• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Blockchain for Transparent Data Management Toward 6G

    2022-04-24 03:22:58XueminShermnShenDongxioLiuChengHungLingXueHnYinWeihuZhungRoSunBidiYing
    Engineering 2022年1期

    Xuemin (Shermn) Shen, Dongxio Liu,*, Cheng Hung, Ling Xue, Hn Yin,Weihu Zhung, Ro Sun, Bidi Ying

    a Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON N2L 3G1, Canada

    b Huawei Technologies Canada, Kanata, ON K2K 3J1, Canada

    Keywords:Blockchain Data management Decentralization Transparency Privacy

    ABSTRACT The wealth of user data acts as a fuel for network intelligence toward the sixth generation wireless networks (6G). Due to data heterogeneity and dynamics, decentralized data management (DM) is desirable for achieving transparent data operations across network domains, and blockchain can be a promising solution. However, the increasing data volume and stringent data privacy-preservation requirements in 6G bring significantly technical challenge to balance transparency, efficiency, and privacy requirements in decentralized blockchain-based DM. In this paper, we investigate blockchain solutions to address the challenge. First, we explore the consensus protocols and scalability mechanisms in blockchains and discuss the roles of DM stakeholders in blockchain architectures. Second, we investigate the authentication and authorization requirements for DM stakeholders.Third,we categorize DM privacy requirements and study blockchain-based mechanisms for collaborative data processing. Subsequently,we present research issues and potential solutions for blockchain-based DM toward 6G from these three perspectives. Finally, we conclude this paper and discuss future research directions.

    1. Introduction

    The proliferation of wireless networks has greatly impacted our ways of living and working by providing ubiquitous coverage and seamless connectivity. As the wireless networks continue to evolve, the sixth generation wireless networks (6G) will further integrate heterogeneous access technologies and network slicing[1,2] to support diversified services with dynamic quality-ofservice requirements. More importantly, network intelligence plays an essential role not only in improving network resource utilization, but also in enhancing user experience with customized service provisioning [3].

    1.1. Data management (DM) toward 6G

    The wealth of user data and recent developments in artificial intelligence (AI) technologies lie at the heart of network intelligence toward 6G. With numerous end devices being deployed and connected, wireless big data are generated at a remarkable rate and scale [4]. Through AI-based data processing, wireless big data have great value for efficient network management toward 6G.For example,user trajectory and association history at different access points can be utilized to conduct AI-based network traffic prediction and content catching on the edge for dynamic network resource allocation [1,5]. Thus, how to effectively and efficiently manage user data—that is, DM, which includes multiple data operations in the life-cycle of user data, from data creation to deletion [6,7]—has become a key enabler of future network intelligence. However, the highly dynamic and heterogeneous nature of 6G imposes four major requirements on DM:

    (1) Decentralization: DM requires collaborations among multiple data stakeholders, including users or machines for data generation, mobile operators for data collection and transmission,and technology vendors (e.g., edge/cloud providers) for data storage and processing. Stakeholders usually come from different network domains that cannot simply agree on a single DM authority.Thus,it is necessary to have a decentralized architecture for data stakeholders to collaboratively manage data life-cycle events [8].

    (2)Transparency:Due to the lack of mutual trust,the DM process should be transparent and verifiable to data stakeholders.Data owners should be aware of any operation performed over their data[9].For regulation purposes,‘‘respective responsibilities”should be determined transparently for stakeholders who process data collaboratively [10].

    (3) Efficiency: The heterogeneity of DM stakeholders, increasing volume of user data, and complexity of data life-cycle events will lead to major concern on assuring efficiency in terms of distributed architecture design, authentication and authorization(AA) management for DM stakeholders, and data-processing mechanisms.

    (4)Privacy:Privacy preservation in DM refers to both the identity privacy of data stakeholders and the content confidentiality of personal data. Although specific privacy requirements can change with different data operations, general principles are enforced in recent privacy regulations, such as European General Data Protection Regulation (GDPR) [10]. For example, users are granted full control of any operation over their data with identifiable information [11]. A data usage agreement that defines stakeholder obligation should be pre-determined and strictly followed.

    It remains an ambitious task to develop a decentralized and transparent DM that satisfies the efficiency and privacy requirements.

    1.2. Blockchain-based DM

    A blockchain consists of a ledger of blocks of peer-to-peer(P2P)transactions [12]. The blockchain is maintained by distributed nodes in the network, where each (full) node maintains a copy of the ledger. From the perspective of functionality, the blockchain shares some features with a traditional distributed database [13],but utilizes secure consensus protocols to maintain consistency of the ledger among mutually distrusted nodes.Moreover,a blockchain can provide programmability to control the ledger updates with smart contract technology [14].

    Blockchain is a promising technology for DM toward 6G, as it naturally addresses the decentralization and transparency requirements.First,DM stakeholders can use the blockchain as the trusted shared storage to record critical DM events[8,15].Each DM stakeholder can maintain a copy of the shared ledger without relying on a centralized entity. Second, the shared ledger is transparent, and the ledger updates are verifiable to related blockchain nodes. DM stakeholders can design smart contracts in order to conduct various data operations collaboratively.These benefits have motivated many recent discussions on blockchain-based DM schemes[16,17]in future intelligent networks[3,18]and other applications,such as information-centric networks [7], supply-chain management [19],the Internet of Things (IoT) [20–22], and e-healthcare [23].

    Given its decentralized and transparent nature, a blockchainbased solution may aggravate the complexity of DM in achieving the requirements of efficiency and privacy [24]. First, distributing data storage to blockchain nodes increases the overall storage overhead. At the same time, to maintain the consistent view of the shared ledger, DM stakeholders run consensus protocols to endorse transactions and verify blocks,which may limit the transaction throughput and increase the data processing burden. Second, due to the storage transparency of the blockchain, onchain data are visible to related blockchain nodes, which contradicts the privacy requirements of user data. Thus, more research efforts should be directed to new designs and practical implementations of blockchain-based DM in order to resolve the efficiency and privacy challenges.

    1.3. Organization of this paper

    In this paper, we discuss blockchain-based DM for 6G. To address the challenges of efficiency and privacy, we summarize state-of-the-art research progress with potential solutions. The organization of this paper is as follows:

    Section 2 presents the blockchain architecture design for DM.We summarize the existing blockchain mechanisms, such as efficient consensus protocols and hybrid chain designs. Moreover, by comparing recent blockchain-based DM schemes, we discuss how DM stakeholders can serve as blockchain components.In Section 3,we explore blockchain-based AA mechanisms for the efficient and privacy-preserving identity management of DM stakeholders. In Section 4, we investigate blockchain-based data-processing mechanisms. After specifying the privacy requirements for blockchain-based data processing, we discuss an on-/off-chain computation model. We also summarize research outcomes on specific privacy-preserving data operations,including data sharing and data analytics. In Section 5, we discuss research issues and potential solutions in detail, in terms of architecture design, AA,and data processing in blockchain-based DM.Finally,we conclude this study and discuss further research directions in Section 6.

    2. Architecture design in blockchain-based DM

    A blockchain can serve as a decentralized and transparent architecture for DM toward 6G. However, it is not trivial to build DM with black-box use of the blockchain.First,a blockchain essentially deals with maintaining consistent storage and state updates in distributed nodes.As the degree of trust among the nodes can change dramatically in real-world applications, a blockchain can have different architecture designs, with trade-offs between ledger scalability and security. When applying a blockchain to DM, it is also necessary to distinguish among the requirements of different DM use cases. Second, stakeholders can have different capabilities and motivations to participate in DM. Furthermore, there are various roles in a blockchain-based architecture, such as miners and clients. However, it remains unclear how to manage the roles of DM stakeholders in a blockchain.

    To address this issue, we explore two essential questions:①What should the blockchain architecture be for DM,and ②what roles do DM stakeholders play in this architecture?We first review existing blockchain architectures with advantages and limitations for DM, and then discuss two typical use cases for blockchainbased DM: vehicle-to-everything (V2X) [25] and cloud/edge computing.

    2.1. Blockchain architectures

    Blockchain architectures can be roughly classified into two categories: permissionless blockchains [14] and permissioned blockchains [26]. A permissionless blockchain mainly consists of two kinds of entities:miners and clients[12].It uses cryptographic currencies to motivate entities to self-organize themselves in public networks.In contrast,a permissioned blockchain is a top–down architecture with three main entities: authorities, miners, and clients. In general, industrial organizations can form a consortium to serve as the supervising authorities of the blockchain.The miners and clients must obtain permission from the authorities before participating in the blockchain. In both architectures, the consensus mechanism is an essential component for maintaining consistency on the ledger.

    In terms of consensus protocols, a permissionless blockchain must resist more malicious participants than the permissioned blockchain. A bitcoin blockchain is proven to be secure if the miners possessing the majority of the computational power are honestly following the proof-of-work (PoW) consensus protocol [27].However, when the number of miners is large, the architecture can suffer from low transaction throughput and high transaction confirmation latency. A permissioned blockchain, such as Hyperledger Fabric [26], relies on the consortium committee to provide membership management and ordering services. Such top–down architecture incurs fewer restrictions on the consensus protocol,where practical Byzantine fault tolerance (PBFT) and Raft can be implemented. To further improve blockchain scalability, new blockchain architectures have been proposed recently.For permissionless blockchains,Prism[28]and OHIE[29]are two new blockchain architectures to support parallel transaction processing.They separate the single chain into multiple chains and divide the roles of miners into several roles for different tasks.

    Although permissionless and permissioned blockchains have different characteristics, most support two attractive functionalities: distributed storage and smart contracts. That is, computer programs can be executed on the distributed environment (the blockchain), which makes blockchains suitable to construct DM platforms toward 6G [30,31].

    2.2. Use cases of blockchain-based DM

    In the following, we present two exemplary use cases of blockchain-based DM: V2X and cloud/edge computing. Our focus is to summarize how DM stakeholders can participate in the blockchain architecture.

    2.2.1. Blockchain-based DM for V2X

    V2X communications enable many vehicular applications, such as on-road infotainment and location-dependent services[25,32,33]. To provide more efficient and effective services for pedestrians and drivers in a V2X communication network,V2X service providers must cooperatively communicate with each other and exchange some users’ private information. However, this requirement cannot be easily satisfied in the current V2X system,since the vehicle-related data are managed independently by V2X service providers, and inappropriate data sharing may lead to serious privacy information leakage [34] and break the privacy regulations. To bridge the gap between existing V2X services and 6G,blockchains have been introduced into the V2X system,where a large number of V2X service providers can build decentralized trusts. In particular, vehicular information exchange can be recorded onto the blockchain, which allows third-party auditors to trace the information flow and prevent potential privacy leakage.Furthermore,depending on various V2X services,the information written into the blockchain differs; it may consist of vehicle insurance information,driver license information,vehicle velocity,location, and so forth.

    A basic blockchain-based V2X communication network includes the following stakeholders: vehicles, roadside units(RSUs),base stations,service providers,edge nodes,and cloud servers.The main difference between DM architectures atop a permissionless blockchain and those atop a permissioned blockchain for V2X services[34]lies in the stakeholders who construct the blockchain. Some existing schemes [30,31] rely on public blockchain platforms as third parties for V2X services.For example,in a public key infrastructure(PKI)-based solution for securing V2X communications that is based on a public blockchain platform[30],vehicles and other stakeholders are conventional clients of Ethereum,which can read/write information on the public ledger and trigger deployed smart contracts.In this setting,the original V2X network architecture and the roles of these stakeholders do not need to be significantly changed, but the stakeholders need to have extra communications with the external public blockchain platform.Although a permissionless blockchain-based DM architecture is considered to be simple and effective, it does not fit well for all V2X services,due to the lack of system scalability and data privacy.A permissionless blockchain platform is public and can be accessed by any party.As a result,some data,such as public certificates and the certificate revocation list(CRL),can be published on the blockchain,while other data, such as personal riding records, should be protected.Moreover,the data-processing delay is high in a permissionless blockchain platform,which makes a permissionless blockchain architecture unsuitable for V2X services with strict latency requirements.

    To overcome these issues, many studies incorporate a permissioned blockchain in V2X services [35–42]. In such solutions, the blockchain is maintained by V2X stakeholders themselves, who can be vehicles, RSUs, edge nodes, and cloud servers, depending on V2X application scenarios. For example, mobile edge nodes or RSUs can serve as full nodes for maintaining a permissioned blockchain, since they are sufficiently powerful in terms of computational and storage capabilities. Vehicles usually serve as light nodes, since they have limited resources and high mobility. Compared with the architecture atop a permissionless blockchain, this architecture is more scalable by controlling the number of miners in the blockchain and adopting hybrid consensus protocols at the cost of complicated architecture designs and security models.More specifically, most state-of-the-art architectures have a premise that root trusted authorities exist in V2X services to bootstrap the system.

    2.2.2. Blockchain-based DM for cloud/edge computing

    Cloud/edge-based DM architecture is established on a centralized model, where a back-end cloud service provider is integrated with front-end interfaces, such as mobile phones, to make data processing and sharing simple and effective. However, the architecture can be vulnerable to internal attacks, due to the lack of procedure transparency at the third-party service provider.Therefore,a more transparent DM framework is essential,in which all data-processing operations can be audited, and even malicious internal attackers can be detected.As a result,a blockchain can be introduced to the cloud/edge-based DM architecture, in order to obtain a transparent DM model with monitoring and auditing capability.

    A blockchain is promising for managing multidomain collaborations in a layered edge-computing or joint-cloud architecture[43,44]. Many related solutions have been proposed recently for blockchain-based DM in cloud computing from either permissionless or permissioned blockchains.A basic blockchain-based DM for cloud computing has the following main stakeholders:users,cloud servers, and application service providers, with DM operations including data auditing, data sharing, data integrity checking, and data searching.

    Most cloud DM architectures adopt an external permissionless blockchain platform [45–51], without high demands for throughput and latency in data processing. The blockchain is mainly viewed as an honest ledger for storing extra information, while large data are stored in cloud servers with or without privacy protection,according to the privacy requirements.Due to the high cost of processing data on permissionless blockchains, heavy data operations cannot be performed on the chain,although lightweight operations, such as data timestamping and operation record tracking, can be performed. Therefore, off-chain DM operations should only be recorded on the chain after being performed. At the same time, data encryption is a general solution to protect privacy for the data stored on the cloud or the blockchain.

    For cloud DM architectures atop a permissioned blockchain,the blockchain is managed by authorized stakeholders, such as cloud servers, edge nodes, and even users [52–56]. The permissioned blockchain can be applied to boost cross-domain trust among different stakeholders.As there are lower on-chain operation costs in a permissioned blockchain, more complex data operations can be done on the chain.In addition,the data privacy protection mechanism is not limited to data encryption.As authorized stakeholders control the on-chain data, they can define access policies for the data on the blockchain. Although this architecture has many advantages, it relies on the trustworthiness of the authorized stakeholders who serve as blockchain managers. If these stakeholders are compromised,the security and privacy of the architecture cannot be ensured.

    A blockchain architecture for DM is shown in Fig. 1. Based on different consensus protocols, distributed ledger storage, and smart contracts, blockchain-based DM can support various V2X and cloud/edge applications. Table 1 provides a summary of the blockchain architectures for DM in two use cases.

    3. AA in blockchain-based DM

    3.1. AA requirements for DM stakeholders

    AA is an indispensable component of blockchain-based DM[57]. In particular, AA addresses two essential questions in DM:Who you are and what you can do.First,there can be multiple participants in DM, such as users, storage nodes, and computing nodes.Authentication helps the DM system to determine unforgeable identities and the exact roles of DM stakeholders. Second,based on their roles, DM stakeholders are authorized to conduct a wide range of operations, such as reading data and modifying the data status.With the above basic functionalities,AA can further help DM stakeholders establish secure and confidential communication channels,which is essential in a distributed blockchain environment. Moreover, the non-repudiability from AA is the key in determining the accountability of DM stakeholders in case of any dispute.

    Blockchain-based DM toward 6G has new requirements for AA mechanisms:

    (1)Distributed management:Without a traditional centralized authority, AA management in DM should be conducted by a set of authorities in a transparent manner.

    (2)Efficiency and privacy:As the roles of DM stakeholders can change dynamically,blockchain-based AA should support efficient credential update and revocation. Also, the real identities of DM stakeholders should be kept private for certain use cases in order to achieve conditional privacy preservation if necessary. Below,we discuss existing works on achieving transparent, efficient, and privacy-preserving blockchain-based AA for DM.

    3.2. Blockchain-based AA

    In a complex DM environment,there may exist multiple stakeholders with the right to generate identities for their users and make authorizations for data operations, such as the independent identity management in Fig. 2 [50]. In such a model, crossdomain AA is required due to frequent information exchange between stakeholders. Certificate management can become a hurdle, as each stakeholder has its own certificate authority (CA) for management. Some stakeholders may be compromised and may publish or utilize fake certificates for data operations. To reduce the management costs and the security risks of cross-domain AA,a manager can be introduced to play the role of the centralized identity management shown in Fig. 2 [50], such as a single-signon service provider. However, this model requires the DM stakeholders to agree on a single manager, which may not always be practical toward 6G. As shown in Fig. 3, blockchain-based decentralized identity management [50–52] can enable stakeholders to collaboratively manage user identities, authenticate users, and update authorization policies in a distributed and transparent manner. More specifically, the blockchain is managed by a consortium committee and can provide AA services for external service providers. Even if some stakeholders are compromised, all membership updates and revocation operations on the blockchain are still traceable and accountable.

    Fig. 1. A blockchain-based DM. PoS: proof of stake; PoA: proof of authority; PoET: proof of elapsed time.

    Table 1 Blockchain-based DM architecture: use case.

    Fig. 2. The evolution of identity management: from independence to decentralization. (a) Independent management in DM; (b) centralized identity management in DM;(c) decentralized identity management in DM.

    Fig. 3. General procedures of blockchain-based authentication and authorization in DM.

    Extensive research efforts have been made to utilize blockchains to enhance AA systems [58]. For traditional certificatebased AA, blockchain-based mechanisms have been proposed to guarantee certificate transparency and revocation transparency for blockchain-based DM [59,60]. More specifically, CAs publish certificates for stakeholders and users,while a group of stakeholders update their certificates on a public blockchain.The validity of the certificates on the blockchain relies not only on the security of the CAs, but also on the group of data stakeholders, as it is necessary for the majority to be honest.Instead of focusing on certificate transparency, other works define authority transparency frameworks to address the issue of auditing AA management among stakeholders [61,62] by viewing the blockchain as public and immutable logs of certificate generation,updating,and revocation.

    In contrast to certificate-based AA systems,self-sovereign identity is a blockchain-based identity management mechanism [63].More specifically, instead of relying on a CA to manage user identities,users themselves can create,store,transfer,and revoke their identity credentials through a blockchain. In this way, the risk of the single-point failure of a centralized CA is much reduced.To achieve fine-grained data access control, attribute-based AA mechanisms such as attribute-based encryption (ABE) can be combined with the blockchain, with user attributes being embedded in the ledgers and smart contracts. Users can access data and retrieve decryption keys based on their attributes [64].Combined with the blockchain and chameleon hash functions,dynamic attribute updates can be achieved in the blockchain[65].

    A blockchain brings many advantages in managing users’ identities to satisfy different security properties in the DM.However,it also raises privacy concerns,as all information stored in the blockchain is transparent. Therefore, privacy-preserving mechanisms can be integrated with blockchain-based AA schemes to provide privacy protection.One basic mechanism is based on pseudonyms.Each user can hold a large number of pseudonyms for AA, and the pseudonyms are always denoted by public keys in the blockchain.For example,a blockchain data-sharing system,Ghostor,hides user identities but allows users to detect integrity violations of remotely stored data [66]. Anonymity is achieved by using a technique named ‘‘a(chǎn)nonymously distributed shared capabilities.” Since the pseudonyms are locally stored by users and are difficult to manage if the number of pseudonyms is larger,other mechanisms,such as group signatures and ring signatures,can help to protect user identity privacy in a blockchain-based DM. A user’s anonymous identity generated from group/ring signature schemes can be stored at the user side for multiple uses across different applications.This identity privacy protection mechanism has been adopted by some blockchain platforms, such as Moreno [67].

    Group/ring signature schemes are built upon Fiat–Shamir signature schemes, which can be utilized for self-sovereign identity management in blockchains [68]. Anonymous credentials can also be delegated at different levels to inspire more DM applications[69]. Under these circumstances, identity privacy is protected and accountability is guaranteed for tracing malicious users. For example, there are blockchain-based AA schemes in which user identities can be traced under certain stringent conditions[70,71]. One or multiple stakeholders can collaboratively generate anonymous credentials for their users based on the zeroknowledge proof technique. When a user behaves maliciously and needs to be traced,these stakeholders can reveal user identity accordingly. In this way, privacy and accountability can be simultaneously satisfied.For attribute-based access control on the blockchain, a general privacy-preserving approach is to hide the access policies by designing an attribute-hiding ABE [72]. This method is different from previous mechanisms by protecting data attributes and policies rather than user identities.

    4. Data processing in blockchain-based DM

    Data processing can refer to a wide range of operations in the life-cycle of data items [7,8]. For a blockchain-based DM, we mainly focus on data operations that require interactions between multiple DM stakeholders,including data sharing and collaborative data analytics. In this section, we first discuss privacy and efficiency requirements with general privacy and computation models. Based on these requirements, we summarize the existing literature on blockchain-based data sharing and analytics.

    4.1. Privacy requirements and model

    For data processing in blockchain-based DM, a general privacy requirement is to restrict data exposure. More specifically, data exposure can be characterized by the following questions:

    (1) What is the sensitivity of the data? First, data sensitivity can vary dramatically depending on the application. For example,user identity data in financial applications are highly confidential,and can lead to economic loss in case of any exposure.Second,data sensitivity can change with the amount of data.For example,a single exposure of a user location may incur limited damage, while the exposure of consecutive user locations may reveal users’ daily routines [73]. Third, data sensitivity can change with time. Many types of data, such as legal files [74], have a ‘‘sealing” period,within which the data should not be exposed. After the ‘‘sealing”period,the data can be accessed by the public or by certain entities.

    (2) To whom are the data exposed? Data processing can involve various entities, which can be roughly categorized into internal/external participants and the blockchains. The term‘‘internal participants” refers to the DM stakeholders involved in the data processing. In contrast, the term ‘‘external participants”refers to entities that are not involved in the data processing,such as an external attacker. In blockchain-based DM, there is a shared view among blockchain participants. In this case, the blockchain can be modeled as a special entity for data exposure.

    From these two questions,privacy requirements in blockchainbased DM can be categorized into four levels:

    (1) Privacy from user anonymity: This requires user identity information to be separated from the dataset before being processed. However, for a data processor(i.e., an entity that conducts data processing) with strong background knowledge, it is highly possible for the processor to recover user identity information from the dataset.

    (2) Confidentiality for external participants: Data of less sensitivity can be processed by data processors in plaintext, but cannot be exposed to external participants. This requirement relies on the trustworthiness of the data processor.

    (3) Confidentiality for internal participants: For data with high sensitivity, data processing should expose as little information as possible to the data processors,including data content,user identity, and data access patterns.

    (4) Confidentiality for blockchains: Sensitive data should not be directly stored on the blockchain. Similarly, sensitive data operations should not be conducted by smart contracts.

    In blockchain-based DM,privacy requirements for different DM applications can change dramatically with the data sensitivity and the roles of data stakeholders. Therefore, GDPR [10] does not provide specific privacy requirements, but rather defines general principles.More specifically,it requires that users have full control over the DM operations on their data.

    Internal participants, such as data controllers and data processors, must agree on data usage terms with users and must strictly follow this agreement in the data processing.At the same time,any unauthorized data sharing with external participants is forbidden.

    Since privacy requirements can sometimes be vague or ambiguous,it is essential to design privacy models that help users,DM system designers,and regulators to better understand privacy regulations in an executable and implementable manner. A data flow diagram(DFD)is a good way of modeling DM.DFDs are similar to process diagrams in software engineering, and can integrate GDPR elements and data life-cycle events[75].Unlike models based on data life-cycle events, resource or capability requirements for data stakeholders can be utilized to implement DM with GDPR compliance [76]. Moreover, for blockchain-based DM, executable privacy models can be implemented to automatically regulate the cloud data operations involved in smart contracts[77,78].

    4.2. Efficiency requirements and computation model

    For data sharing and analytics in blockchain-based DM, a straightforward solution is everything-on-chain, which involves storing the entire dataset on the blockchain and conducting data processing via smart contracts. However, this can require prohibitive storage and place a heavy computational burden on the blockchain participants. To address this issue, it is possible to introduce off-chain storage or computation nodes that can store data or perform data processing more efficiently, and only upload pivotal information onto the blockchain.This paradigm is regarded as an on-/off-chain model [79].

    In a general on-/off-chain model,an external data storage provider can store the hash values of the data items onto the blockchain[80]. In this way, the integrity of the off-chain data storage can be ensured, since on-chain hashes cannot be modified. This model can also eliminate the direct exposure of private data to the blockchain.The hash-based approach relies on the trustworthiness of an external data storage provider to perform data operations. In blockchain-based DM, it is desirable to allow weaker security assumptions for the storage provider and to design more expressive on-chain authenticators for verifying the correctness of off-chain data operations. For example, an aggregation of multiple data records can be computed by an off-chain cloud server, which only sends verifiable computation results to the blockchain. Below, we discuss research works on constructing on-/off-chain models. The main requirement of such a model is to have verifiable off-chain executions, including zero-knowledge succinct non-interactive argument(SNARG)and a trusted execution environment(TEE).

    SNARG is a system in which a prover can convince a verifier of the existence of a secret for a public relation. The relation can be represented by an arithmetic circuit for generally verifiable computations [81].

    Verification of SNARG is efficient and can be privacy-preserving without directly exposing the inputs and outputs of the computation. As a result, SNARG is widely used to construct an on-/offchain computation model[24]for blockchain-based DM.However,the verification efficiency of SNARG comes at the cost of a trusted setup of relation-dependent public parameters and expensive prover computation overhead. Therefore, it is critical to properly set universal or updatable public parameters [82] or to use a secure multiparty computation protocol to generate public parameters for SNARG systems. Moreover, SNARG does not naturally provide privacy against internal participants. Data processors must have access to the original data, which is not always desirable for DM applications.

    TEE,such as the Intel Software Guard Extension(SGX)[83],provides another way to verify computations.Before execution in TEE,codes are loaded into a secure enclave, which is secure hardware with protected memories. To ensure the loaded codes and data are trusted, SGX provides a remote attestation service: TEE generates an attestation request to a remote attestation service to ensure the integrity and correctness of code executions. Unlike SNARG,TEE does not require a trusted setup of public parameters and is more efficient in generating proof of computations. Therefore,TEE can facilitate the design of on-/off-chain computation models[84,85]by serving as a reliable and authenticated off-chain computation unit. Moreover, with the integration of a key manager, TEEbased solutions can achieve authenticated and encrypted communications between the enclave and external environments to achieve privacy protection against malicious data processors.However,there are some challenges in the practical implementation of TEE.First,a comprehensive and formal security analysis[86]of TEE has recently been discussed. Second, remote attestation strongly relies on the service provider, which can be a single trust point in a blockchain environment.

    Besides certifying the computation results with the aid of either SNARG or TEE, another potential path is to adopt game theory to create a competitive relationship between multiple off-chain resource providers in order to eliminate cheating [87]. For example,two cloud servers can be assigned the same computation tasks.By setting proper financial gains and losses, the two cloud servers can be motivated to correctly complete the computing tasks.

    4.3. Blockchain-based data-processing mechanisms

    An on-/off-chain model based on SNARG,TEE,or the two-server model provides general solutions to data processing tasks. However,for specific tasks,specialized design strategies(e.g.,new data structures) are required to fulfill the privacy and efficiency requirements.

    4.3.1. Data sharing

    When data are collected and stored in a blockchain-based DM,it is important to share or trade the data to enable multiple dataintensive applications [18,88].

    Various privacy requirements can be achieved for data sharing using different techniques. Identity privacy for both data owners and receivers can be achieved by pseudonyms [89] or group signature-based anonymous credentials. Data encryption mechanisms with key management techniques can be enforced to achieve on-chain data confidentiality. For fine-grained access control in data sharing, attribute-based or functional encryption can also be used[90,91],in which a data encryption key or a ciphertext can determine access policies. Unlike methods that are based on encryption key management, reputation management [92] can also be integrated into data sharing. In reputation management,data senders and receivers can be enabled to leave reviews for the data-sharing process [93]. The accumulated review score can serve as the criteria for access assessment. For example, a proofof-collaboration consensus protocol is designed for data sharing at the edge[94],where reputation based on collaboration is quantified. Recently, researchers have also considered GDPR requirements in data sharing [95,96]. More specifically, a blockchainbased solution can enable users to fully control their personal data,which meets the GDPR requirements of consent-based DM.

    Data owners often outsource their data to a third-party storage provider,such as a cloud server,and rely on the storage provider to manage their data. In this model, the blockchain can serve as a trusted auditor for the data-sharing process [97]. To relieve data owners of heavy key management overheads,it is desirable to have a reliable key manager for data encryption and decryption.Threshold cryptography, such as (t,n) Paillier crypto (where t is a threshold number and n is the number of secret shares),can be utilized to protect data that are stored on the cloud and shared on the blockchain[98].At the same time,it is essential to securely choose a set of committee members to manage the keys. The blockchain can also be utilized to manage data modification on the cloud storage[46], where a trusted authority (TA) is integrated with the smart contract to complete the modification process.

    Aside from data sharing, data trading can further explore the data value. A blockchain-based digital identity exchange scheme for financial institutions has been proposed [99], in which SNARG is utilized to prove the authenticity of identities in a privacypreserving manner.TEE can be utilized to build a data-trading platform [100,101] that preserves fairness for both buyers and sellers,and ensures on-chain privacy for data processing [102].

    4.3.2. Data analytics

    A blockchain can support various data-analysis tasks [103] for intelligent 6G. A blockchain-based learning framework is proposed in Ref. [104] to securely compute model parameter updates with a threshold Paillier algorithm. Another important data analysis mechanism is to enable flexible and expressive queries. For data stored on the blockchain, a query should be efficient, and the correctness proof should be verified at a low cost[13], where authenticated data structures can be tailored for both inter-block and cross-block query processing. To maintain data privacy on the blockchain, it is possible to encrypt the data on the chain with a searchable index [105]. Then, a smart contract can be constructed for querying over the searchable indexes,which naturally ensures the verifiability of the search result. For searching over the location-based data, it is desirable to established range-based searchable indexes [106]. When data are stored off the blockchain, data owners can build an on-chain authenticator of the data index from SNARG or cryptographic accumulators. In this way, query operations can be conducted off-chain and the query result can be verified on-chain. More expressive verifiable queries can be supported by integrating database query techniques [107].

    A blockchain can naturally serve as a log system [108,109] due to its transparency and immutability. That is, data stored on the blockchain can be utilized to conduct event-driven system debugs and analysis. To support fine-grained data provenance operations,expressive data indexes can be built atop the original blockchain data [13,110]. At the same time, the blockchain can be utilized to construct log systems for DM applications. A lightweight blockchain logging mechanism is proposed in Ref. [111] with a new log storage structure for data-intensive applications. To achieve communication between different systems, multichain interoperability is considered in Ref. [112]. Compared with direct use of the blockchain for log storage, storing sensitive log data off the blockchain can reduce the on-chain overheads and privacy leakage.In particular, an IoT data provenance scheme is proposed in Ref.[113]. SNARG is adopted to succinctly store provenance data at each network administrator with succinct authenticators on the blockchain for cross-domain network provenance queries. Cryptographic accumulators can be utilized for a single log server to generate proofs of correct log updates, as discussed in Ref. [114] for certificate transparency services. A summary of blockchain-based privacy-preserving data processing is shown in Table 2[24,84,87,89–91,96,100,104,105,108,115].

    5. Research issues and potential solutions

    While blockchain-based solutions have great potential for DM toward 6G, many unresolved research challenges still remain. In this section, we discuss research issues and potential solutions indetail, in terms of architecture design, AA, and data processing in blockchain-based DM.

    Table 2 Summary of privacy-preserving data processing in blockchains.

    5.1. Architecture design in blockchain-based DM

    Although there are many blockchain architectures for DM,most are designed for applications, and various challenging issues related to DM architecture designs still exist, as follows:

    (1) Incentive and regulation mechanism design: A permissionless blockchain utilizes financial incentives for its participants,while a permissioned blockchain relies on a consortium committee to regulate its procedures.In practice,DM stakeholders toward 6G are highly heterogeneous,and can have different capabilities,profit considerations,and management frameworks.Therefore,the question of how to design incentive mechanisms for permissionless blockchain-based DM and regulation rules for permissioned blockchain-based DM remains a challenging issue. Multiple technologies, such as game theory and threshold cryptography, can be integrated to offer effective group and organization behavior management.

    (2) Blockchain architecture with network slicing: Network function virtualization(NFV)enables flexible resource sharing over the same physical infrastructures of a communication network and is envisioned to play an important role in future wireless networks[1]. In NFV, a network slice can contain a set of virtualized functions from multiple physical resource providers and can be managed by local or centralized software defined networks (SDNs)controllers, making DM more complicated. To manage data flows among virtualized functions, the DM architecture design should take into account the roles of new 6G stakeholders, such as a third-party resource provider and a cloud-based slice orchestrator.As the business model and implementation details of NFV-enabled 6G become clearer in the future, their impact on DM architecture design can be studied further.

    (3) Hybrid blockchain architecture design: Blockchain architectures for DM are designed based on either a permissioned blockchain or a permissionless blockchain.Both architectures have their own advantages and disadvantages; the core component of these architectures is the consensus protocol,which affects the system’s scalability and security. To further improve system scalability while simultaneously satisfying the security requirements,a flexible and hybrid blockchain architecture should be utilized, which can support the switching of consensus protocols according to different application requirements in DM. Moreover, as the blockchain plays a critical role in the new information infrastructure for DM toward 6G,blockchain-as-a-service can be a potential solution to provide plug-in DM architecture design[26]that integrates new technologies, such as lightweight clients [116] and stateless blockchains [117].

    (4)Efficient cross-chain interoperability with privacy preservation: Current DM architectures are designed based solely on a single ledger, without fully considering cross-chain interoperability. With a heterogeneous blockchain architecture for DM [118]that accommodates multiple applications, each application may establish its own sub-chain to manage its own data with privacy preservation. This approach is similar to the concept of private channels in a permissioned blockchain, but does not support cross-chain interoperability, due to privacy concerns. Therefore, a new blockchain architecture for DM with efficient cross-chain interoperability requires further study, especially from the perspective of privacy preservation. Hierarchical blockchain architectures can be designed to manage cross-chain communications at the consensus level. Moreover, it is possible to set broker nodes that operate over multiple chains. With identity management for the broker nodes, cross-chain communications can be securely facilitated.

    5.2. AA in blockchain-based DM

    Although blockchain-based AA mechanisms have many advantages, they also raise some efficiency and privacy concerns that should be carefully addressed.

    (1) Lightweight AA: One main difference between blockchainbased AA schemes and conventional AA schemes is that users can self-maintain their identities,with only necessary information being uploaded to the blockchain. With a complicated DM architecture in which multiple stakeholders coexist,a user with limited computing and storage capabilities may have different identity credentials for various use cases. At the same time, blockchain storage and computing resources are expensive in terms of throughput and latency restrictions. As a result, how to achieve blockchain-based lightweight identity management becomes an important issue for DM toward 6G. A potential solution is to integrate with an external credential server for credential management. To enable users to fully control their credentials, additional security guarantees should be achieved, such as verifiable credential updates based on cryptographic accumulators[9]or TEE-based processing.

    (2)Distributed AA with dynamic updates:To further eliminate trust requirements for any single entity, critical AA operations should be conducted by a set of key managers,such as distributed credential issuance and revocation [70]. Such a model can involve many communications between the key managers,and an effective incentive and regulation mechanism is required to manage their behavior.

    Threshold cryptography can be utilized to reduce the computational burdens on the key managers. At the same time, the membership of key managers can change over time and needs to be updated frequently. When the set of key managers changes, the forward and backward security of the identity credentials should also be ensured. That is, the question of how to achieve secure and efficient committee updates becomes a challenging issue.One potential solution is proactive secret sharing [119], in which shared secrets among key managers can be updated frequently.Critical management operations can also be conducted in a secure hardware execution environment.

    (3) Balancing AA privacy and accountability: Identity privacy can have fine-grained levels in DM by only revealing necessary identity information under privacy regulations, such as an organization membership and stakeholder attributes. For different DM use cases, flexible privacy modeling and execution can be integrated with a smart contract to enforce AA privacy management[77]. However, identity privacy should not be uncompromisable for DM toward 6G. In case of strong dispute, blockchain-based AA should recover the real identities of stakeholders in order to conduct investigations and enforce accountability, which can be achieved using threshold encryption techniques. In this case, it is important to have a clear criterion to decide when and how to recover stakeholder identity. A hierarchical identity management committee can be designed with specialized regulatory frameworks.

    5.3. Data processing in blockchain-based DM

    There have been extensive studies on blockchain-based DM,from SNARG/TEE-based solutions for general computations to specialized designs for data sharing and data analytics. However, for blockchain-based DM toward 6G, the question of how to balance functionality, efficiency, and privacy continues to pose the following technical challenges.

    (1)On-chain process design:Blockchain provides a trusted and reliable shared view of certain DM processes among DM stakeholders.As the on-chain storage and computation resources are limited and may cause privacy concerns, DM stakeholders must carefully decide what information to share.There may be very subtle differences between information that should and should not be shared,which may include hash values of original data for integrity checking, DM life-cycle event logs, or just proof of the existence of DM operations. For privacy and efficiency, only pivotal information should be shared, with selective disclosure only to necessary participants [69]. At the same time, there may be cases when onchain data need to be removed, with redactable blockchain techniques as a potential solution.

    (2)Privacy model design:Blockchain-based DM is complicated by its dynamic and heterogeneous participants in various applications, which can lead to rapid changes in privacy requirements[74]. As a result, privacy modeling and evaluations under privacy regulations should be considered to enable flexible privacy management on the blockchain[77],where a natural language processing technique can be a potential solution to help smart contracts better understand privacy requirements.

    (3)Modular design for data processing:Many existing designs can achieve privacy preservation for different DM operations. For example, SNARG can support general arithmetic computations with succinct on-chain verification, TEE is efficient for verifiable hash computations, and searchable encryption can have specialized designs for different query operations. In practice, a DM instance may incur multiple data operations, where a solution based on a single technique cannot meet both the efficiency and privacy requirements.Modular design strategy[120]is a potential solution that decouples DM operation,such as keyword query and identity management [121], with efficient instantiations from different techniques. This strategy requires an overall understanding of different verifiable computation systems in terms of their advantages and limitations. A universal compatible model [122]can be utilized to analyze the systematic security.

    (4) Automation versus transparency and accountability: In Article 22 of GDPR,users have the right to object to automatic decisions regarding their data, which may contradict the automation property of blockchain [11] and AI-based decision-making. However, it is often difficult to guarantee transparency and accountability during an AI-assisted decision-making process in blockchain-based DM[9].A potential solution is to design efficient algorithms to directly evaluate outputs from automatic processes.At the same time, users should be given clear explanations of the impacts of the automatic process on their data and granted the right to object in case of any privacy concerns. For collaborative data processing, it is important to enforce the joint accountability of involved DM stakeholders by establishing DM operation provenance and forensic mechanisms.

    6. Conclusions

    In this paper, we investigated blockchain-based DM for 6G and highlighted its benefits of decentralization and transparency. By identifying efficiency and privacy challenges, we focused on DM architecture design, the AA of DM stakeholders, and blockchainbased data processing.

    To explore potential solutions that balance transparency, efficiency,and privacy in decentralized blockchain-based DM, further research can be directed to the following open issues. First, the impact of network virtualization on DM architecture design should be discussed.Blockchain-based DM requires a flexible and versatile architecture with efficient consensus protocols, inter-chain operability, and fast service-oriented configurations. Second, lightweight and distributed AA with dynamic updates should be designed in order to strike a balance between AA privacy and accountability for blockchain-based DM. Third, an executable privacy model that can accommodate a wide range of privacy requirements in different DM operations should be achieved.Modular integration of privacy-preserving data-processing techniques should be explored under the privacy models.

    Acknowledgments

    This work was supported by research grants from Huawei Technologies Canada and from the Natural Sciences and Engineering Research Council (NSERC) of Canada.

    Compliance with ethics guidelines

    Xuemin (Sherman) Shen, Dongxiao Liu, Cheng Huang, Liang Xue, Han Yin,Weihua Zhuang, Rob Sun, and Bidi Ying declare that they have no conflict of interest or financial conflicts to disclose.

    av天堂中文字幕网| 亚洲欧洲国产日韩| 亚洲av成人av| 91在线精品国自产拍蜜月| 九九爱精品视频在线观看| 亚洲人成网站在线观看播放| 夫妻性生交免费视频一级片| 免费大片18禁| 一卡2卡三卡四卡精品乱码亚洲| 成人亚洲精品av一区二区| 啦啦啦韩国在线观看视频| 国产极品精品免费视频能看的| 国产伦精品一区二区三区视频9| 三级毛片av免费| 精品一区二区三区人妻视频| 插阴视频在线观看视频| 人体艺术视频欧美日本| 男女视频在线观看网站免费| 在线播放无遮挡| 久久99蜜桃精品久久| 九色成人免费人妻av| 嫩草影院新地址| 大香蕉97超碰在线| a级毛色黄片| 尤物成人国产欧美一区二区三区| 联通29元200g的流量卡| 伊人久久精品亚洲午夜| 国产精品久久久久久久电影| 亚洲乱码一区二区免费版| 亚洲av免费在线观看| 99热6这里只有精品| 国产亚洲5aaaaa淫片| 啦啦啦啦在线视频资源| 美女大奶头视频| 国产精品蜜桃在线观看| 黄片wwwwww| 亚洲国产精品国产精品| 日韩欧美三级三区| 一级爰片在线观看| 国产黄a三级三级三级人| 亚洲av中文字字幕乱码综合| 激情 狠狠 欧美| 国产免费男女视频| 欧美激情在线99| 精品国产露脸久久av麻豆 | 国产三级在线视频| 亚洲欧美精品专区久久| 小说图片视频综合网站| 成人午夜精彩视频在线观看| 亚洲人成网站在线播| 免费黄色在线免费观看| 亚洲欧美成人综合另类久久久 | 1000部很黄的大片| 少妇熟女欧美另类| 免费黄色在线免费观看| 久久欧美精品欧美久久欧美| 久久99热6这里只有精品| 美女大奶头视频| 日韩欧美国产在线观看| 亚洲内射少妇av| 青春草亚洲视频在线观看| 国产精品,欧美在线| 蜜臀久久99精品久久宅男| 色网站视频免费| 中文在线观看免费www的网站| 日本爱情动作片www.在线观看| 99九九线精品视频在线观看视频| 九九爱精品视频在线观看| 亚洲国产精品sss在线观看| 韩国av在线不卡| 久久亚洲精品不卡| 日韩一区二区视频免费看| 青青草视频在线视频观看| www.av在线官网国产| 国内精品宾馆在线| 亚洲欧美精品专区久久| 午夜久久久久精精品| 久久精品综合一区二区三区| 亚洲最大成人中文| 午夜福利视频1000在线观看| 又粗又爽又猛毛片免费看| 中文字幕亚洲精品专区| 国产精品一区二区三区四区久久| 国产午夜精品一二区理论片| 两个人视频免费观看高清| 午夜福利在线观看免费完整高清在| 国产中年淑女户外野战色| 搡女人真爽免费视频火全软件| 久久久精品大字幕| 少妇裸体淫交视频免费看高清| 国产精品一区二区在线观看99 | av福利片在线观看| 热99re8久久精品国产| 草草在线视频免费看| 中文字幕av在线有码专区| 少妇猛男粗大的猛烈进出视频 | 在线免费观看的www视频| 久久亚洲国产成人精品v| 午夜老司机福利剧场| 国产极品天堂在线| av黄色大香蕉| 嫩草影院精品99| 插阴视频在线观看视频| 日本黄色片子视频| 欧美另类亚洲清纯唯美| videos熟女内射| 国产在线一区二区三区精 | 国产精品综合久久久久久久免费| www日本黄色视频网| 精品少妇黑人巨大在线播放 | 国产欧美日韩精品一区二区| 69av精品久久久久久| 男人舔奶头视频| 国产综合懂色| 视频中文字幕在线观看| 成人毛片60女人毛片免费| 午夜精品国产一区二区电影 | 亚洲av.av天堂| 特级一级黄色大片| 男人的好看免费观看在线视频| 男女啪啪激烈高潮av片| 国产淫片久久久久久久久| 日韩制服骚丝袜av| 亚洲无线观看免费| 成人av在线播放网站| 大香蕉久久网| 国产中年淑女户外野战色| 国产精品一区二区三区四区久久| 精品酒店卫生间| 国产精品一二三区在线看| 久久精品影院6| 99国产精品一区二区蜜桃av| 精品无人区乱码1区二区| 国产精品一区二区三区四区久久| 色综合色国产| 免费看av在线观看网站| 国产一区二区亚洲精品在线观看| 精品国产露脸久久av麻豆 | 亚洲欧洲国产日韩| 精品少妇黑人巨大在线播放 | 国产精品乱码一区二三区的特点| 久99久视频精品免费| 国产欧美另类精品又又久久亚洲欧美| 欧美激情国产日韩精品一区| 国产中年淑女户外野战色| 有码 亚洲区| 午夜福利网站1000一区二区三区| 乱码一卡2卡4卡精品| 99国产精品一区二区蜜桃av| 日韩欧美精品v在线| 国产极品精品免费视频能看的| 少妇被粗大猛烈的视频| 色噜噜av男人的天堂激情| 特级一级黄色大片| 欧美人与善性xxx| 欧美3d第一页| 超碰av人人做人人爽久久| 国产高潮美女av| 成人美女网站在线观看视频| 国产在视频线精品| 免费av毛片视频| h日本视频在线播放| 亚洲人成网站在线播| 91久久精品国产一区二区成人| 蜜臀久久99精品久久宅男| 亚洲精华国产精华液的使用体验| 51国产日韩欧美| 久久久精品欧美日韩精品| 日本五十路高清| 久久久久免费精品人妻一区二区| 国产中年淑女户外野战色| 淫秽高清视频在线观看| 男人舔奶头视频| 中文资源天堂在线| 国产亚洲一区二区精品| 久久久精品欧美日韩精品| 国产亚洲5aaaaa淫片| 国产伦在线观看视频一区| 亚洲一区高清亚洲精品| 精品久久久久久电影网 | 免费不卡的大黄色大毛片视频在线观看 | 免费电影在线观看免费观看| 永久网站在线| 联通29元200g的流量卡| 亚洲欧美一区二区三区国产| 九九热线精品视视频播放| av在线观看视频网站免费| 中文资源天堂在线| 欧美成人免费av一区二区三区| 我要搜黄色片| 色噜噜av男人的天堂激情| av福利片在线观看| 成人欧美大片| 成人特级av手机在线观看| 亚洲18禁久久av| 一本一本综合久久| 欧美成人精品欧美一级黄| 国产精品久久久久久av不卡| 久久久成人免费电影| av.在线天堂| 亚洲人成网站高清观看| 水蜜桃什么品种好| 国产精品精品国产色婷婷| 少妇人妻一区二区三区视频| 国产精品国产高清国产av| 99久久成人亚洲精品观看| 18禁裸乳无遮挡免费网站照片| 精品国产露脸久久av麻豆 | 欧美高清成人免费视频www| 啦啦啦啦在线视频资源| 国产精品久久久久久av不卡| 免费不卡的大黄色大毛片视频在线观看 | 亚洲av福利一区| 亚洲激情五月婷婷啪啪| 内射极品少妇av片p| 精品久久久久久久久久久久久| 亚洲综合精品二区| 国国产精品蜜臀av免费| 亚洲国产精品sss在线观看| 亚洲色图av天堂| 观看免费一级毛片| 国产成人aa在线观看| 两个人视频免费观看高清| av免费在线看不卡| 日韩av在线免费看完整版不卡| 国产午夜精品论理片| av线在线观看网站| 国产成人aa在线观看| 国产免费视频播放在线视频 | 久99久视频精品免费| 97超碰精品成人国产| 永久网站在线| 在线观看av片永久免费下载| 亚洲欧美精品专区久久| 亚洲欧洲国产日韩| 国产亚洲91精品色在线| 最近手机中文字幕大全| 99国产精品一区二区蜜桃av| 国产精品三级大全| 热99在线观看视频| 久久精品人妻少妇| 三级男女做爰猛烈吃奶摸视频| 国产淫语在线视频| 午夜福利成人在线免费观看| 国产人妻一区二区三区在| 丝袜美腿在线中文| 天堂√8在线中文| 男人舔女人下体高潮全视频| 91久久精品电影网| 一个人观看的视频www高清免费观看| 亚洲精品456在线播放app| 夫妻性生交免费视频一级片| 亚洲国产欧洲综合997久久,| 国产黄色视频一区二区在线观看 | 听说在线观看完整版免费高清| 女人被狂操c到高潮| www.av在线官网国产| 久久久久久伊人网av| 国产精品嫩草影院av在线观看| 乱码一卡2卡4卡精品| 亚洲av中文av极速乱| 一区二区三区四区激情视频| 国产在线一区二区三区精 | 久久久久久国产a免费观看| 在线免费观看不下载黄p国产| 国产伦精品一区二区三区四那| 2022亚洲国产成人精品| 免费看美女性在线毛片视频| 国产91av在线免费观看| 熟女电影av网| 亚洲精品国产成人久久av| 国产69精品久久久久777片| 女人久久www免费人成看片 | 久久久久网色| 啦啦啦韩国在线观看视频| 日本色播在线视频| 2021少妇久久久久久久久久久| 国产精品人妻久久久久久| 国产午夜精品久久久久久一区二区三区| 在线观看美女被高潮喷水网站| 久久草成人影院| 波野结衣二区三区在线| 亚洲av福利一区| 晚上一个人看的免费电影| 中文亚洲av片在线观看爽| 精品久久久久久久久av| 亚洲一区高清亚洲精品| 看十八女毛片水多多多| 麻豆国产97在线/欧美| 91精品国产九色| 欧美日韩综合久久久久久| 国国产精品蜜臀av免费| 久久精品国产亚洲av天美| 久久欧美精品欧美久久欧美| av视频在线观看入口| 午夜精品一区二区三区免费看| 黄片无遮挡物在线观看| 91久久精品国产一区二区成人| 久久精品熟女亚洲av麻豆精品 | 网址你懂的国产日韩在线| 一边亲一边摸免费视频| 特大巨黑吊av在线直播| 永久免费av网站大全| 日日干狠狠操夜夜爽| 亚洲丝袜综合中文字幕| 国产av在哪里看| 国内精品宾馆在线| 国产午夜精品一二区理论片| 国产亚洲5aaaaa淫片| 18禁裸乳无遮挡免费网站照片| 日韩一区二区视频免费看| 久久精品国产自在天天线| 久久久色成人| 伦精品一区二区三区| 国产成年人精品一区二区| 韩国av在线不卡| 人人妻人人澡人人爽人人夜夜 | 国产乱人视频| 欧美精品国产亚洲| 精品99又大又爽又粗少妇毛片| 人体艺术视频欧美日本| 国产精品爽爽va在线观看网站| 老司机福利观看| 中文亚洲av片在线观看爽| 国产亚洲最大av| 亚洲人成网站高清观看| 爱豆传媒免费全集在线观看| 亚洲人成网站高清观看| 亚洲自偷自拍三级| 亚洲人成网站高清观看| 国产私拍福利视频在线观看| 中文在线观看免费www的网站| 久久久久精品久久久久真实原创| 一卡2卡三卡四卡精品乱码亚洲| av播播在线观看一区| 熟女人妻精品中文字幕| 在线观看av片永久免费下载| 日韩 亚洲 欧美在线| 1000部很黄的大片| 人妻少妇偷人精品九色| 久久精品人妻少妇| 99热全是精品| 久久99蜜桃精品久久| 久久精品夜色国产| 汤姆久久久久久久影院中文字幕 | 超碰97精品在线观看| 亚洲精品久久久久久婷婷小说 | 在线观看66精品国产| 免费搜索国产男女视频| 九草在线视频观看| 日日摸夜夜添夜夜爱| 成人高潮视频无遮挡免费网站| 亚洲av一区综合| 91狼人影院| or卡值多少钱| 中文资源天堂在线| 校园人妻丝袜中文字幕| 黄色一级大片看看| 99久久无色码亚洲精品果冻| 亚洲经典国产精华液单| 一级毛片我不卡| 欧美最新免费一区二区三区| 欧美xxxx黑人xx丫x性爽| 亚洲色图av天堂| 免费搜索国产男女视频| 成人亚洲欧美一区二区av| 精品久久久久久久末码| 亚洲中文字幕日韩| 国产亚洲精品久久久com| 日本黄色视频三级网站网址| 能在线免费看毛片的网站| 成人亚洲欧美一区二区av| 精品久久久久久久末码| 亚洲国产高清在线一区二区三| 日韩一区二区视频免费看| 亚洲伊人久久精品综合 | 国产三级中文精品| 国产乱来视频区| 亚洲精品aⅴ在线观看| 老司机影院成人| 永久免费av网站大全| 精品一区二区三区视频在线| 国产成人精品久久久久久| 国产亚洲精品久久久com| 国产极品精品免费视频能看的| 国产精华一区二区三区| 寂寞人妻少妇视频99o| 好男人在线观看高清免费视频| 精品熟女少妇av免费看| 午夜爱爱视频在线播放| 久久欧美精品欧美久久欧美| 欧美3d第一页| 国产不卡一卡二| 成人亚洲精品av一区二区| 少妇丰满av| 亚洲不卡免费看| 精品久久久久久电影网 | 97在线视频观看| 午夜免费男女啪啪视频观看| 99九九线精品视频在线观看视频| 欧美日本视频| 视频中文字幕在线观看| 看十八女毛片水多多多| 日韩一本色道免费dvd| 国产精品久久久久久精品电影小说 | 日韩精品青青久久久久久| 国产成人aa在线观看| 神马国产精品三级电影在线观看| 亚洲一区高清亚洲精品| 久久精品夜夜夜夜夜久久蜜豆| 成人亚洲精品av一区二区| 国产精品av视频在线免费观看| 欧美成人午夜免费资源| 日韩大片免费观看网站 | 男女下面进入的视频免费午夜| 欧美高清性xxxxhd video| 亚洲伊人久久精品综合 | 国产一区二区在线观看日韩| av黄色大香蕉| 少妇的逼好多水| 国产亚洲av片在线观看秒播厂 | 国产精品人妻久久久影院| 精品国内亚洲2022精品成人| 中文字幕熟女人妻在线| 一个人看视频在线观看www免费| 亚洲欧美日韩卡通动漫| 国产熟女欧美一区二区| 精品一区二区三区视频在线| 国产亚洲5aaaaa淫片| 嘟嘟电影网在线观看| 少妇被粗大猛烈的视频| 在线播放国产精品三级| 欧美精品国产亚洲| 中文字幕av在线有码专区| 激情 狠狠 欧美| 伦精品一区二区三区| 99国产精品一区二区蜜桃av| 九九在线视频观看精品| av女优亚洲男人天堂| 亚洲精品自拍成人| 国产精品久久久久久久久免| 久久婷婷人人爽人人干人人爱| videos熟女内射| 高清av免费在线| 亚洲精华国产精华液的使用体验| av在线播放精品| 成人亚洲欧美一区二区av| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 久久精品国产亚洲av天美| 亚洲av中文av极速乱| 国产老妇伦熟女老妇高清| 人人妻人人澡人人爽人人夜夜 | 久久久久网色| 人人妻人人澡欧美一区二区| 一卡2卡三卡四卡精品乱码亚洲| 精品一区二区免费观看| 欧美97在线视频| 激情 狠狠 欧美| 久久久久国产网址| 国语对白做爰xxxⅹ性视频网站| 人妻夜夜爽99麻豆av| 麻豆乱淫一区二区| 亚洲欧美成人综合另类久久久 | 成人特级av手机在线观看| 久久久久久久久久成人| 亚洲五月天丁香| 久久精品91蜜桃| 日韩 亚洲 欧美在线| 成人三级黄色视频| 99久久成人亚洲精品观看| 久久人人爽人人爽人人片va| 尾随美女入室| 欧美xxxx黑人xx丫x性爽| 成人毛片60女人毛片免费| a级毛色黄片| 久久久久精品久久久久真实原创| 99热这里只有是精品50| 久久久精品欧美日韩精品| 国产毛片a区久久久久| 插阴视频在线观看视频| 午夜日本视频在线| 午夜精品国产一区二区电影 | 精品不卡国产一区二区三区| 人妻少妇偷人精品九色| 欧美日韩精品成人综合77777| 日韩欧美国产在线观看| 色哟哟·www| 久久精品国产亚洲av涩爱| 日韩欧美精品免费久久| 亚洲精品乱码久久久久久按摩| 日韩 亚洲 欧美在线| 亚洲精品成人久久久久久| 老师上课跳d突然被开到最大视频| 亚洲av免费在线观看| 国产高清三级在线| 亚洲精品乱久久久久久| 小蜜桃在线观看免费完整版高清| 69av精品久久久久久| 欧美三级亚洲精品| 国产精品一二三区在线看| 日韩制服骚丝袜av| 秋霞伦理黄片| av视频在线观看入口| 亚洲中文字幕一区二区三区有码在线看| 免费黄色在线免费观看| 亚洲欧美成人综合另类久久久 | 一级毛片久久久久久久久女| 九九在线视频观看精品| a级毛色黄片| 亚洲国产精品专区欧美| 国产精品人妻久久久久久| 91精品伊人久久大香线蕉| 91久久精品电影网| 成人亚洲精品av一区二区| 亚洲国产欧洲综合997久久,| 国产成人一区二区在线| 春色校园在线视频观看| 亚洲乱码一区二区免费版| 亚洲天堂国产精品一区在线| 九九热线精品视视频播放| 亚洲色图av天堂| 久99久视频精品免费| 色噜噜av男人的天堂激情| 联通29元200g的流量卡| 女人十人毛片免费观看3o分钟| 大话2 男鬼变身卡| 欧美成人精品欧美一级黄| 国产男人的电影天堂91| 亚洲最大成人中文| 亚洲av免费高清在线观看| 91aial.com中文字幕在线观看| 欧美另类亚洲清纯唯美| 成年女人永久免费观看视频| h日本视频在线播放| 亚洲人与动物交配视频| 久久99热这里只有精品18| a级一级毛片免费在线观看| 亚洲国产精品成人综合色| 国产极品精品免费视频能看的| 午夜福利视频1000在线观看| av在线蜜桃| 狂野欧美白嫩少妇大欣赏| 日本五十路高清| 嘟嘟电影网在线观看| 少妇被粗大猛烈的视频| 观看免费一级毛片| 高清av免费在线| 午夜视频国产福利| 国产亚洲最大av| 日韩成人伦理影院| 一个人免费在线观看电影| 成人高潮视频无遮挡免费网站| 欧美激情在线99| 亚洲成人av在线免费| 亚洲国产最新在线播放| 国产精品一区二区在线观看99 | 九色成人免费人妻av| 久久这里有精品视频免费| 中文字幕熟女人妻在线| 精品少妇黑人巨大在线播放 | 九草在线视频观看| 国产精品久久视频播放| 欧美日韩一区二区视频在线观看视频在线 | 国产中年淑女户外野战色| 村上凉子中文字幕在线| 特大巨黑吊av在线直播| 精品久久久久久电影网 | 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 国产亚洲5aaaaa淫片| 乱码一卡2卡4卡精品| 少妇裸体淫交视频免费看高清| 久久精品91蜜桃| 如何舔出高潮| 久久久成人免费电影| 国产高清三级在线| 91久久精品国产一区二区三区| 久久久久免费精品人妻一区二区| 最近中文字幕高清免费大全6| 欧美日韩国产亚洲二区| 亚洲成av人片在线播放无| 91av网一区二区| 非洲黑人性xxxx精品又粗又长| 永久网站在线| 毛片女人毛片| 亚洲色图av天堂| 欧美一区二区亚洲| 欧美潮喷喷水| 国产男人的电影天堂91| 亚洲图色成人| 3wmmmm亚洲av在线观看| 啦啦啦啦在线视频资源| 蜜臀久久99精品久久宅男| 成人av在线播放网站| 免费观看在线日韩| 97热精品久久久久久| 亚洲色图av天堂| 嫩草影院新地址| 中文资源天堂在线| 成年女人永久免费观看视频| 国产成人精品一,二区| 亚洲av男天堂| 久久精品国产亚洲av天美| 91av网一区二区| 国产精品一二三区在线看| 日韩av不卡免费在线播放| 亚洲欧美日韩高清专用| 亚洲精品aⅴ在线观看| 国产中年淑女户外野战色| 国产真实伦视频高清在线观看| 美女高潮的动态| 精品久久久久久电影网 | 日本黄大片高清| 男插女下体视频免费在线播放| 久久久久国产网址| 99九九线精品视频在线观看视频|