• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Privacy-Based SLA Violation Detection Model for the Security of Cloud Computing

    2017-04-09 05:53:06ShengliZhouLifaWuCanghongJin
    China Communications 2017年9期

    Shengli Zhou*, Lifa Wu Canghong Jin

    1 Army Engineering University, Nanjing 210007, China

    2 Information Department of Zhejiang Police College, Hangzhou 310000, China

    3 Zhejiang University City College, Hangzhou 310000, China

    * The corresponding author, email: 76933768@qq.com

    I. INTRODUCTION

    Cloud computing is a computing model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks,servers, storage, applications, and other services) that can be rapidly provisioned and released with minimal management effort or cloud service provider (CSP) interaction[1].An increasing amount of work is migrating from the desktop environment to the cloud[2].However, current security incidents, such as,the leaking of information on 5 million Gmail accounts and iCloud vulnerability, which has led to the disclosure of the personal data of celebrities and others, poses an ever present threat to user privacy. By exploiting system vulnerabilities and elevating their own user privileges, hackers can make unauthorized actions, for instance, reading other user data[3].From this perspective, it is also particularly important to prevent privileged administrators in a cloud environment from carrying out illegal actions. One way to implement this would be for the cloud service provider to sign a service level agreement (SLA) to identify the privacy requirement from SC. However,a traditional SLA is mostly enacted for the purpose of ensuring Quality of Service (QoS)and is seldom aimed at protecting the user’s privacy and SLA management model, even if they have a security strategy on the basis of character matching. In this paper, a SLA-based Privacy Protection Model (SLA-BPPM)is devised for the maintenance of the user’s privacy in a cloud-computing environment.This is based on a Markov decision-making process, which is introduced for modeling according to the users’ privacy requirements in the SLA, which can result in the permission of CSP operation. Additionally, the operation of the CSP is specifically recognized as a threat to SC when it operates outside the expected range. This model is unique among existing SLA based models in that it is designed to prevent the CSP from violating the users’ privacy.

    The remainder of this paper is organized as follows. Section 2 describes related work.Section 3 introduces the background and technology of Markov Decision Processes. Section 4 introduces the design of the SLA-BPPM.Section 5 analyzes the implementation of the model. Section 6 describes two experiments,which facilitate testing and analysis on the model. Finally, the last section concludes the paper and proposes further work.

    The authors propose a privacy-based SLA violation detection model for cloud computing based on Markov decision process theory to supervise a cloud service provider (CSP)directly.

    II. RELATED WOR K

    For cloud computing, most research on SLAs focuses on QoS. In situations where QoS is violated, the CSP will be penalized[4]. In [5], the authors transferred the concept of a Web Service Level Agreement (WSLA) to cloud computing and designed a service measurement module, a service state estimation module and a service management module. Meanwhile,this agreement has been adapted for the particular conditions of cloud computing. With the design of these three modules, the QoS and level of security can be measured and service management can also be carried out, based on the service status and conditions under which the SLA is violated. In [6], the authors proposed a way to measure concerns about the security of QoS in cloud computing, in which users can judge the reliability of a CSP and choose a suitable one if their requirements are not met.

    In [7], the authors provided a comprehensive introduction to the field of Cloud monitoring. Several critical issues, such as the motivations for taking monitoring strategies in Cloud computing and some major properties of the monitoring system were discussed in this article. Moreover, this paper also reviewed some commercial and open-source Cloud Monitoring systems. In [8], a SLA Violation detecting infrastructure (DeSVi) was proposed to monitor SLA violations. This infrastructure was responsible for allocating resources for a requested service. At the same time, the resources are monitored by a new framework that is able to map the low-level resource metrics to user-defined SLAs. Moreover, this model also detected possible SLA violations through knowledge databases. In addition,the optimal configuration of SLA parameters in this model were investigated in stress tests generated by two applications: (1) image rendering applications based on ray-tracing and(2) transactional web applications based on the well-known TPC-W benchmark. In [9],the authors developed a set of related SLA indicators based on the pattern of three major service formats of cloud computing, namely:Software as a Service (SaaS), platform as a Service (PaaS), and infrastructure as a Service(IaaS). These indicators can be monitored while the CSP is providing services. In [10][11], the authors undertook research into setting up a framework, known as LoM2HiS, that could report the supervising indicators of fundamental infrastructures to SLA clauses. This research also investigated the optimization of time intervals for supervision. In additional,they also established a framework called DeSVi, which could detect situations when the SLA is violated by the CSP. This framework allocated and deployed system resources for a virtual machine by utilizing LoM2HiS. It also implemented the function of automatic status monitoring where the SLA was deemed to be violated by the CSP when key indicators crossed a predefined threshold.

    In [12], the authors devised a model that could automatically match with SLA parameters, and the CSP could also be selected automatically based on the content demanded by the SLA. In addition, this model enables the user to build learning templates according to their own requirements and set up SLA param-eters that can be recognized easily. One weakness of above models is that the SC’s benefits are affected even if the CSP is penalized subsequent to any violation of the requirements of the agreement. In [13], the authors formulated a more rigorous threshold value according to the indicators established in the SLA. This value is even more rigorous than the real threshold value. In this way, the CSP can be regulated before they go beyond the threshold.However, this strategy presents another problem, which is that users may become dissatisfied with the service due to the regularity of apparent violations. The user may then leave the service so undermining the purpose of the SLA.

    In [14], the authors presented an overview of SLA monitoring and made a comprehensive analysis of it in the context of trust maintenance in cloud computing. In [15], the authors devised a model that can update the trustworthiness of peer clients and statistically analyze data on providers without any intervention from a central entity. The prices in later transactions are negotiated based on the level of trustworthiness displayed during previous transactions. The model is also embedded into the Service Level Agreement negotiation and enforcement process, thus giving priority to trusted clients to minimize the consequences of Low Quality of Service. In [16], the authors introduced a mechanism to calculate a service provider’s trustworthiness, based on their compliance to the promised SLA parameters.This model was simulated in a MATLAB program to prove its applicability in a cloud environment. Other articles have also made useful contributions in SLA violations detection.Paper [17] proposed a violations detection system which implemented a re-negotiation process for SLAs to limit the over provisioning of resources and thus achieved an optimal usage of resources. Paper [18] proposed a service-oriented monitoring system called Grid Eye, which has an extensible architecture and enables the prediction of overall resource usage. Paper [19] gave a general survey of the current state of SLA management in Cloud computing and introduces some performance measurement models for SLA, giving their advantages and limitations. This was useful for obtaining an overview of the performance of existing measurement models.

    In [20], the authors designed an automatic negotiation model for SLAs, which formulated a sound SLA based on a set of quality parameters for the CSP to meet, as well as the requirements of users. This aimed to maximize the interests of users and help them to make good decisions in choosing the right CSP for them. Our paper improves the posterior test for SLA’s management by taking the concept of above model, and thus conducts the protection of users’ privacy by means of an SLA.In the meantime, the model of users’ privacy requirements in SLA has also been built and a set of operations that conform to users’ requirements have been generated accordingly.In addition, this model attempts to anticipate the intentions of the CSP in order to permit operations that are beneficial for users and prohibit the operations that will violate users’privacy. Furthermore, the problem of excessive resource consumption associated with traditional encryption based privacy protection mechanisms is avoided in our model, as is the risk of arbitrary operations by administrators.

    III. TECHNOLOGICAL BACKGROUND

    IV. MODEL DESIGN

    A SLA forms a bridge between the CSP and users. Three elements of particular importance in its management process are: parameter definition, reporting, and penalties for violating the rules. A SLA-BPPM in combination with SLAs has achieved the data and privacy protection target that can satisfy the demands of users. The major function modules in this model are the SLA identification module, optimized modeling module, violation detection module and the CSP behavior-supervising module. An additional database, which stores the possible action set of the CSP is also included in this model, the structure of which is depicted in figure 1.

    SLA parameter identification: This module parses the SLA files to obtain the privacy requirements of the user. It then converts them into a form, which is suitable for the modeling phase.

    Optimized modeling: This is a core function module, which contains all possible actions by the CSP. Using MDP, a users’ privacy requirements model is established and an action set is generated where every state is associated with an action and a reward is also linked with the execution of each possible action. When the terminal state is reached, the model finds the action set which earns the highest reward.This becomes the optimized action set that is allowed by the privacy requirements.

    CSP behavior monitor: The actions of the CSP are monitored and collected in real-time while they are providing services. The CSP’s actions are recorded and delivered to the violation detection module.

    Violation detection: The CSPs behavior is compared against the optimized action set.The CSP is judged to be in violation of the users’ privacy requirements if their real-time action conflicts with optimized action set. In this case, they will be penalized accordingly.

    CSP action set: This contains the information needed for modeling. It stores all the operations that the CSP might take, the operations of administrators and users, which may be authorized or unauthorized, are all included in this set.

    Fig. 1 SLA-BPPM functional framework

    Fig. 2 Metric type expansion

    Fig. 3 Metric definition example

    Fig. 4 Example of privacy-based SLA file definition

    The SLA-BPPM should operate as a third party, independent from users and the CSP,although the cooperation of CSP is needed to gain access to the actions of the CSP. In order to obtain more reliable services, the SLA model could be deployed by the CSP and managed by specialized personnel. Additionally, it is possible to observe the daily behavior of the CSP, which provides a way to ensure power separation. The detailed implementation of our model will be presented in the following section.

    V. MODEL IMPLEMENTATION

    The human-machine interaction is implemented using an XML file as commonly applied in web services. This format is also adopted in our paper, but leaves out the negotiation procedure between the users and the CSP.

    In our model, the implementation of the module “CSP behavior monitor” and “CSP actions set” requires the support of the CSP. We can get the set by employing some social engineering measures or from the related set and operation feedback interfaces provided by the CSP. The following section of this paper will describe the technological details of the three other modules.

    5.1 Parameter identification

    In web services, SLA documents are generally written using WSLA, as developed by IBM.This document defines the basic format and related parameters that ensure the appropriate QoS features. Our paper uses the format of this document and makes some extensions to incorporate protocols to implement privacy and security involving users and the CSP. In cloud computing, the major threats to users are: leakage of data, incomplete deletion of data, failure to isolate user data from others,illegal transferring of data, and the mining of data [11]. Focusing on the above security threats, we expand Metric and add some types for protecting users’ privacy as shown in figure 2.

    Users base their negotiation for the SLA on this definition and the metric parameters for the SLA can be also defined here. As shown in figure 3, the example calls this Metric “PrivacyPromises,” and shows that the CSP, which provides these services is “CSPProvider” and the pledged promises are “NoLeakage” and“PermanentDelete.”

    A complete document is shown in figure 4, which defines the providers, customers and optional third party services. The parameter“sponsor” defines the object with optional third party supports. The supporter of services introduced in this model is SLA_BPPM mod-el, which enables the evaluation of services provided by the CSP. In this paper, privacy protection is seen as a service, which conforms to the service oriented mechanism. The metric’s definition is cited in the parameter of services, which indicates the standard by which to measure services. The parameter “source”refers to the provider of the parameter, which is also the provider of services. “Pull” represents the receiving party of this parameter,which is the optional third party.

    5.2 Optimized modeling

    After defining the privacy requirements of users in the SLA, the model SLA-BPPM attempts to build an environmental model for the operations that will be provided to users by the CSP. This model defines a set of stateswhich denotes the situation after an action operation was taken by the CSP.represents the initialized state that started before any operation has been executed on the user data. An operations setdenotes the possible operations that the CSP might take on the user data. When the user data is in state si, an operationis carried out by the CSP which causes the data to shift to sj. The set of operations are executed sequentially by the CSP, where there is a particular probability that the CSP chooses an operationto move the system into the next state. In other words, the CSP’s operation on the user data is represented as a random process. The data state sjis determined solely by siand operationwith the state before sjhaving no effect. Out of the above characteristics, we choose MDP to model the operations of the CSP, in order to get a decision that will satisfy the users’ privacy requirements. Based on this decision, we inspect the CSP’s operations on the user data to see if any violation has taken place, and regulate the CSP’s behavior in order to protect the users’ privacy.

    With the adoption of the set of states S and action set A, we define a MDPAll symbols are the same as those described in section 2. As shown in figure 5, the circular ring denotes the state of the user data, and the arrow represents the shifting of the state after the implementation of operation a with probability p and reward r. Both the operations set and the state set in the model are discrete and finite sets, so the MDP shown in figure 5 should be regarded as a discrete MDP. In the interests of clarity, the intermediate states and operations, as well as the related subscripts,are omitted.

    To calculate the optimized decision V, not only the already determined parameters S and A, but also the parameter P and reward function R are needed. P denotes the probability of state s transitioning due to the triggering of operation a, which is also the probability of an operation that will be taken to user data by the CSP. For every state si, the model SLA-BPPM records the number of times sishifts to sj, after operationand is denoted asOn the basis ofthe probability can be calculated with the formula

    In this model, the reward function indicates how well the CSP’s operations conform to the specific requirements of the user data privacy.It is a variable, which is highly relevant to users and can be determined by users’ feedback on the CSP’s operations.

    Fig. 5 Environment modeling

    We define a quintuple privacya_i(si,sj) =, corresponding to the 5 types of privacy requirements that were introduced in section 5.1. After users’ have completed a set of transactions through the CSP, feedback is generated on the level of compliance for the 5 types of privacy requirement. The feedback ranges between[-2, 2]. For example, if a user gives feedbackthen all related components are updated with the formula: privacyai(si,sj).noleak = privacyai(si,sj).noleak + feed.noleak.In addition, the related components of the reward function can be calculated with the formula

    The calculated reward function is a proportion in global condition, which represents the impact that the operation has been taken by comparing with other operations.

    5.3 Violation detection

    In practice, the CSP may choose strategyin preference to carrying out operationThere is a risk that the users’ privacy could be violated by the chosen operation.When defining the set of optimal strategiesand operations setthree situations are possible, namelyandmeans that the CSP has seriously violated the users’ privacy requirement and in this situation, the CSP can be regarded as unreliable. Ifthe CSP has performed some additional operations on the user data which indicates some risk of undermining the users’ privacy. Lastly,indicates that both the requested operations and the users’ privacy protection have all been accomplished. The model in this paper is able to decide whether the CSP has jeopardized the users’ privacy with a probability, which is calculated objectively. Therefore, in practice, the results should be repeatable.

    The user behavior based CSP reliability analysis can be conducted according to state transfer of Markov’s model. The analysis process is designed as follows. First, the existing CSP operations are statistically evaluated, including the classification of CSP’s operations and the number of operations of each category.At the same time, for each type of operation in different scenario, we estimate probability of each specific operation that is generated afterward. The Markov transfer matrix can be used calculate the next step, and since the Markov method has no subsequent validity, the state of operation in step n only relates to the operation in the n-1 step. The expression is as follow:

    In the expression, N identifies the number of behaviors, P denotes that in N-1 step, the ratio of transfer from operation j to operation i, V means the abnormal operation from step n-1 to step n, such as exception interruption,etc. And V is equal to zero when no exception value is put into consideration.

    Therefore, the number of actions in a certain step is determined by the number of the previous step and the respective matrix of both the steps. The matrix is as follows:

    The establishment of transfer matrix is the core part of the entire model, and the build process can be divided into two steps. First of all, users’ operation log is collected and statistically analyzed in order to get the correlation of users’ accounts, time, and and operation types, and bayesian conditional probability model is used to get the transfer probability of each pair of steps. Secondly, due to the uncertainty of users’ behavior, some random factors are placed in different steps, making the matrix partially different each time.

    VI. EXPERIMENT AND ANALYSIS

    In the experiment, the simulation part is conducted on CloudSim, a cloud computing simulation software developed by the university of Melbourne, which supports the modeling and simulation of large-scale cloud computing infrastructure. The simulation layer of Cloudsim provides support for the configuration and simulation of virtual data center, including virtual machine, memory, storage capacity and bandwidth interface, which can be used to study on the allocating strategy from host machine to virtual machine, and the strategy can be implemented by extending some core virtual machine scheduling functions.

    The experiment is conducted mainly on the recognition of the operations that undermine user privacy, and recognition accuracy is also tested. At them same time, the experiment takes simulation test only on the recognition function and ignored the cloud platform’s influence of the consumption of performance and resource . Since there is no similar publication on the related model of SLA, our experiment result cannot be compared with other related models.

    6.1 Running environment building

    This experiment is carried out based on the operation log of CSP of a cloud platform employed by a domestic Internet company. Since the secrecy and sparsity of the company’s business, some part of the analysis is simulated and amplified. Using a certain government cloud system, we record 6600 user data items,and tasks are divided into user full-text retrieval is named as FullSearch, the user path search, key staff query Important Person Query, key region query , equipment factory query are named as Path Search, Important Person Query, Key Areas Query and Manu Factory Query, respectively.

    Each row and column in the matrix corresponds to one of the five behaviors listed in table 1, and the building results of Markov matrix on associated behavior of average administrator and senior administrator, which is as follows.

    From the two matrices shown above, there is an evident difference of transfer probability between different roles, for CSP’s super administrator, the behavior correlation is higher than that of the average user. The probabilities of transferring between different operations are also different, for instance the probabili-ty of a path query and a key person query is higher than that occurring between other operations.

    The 6,600 data items were evaluated by third party business experts, with 193 problems in total proposed, labeled as 0 and 1 respectively. Based on this actual labeled data,a total of 1 million records from 10000 users,with an average of 100 operations per user,are collected using simulation devices. We properly adjust the data and magnify the proportion of abnormal behavior, thus 95% normal operations and 5% abnormal operations are produced. As shown in chapter 5.1, users violation actions are divided into five types.Since the deletion operation is not contained in users’ operations set, so we take four types of violations as the classification, as shown in table 2. Therefore, for the people that have one of the abnormal behavior, we give them an associated role, and some actions can be shared by multiple roles.

    6.2 Model prediction

    Fig. 6 Convergence of the model

    Table II Ratio of illegal behavior

    This experiment mainly conducted two kinds of experiments on the given simulated data.According to the actual operation procedure of ali yun, the order of operation is randomly sorted after the similarity comparison, the details are listed as follows:

    (1) Extract and classify the relevant aliyun CSP operation and users

    (2) Sort each type of users’ operations based on time.

    (3) Attain the operating mode from the training in the manually labeled scene.

    (4) Set a scene label based on the pattern recognition result of the scene.

    This completes the collection and analysis of the user’s normal behavior, while the user’s exception behavior is inserted randomly by the program, which is conducted based on the behavior pattern listed in 5.1.

    Experiment I:This is used to inspect the convergence speed of the model and determine the number of user operations that are needed before the model results stabilize. Assuming that the transaction probability before the implementation of a certain operation and the transaction probability calculated after the operation is P1 and P2 respectively,the vertical axis of a graphical representation will be,and the horizontal axis is the number of transactions completed using the CSP. In addition, the value ofwill be gradually reduced with an increasing number of transactions, which will approach zero asymptotically. The lower transaction times are,the faster the convergence speed of the model.The experimental process is described in figure 6.

    Experiment II: check the accuracy of the reward function. When the system stabilizes,the user trades with the CSP, setting a privacy target in the transaction, such as information that is not compromised. CSP in this experiment can choose m operations, among them there are n operations that must be completed in the transaction , and the other m - n ones is not the necessary operations (in order to better denote dangerous actions), and a possible leak of user privacy may exist in these unnecessary operations. Then we calculate the score of the reward function and determine whether the ac-tion is illegal, on the given threshold value of 0.3. By comparing the result with the violation data in simulation, we obtain the relevant coverage, accuracy and F value.

    According to the random sampling method,1000 related users and their data are obtained from one million records, and a test collection is produced according to the regular behaviors and labeled violation behaviors. Take 10 relevant tests, and get the average value average of accuracy and coverage, we get the F value calculated, as shown in table 3.

    Illustrated by table 3, the SLA-BPPM model has the ability to predict different types of violations, With highest accuracy for the prediction of the violation behavior existed in data mining and best comprehensive performance of the F value, thus means that the model has better real world performance.

    VII. CONCLUSION

    The assessment of CSP’s service quality is the hot spot in the research of the cloud computing platform. In this paper, SLA-BPPM is shown to be able to supervise the operation of CSPs by utilizing a Markov decision-making process to detect whether a CSP has violated the users’ privacy within a certain range of probability. Meanwhile, the CSP’s operations could be moderated using the model so as to avoid the violation of uses’ privacy. And the experiment results indicate that SLA-BPPM can better recognize the violation behavior and possess good practicality.

    One limitation of this model is that it requires the cooperation of the CSP for its operation and the users’ role setting also needs to be determined aforehand. In future work, the modeling process could be carried out with a hidden Markov model, which may reduce the dependency on the CSP and suffice more general running state of cloud computing.

    This work was supported in part by National Natural Science Foundation of China (NSFC)under Grant U1509219 and 2017YFB0802900.

    Table III The average accuracy, coverage and F value of all scenes

    Reference

    [1] X D WANG et al., “Research on Security of Virtualization on Cloud Computing,” Telecommunications Science, vol. 31, no. 6, 2015, pp. 8-25.

    [2] LIU M H et al., “Research on Sensitive Data Protection Technology on Cloud Computing,” Telecommunications Science, vol. 30, no. 11, 2014,pp. 2-8.

    [3] Feng DG et al., “Study on cloud computing security,” Journal of Software, vol. 22, no. 1, 2011,pp. 71-83.

    [4] M. Alhamad et al., “SLA-Based Trust Model for Cloud Computing,” Proc. 2010 13th International Conference on Network-Based Information Systems, 2010, pp. 321-324.

    [5] Patel, P. et al., “Service Level Agreement in Cloud Computing.” Proc. Cloud Workshops at OOPSLA, 2009, pp.55-58.

    [6] Zhang, J. et al., “a petri-net based specification model for web services,” Proc. IEEE International Conference on Web Services, 2004, pp. 420–427.

    [7] Giuseppe Aceto et al., “Cloud monitoring: A survey,” Computer Networks, vol. 57, no. 5, 2013,pp. 2093-2115.

    [8] Vincent C Emeakaroha et al.,” Towards autonomic detection of SLA violations in Cloud infrastructures,” Future Generation Computer Systems, vol. 28, no. 5, 2012, pp. 1017-1029.

    [9] Alhamad, M. et al., “Conceptual SLA framework for cloud computing,” Proc. 2010 4th IEEE International Conference on Digital Ecosystems and Technologies (DEST), 2010, pp. 606–610.

    [10] Emeakaroha, V.C. et al., “An architecture for detecting SLA violations in cloud computing infrastructures,” Proc. Proceedings of the 2nd International ICST Conference on Cloud Computing,2010, pp.45-48.

    [11] Emeakaroha et al., “Towards autonomic detection of sla violations in cloud infrastructures,”Future Generation Computer Systems, vol. 228,no. 7, 2012, pp. 1017-1029.

    [12] Redl, C. et al., “Automatic SLA Matching and Provider Selection in Grid and Cloud Computing Markets,” Proc. the 13th CM/IEEE International Conference on Grid Computing. 2012, pp.55-59.

    [13] Brandic et al., “Advanced QoS Methods for Grid Workflows Based on Meta-Negotiations and SLA-Mappings,” Proc. 3rd Workshop on Workflows in Support of Large-Scale Science, 2008,pp. 56-60.

    [14] Walayat et al., ”Maintaining Trust in Cloud Computing through SLA Monitoring,” Proc. ICONIP,2014, pp. 690–697.

    [15] Mario Macías et al., “Analysis of a trust model for SLA negotiation and enforcement in cloud markets,” Future Generation Computer Systems.vol. 28, no. 5, 2013, pp. 1056-1072.

    [16] Jagpreet Sidhu et al., ”Compliance based trustworthiness calculation mechanism in cloud environment,” Procedia Computer Science, vol. 37,no. 5, 2014, pp. 439 – 446.

    [17] S. Anithakumari et al., “ Autonomic SLA Management in Cloud Computing Services,” Proc.SNDS, 2014, pp. 151–159.

    [18] W. Fu et al., “a service-oriented grid monitoring system with improved forecasting algorithm,”P(pán)roc. Proceedings of the 5th International Conference on Grid and Cooperative Computing Workshops, 2006, pp. 211–219.

    [19] Mohammed Alhamad et al., “A Survey on SLA and Performance Measurement in Cloud Computing,” Proc. OTM, 2011, pp. 469–477.

    [20] Linlin Wu et al., ” Automated SLA Negotiation Framework for Cloud Computing,” Proc. Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013, pp.13-16.

    [21] MA Bin et al., “An Optimized Vertical Handoff Algorithm Based on Markov Process in Vehicle Heterogeneous Network,” China Communications, vol. 12, no. 4, 2015, pp. 106-116.

    久久久久网色| 中出人妻视频一区二区| 日韩在线高清观看一区二区三区| 欧美+亚洲+日韩+国产| 亚洲美女视频黄频| 成人特级av手机在线观看| 一区二区三区免费毛片| 直男gayav资源| av在线亚洲专区| 在线观看av片永久免费下载| 99久久中文字幕三级久久日本| 精品免费久久久久久久清纯| 国产精品伦人一区二区| 国产精品电影一区二区三区| 22中文网久久字幕| 噜噜噜噜噜久久久久久91| 国产精品久久久久久精品电影小说 | kizo精华| 久久久久久九九精品二区国产| 3wmmmm亚洲av在线观看| 日韩av在线大香蕉| 校园春色视频在线观看| 人人妻人人澡人人爽人人夜夜 | 亚洲,欧美,日韩| 国内少妇人妻偷人精品xxx网站| 五月玫瑰六月丁香| av女优亚洲男人天堂| 国产亚洲av片在线观看秒播厂 | 日本在线视频免费播放| 网址你懂的国产日韩在线| 亚洲欧美日韩无卡精品| 天美传媒精品一区二区| 欧美成人免费av一区二区三区| 欧美激情国产日韩精品一区| 久久99精品国语久久久| 我要搜黄色片| 国产精品久久电影中文字幕| 欧美最新免费一区二区三区| 久久这里只有精品中国| 国产一区二区亚洲精品在线观看| 爱豆传媒免费全集在线观看| 激情 狠狠 欧美| 亚洲av.av天堂| 国产精品一区二区三区四区久久| 久久人人爽人人爽人人片va| 亚洲综合色惰| 日韩人妻高清精品专区| 国产探花在线观看一区二区| 中文字幕久久专区| 国产成人freesex在线| 成年版毛片免费区| 在线a可以看的网站| 国产精品久久久久久亚洲av鲁大| 精品国产三级普通话版| 一边亲一边摸免费视频| 搡老妇女老女人老熟妇| 一进一出抽搐动态| 亚洲国产精品国产精品| 午夜精品一区二区三区免费看| 国产精品人妻久久久久久| 亚洲国产精品合色在线| 不卡一级毛片| 少妇人妻一区二区三区视频| 国产成年人精品一区二区| 一级毛片久久久久久久久女| 午夜老司机福利剧场| 春色校园在线视频观看| 国产亚洲精品久久久com| 亚洲最大成人手机在线| 嫩草影院入口| 欧美成人a在线观看| 亚洲七黄色美女视频| 六月丁香七月| 51国产日韩欧美| 欧美极品一区二区三区四区| 赤兔流量卡办理| 夜夜看夜夜爽夜夜摸| 国产免费一级a男人的天堂| 深夜a级毛片| 日韩三级伦理在线观看| 久久久久久国产a免费观看| 欧美性猛交╳xxx乱大交人| 18禁在线播放成人免费| 欧美xxxx黑人xx丫x性爽| 国产人妻一区二区三区在| 亚洲三级黄色毛片| 悠悠久久av| 有码 亚洲区| 国产美女午夜福利| 免费看光身美女| 日韩精品有码人妻一区| 国产亚洲av嫩草精品影院| 精品久久久噜噜| 欧美最新免费一区二区三区| 国产一区二区亚洲精品在线观看| 极品教师在线视频| 熟女电影av网| 久久久久久大精品| 精品日产1卡2卡| 婷婷精品国产亚洲av| 丰满人妻一区二区三区视频av| 美女cb高潮喷水在线观看| 久久久精品大字幕| 国产亚洲5aaaaa淫片| 日本免费a在线| 中文字幕制服av| 成人永久免费在线观看视频| 国产精品一及| 久久人人爽人人片av| av在线亚洲专区| 黄片wwwwww| 在线观看午夜福利视频| 免费一级毛片在线播放高清视频| 日本色播在线视频| 一本一本综合久久| 一个人看视频在线观看www免费| 3wmmmm亚洲av在线观看| 好男人在线观看高清免费视频| 免费一级毛片在线播放高清视频| 少妇丰满av| 美女内射精品一级片tv| 看片在线看免费视频| 神马国产精品三级电影在线观看| 欧美性感艳星| 精品99又大又爽又粗少妇毛片| 女同久久另类99精品国产91| 一级毛片电影观看 | 99riav亚洲国产免费| 亚洲在线自拍视频| 亚洲精品日韩av片在线观看| 99久国产av精品国产电影| 少妇的逼水好多| 国产精品无大码| 美女内射精品一级片tv| 99久久精品一区二区三区| av天堂在线播放| 狠狠狠狠99中文字幕| 亚洲图色成人| 国产成人精品久久久久久| 变态另类丝袜制服| 久久精品久久久久久久性| 日韩国内少妇激情av| 99热网站在线观看| 麻豆精品久久久久久蜜桃| 岛国毛片在线播放| 一边亲一边摸免费视频| 欧美高清性xxxxhd video| h日本视频在线播放| 97超视频在线观看视频| 欧美3d第一页| 成年女人看的毛片在线观看| 在线观看美女被高潮喷水网站| 精品99又大又爽又粗少妇毛片| 免费观看在线日韩| 舔av片在线| 午夜福利成人在线免费观看| 男的添女的下面高潮视频| 一级二级三级毛片免费看| 国产91av在线免费观看| 日韩av不卡免费在线播放| 免费看美女性在线毛片视频| 午夜久久久久精精品| 亚洲av二区三区四区| 99久久中文字幕三级久久日本| 精品久久久久久久末码| 人妻久久中文字幕网| 久久亚洲国产成人精品v| 网址你懂的国产日韩在线| 国产一区二区三区av在线 | 哪个播放器可以免费观看大片| 色噜噜av男人的天堂激情| 久久久久久伊人网av| 亚洲一级一片aⅴ在线观看| 深爱激情五月婷婷| 国产亚洲av嫩草精品影院| 高清毛片免费看| 伦精品一区二区三区| 永久网站在线| 久久久久久伊人网av| 亚洲国产精品成人综合色| 美女 人体艺术 gogo| 欧美最黄视频在线播放免费| 成人亚洲欧美一区二区av| 日韩精品青青久久久久久| 99热只有精品国产| 最后的刺客免费高清国语| 亚洲av不卡在线观看| 熟妇人妻久久中文字幕3abv| 欧美+亚洲+日韩+国产| 爱豆传媒免费全集在线观看| 亚洲va在线va天堂va国产| 成人亚洲精品av一区二区| 美女被艹到高潮喷水动态| 九草在线视频观看| 亚洲精品久久久久久婷婷小说 | 村上凉子中文字幕在线| 久久久久久久午夜电影| 午夜福利在线观看吧| 特大巨黑吊av在线直播| 欧美日本视频| 男的添女的下面高潮视频| 久久人人爽人人爽人人片va| 毛片女人毛片| 欧美最黄视频在线播放免费| 婷婷色综合大香蕉| 免费观看的影片在线观看| 国产精品不卡视频一区二区| 国产成年人精品一区二区| 欧美3d第一页| 三级国产精品欧美在线观看| 国产精品久久久久久av不卡| 国产免费男女视频| 亚洲精品国产成人久久av| 国产精品久久电影中文字幕| 亚洲成人精品中文字幕电影| av女优亚洲男人天堂| 大香蕉久久网| 九九热线精品视视频播放| 亚洲人成网站在线播| 欧美一区二区精品小视频在线| 欧美激情在线99| 国产精品野战在线观看| 99久久中文字幕三级久久日本| 久久精品久久久久久久性| 成年女人看的毛片在线观看| 六月丁香七月| 黄色配什么色好看| 青春草亚洲视频在线观看| 乱码一卡2卡4卡精品| 亚洲真实伦在线观看| 日韩高清综合在线| 黄色配什么色好看| 免费看美女性在线毛片视频| 少妇的逼水好多| www.色视频.com| 国产精品一二三区在线看| 在线天堂最新版资源| 午夜亚洲福利在线播放| 亚洲av中文字字幕乱码综合| 国产成年人精品一区二区| 国产精品蜜桃在线观看 | 插阴视频在线观看视频| 免费无遮挡裸体视频| 亚洲最大成人av| 久久人妻av系列| 精华霜和精华液先用哪个| 麻豆国产av国片精品| 日韩成人伦理影院| 天堂√8在线中文| 亚洲一区高清亚洲精品| 欧美最新免费一区二区三区| 最近中文字幕高清免费大全6| 国产亚洲av片在线观看秒播厂 | 哪里可以看免费的av片| 亚洲最大成人av| 狠狠狠狠99中文字幕| 久久99热6这里只有精品| 青春草视频在线免费观看| 人人妻人人澡人人爽人人夜夜 | av在线蜜桃| 国产精品国产三级国产av玫瑰| 欧美xxxx黑人xx丫x性爽| 在线播放国产精品三级| 国产精品1区2区在线观看.| 日韩精品有码人妻一区| 观看美女的网站| 一级黄片播放器| 联通29元200g的流量卡| 亚洲欧美精品自产自拍| 久久99热这里只有精品18| 国模一区二区三区四区视频| av黄色大香蕉| 黄色日韩在线| 在线免费观看的www视频| 国产精品久久久久久精品电影| 国产精品一区二区三区四区免费观看| 村上凉子中文字幕在线| 欧美xxxx黑人xx丫x性爽| 国产色婷婷99| 久久久久免费精品人妻一区二区| 少妇人妻一区二区三区视频| 国产不卡一卡二| 亚洲aⅴ乱码一区二区在线播放| 中出人妻视频一区二区| 九草在线视频观看| 久久99蜜桃精品久久| av视频在线观看入口| 欧美一级a爱片免费观看看| 日本成人三级电影网站| 国产精品免费一区二区三区在线| 99热这里只有是精品在线观看| 亚洲av二区三区四区| 九色成人免费人妻av| 成熟少妇高潮喷水视频| 国产午夜精品论理片| 日本熟妇午夜| 亚洲五月天丁香| 亚洲成a人片在线一区二区| 午夜激情欧美在线| 欧美3d第一页| 中文字幕久久专区| 国产精品福利在线免费观看| 欧美日韩乱码在线| 久久精品国产亚洲av天美| 大型黄色视频在线免费观看| 亚洲av一区综合| 如何舔出高潮| 成人高潮视频无遮挡免费网站| 男女做爰动态图高潮gif福利片| 99久国产av精品国产电影| 国产成人午夜福利电影在线观看| av免费观看日本| 男女视频在线观看网站免费| 一级毛片aaaaaa免费看小| 免费av不卡在线播放| 丰满人妻一区二区三区视频av| 99在线视频只有这里精品首页| 国产伦在线观看视频一区| 丰满的人妻完整版| 麻豆成人午夜福利视频| 国产伦一二天堂av在线观看| 久久婷婷人人爽人人干人人爱| 一本一本综合久久| 特级一级黄色大片| 丰满人妻一区二区三区视频av| 99国产精品一区二区蜜桃av| 国产一区二区亚洲精品在线观看| 亚洲欧美日韩高清专用| 国产亚洲av片在线观看秒播厂 | 国产伦精品一区二区三区视频9| 在现免费观看毛片| 国产午夜精品论理片| 99热网站在线观看| 最近2019中文字幕mv第一页| 天天一区二区日本电影三级| 国产精品久久久久久精品电影| 欧美xxxx性猛交bbbb| 亚洲色图av天堂| 国产成年人精品一区二区| 久久精品久久久久久久性| 小说图片视频综合网站| 一级毛片电影观看 | 好男人在线观看高清免费视频| 91狼人影院| av又黄又爽大尺度在线免费看 | 小蜜桃在线观看免费完整版高清| 亚洲精品国产成人久久av| 麻豆一二三区av精品| 国产国拍精品亚洲av在线观看| av黄色大香蕉| 国产成年人精品一区二区| 国产高清三级在线| 国产精品人妻久久久影院| 国产在线精品亚洲第一网站| 欧美精品国产亚洲| 一级毛片aaaaaa免费看小| 变态另类丝袜制服| 成人欧美大片| 噜噜噜噜噜久久久久久91| 国产成人午夜福利电影在线观看| 美女xxoo啪啪120秒动态图| 国产亚洲精品av在线| 一级毛片电影观看 | 国产精品一区二区三区四区免费观看| 99久久无色码亚洲精品果冻| 99视频精品全部免费 在线| 在线观看午夜福利视频| 国产精品久久久久久久电影| 男人和女人高潮做爰伦理| 午夜福利在线观看免费完整高清在 | 夜夜爽天天搞| 美女脱内裤让男人舔精品视频 | 国产精品国产高清国产av| 亚洲欧美日韩卡通动漫| 夫妻性生交免费视频一级片| 禁无遮挡网站| 成人毛片60女人毛片免费| av女优亚洲男人天堂| 国产精品综合久久久久久久免费| 狂野欧美白嫩少妇大欣赏| 男人舔奶头视频| 国产日本99.免费观看| 蜜臀久久99精品久久宅男| 美女 人体艺术 gogo| 亚洲精品日韩在线中文字幕 | 午夜a级毛片| 国产久久久一区二区三区| 日韩欧美一区二区三区在线观看| 久久久a久久爽久久v久久| 国产一区亚洲一区在线观看| 青春草视频在线免费观看| 国产黄a三级三级三级人| 久久这里有精品视频免费| 精品久久久久久久久av| 亚洲欧美成人精品一区二区| 黄色视频,在线免费观看| 中文资源天堂在线| 亚洲av第一区精品v没综合| 看免费成人av毛片| 好男人视频免费观看在线| 波野结衣二区三区在线| 男插女下体视频免费在线播放| 国产一级毛片七仙女欲春2| 午夜精品在线福利| 欧美+亚洲+日韩+国产| 国产视频内射| 日韩精品有码人妻一区| 老女人水多毛片| 亚洲18禁久久av| 一本精品99久久精品77| 国产精品一区二区三区四区久久| 国产精品野战在线观看| 亚洲av一区综合| 岛国毛片在线播放| 亚洲精品国产av成人精品| 色哟哟哟哟哟哟| 国产老妇伦熟女老妇高清| 男女啪啪激烈高潮av片| 亚洲一区高清亚洲精品| 亚洲欧美日韩无卡精品| 久久久久久久久久久丰满| 亚洲av.av天堂| 亚洲在线观看片| 国产黄a三级三级三级人| kizo精华| 丝袜美腿在线中文| 熟女电影av网| 简卡轻食公司| 自拍偷自拍亚洲精品老妇| 婷婷色av中文字幕| 亚洲欧美成人综合另类久久久 | 日本黄色视频三级网站网址| 亚洲欧美中文字幕日韩二区| 国产成年人精品一区二区| 国产欧美日韩精品一区二区| 国产精品精品国产色婷婷| 内射极品少妇av片p| 99国产精品一区二区蜜桃av| 精品熟女少妇av免费看| 久99久视频精品免费| 国产极品天堂在线| 国产91av在线免费观看| av又黄又爽大尺度在线免费看 | 伦理电影大哥的女人| 亚洲五月天丁香| 国产一级毛片七仙女欲春2| 亚洲人与动物交配视频| 五月伊人婷婷丁香| 日本一本二区三区精品| a级毛片a级免费在线| 伊人久久精品亚洲午夜| 午夜福利在线观看吧| 麻豆久久精品国产亚洲av| 51国产日韩欧美| 日本色播在线视频| 老女人水多毛片| 97在线视频观看| 91狼人影院| 六月丁香七月| 欧美一区二区精品小视频在线| 夜夜夜夜夜久久久久| 精品久久久久久成人av| 免费观看a级毛片全部| 欧美色视频一区免费| 亚洲真实伦在线观看| 夜夜夜夜夜久久久久| 午夜福利在线在线| 少妇人妻精品综合一区二区 | 久久精品国产清高在天天线| 蜜桃亚洲精品一区二区三区| 日产精品乱码卡一卡2卡三| 麻豆国产av国片精品| 在线a可以看的网站| 狠狠狠狠99中文字幕| 伦精品一区二区三区| 欧美性猛交╳xxx乱大交人| 中文字幕av在线有码专区| 麻豆国产97在线/欧美| 午夜精品一区二区三区免费看| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 欧美色欧美亚洲另类二区| 国产高潮美女av| 久久久国产成人免费| 亚洲一区二区三区色噜噜| 男插女下体视频免费在线播放| 插逼视频在线观看| 在线观看午夜福利视频| 夫妻性生交免费视频一级片| av卡一久久| 伦理电影大哥的女人| 亚洲av熟女| 欧美+日韩+精品| 国模一区二区三区四区视频| 亚洲精品自拍成人| 又爽又黄无遮挡网站| 日韩欧美一区二区三区在线观看| 成人午夜精彩视频在线观看| 69av精品久久久久久| 欧美日韩一区二区视频在线观看视频在线 | 亚洲在线自拍视频| 欧美一区二区亚洲| 中文亚洲av片在线观看爽| 久久人人爽人人片av| 在线观看一区二区三区| 欧美一级a爱片免费观看看| 免费看美女性在线毛片视频| 国产精品久久久久久久电影| 国产亚洲欧美98| 亚洲av男天堂| 久久亚洲国产成人精品v| 亚洲婷婷狠狠爱综合网| 日韩一本色道免费dvd| 亚洲av不卡在线观看| 中文精品一卡2卡3卡4更新| 国产伦一二天堂av在线观看| 春色校园在线视频观看| 国产午夜精品久久久久久一区二区三区| av黄色大香蕉| 黄色视频,在线免费观看| 成人亚洲欧美一区二区av| 中文字幕精品亚洲无线码一区| 国内揄拍国产精品人妻在线| 啦啦啦韩国在线观看视频| 国产黄色小视频在线观看| 中文亚洲av片在线观看爽| 青春草国产在线视频 | 晚上一个人看的免费电影| 亚洲一级一片aⅴ在线观看| 国产伦理片在线播放av一区 | 亚洲色图av天堂| 能在线免费观看的黄片| 亚洲欧洲国产日韩| 国产午夜精品一二区理论片| 国模一区二区三区四区视频| 国产av在哪里看| 99久久成人亚洲精品观看| 亚洲最大成人av| 人体艺术视频欧美日本| 日韩一区二区三区影片| 丰满人妻一区二区三区视频av| 日韩成人伦理影院| 性色avwww在线观看| 日日啪夜夜撸| 级片在线观看| 舔av片在线| 日本成人三级电影网站| 国产视频内射| 亚洲自偷自拍三级| 久久久久国产网址| 国产老妇伦熟女老妇高清| eeuss影院久久| 精品国内亚洲2022精品成人| 岛国在线免费视频观看| 22中文网久久字幕| 日本三级黄在线观看| 成年女人永久免费观看视频| 色综合色国产| 成人av在线播放网站| 热99在线观看视频| 日韩在线高清观看一区二区三区| 成人无遮挡网站| 欧美又色又爽又黄视频| av黄色大香蕉| 少妇裸体淫交视频免费看高清| 亚洲中文字幕一区二区三区有码在线看| 欧美3d第一页| 国产av不卡久久| 久久久久国产网址| 最近的中文字幕免费完整| 国产伦精品一区二区三区视频9| 国产精品人妻久久久久久| 久久久久九九精品影院| 97人妻精品一区二区三区麻豆| 国产色婷婷99| 国产精品久久久久久av不卡| 蜜臀久久99精品久久宅男| 国产在线精品亚洲第一网站| 久久6这里有精品| 欧美+亚洲+日韩+国产| 国产大屁股一区二区在线视频| 亚洲av一区综合| 欧美精品一区二区大全| 别揉我奶头 嗯啊视频| av在线天堂中文字幕| 欧美三级亚洲精品| 久久精品国产99精品国产亚洲性色| 爱豆传媒免费全集在线观看| 岛国毛片在线播放| 精品无人区乱码1区二区| 免费不卡的大黄色大毛片视频在线观看 | 色视频www国产| 免费不卡的大黄色大毛片视频在线观看 | 精品久久国产蜜桃| 久久久久久久午夜电影| 欧美日韩综合久久久久久| 干丝袜人妻中文字幕| 精品久久久久久久久av| 日本成人三级电影网站| 嘟嘟电影网在线观看| 久久久久久久午夜电影| 你懂的网址亚洲精品在线观看 | 婷婷亚洲欧美| 狂野欧美白嫩少妇大欣赏| 97超视频在线观看视频| 日本熟妇午夜| 国产黄色视频一区二区在线观看 | 久久久色成人| 久久精品夜夜夜夜夜久久蜜豆| 日韩成人伦理影院| 麻豆国产av国片精品| 国产精品久久久久久精品电影| 不卡视频在线观看欧美| 精品人妻熟女av久视频| 亚洲av男天堂| 黄色一级大片看看|