• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Security analysis of access control model in hybrid cloud based on security entropy①

    2015-04-17 05:45:03CheTianwei車天偉
    High Technology Letters 2015年2期

    Che Tianwei (車天偉)

    (*The School of Computer Science and Technology, Xidian University, Xi’an 710071, P.R.China)(**The School of Computer Science and Technology , Northwestern Polytechnical University, Xi’an 710129, P.R.China)(***The PLA information Engineering University, Zhengzhou 450001, P.R.China)

    ?

    Security analysis of access control model in hybrid cloud based on security entropy①

    Che Tianwei (車天偉)②

    (*The School of Computer Science and Technology, Xidian University, Xi’an 710071, P.R.China)(**The School of Computer Science and Technology , Northwestern Polytechnical University, Xi’an 710129, P.R.China)(***The PLA information Engineering University, Zhengzhou 450001, P.R.China)

    To resolve the problem of quantitative analysis in hybrid cloud, a quantitative analysis method, which is based on the security entropy, is proposed. Firstly, according to the information theory, the security entropy is put forward to calculate the uncertainty of the system’s determinations on the irregular access behaviors. Secondly, based on the security entropy, security theorems of hybrid cloud are defined. Finally, typical access control models are analyzed by the method, the method’s practicability is validated, and security and applicability of these models are compared. Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.

    hybrid cloud, security entropy, classificatory access control model, directly unauthorized access, right about access, indirectly unauthorized access

    0 Introduction

    The key to access control model security proof is to find a recognized and self-evident security axiom, and then based on this security axiom, to deduce, or prove the security assumptions proposed in the model by means of this security axiom, so as to make it more reliable. However, even the proven Bell-La Padula(BLP) model[1,2]can’t prove the rationality, completeness and safety of “simple security axiom” and “ *-property axiom” that it proposed. So, some scholars point out that the security axioms in BLP cannot completely prove the security of BLP[3]. A complete access control model must clearly tell us which security requirements should be met, which access violation would be prevented, and how to reduce and prove the uncertainty of the access violation that the hybrid cloud allows.

    Entropy is a tool of measuring uncertainty, which was originally used in thermodynamics. Shannon introduces it to the information theory, and puts forward the concept of information entropy for disordered degree of information[4]. Since the information entropy theory is proposed, it has been applied in many fields such as engineering science and social science. Some scholars have successfully introduced it into the quantification analysis of information security risk and event uncertainty[5-7].

    This study, based on the thought and method that information entropy measures the uncertainty of things, puts forward the concept of security entropy, and by means of it, measures the uncertainty of system’s response to access violations, which provides a scientific quantitative method for the safety analysis of classificatory access control model.

    1 security entropy

    Clouds and large data have become the mainstream mode of service to enhance customer service quality, this service model is facing some security risks such as loss and leakage of user data. In order to meet the access control demand for cloud services, especially the access control requirement for multi-level cloud services to coexist user data of different grades and categories of cloud services at the same time, the access control should be able to support different security strength and support the joint control of different intensities between access control models, which is different from the traditional access control method. A quantitative method is presented for security requirements and security access control model assessment to meet the needs of multi-level cloud security assessment service access control model.

    1.1 Definition of security entropy

    In the cloud system, when a user sends an access request, the system will respond: to allow or to deny. And this response is the only one. To allow or to deny should not appear simultaneously. In addition, the access request is divided into two types: legal request and illegal request. If the system is seen as a black box, the system will give four kinds of response to user’s each access request, that is, “allow legall access”、“refuse legall access”、“allow access violation” and “refuse access violation”. Obviously, the response can be considered as a basis for judging if a system is good or bad. The more the denial responses to legitimate access gets, the poorer the system availability is. The more the allowable responses to violation access gets, the worse the system’s confidentiality is.

    In order to comprehensively measure the uncertainty of system’s response to various access requests, the security entropy is defined as follows:

    Definition 1(security entropy) : If a group of access request B=b1,b2,…,bqis seen as the input, the system’s request responses to each access result as the object of study, and variable X as this response results, then the value of X will be :to allow legitimate access, to deny legitimate access, to allow illegal access, and to deny illegal access, which is recorded as a1,a2,a3,a4respectively. If Symbol p(ai) stands for the statistical probability of ai, the probability space [X, p(X=ai)] of X will be

    Assigning weight wi, the impact factor of the system security, for each response result, the greater wiis, the higher the ai‘s influence to system safety is, otherwise the smaller the ai‘s influence is. If the distribution of wiis

    the security entropy of X will be

    (1)

    1.2 The meaning of safety entropy

    According to the common sense of information security, response a2gives negative effects on the usability of the system, and response a3gives negative effects on the confidentiality of the system, while response a1and a4have less influence on system security. Therefore, if we let w2, w3w1, w4, the meaning of safety entropy in Eq.(1) is the average uncertainty of the happened harmful responses. The bigger the value of security entropy is, the more the harmful response uncertainty is; the smaller the value of security entropy is, the less the response uncertainty is. As for the same set of access request, the smaller the security entropy of different access control model is, the less the possibility that model makes harmful response is.

    If w2>0,w3>0,w1=w4=0, and w2+w3=1, security entropy is the ground on which the system satisfies usability and confidentiality. If w2=1,w3=w1=w4=0, security entropy of Eq.(1) will be the ground on which the system satisfies usability. If w3=1,w1=w2=w4=0, security entropy of Eq.(1) will be the ground on which the system satisfies confidentiality.

    The number of the four responses is related to the number of input samples. If all input samples are legitimate accesses, a3and a4will be 0, and if all input samples are illegal access, a1and a2will be 0.In order to make the safety entropy reflect the system security accurately, the input samples must be complete. In addition, the responses are related to the number of input samples. If an input number of the access request is much more than others, the response will be distorted

    Therefore, when security entropy is calculated, the input samples (access requests) must be complete and its probability distribution must be uniform.

    The smaller the security entropy is, the less uncertainty of the harmful response that system does is, the more the security of the model is. When the security entropy approaches 0, then the model will achieve the theoretical security.

    1.3 Security entropy of different types of illegal accesses

    Whether an access is illegal is related to security requirements. According to the access control requirements in national grade of protection standard GB17859-1999[8], illegal access can be classified into three types: directly illegal access, right about access, and indirectly illegal access. The directly illegal access refers to explicitly violating the authorized strategy such as the access control matrix and so on.

    The right about access refers to the one which leads to violating information flow direction that the system stipulates, in other word, the one which leads information flow from high class to low class. The indirectly illegal access refers to the one that violates the authorized strategy through information indirect transmission.

    For instance, there are two users(s1、s2) and two resourses (o1、o2) in the hybrid cloud, and the relationship of security level is f(s1)?f(s2)?f(o1)=f(o2), the authorized strategy of the system is that “s1 read o2”, “s2 read o1”, “s2 write o2”.

    Let us see the following four events: b1: s2 read o1,b2: s2 write o2,b3:s1 read o2,b4:s1 read o1.Because b4 explicitly violates the authorized strategy, b4 is therefore directly illegal access, and the sequence of access b1b2b3 causes the information to flow from s1 into o1, which equals that s1 read o1 indirectly. Therefore b1b2b3 is indirectly illegal access. b1 and b3 cause the information flowing to the violation of the direction made by the system, so b1 and b3 are right about access.

    For the different types of illegal access, the meaning of Eq.(1) is different. If the illegal access is defined as “directly illegal access”, the security entropy of Eq.(1) is called “direct security entropy” recorded as HD(X).

    Again, if the illegal access is defined as “right about access”, the security entropy of Eq.(1) is called “mandatory security entropy” recorded as HM(X). If the illegal access is defined as “indirectly illegal access”, the security entropy of Eq.(1) is called “indirectly security entropy” recorded as HI(X).

    2 Safety conditions of classificatory access control model

    2.1 Security attributes based on security entropy of safety

    w2>0,w3>0,w2+w3=1。

    Theorem 1 (direct safety of access control model): Access control model has direct safety, if and only if

    Prove:

    It is proved that when HD(X)=0, the event “refuse legal access” and “allow access violation” will never happen, that is, p(a2)=p(a3)=0.

    The total number of aiis made as ni(i=1,2,3,4), n1+n2=s, n3+n4=t. Because a1、a2and a3、a4are different responses to the same access, p(a1)+p(a2)=s/(s+t), p(a3)+p(a4)=t/(s+t).

    Because w2>0,w3>0,w2+w3=1, so w1=w4=0。

    End.

    Similarly, theorems could be got as follows:

    Theorem 2 (mandatory safety of access control model): the access control model has mandatory safety, if and only if

    Theorem 3 (indirectly safety of access control model): the access control model has indirect safety, if and only if

    2.2 Safety theorem of classificatory access control model

    Symbol Θ2represents class 2 access control model, Θ3represents class 3 access control model, and Θ4represents class 4 access control model.

    Now, according to safety needs of class 2、3、4 information system, the safety theorem of classificatory access control model based on the above security attributes is put forward.

    Theorem 4 (safety of classificatory access control model):,Class 2 access control model Θ2satisfies safety needs, if and only if HD(X)|Θ2≡0, in which w2>0,w3>0,w2+w3=1; Class 3 access control model Θ3satisfies safety needs, if and only if HD(X)|Θ2≡0 and HM(X)|Θ3≡0, in which w2>0,w3>0,w2+w3=1; Class 4 access control model Θ4satisfies safety needs, if and only if HD(X)|Θ4≡0、HM(X)|Θ4≡0 and HI(X)|Θ4≡0, in which w2>0,w3>0,w2+w3=1;

    3 Analysis of typical access control model based on security entropy

    Now, the theory is applied to analyze the security of typical access control model, verify the practicability of this method, and point out the defect of these access control models.

    3.1 Security analysis to HRU model

    3.1.1 Direct safety

    The statistical probability distribution of responses is

    Since HD(X)|HRU≡0, model HRU can satisfy direct safety.

    3.1.2 Mandatory safety

    3.1.3 Indirect safety

    HI(X)|HRU>0, which shows that the HRU model doesn’t satisfy indirect safety.

    The above analysis shows that, model HRU satisfies direct safety, and doesn’t satisfy mandatory safety and indirect safety.

    3.2 Security analysis to BLP

    3.2.1 Direct safety and indirect safety

    Model BLP uses two methods: DAC and MAC in which, DAC uses the HRU model, so the direct safety and the indirect safety of the BLP model coincide with that of HRU, that is, BLP satisfies direct safety and doesn’t satisfy indirect safety.

    3.2.2 Mandatory safety

    So, HM(X)|BLP≡0, which shows that BLP satisfies mandatory safety.

    3.3 Security analysis to RBAC

    Model RBAC[9-11]assigns roles for users, and then based on these roles grants authorization. The RBAC’s rights management and access control manner are similar to HRU’s. so its safety is similar to that of HRU, which is, satisfying direct safety and not satisfying mandatory safety or indirect safety.

    3.4 Security analysis to FGBAC

    FGBAC[12]is the improved BLP, which introduces the information flow graph as a judgment auxiliary tool. In FGBAC, any directly illegal access, right about access and indirectly illegal access will be refused. So

    HD(X)|FGBAC=HM(X)|FGBAC=HI(X)|FGBAC≡0

    It shows that the model satisfies direct safety, mandatory safety and indirect safety.

    According to the above safety analysis of the typical access control model, and in the light of the safety needs of 2、3 and 4 class systems, it is concluded the typical model’ security and applicability are Table 1 and Table 2.

    Table 1 The security of typical access control model

    Table 2 The applicability of typical access control model

    In the simulation environment of achieving the RBAC, BLP and FGBAC models, the rationality of this method is tested. In the simulation environment, 30 users and 200 text types of resources have been. Through user behavior simulation program automaticly and randomly generated user access and randomly modified on three models of security rules and procedures, three audit tracking programs are established recording the determination result of each model. the security entropy is calculated according to the execution result shown in Table 3.

    Table 3 The security entropy result of typical access model

    4 Conclusion

    This study puts forward the concept of “security entropy” for measuring uncertainty of system’s response to access request, and proposes its security theorems based on security entropy. The theory can be widely applied to security analysis of access control mode and system.

    Based on the theory,this work analyses the typical access control model, verifies the practicability of the method, and concludes the security and application scope of the available models.

    Reference

    [ 1] Bell D E, Lapadula L J. Security Computer Systems:Mathematical Foundations and Model. Bedford:Mass Mitre Corp,1973. 66-79

    [ 2] David E B. Looking back at the bell-La Padula model. In: Proceedings of the 21st Annual Computer Security Applications Conference, Tuscon, USA, 2005. 337-351

    [ 3] Si T G, Tan Z Y , Dai Y Q. A Security Proof Method for Multilevel Security Models. Journal of Computer Research and Development, 2008,45(10): 1711-1717 (in Chinese)

    [ 4] Fu Z Y. Information Theory—Fundamental Theory and Application. Beijing: Press of Electronics Industry,2007 (in Chinese)

    [ 5] Wang G B, Huang H Z, Zhang X L. Risk Possibility Number——A New Model for Risk Evaluation and Prioritization Based on Maximum Entropy Theory. Acta Aeronautica Et Astronautica Sinica, 2009,30(9):1684-1690 (in Chinese)

    [ 6] Fu Y,Wu X P,Ye Q,et al. An Approach for information Systems Security Risk Assessment on Fuzzy Set and Entropy-Weight. Acta Electronica Sinica, 2010,38(7):1490-1494(in Chinese)

    [ 7] Zhao D M,Ma J F,Wang Y S. Model of fuzzy risk assessment of the information system. Journal on Communications, 2007, 28(4):51-56 (in Chinese)

    [ 8] GB/T 17859-1999. Classified Criteria for Security. Beijing: Standards Press of China,1999 (in Chinese)

    [ 9] Peter J. Third Generation Computer Systems. Computer Surveys, 1971,3(4):175-216

    [10] Sandhu R S, Coyne E J, Feinstein H L. Role-based access control models. IEEE Computer, 1996,29(2):38-47

    [11] Zhai D G, Xu Z,Feng D G. Violation of static mutual exclusive role constraints in dynamic role transition. Journal of computer research and development, 2008, 45(4):677-683(in Chinese)

    [12] Wang C, Chen X Y, Li N. An access control mode based on information flow graph. In: Proceedings of the International Conference on Computational Intelligence and Security, Sanya, China, 2011. 998-1000

    Che Tianwei, born in 1971,He received his Ph.D. in Computer Science and Technology School of Xidian University in 2014. His main research interests include computer architecture, information security, grid computing systems.

    10.3772/j.issn.1006-6748.2015.02.012

    ①Supported by the National Natural Science Foundation of China (No. 60872041, 61072066) and Fundamental Research Funds for the Central Universities (JYI0000903001, JYI0000901034).

    ②To whom correspondence should be addressed. E-mail: tianweiche@163.com Received on Jan. 28, 2014*, Ma Jianfeng*, Li Na**, Wang Chao***

    久久久久亚洲av毛片大全| 国产精品久久久久久亚洲av鲁大| 全区人妻精品视频| 免费看a级黄色片| 欧美av亚洲av综合av国产av| 五月玫瑰六月丁香| av视频在线观看入口| 可以在线观看的亚洲视频| 国产成人aa在线观看| 午夜福利成人在线免费观看| 亚洲 欧美一区二区三区| www日本在线高清视频| 中文亚洲av片在线观看爽| 亚洲精品一区av在线观看| 岛国视频午夜一区免费看| 岛国在线免费视频观看| 女人被狂操c到高潮| 脱女人内裤的视频| 精品一区二区三区视频在线观看免费| 一进一出好大好爽视频| 岛国在线免费视频观看| 人妻久久中文字幕网| 99国产精品99久久久久| 老熟妇仑乱视频hdxx| 国产精品久久久人人做人人爽| 偷拍熟女少妇极品色| 老鸭窝网址在线观看| xxxwww97欧美| 91九色精品人成在线观看| 999久久久精品免费观看国产| 91av网一区二区| 日韩欧美三级三区| 国产精品久久久久久精品电影| 国产高清激情床上av| 欧美不卡视频在线免费观看| 日本一本二区三区精品| 黄色丝袜av网址大全| 欧美色视频一区免费| 嫩草影院精品99| 在线免费观看不下载黄p国产 | 国产一区二区在线av高清观看| 久久久精品欧美日韩精品| 欧美在线一区亚洲| 这个男人来自地球电影免费观看| 一夜夜www| 国产一区在线观看成人免费| 我的老师免费观看完整版| 激情在线观看视频在线高清| 亚洲国产精品合色在线| 国产午夜精品论理片| 日日摸夜夜添夜夜添小说| 国内精品久久久久精免费| 午夜久久久久精精品| www.熟女人妻精品国产| 黑人欧美特级aaaaaa片| 亚洲欧美日韩高清在线视频| 可以在线观看毛片的网站| 亚洲国产精品合色在线| 97碰自拍视频| 久久久国产精品麻豆| 99在线视频只有这里精品首页| 免费在线观看亚洲国产| 黑人操中国人逼视频| 国产真人三级小视频在线观看| 超碰成人久久| 在线播放国产精品三级| 中文字幕精品亚洲无线码一区| 国产成人av教育| 老司机午夜十八禁免费视频| 好男人在线观看高清免费视频| 香蕉国产在线看| 成人性生交大片免费视频hd| 香蕉丝袜av| 国产一区二区激情短视频| 少妇丰满av| 亚洲色图av天堂| 日本成人三级电影网站| 12—13女人毛片做爰片一| 又紧又爽又黄一区二区| 窝窝影院91人妻| 日韩av在线大香蕉| 欧美成人性av电影在线观看| 久久亚洲真实| 十八禁人妻一区二区| 国产精品av久久久久免费| 久久香蕉国产精品| 丰满人妻一区二区三区视频av | 国产亚洲精品一区二区www| 日韩精品中文字幕看吧| 在线视频色国产色| 狠狠狠狠99中文字幕| 久久久国产成人精品二区| netflix在线观看网站| av黄色大香蕉| 亚洲午夜理论影院| 免费在线观看视频国产中文字幕亚洲| 我的老师免费观看完整版| 国产黄片美女视频| 日韩成人在线观看一区二区三区| 国产精品九九99| 日本一二三区视频观看| 国产人伦9x9x在线观看| 国产精品久久久久久久电影 | 国产不卡一卡二| 麻豆国产97在线/欧美| 一本一本综合久久| 久久热在线av| 亚洲国产日韩欧美精品在线观看 | 88av欧美| av女优亚洲男人天堂 | 欧美乱色亚洲激情| 97碰自拍视频| 女生性感内裤真人,穿戴方法视频| 久久精品91无色码中文字幕| 中出人妻视频一区二区| 曰老女人黄片| 午夜免费观看网址| a在线观看视频网站| 高清在线国产一区| 我的老师免费观看完整版| 亚洲美女视频黄频| 嫩草影院入口| 两个人看的免费小视频| 国产一级毛片七仙女欲春2| avwww免费| 最近最新中文字幕大全免费视频| 免费看日本二区| 中文字幕高清在线视频| 男人舔女人的私密视频| 噜噜噜噜噜久久久久久91| 真人一进一出gif抽搐免费| 国产人伦9x9x在线观看| 亚洲欧美日韩高清在线视频| 亚洲国产高清在线一区二区三| 啦啦啦免费观看视频1| 亚洲九九香蕉| 国产精品久久电影中文字幕| av天堂中文字幕网| 国产精品久久久人人做人人爽| 51午夜福利影视在线观看| aaaaa片日本免费| 亚洲国产欧美网| 亚洲成人久久性| 香蕉av资源在线| 两个人视频免费观看高清| 性欧美人与动物交配| 免费观看精品视频网站| 国产视频一区二区在线看| 亚洲美女视频黄频| 免费观看的影片在线观看| 国产精品 欧美亚洲| 白带黄色成豆腐渣| avwww免费| 中亚洲国语对白在线视频| 亚洲avbb在线观看| 九九在线视频观看精品| 天天躁狠狠躁夜夜躁狠狠躁| 成在线人永久免费视频| 欧美色欧美亚洲另类二区| 欧美日本视频| 久久人人精品亚洲av| 欧美在线黄色| 国产精品av视频在线免费观看| 我要搜黄色片| 香蕉国产在线看| 校园春色视频在线观看| 在线播放国产精品三级| 亚洲天堂国产精品一区在线| 精品久久久久久久人妻蜜臀av| 麻豆成人av在线观看| 欧美+亚洲+日韩+国产| 国产男靠女视频免费网站| 舔av片在线| 欧美丝袜亚洲另类 | 欧美成人一区二区免费高清观看 | 亚洲精品美女久久av网站| 久久亚洲真实| 国产综合懂色| 国产一级毛片七仙女欲春2| 宅男免费午夜| 久99久视频精品免费| 亚洲av成人一区二区三| 日本五十路高清| 久久久久久大精品| 99久国产av精品| 色老头精品视频在线观看| 美女大奶头视频| a级毛片在线看网站| 少妇的丰满在线观看| 一个人看视频在线观看www免费 | 亚洲国产精品成人综合色| 蜜桃久久精品国产亚洲av| 黄色日韩在线| 免费电影在线观看免费观看| bbb黄色大片| 一区二区三区国产精品乱码| 国产男靠女视频免费网站| 搡老妇女老女人老熟妇| 色综合欧美亚洲国产小说| 国产毛片a区久久久久| 国内揄拍国产精品人妻在线| a在线观看视频网站| 国产 一区 欧美 日韩| 中文亚洲av片在线观看爽| 久久久久久久久久黄片| 欧美色视频一区免费| 日日摸夜夜添夜夜添小说| 欧美一区二区精品小视频在线| 五月玫瑰六月丁香| av片东京热男人的天堂| 国产精品99久久久久久久久| www.999成人在线观看| 美女 人体艺术 gogo| 窝窝影院91人妻| 国产野战对白在线观看| 亚洲五月婷婷丁香| 久久久久免费精品人妻一区二区| 91麻豆精品激情在线观看国产| 毛片女人毛片| 国产伦在线观看视频一区| av欧美777| 桃红色精品国产亚洲av| 国产伦在线观看视频一区| 美女大奶头视频| 嫩草影院入口| 亚洲av片天天在线观看| 成人三级黄色视频| 国产亚洲av嫩草精品影院| 一级毛片高清免费大全| 国产av在哪里看| 亚洲七黄色美女视频| 精品久久蜜臀av无| 麻豆成人av在线观看| 欧美黄色片欧美黄色片| 在线观看日韩欧美| 国产精品99久久久久久久久| 99久久精品热视频| 国产淫片久久久久久久久 | 热99re8久久精品国产| 中文字幕av在线有码专区| 搡老岳熟女国产| 丝袜人妻中文字幕| 中文资源天堂在线| 国产又色又爽无遮挡免费看| 美女cb高潮喷水在线观看 | 岛国在线免费视频观看| 91老司机精品| 国产真人三级小视频在线观看| 男插女下体视频免费在线播放| 精品久久久久久久久久免费视频| 悠悠久久av| 精品国产乱码久久久久久男人| 少妇的丰满在线观看| 九九在线视频观看精品| 亚洲狠狠婷婷综合久久图片| 后天国语完整版免费观看| 国产av麻豆久久久久久久| 午夜福利在线在线| 99久久无色码亚洲精品果冻| 色综合婷婷激情| 久久这里只有精品中国| 国产成人aa在线观看| 搞女人的毛片| 97人妻精品一区二区三区麻豆| 99riav亚洲国产免费| 99国产精品99久久久久| 欧美午夜高清在线| 国产97色在线日韩免费| 黄色 视频免费看| 亚洲无线在线观看| 久久国产精品人妻蜜桃| 97人妻精品一区二区三区麻豆| 给我免费播放毛片高清在线观看| 国产免费男女视频| 国产精品一区二区三区四区久久| 精品日产1卡2卡| 一区二区三区激情视频| 成人特级av手机在线观看| 国产日本99.免费观看| 国产精品一区二区精品视频观看| 女生性感内裤真人,穿戴方法视频| 欧美日韩亚洲国产一区二区在线观看| 18禁观看日本| 中亚洲国语对白在线视频| 一级毛片精品| 亚洲国产看品久久| 欧美成狂野欧美在线观看| 国产亚洲精品综合一区在线观看| 无遮挡黄片免费观看| 麻豆av在线久日| 啦啦啦观看免费观看视频高清| www.自偷自拍.com| 五月玫瑰六月丁香| 欧美另类亚洲清纯唯美| 好男人电影高清在线观看| 成人特级av手机在线观看| 色综合欧美亚洲国产小说| 一区二区三区激情视频| 国产精品 国内视频| 看片在线看免费视频| 日韩欧美精品v在线| www.www免费av| 又黄又粗又硬又大视频| 岛国视频午夜一区免费看| 久久草成人影院| 国产亚洲精品一区二区www| 国产69精品久久久久777片 | 久久久久国产一级毛片高清牌| 欧美不卡视频在线免费观看| 久久久国产精品麻豆| 99久久成人亚洲精品观看| 国产高潮美女av| 亚洲aⅴ乱码一区二区在线播放| 夜夜躁狠狠躁天天躁| avwww免费| 成人av在线播放网站| 国产成+人综合+亚洲专区| 香蕉av资源在线| 欧美中文日本在线观看视频| 亚洲熟女毛片儿| АⅤ资源中文在线天堂| 美女扒开内裤让男人捅视频| 97碰自拍视频| 日韩高清综合在线| 欧美精品啪啪一区二区三区| 男女床上黄色一级片免费看| 99久久国产精品久久久| 在线a可以看的网站| 欧美黄色片欧美黄色片| 法律面前人人平等表现在哪些方面| 国产精品影院久久| 男人的好看免费观看在线视频| 99精品在免费线老司机午夜| 亚洲 欧美 日韩 在线 免费| 蜜桃久久精品国产亚洲av| 亚洲欧美日韩东京热| 国内揄拍国产精品人妻在线| 99国产精品一区二区蜜桃av| 日本在线视频免费播放| 午夜两性在线视频| 老汉色av国产亚洲站长工具| 亚洲欧美日韩高清专用| 成人一区二区视频在线观看| 日本与韩国留学比较| 日韩高清综合在线| 色综合婷婷激情| 99re在线观看精品视频| 母亲3免费完整高清在线观看| 久久热在线av| 欧美最黄视频在线播放免费| 日韩成人在线观看一区二区三区| 日韩高清综合在线| 亚洲在线观看片| 国产乱人视频| 制服丝袜大香蕉在线| 亚洲成人中文字幕在线播放| 欧美黄色片欧美黄色片| 国产亚洲av嫩草精品影院| 淫妇啪啪啪对白视频| 三级国产精品欧美在线观看 | 别揉我奶头~嗯~啊~动态视频| 国产av麻豆久久久久久久| 亚洲成人久久性| 成人特级av手机在线观看| 欧美3d第一页| 久久国产精品人妻蜜桃| av天堂中文字幕网| 亚洲激情在线av| 国产精品美女特级片免费视频播放器 | 久久久久国内视频| x7x7x7水蜜桃| 无限看片的www在线观看| 18禁观看日本| 亚洲av第一区精品v没综合| 久久草成人影院| 在线观看66精品国产| 一二三四社区在线视频社区8| 老司机午夜福利在线观看视频| 久久精品亚洲精品国产色婷小说| 欧美午夜高清在线| 欧美黄色淫秽网站| 黑人巨大精品欧美一区二区mp4| 97超视频在线观看视频| 亚洲成av人片免费观看| 亚洲中文日韩欧美视频| 搡老岳熟女国产| 久久亚洲真实| 精品一区二区三区av网在线观看| 变态另类成人亚洲欧美熟女| 国产欧美日韩精品亚洲av| 亚洲国产欧美一区二区综合| 一卡2卡三卡四卡精品乱码亚洲| 欧美高清成人免费视频www| 男人舔奶头视频| 亚洲九九香蕉| 狂野欧美激情性xxxx| 久久精品亚洲精品国产色婷小说| 久久人人精品亚洲av| 91久久精品国产一区二区成人 | 在线观看日韩欧美| 亚洲国产日韩欧美精品在线观看 | 手机成人av网站| 99久久精品热视频| 青草久久国产| 伦理电影免费视频| 国产99白浆流出| 舔av片在线| 熟女少妇亚洲综合色aaa.| 中文亚洲av片在线观看爽| 99热只有精品国产| 久久这里只有精品中国| 91av网一区二区| 禁无遮挡网站| 九色国产91popny在线| 亚洲欧美日韩东京热| 中文字幕人成人乱码亚洲影| 岛国在线免费视频观看| 久久久久久久久免费视频了| 人妻夜夜爽99麻豆av| 精品久久久久久久毛片微露脸| 亚洲男人的天堂狠狠| 国产一区二区三区视频了| 精品久久久久久久毛片微露脸| 亚洲人成伊人成综合网2020| 亚洲成av人片在线播放无| 在线观看一区二区三区| 欧美xxxx黑人xx丫x性爽| 久久久久久久久中文| 九九久久精品国产亚洲av麻豆 | 午夜成年电影在线免费观看| 国产一区二区三区视频了| a在线观看视频网站| 老熟妇乱子伦视频在线观看| cao死你这个sao货| 在线十欧美十亚洲十日本专区| 国产精品精品国产色婷婷| 亚洲av中文字字幕乱码综合| 搡老岳熟女国产| 制服丝袜大香蕉在线| 婷婷六月久久综合丁香| av视频在线观看入口| 成年免费大片在线观看| 看片在线看免费视频| 日韩精品青青久久久久久| 精品国产乱码久久久久久男人| svipshipincom国产片| 久久午夜综合久久蜜桃| 在线免费观看不下载黄p国产 | 久久久国产成人精品二区| 韩国av一区二区三区四区| 一级a爱片免费观看的视频| 国模一区二区三区四区视频 | АⅤ资源中文在线天堂| aaaaa片日本免费| 在线a可以看的网站| 中文字幕熟女人妻在线| 国产高清videossex| 国产乱人视频| 母亲3免费完整高清在线观看| 亚洲成av人片在线播放无| 国产成人系列免费观看| 一本一本综合久久| 老司机在亚洲福利影院| 91麻豆精品激情在线观看国产| 夜夜爽天天搞| 国产精品一区二区三区四区免费观看 | avwww免费| 最近最新免费中文字幕在线| 中文字幕久久专区| 成人三级黄色视频| 一进一出抽搐动态| 国产精品一区二区精品视频观看| 女生性感内裤真人,穿戴方法视频| 少妇的丰满在线观看| 18禁观看日本| 午夜免费激情av| 欧美精品啪啪一区二区三区| 香蕉丝袜av| 啦啦啦观看免费观看视频高清| 亚洲成人精品中文字幕电影| 亚洲性夜色夜夜综合| 夜夜躁狠狠躁天天躁| 久久精品国产亚洲av香蕉五月| 亚洲国产色片| 亚洲第一欧美日韩一区二区三区| 精品国产乱子伦一区二区三区| 男女做爰动态图高潮gif福利片| 欧美丝袜亚洲另类 | 999精品在线视频| 欧美在线一区亚洲| 欧美乱色亚洲激情| 国产精品九九99| 国产高清videossex| 午夜福利在线在线| 亚洲性夜色夜夜综合| 国产成人欧美在线观看| av在线蜜桃| 国产精品久久久久久人妻精品电影| 亚洲第一电影网av| 国产av在哪里看| 久9热在线精品视频| 亚洲精品一卡2卡三卡4卡5卡| 成年女人永久免费观看视频| 老司机午夜福利在线观看视频| 日韩免费av在线播放| 欧美乱妇无乱码| 激情在线观看视频在线高清| 国产三级黄色录像| 一本精品99久久精品77| 白带黄色成豆腐渣| 国产高清有码在线观看视频| 久久热在线av| 精品国产三级普通话版| 成年免费大片在线观看| 国产极品精品免费视频能看的| 亚洲九九香蕉| 午夜精品一区二区三区免费看| 少妇丰满av| 免费在线观看亚洲国产| 中文亚洲av片在线观看爽| 偷拍熟女少妇极品色| 夜夜躁狠狠躁天天躁| 中文字幕人妻丝袜一区二区| 国产在线精品亚洲第一网站| 热99在线观看视频| 丰满人妻熟妇乱又伦精品不卡| av中文乱码字幕在线| 欧美黑人巨大hd| 波多野结衣巨乳人妻| 国产精品一及| www.熟女人妻精品国产| 美女免费视频网站| 无人区码免费观看不卡| 免费在线观看日本一区| 97人妻精品一区二区三区麻豆| 亚洲精品456在线播放app | 国产精品日韩av在线免费观看| 在线播放国产精品三级| 精品人妻1区二区| 搡老妇女老女人老熟妇| 窝窝影院91人妻| 精品人妻1区二区| 又大又爽又粗| 99热精品在线国产| 丰满人妻一区二区三区视频av | cao死你这个sao货| 韩国av一区二区三区四区| 床上黄色一级片| 国产1区2区3区精品| 国产黄a三级三级三级人| 国产高清videossex| 久久精品夜夜夜夜夜久久蜜豆| 亚洲第一欧美日韩一区二区三区| 日本与韩国留学比较| 麻豆国产av国片精品| 99视频精品全部免费 在线 | 黄色日韩在线| 亚洲欧美一区二区三区黑人| 日本熟妇午夜| 露出奶头的视频| 成人精品一区二区免费| 九色成人免费人妻av| 亚洲精品久久国产高清桃花| 成年版毛片免费区| 免费搜索国产男女视频| 欧美不卡视频在线免费观看| 国产伦人伦偷精品视频| 国产成+人综合+亚洲专区| 国产黄色小视频在线观看| 天堂网av新在线| 又粗又爽又猛毛片免费看| 18禁美女被吸乳视频| 国产精品99久久久久久久久| 国产精品爽爽va在线观看网站| 国产精品一区二区免费欧美| 欧美在线黄色| 久9热在线精品视频| 99久久精品国产亚洲精品| 亚洲中文字幕一区二区三区有码在线看 | 欧美黄色淫秽网站| 亚洲精品一区av在线观看| 给我免费播放毛片高清在线观看| 欧美日韩瑟瑟在线播放| 国产黄色小视频在线观看| 无限看片的www在线观看| 国产一区二区三区在线臀色熟女| 一级毛片女人18水好多| 欧美午夜高清在线| 国产在线精品亚洲第一网站| www.999成人在线观看| aaaaa片日本免费| 亚洲精品在线观看二区| 黄色片一级片一级黄色片| www.自偷自拍.com| 亚洲欧美日韩高清专用| 日韩欧美 国产精品| 国内精品久久久久久久电影| 国产爱豆传媒在线观看| 18禁黄网站禁片午夜丰满| 神马国产精品三级电影在线观看| av片东京热男人的天堂| 精品人妻1区二区| 亚洲第一欧美日韩一区二区三区| 亚洲国产看品久久| 色av中文字幕| 午夜a级毛片| 久久久久精品国产欧美久久久| 久久婷婷人人爽人人干人人爱| 国产精品亚洲av一区麻豆| 啦啦啦免费观看视频1| 嫁个100分男人电影在线观看| 亚洲国产日韩欧美精品在线观看 | 老司机午夜福利在线观看视频| av福利片在线观看| 俄罗斯特黄特色一大片|