying the security risks associated with governmental use of cloud computing,” Government Information Quarterly, vol. 27, no.3, pp. 245-253, 2010.

    [2] H. Takabi, J. B. D. Joshi, and G. J. Ahn, “Security and privacy challenges in cloud computing environments,” IEEE Security & Privacy, vol. 8, no. 6, pp. 24-31, 2010.

    [3] D. Durkee, “Why cloud computing will never be free,”Communications of the ACM, vol. 53, no. 5, pp. 62-69, May 2010.

    [4] M. Gruninger and J. Lee, “Ontology: applications and design,” Communications of the ACM, vol. 45, no. 2, pp.39-56, Feb. 2002.

    [5] X.-H. Le, S. Lee, Y.-K. Lee, H. Lee, M. Khalid, and R.Sankar, “Activity-oriented access control to ubiquitous hospital information and service,” Information Sciences, vol.180, no. 16, pp. 2979-2990, Aug. 2010.

    [6] A. Masoumzadeh and J. Joshi, “OSNAC: an ontology-based access control model for social networking systems,” in Proc. of the IEEE Int. Conf. on Social Computing/IEEE Int.Conf. on Privacy, Security, Risk and Trust, Minneapolis,2010, pp. 751-759,.

    [7] L. Hu, S. Ying, X. Jia, and K. Zhao, “Toward an approach of semantic access control for cloud computing,” Lecture Notes in Computer Science, vol. 5931, pp. 145-156, Dec. 2009.

    [8] T. Zhu, W. Liu, and J. Song, “An efficient role based access control system for cloud computing,” in Proc. of the 11th Int.Conf. on Computer and Information Technology, Beijing,2011, pp. 97-102.

    [9] S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: distributed access control in clouds,” in Proc. of IEEE the 10th Int.Conf. on Trust, Security and Privacy in Computing and Communications, Changsha, 2011, pp. 91-98.

    成人18禁高潮啪啪吃奶动态图| 国产精品九九99| 99国产精品一区二区三区| 50天的宝宝边吃奶边哭怎么回事| 免费看十八禁软件| 免费看a级黄色片| 男女那种视频在线观看| 久久中文字幕一级| 嫁个100分男人电影在线观看| 香蕉国产在线看| 日韩大尺度精品在线看网址| 国产精品av久久久久免费| 91九色精品人成在线观看| av有码第一页| 欧美日本视频| 亚洲av日韩精品久久久久久密| 一本综合久久免费| 在线永久观看黄色视频| 久久人妻av系列| 久久久久久久午夜电影| 日本熟妇午夜| 欧美日韩福利视频一区二区| 久久香蕉国产精品| 身体一侧抽搐| 观看免费一级毛片| 99在线视频只有这里精品首页| www日本黄色视频网| 看黄色毛片网站| 欧美日韩福利视频一区二区| 亚洲av美国av| 国产精品亚洲美女久久久| 99国产综合亚洲精品| 国产精品av久久久久免费| 一卡2卡三卡四卡精品乱码亚洲| 在线观看美女被高潮喷水网站 | 婷婷亚洲欧美| 两性午夜刺激爽爽歪歪视频在线观看 | av福利片在线观看| 亚洲国产精品999在线| 亚洲av成人av| 亚洲成a人片在线一区二区| 白带黄色成豆腐渣| 久久久久久久午夜电影| 欧美丝袜亚洲另类 | 中文字幕久久专区| www.999成人在线观看| 又黄又粗又硬又大视频| 99国产极品粉嫩在线观看| 久久久久久大精品| 亚洲国产中文字幕在线视频| 午夜影院日韩av| 欧美黑人巨大hd| 看片在线看免费视频| 国产精品av视频在线免费观看| 婷婷丁香在线五月| 可以在线观看毛片的网站| 久久久国产精品麻豆| av国产免费在线观看| 天天一区二区日本电影三级| 亚洲av中文字字幕乱码综合| 久久久久精品国产欧美久久久| 国产精品一及| 99久久久亚洲精品蜜臀av| 国产免费男女视频| 少妇的丰满在线观看| 18禁裸乳无遮挡免费网站照片| 丁香六月欧美| 国产亚洲精品久久久久5区| 村上凉子中文字幕在线| 熟女少妇亚洲综合色aaa.| 国产亚洲精品久久久久5区| 无遮挡黄片免费观看| 特级一级黄色大片| 麻豆成人午夜福利视频| 色综合站精品国产| 久久久久亚洲av毛片大全| 91在线观看av| 精品欧美国产一区二区三| 欧洲精品卡2卡3卡4卡5卡区| 国产91精品成人一区二区三区| 精品国产亚洲在线| 色综合欧美亚洲国产小说| 99久久综合精品五月天人人| 午夜免费激情av| 亚洲熟妇中文字幕五十中出| 国产亚洲av高清不卡| 波多野结衣巨乳人妻| 国产又黄又爽又无遮挡在线| 99精品久久久久人妻精品| 久久午夜亚洲精品久久| 欧美黄色片欧美黄色片| 一进一出好大好爽视频| 一进一出好大好爽视频| 婷婷六月久久综合丁香| avwww免费| 午夜免费观看网址| 他把我摸到了高潮在线观看| 国产av一区二区精品久久| 日韩欧美一区二区三区在线观看| 色噜噜av男人的天堂激情| 日韩欧美国产一区二区入口| 婷婷精品国产亚洲av在线| 国内少妇人妻偷人精品xxx网站 | 丰满人妻熟妇乱又伦精品不卡| 亚洲av电影不卡..在线观看| 久久香蕉激情| 国产成人av教育| 女警被强在线播放| 国产精品自产拍在线观看55亚洲| 又黄又爽又免费观看的视频| aaaaa片日本免费| 琪琪午夜伦伦电影理论片6080| 伊人久久大香线蕉亚洲五| 黄色毛片三级朝国网站| 麻豆成人午夜福利视频| 亚洲性夜色夜夜综合| 91字幕亚洲| 一本大道久久a久久精品| 午夜精品一区二区三区免费看| 美女 人体艺术 gogo| 91成年电影在线观看| 亚洲精品在线观看二区| 成人三级黄色视频| 国产1区2区3区精品| 欧美+亚洲+日韩+国产| 国产精品久久久久久久电影 | 久久精品人妻少妇| 又紧又爽又黄一区二区| 黑人巨大精品欧美一区二区mp4| 悠悠久久av| 欧美日本亚洲视频在线播放| 久久亚洲精品不卡| 亚洲成人中文字幕在线播放| 久久天堂一区二区三区四区| 亚洲精品色激情综合| 最近最新免费中文字幕在线| 久久久久国产一级毛片高清牌| 久久精品成人免费网站| 两个人视频免费观看高清| 久久天躁狠狠躁夜夜2o2o| 久久精品成人免费网站| 禁无遮挡网站| 国产欧美日韩一区二区精品| 精品熟女少妇八av免费久了| 夜夜夜夜夜久久久久| 人妻久久中文字幕网| 国产亚洲精品久久久久久毛片| 看黄色毛片网站| netflix在线观看网站| 熟妇人妻久久中文字幕3abv| 757午夜福利合集在线观看| 小说图片视频综合网站| 欧美成人午夜精品| 国产99白浆流出| 欧美+亚洲+日韩+国产| 日韩欧美精品v在线| 亚洲激情在线av| 天堂√8在线中文| 久久中文字幕一级| 亚洲精品久久国产高清桃花| 亚洲五月婷婷丁香| 日本撒尿小便嘘嘘汇集6| 国产精品亚洲av一区麻豆| 91麻豆av在线| 亚洲国产中文字幕在线视频| 91大片在线观看| 亚洲av片天天在线观看| 久久久久国产精品人妻aⅴ院| 无限看片的www在线观看| 欧美精品啪啪一区二区三区| 亚洲精品一卡2卡三卡4卡5卡| 久久久久久九九精品二区国产 | 国产午夜精品久久久久久| 中文字幕人妻丝袜一区二区| 国产精品九九99| 亚洲国产精品成人综合色| 久久午夜亚洲精品久久| 亚洲一区高清亚洲精品| 丰满人妻熟妇乱又伦精品不卡| 黄色a级毛片大全视频| 中文字幕av在线有码专区| 99热这里只有是精品50| 中文字幕久久专区| 欧美乱色亚洲激情| 久久久久久免费高清国产稀缺| 午夜视频精品福利| 亚洲美女黄片视频| 最好的美女福利视频网| 日韩欧美一区二区三区在线观看| 极品教师在线免费播放| 午夜精品在线福利| 免费在线观看成人毛片| 久久伊人香网站| 男男h啪啪无遮挡| 亚洲va日本ⅴa欧美va伊人久久| 国产99白浆流出| 久久精品aⅴ一区二区三区四区| 十八禁网站免费在线| 亚洲精品中文字幕一二三四区| 日本一二三区视频观看| 欧美另类亚洲清纯唯美| 亚洲在线自拍视频| 亚洲欧美日韩东京热| 亚洲专区中文字幕在线| 久久99热这里只有精品18| 男女床上黄色一级片免费看| 久久精品国产亚洲av高清一级| 好男人在线观看高清免费视频| 国产单亲对白刺激| 亚洲人成网站高清观看| 亚洲午夜精品一区,二区,三区| 久久欧美精品欧美久久欧美| 欧美黄色片欧美黄色片| 啪啪无遮挡十八禁网站| 欧美色欧美亚洲另类二区| 国产片内射在线| 国产成+人综合+亚洲专区| 久久婷婷成人综合色麻豆| 亚洲国产精品999在线| 久久久水蜜桃国产精品网| 亚洲精品久久国产高清桃花| 精品午夜福利视频在线观看一区| 日日摸夜夜添夜夜添小说| 在线观看66精品国产| 亚洲 国产 在线| 最好的美女福利视频网| 中文字幕人成人乱码亚洲影| 亚洲av电影在线进入| 麻豆成人午夜福利视频| 国产精品永久免费网站| 久久久久国产精品人妻aⅴ院| 欧美+亚洲+日韩+国产| 天堂动漫精品| 亚洲国产精品成人综合色| 欧美丝袜亚洲另类 | 午夜影院日韩av| 亚洲激情在线av| 这个男人来自地球电影免费观看| 欧美另类亚洲清纯唯美| 欧美绝顶高潮抽搐喷水| 国产精品亚洲一级av第二区| 在线观看一区二区三区| 少妇裸体淫交视频免费看高清 | 国产成人av教育| 欧美一级a爱片免费观看看 | 日本免费a在线| 一边摸一边抽搐一进一小说| 校园春色视频在线观看| 欧美久久黑人一区二区| 久久国产精品影院| 欧美午夜高清在线| 国产av在哪里看| 久久香蕉国产精品| 精品久久久久久久末码| 午夜福利成人在线免费观看| 欧美 亚洲 国产 日韩一| 亚洲精品一区av在线观看| videosex国产| 丝袜人妻中文字幕| 午夜福利成人在线免费观看| 一级毛片高清免费大全| 久久久久久亚洲精品国产蜜桃av| 国产精品 国内视频| 91国产中文字幕| 欧美日韩一级在线毛片| 高清在线国产一区| 手机成人av网站| 日韩欧美精品v在线| 我要搜黄色片| 日韩有码中文字幕| 国产成人av激情在线播放| 一级黄色大片毛片| 日韩精品免费视频一区二区三区| 黄色视频,在线免费观看| 欧美人与性动交α欧美精品济南到| √禁漫天堂资源中文www| 国语自产精品视频在线第100页| 国产男靠女视频免费网站| 国产精品av久久久久免费| 很黄的视频免费| 日日摸夜夜添夜夜添小说| 久久欧美精品欧美久久欧美| 一个人免费在线观看的高清视频| 桃色一区二区三区在线观看| 亚洲成av人片在线播放无| 久久久久久免费高清国产稀缺| 亚洲熟妇中文字幕五十中出| 丝袜人妻中文字幕| 午夜成年电影在线免费观看| 欧美精品啪啪一区二区三区| 搡老岳熟女国产| 欧美成人性av电影在线观看| 亚洲欧美精品综合久久99| 男男h啪啪无遮挡| 国产野战对白在线观看| 久久精品国产亚洲av高清一级| 可以免费在线观看a视频的电影网站| 激情在线观看视频在线高清| 国产爱豆传媒在线观看 | 精品久久久久久成人av| 精品福利观看| 18禁黄网站禁片免费观看直播| 在线观看美女被高潮喷水网站 | 在线观看美女被高潮喷水网站 | 母亲3免费完整高清在线观看| 可以免费在线观看a视频的电影网站| 亚洲国产精品合色在线| www日本黄色视频网| 成人午夜高清在线视频| 亚洲avbb在线观看| 婷婷亚洲欧美| 男女做爰动态图高潮gif福利片| 久久久久国内视频| xxx96com| 在线a可以看的网站| 日韩欧美一区二区三区在线观看| 嫁个100分男人电影在线观看| 国产在线精品亚洲第一网站| 老汉色∧v一级毛片| 九九热线精品视视频播放| 亚洲欧美精品综合久久99| 亚洲专区国产一区二区| 香蕉av资源在线| 欧美人与性动交α欧美精品济南到| 国产亚洲精品av在线| 丁香欧美五月| 夜夜爽天天搞| 久久久精品大字幕| 欧美又色又爽又黄视频| 日韩三级视频一区二区三区| 欧美乱妇无乱码| 国产69精品久久久久777片 | 91九色精品人成在线观看| 麻豆久久精品国产亚洲av| 精品人妻1区二区| 大型av网站在线播放| 精品熟女少妇八av免费久了| 精品久久久久久久久久免费视频| 黄色 视频免费看| 国产一区二区在线av高清观看| 18禁黄网站禁片午夜丰满| 啦啦啦观看免费观看视频高清| 波多野结衣高清无吗| 少妇裸体淫交视频免费看高清 | 99国产精品99久久久久| 久久欧美精品欧美久久欧美| 国产成人精品无人区| 成人18禁高潮啪啪吃奶动态图| 熟女电影av网| АⅤ资源中文在线天堂| 亚洲色图 男人天堂 中文字幕| 久久精品亚洲精品国产色婷小说| 美女午夜性视频免费| 久久精品91无色码中文字幕| 夜夜躁狠狠躁天天躁| 国产男靠女视频免费网站| 国产精品久久久久久人妻精品电影| 亚洲欧美激情综合另类| 国产精品乱码一区二三区的特点| 久久婷婷人人爽人人干人人爱| 午夜精品在线福利| 中文字幕av在线有码专区| 午夜a级毛片| 亚洲成av人片免费观看| 人人妻人人看人人澡| 亚洲乱码一区二区免费版| 人成视频在线观看免费观看| 精品第一国产精品| av中文乱码字幕在线| 亚洲av熟女| 可以在线观看毛片的网站| 婷婷精品国产亚洲av在线| 精品日产1卡2卡| 在线观看免费视频日本深夜| 日韩欧美三级三区| e午夜精品久久久久久久| 久久精品91蜜桃| 中文字幕熟女人妻在线| 日韩欧美在线二视频| 日本黄大片高清| 俄罗斯特黄特色一大片| 国产精品永久免费网站| 国内少妇人妻偷人精品xxx网站 | 一个人免费在线观看电影 | 男女那种视频在线观看| 成人国产一区最新在线观看| 国产一区二区三区在线臀色熟女| 99热这里只有精品一区 | 99久久99久久久精品蜜桃| 欧美黄色片欧美黄色片| 国产区一区二久久| 在线观看www视频免费| 亚洲无线在线观看| 久久伊人香网站| 亚洲全国av大片| 亚洲av熟女| 看片在线看免费视频| 欧美av亚洲av综合av国产av| 1024视频免费在线观看| 在线观看午夜福利视频| 天堂影院成人在线观看| 国产精品免费视频内射| 18禁国产床啪视频网站| 夜夜夜夜夜久久久久| 欧美激情久久久久久爽电影| 欧美一区二区精品小视频在线| 18禁国产床啪视频网站| 欧美性猛交╳xxx乱大交人| 欧美日韩福利视频一区二区| 人妻久久中文字幕网| 国产激情欧美一区二区| 一区二区三区激情视频| 午夜免费观看网址| 69av精品久久久久久| 免费在线观看成人毛片| 麻豆一二三区av精品| 午夜福利高清视频| 亚洲精品粉嫩美女一区| 欧美成人一区二区免费高清观看 | 国产三级在线视频| 亚洲精品国产精品久久久不卡| 午夜精品在线福利| 啦啦啦观看免费观看视频高清| 国产一级毛片七仙女欲春2| 99久久无色码亚洲精品果冻| 国产亚洲精品av在线| videosex国产| 国产精品永久免费网站| 欧美又色又爽又黄视频| 一本一本综合久久| 一二三四在线观看免费中文在| 亚洲精品粉嫩美女一区| 中文字幕最新亚洲高清| 久久久国产欧美日韩av| 久久久久国内视频| 香蕉久久夜色| 久久精品综合一区二区三区| 国产aⅴ精品一区二区三区波| 午夜福利欧美成人| 真人一进一出gif抽搐免费| 国产精品99久久99久久久不卡| 久久中文字幕人妻熟女| 91老司机精品| 日韩成人在线观看一区二区三区| 国产av又大| 精品福利观看| 九九热线精品视视频播放| 两个人看的免费小视频| 欧美在线黄色| 久99久视频精品免费| 岛国在线观看网站| 日韩三级视频一区二区三区| 久久久久精品国产欧美久久久| 日韩精品青青久久久久久| 亚洲午夜精品一区,二区,三区| videosex国产| 国产aⅴ精品一区二区三区波| 无遮挡黄片免费观看| 精品欧美国产一区二区三| 欧美日韩瑟瑟在线播放| 亚洲精品国产精品久久久不卡| 最新美女视频免费是黄的| 美女午夜性视频免费| 免费在线观看亚洲国产| 老汉色∧v一级毛片| 欧美久久黑人一区二区| 国产三级在线视频| 欧美日韩一级在线毛片| 亚洲成人免费电影在线观看| 国产精品久久久久久人妻精品电影| 色综合婷婷激情| 国产av不卡久久| 高清在线国产一区| 日韩成人在线观看一区二区三区| 欧美日韩一级在线毛片| 亚洲av五月六月丁香网| 国产精品av久久久久免费| 可以在线观看毛片的网站| 久久中文看片网| 人妻久久中文字幕网| 女人高潮潮喷娇喘18禁视频| av福利片在线| 999久久久精品免费观看国产| 亚洲精华国产精华精| 国产精品亚洲美女久久久| 国产三级黄色录像| 久久人妻av系列| 日韩欧美国产一区二区入口| 国产欧美日韩一区二区精品| 久久久久久免费高清国产稀缺| 久久久精品欧美日韩精品| 国产av麻豆久久久久久久| 美女黄网站色视频| 午夜久久久久精精品| 日韩精品免费视频一区二区三区| e午夜精品久久久久久久| 12—13女人毛片做爰片一| 青草久久国产| 欧美绝顶高潮抽搐喷水| 日本a在线网址| 欧美日本视频| 女生性感内裤真人,穿戴方法视频| 黑人欧美特级aaaaaa片| 色噜噜av男人的天堂激情| av片东京热男人的天堂| 亚洲专区中文字幕在线| 可以在线观看的亚洲视频| 日本黄大片高清| 国产av又大| 999精品在线视频| 成人手机av| 女人爽到高潮嗷嗷叫在线视频| 久久久国产精品麻豆| 日本一本二区三区精品| 久久精品人妻少妇| 麻豆成人午夜福利视频| 老司机靠b影院| 久久香蕉激情| 午夜福利高清视频| 在线观看免费午夜福利视频| 欧美日韩黄片免| 免费搜索国产男女视频| 欧美激情久久久久久爽电影| 51午夜福利影视在线观看| 日韩国内少妇激情av| 岛国在线免费视频观看| 91九色精品人成在线观看| 亚洲性夜色夜夜综合| 91九色精品人成在线观看| 国产精品精品国产色婷婷| 在线观看舔阴道视频| 俄罗斯特黄特色一大片| 国产亚洲精品一区二区www| 在线观看美女被高潮喷水网站 | www.精华液| 少妇人妻一区二区三区视频| 欧美3d第一页| 美女免费视频网站| 国产精品美女特级片免费视频播放器 | 久久精品国产亚洲av高清一级| 一本综合久久免费| 国内毛片毛片毛片毛片毛片| 免费在线观看视频国产中文字幕亚洲| 十八禁网站免费在线| 夜夜躁狠狠躁天天躁| 国产一区二区激情短视频| 99热这里只有是精品50| 免费在线观看完整版高清| 一本精品99久久精品77| 一进一出好大好爽视频| 在线播放国产精品三级| 欧美午夜高清在线| 精品第一国产精品| 岛国视频午夜一区免费看| 亚洲欧美日韩高清在线视频| 九色成人免费人妻av| 色综合婷婷激情| 制服丝袜大香蕉在线| www日本在线高清视频| 99国产精品一区二区蜜桃av| 午夜激情av网站| 国产精品 国内视频| 国产亚洲精品久久久久久毛片| 成人手机av| 成人av一区二区三区在线看| 18禁黄网站禁片午夜丰满| 18禁观看日本| 女人被狂操c到高潮| 欧美在线黄色| 欧美大码av| 麻豆国产97在线/欧美 | 精品电影一区二区在线| 成人av在线播放网站| 国产精品电影一区二区三区| 国产亚洲精品第一综合不卡| 精品一区二区三区四区五区乱码| 国产高清视频在线播放一区| 别揉我奶头~嗯~啊~动态视频| 久久精品人妻少妇| 欧美丝袜亚洲另类 | 人妻久久中文字幕网| 99久久精品热视频| 50天的宝宝边吃奶边哭怎么回事| 九色成人免费人妻av| 亚洲中文日韩欧美视频| 久久久久久大精品| 在线国产一区二区在线| 久久中文字幕一级| 欧美精品啪啪一区二区三区| 免费看十八禁软件| 人妻夜夜爽99麻豆av| 操出白浆在线播放| 亚洲自拍偷在线| svipshipincom国产片| 亚洲av美国av| 丁香六月欧美| 日本免费a在线| 国产精品一区二区精品视频观看| 欧美乱妇无乱码| 亚洲 欧美 日韩 在线 免费| 国产真实乱freesex| 欧美日本亚洲视频在线播放| 欧美一级毛片孕妇| 草草在线视频免费看| 最新美女视频免费是黄的| 欧美一区二区国产精品久久精品 | 国产亚洲精品第一综合不卡| 一卡2卡三卡四卡精品乱码亚洲| 欧美黑人精品巨大| www.熟女人妻精品国产| 亚洲精品色激情综合| 成人欧美大片| 久久人妻福利社区极品人妻图片| 超碰成人久久| 一个人观看的视频www高清免费观看 |