• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Differentially Private Real-Time Streaming Data Publication Based on Sliding Window Under Exponential Decay

    2019-02-22 07:32:40LanSunChenGeXinHuangYingjieWuandYanGao
    Computers Materials&Continua 2019年1期

    Lan Sun, Chen Ge, Xin Huang, Yingjie Wu, and Yan Gao

    Abstract: Continuous response of range query on steaming data provides useful information for many practical applications as well as the risk of privacy disclosure. The existing research on differential privacy streaming data publication mostly pay close attention to boosting query accuracy, but pay less attention to query efficiency, and ignore the effect of timeliness on data weight. In this paper, we propose an effective algorithm of differential privacy streaming data publication under exponential decay mode. Firstly, by introducing the Fenwick tree to divide and reorganize data items in the stream, we achieve a constant time complexity for inserting a new item and getting the prefix sum. Meanwhile, we achieve time complicity linear to the number of data item for building a tree. After that, we use the advantage of matrix mechanism to deal with relevant queries and reduce the global sensitivity. In addition, we choose proper diagonal matrix further improve the range query accuracy. Finally, considering about exponential decay, every data item is weighted by the decay factor. By putting the Fenwick tree and matrix optimization together, we present complete algorithm for differentiate private real-time streaming data publication. The experiment is designed to compare the algorithm in this paper with similar algorithms for streaming data release in exponential decay. Experimental results show that the algorithm in this paper effectively improve the query efficiency while ensuring the quality of the query.

    Keywords: Differential privacy, streaming data publication, exponential decay, matrix mechanism, sliding window.

    1 Introduction

    Currently, the rapid development of big data and the Internet of things (IoT) makes data easier to be collected, and leads to a serious concern about information security [Yang and Soboroff (2015)]. Specially, many applications require continuous statistical release of streaming data, such as real-time statistics of the sales amount on shopping sites,real-time statistics of high frequency phrases for search engines. In these applications, the release data is the accumulated value of streaming data in a certain sense. Statistical publication of streaming data not only brings information to people's life, but also brings the risk of privacy disclosure [Fung, Wang, Chen et al. (2010)]. Differential privacy[Dwork (2006); Zhou, Li and Tao (2009); Xiong, Zhu and Wang (2014); Zhang and Meng (2014)] is recognized as a robust privacy protection model. In view of the privacy protection of streaming data publication, there are many related studies based on differential privacy model. There is a lot of related research [Dwork, Naor, Pitassi et al.(2010); Chan, Shi and Song (2010); Cao, Xiao, Ghinita et al. (2013); Zhang and Meng(2016); Bolot, Fawaz, Muthukrishnan et al. (2013)] for privacy protection of streaming data release is based on differential privacy model.

    Dwork et al. [Dwork, Naor, Pitassi et al. (2010)] put forward a study of differential privacy under continual observation. It continuously releases the count value of single stream data from start to current time by piece-wise counting. Chan et al. [Chan, Shi and Song (2010)]improved the query accuracy and algorithm efficiency by binary tree. Zhang et al. [Zhang and Meng (2016)] realized the publication of count values in each sliding window with partitioning-based method.

    There are two problems in existing correlation studies: 1. All of the above studies assume that the data items at all times are of the same importance. But in practical applications, it tends to pay more attention to the statistical release of recent data and low attention to historical data because the statistical monitoring of recent events has a stronger relevance to its purpose. To solve this problem, a usually method is to make the data item with weight which is inversely proportional to the distance from the data to the current time. Under exponential decay mode, Cao et al. [Cao, Xiao, Ghinita et al. (2013)] proposed differential privacy streaming data publishing algorithm with interval tree structure which is failure to make full use of the correlation between queries in continuous statistical publishing to further improve the accuracy of data release. 2. Authors in Dwork et al. [Dwork, Naor,Pitassi et al. (2010); Chan, Shi and Song (2010); Cao, Xiao, Ghinita et al. (2013); Zhang and Meng (2016); Bolot, Fawaz, Muthukrishnan et al. (2013)] mainly focused on how to improve the query precision of streaming data. However, here is a higher demand for the query efficiency of data release in many practical applications.

    In this paper, we present a differential privacy real-time release algorithm for streaming data in exponential decay mode. This algorithm effectively improves the query efficiency on the premise of guaranteeing the quality of the streaming data.

    The main works of this paper are as follows:

    (1) Point at continuous statistical release of streaming data under exponential decay mode,we propose an algorithm to improve efficiency of range query with Fenwick tree.

    (2) Furthermore, matrix mechanism is used to explore the relevance between queries.Algorithms for strategy matrix construction and diagonal matrix construction are proposed according to the characteristics of the load matrix under exponential decay mode. The matrix optimization method is used to further improve the query accuracy and efficiency.(3) We present complete algorithm of streaming data range query response under exponential decay. Experimental results show that the algorithm is effective and feasible.The organizational structure of the rest of this paper is as follows: The second section gives a brief introduction of the relevant concepts. The third section describes our approach and provides theoretical analysis. Section 3.1 proposes a fast range query algorithm based on Fenwick tree. How to introduce the matrix mechanism to improve the release accuracy is explained in Section 3.2. Experimental results and analyses are presented in Section 4, and Section 5 is the conclusion.

    2 Background

    2.1 Differential privacy

    Differential privacy [Dwork (2006)] has gradually emerged as the standard notion of privacy in data analysis. Informally, an algorithm is differential private if it is insensitive to small changes in the input. The formal definition of “small changes” is as follows:

    Definition 1(Neighboring data sets): Given two data setsDandD’, if they are differing on at most one element:

    Then we call them a pair of neighboring data sets.

    Definition 2(ε-differential privacy): Algorithm A isε-differential private if for any neighboring data setsDandD’, and any subset of outputs S?Range(A), the following holds:

    where the probability is taken over the randomness of theA. The smaller theε, the stronger the private protection is.

    2.2 Range Query in Sliding Window under Exponential Decay

    Definition 3(Sliding window): Arrange items in a streaming data according to their time stamp. The sliding window, with a fixed lengthW, always keeps the newestWth items,while discarding old ones.

    Definition 4(Range query in sliding window): Range query is to accumulate all items in a continuous interval in sliding window. Formally, for a data streamS ={D1, D2, ..., Dn}, and the current time ist. The answer of the range query

    Definition 5(Range query under exponential decay): Based on definition 4, we add the weight coefficientto each data item, whereis called the decay factor which is fixed beforehand, the variablexrepresents the distance between the item’s time stamp andt. The above formula is adjusted to:

    Exponential decay associates longer items with smaller impact on final result.

    2.3 Matrix mechanism

    Given a workload of linear range queries, the matrix mechanism [Li, Hay, Rastogi et al.(2010); Yuan, Zhang, Winslett et al. (2012)] uses an alternative set of queries, named the strategy, which are answered privately by a standard mechanism. Answers to the workload are then derived from the strategy queries, which bringing a higher accuracy.

    Definition 6(Matrix mechanism): Decompose the workload matrixWinto two matricesBandL. We callLthe strategy matrix, which actually making a basis transformation on original data. Then noise is added to the result of transformation, and the disturbing result is converted to the final query result through matrixB. The formula form is as follows:

    3 Real-time private streaming data publication under exponential decay

    3.1 Real-time range query based on Fenwick tree

    As proposed in Chan et al. [Chan, Shi and Song (2010)], one can use interval tree as the data structure to arrange streaming data in the sliding window, which improves the time efficiency of data release. Specifically, full binary tree architecture was used in Chan et al.[Chan, Shi and Song (2010)], and its structure is shown in Fig. 1. Assume the size of sliding window isW, andtrepresents the current moment. As shown in Fig. 1, there are two binary trees that each has its part included in sliding window. Gray nodes were slid out of the window and will never be concerned again in later process, while striped ones are about to be included. Once first node of the new tree has been included, the whole binary tree will be built beforehand. Nodes in the new tree will be activated one after another in pace with their sliding into the window.

    Figure 1: Building interval tree under sliding window

    Using the full binary tree, we can answer any range query in the sliding window. However,as Fig. 2 suggested, all of the right sons (gray nodes) in the tree are unnecessary for this job,because we can obtain their value by their father nodes. By removing them, the number of remain nodes is equal to the size of sliding window, i.e.W. And we can still add every emerging data item in a constant time. After this simplification, the remained structure is called Fenwick tree [Fenwick (1994)].

    Figure 2: The gray nodes are redundant

    Fenwick tree is such a data structure that supports query and modify operation with aO(log2(N)) time complexity. For a givenr, the prefix sum in range [1,r] can be figure out quickly. We useSum(r) to represent the prefix sum, i.e.Sum(r)=D1+D2+...+Dr(we neglect the exponential decay temporarily).

    In the calculating process, Fenwick tree has generated intermediate variablesSi(i∈[1,r]),given by the following formula:

    Djis the j-th data item, andlowbit(x) means the lowest “1” in the binary form ofx. For example, when x=12, we have (12)10=(1100)2. The lowest “1” is in the third position, solowbit(12)=(0100)2=(4)10. We can getlowbit(x) easily by bitwise operation:lowbit(x)=x& (-x). Fenwick tree then use these intermediate variablesSito get the prefix sum:

    When considering about exponential decay, every data item should be weighted by the decay factorpx. So the prefix sum becomes:

    Correspondingly, formula (8) and formula (9) are also adjusted to formula (11) and formula (12) as follows:

    Fig. 3 shows the structure of Fenwick tree under exponential decay.

    Figure 3: Fenwick tree under exponential decay

    In Fig. 3, the size of sliding window, i.e.W, is 5, so we choose the tree’s height to be 3.Nodes which have already slid out of the window will never be used again, so we can recycle them to save memory. And once after the latest node of old tree has been processed,the next data item will cause the building process of a new tree with preset height.

    Then we give the detail about how the Fenwick tree works:

    Firstly, we number activated nodes according to their time stamp. Then the white nodes in Fig. 4 form two Fenwick trees. One contains nodes ①~④, while nodes ⑤~⑦ stored in another. The value of node ① is the data item at timet1, ②’s value is the sum oft1andt2,and ④ is sum of [t1,t4]. (When considering about exponential decay, all the value mentioned above should be associated with their decay weight. For simplicity, we omit the statement about it. You can see Fig. 3 and algorithm 1 to get a better understanding).

    Figure 4: Details about Fenwick tree

    Briefly, father’s value is the sum of all its sons (We call nodeyis the father of nodex, ifx +lowbit(x)= y). And we just need one add operation for each node, because its father is unique. Let us take node ④ for example: It is only father of nodes ② and ③. So after calculating node ②, we can immediately add it to node ④, withO(1) time cost. Therefore,we achieve time complicity linear to the number of data item for building a tree.

    Then we can use such a tree structure to get the prefix sum. For example,Sum(1)=t1is the value stored in node ①,Sum(2)=t1+t2is the value in node ②, andSum(3)=t1+t2+t3is the sum of nodes ② and ③. As forSum(5)=t1+...+t5, because it is split into two trees, we need to sum up nodes ④ and ⑤. We can further simplify this process. For example, since we has already get the prefixSum(6)=⑥+④, we can getSum(7)=⑦+⑥+④ by sum upSum(6) and node ⑦. By this way, we achieveO(1)time complicity for inserting a single new node.

    WhenWwas given, the tree’s height is then determined, writtenH. Based on formula (9),the global sensitivity is alsoH. Therefore, by adding Laplace noise with scaleH/εto each node in the tree, our algorithm satisfiesε-differential privacy.

    In summary, the algorithm for inserting new data item into Fenwick tree is described in algorithm 1:

    3.2 Accuracy optimization using matrix mechanism

    To answer a range query, we may need to combine some nodes’ values generated in last section. For example, in Fig. 4, we have to answer the range query [2, 5] by [1, 4]+[4,5]-[1, 2].It causes the accumulation of noise, and then the loss of accuracy. In Section 3.1, we have generated intermediate variablesSiby Fenwick tree. This process can be written as a form of a matrix timing a vector. When the size of tree is 7, the matrix and vector is as follows:

    WhereLis the strategy matrix,Dis the original data set, andSis a vector combined by all intermediate variablesSi. That is to say, we transform the original data set into the intermediate variables vector, perturb it using Laplace noise, and finally restore it for answering the queries. This process is corresponding to formula (11) and Fig. 3.

    Correspondingly, when given a certain Fenwick tree, we can restore it to the prefix sums that we need, using formula (12). We follow the example above, giving the matrix form for this restoring process:

    WhereWis the load matrix. In our setting of continual range query response, its form is as follows:

    In conclusion, the prefix vector can be written as matrix formWD=BLD, whereW=BL.After changing the tree into a matrix form, our method is actually a specific decomposition strategy of matrix mechanism. The matrix mechanism, in general, is to design an optimal decomposition strategy to decompose the workloadWto improve accuracy. However, we aim to design a sub-optimal decomposing way, whose error is slightly greater than the optimal one. But we can figure out it quickly following Section 3.1’s result. According to Yuan et al. [Yuan, Zhang, Winslett et al. (2012)], the mean square error of our method is:

    LetNbe the size of matrix, concluded from formula (8), the number of nonzero elements in each row of reduction matrixBis not greater thanlog2(N), and total number of nonzero elements in B is not larger thanN·log2(N).Since the only possible value of nonzero elements in B is 1, we havetrace(BTB)≤N·log2(N).By formula (2) to formula (7), the global sensitivity ofL, i.e. ΔL, is equal to the tree’s heightH=log2(N). The total error of all N times query isAveraging to each query, the mean error isAccording to Cai et al. [Cai, Wu and Wang (2016)], there exist a diagonal matrixwhich changesand formula (15) is adjusted to:

    Under our setting of sliding window, since the window’s size is fixed, we can consider this calculation as a preprocessing part. We store the diagonal values beforehand, and invoke them directly during the publishing, avoiding time waste.

    From above analysis, we come to the conclusion that: Though this accuracy optimize method is deduced based on matrix mechanism, there is no need to explicitly calculate the matrices. We can simply adjust algorithm 1 by adding the coefficients from the diagonal matrix. The improved Fenwick tree building algorithm is as follows:

    Putting the Fenwick tree and matrix optimization together, we present our complete method in algorithm 4:

    4 Experiments

    We compare our method, named RTP_DMM, with two similar works in terms of efficiency and accuracy: The EX algorithm proposed in Zhang et al. [Zhang and Meng(2016)] using interval tree; and the LP algorithm proposed by Dwork, which directly calculate the weighted answers and perturb it. We set different privacy budget parameters as 1.0, 0.1 and 0.01. To exclude randomness, each experiment was run 30 times to get the average.

    4.1 Data sets and environment

    We use the Search Logs and NetTrace in Hay et al. [Hay, Rastogi, Miklau et al. (2010)],along with WorldCup98 in Kellaris et al. [Kellaris, Papadopoulos, Xiao et al. (2014)] as our testing data sets. Search Logs collects the number of searches for the keyword“Obama” from 2004.01 to 2009.08. The NetTrace data sets contain the number of packet requests to a IP segment during a specific period. WorldCup98 records the visits to the World Cup official website during 1998.04 to 1998.07. Their scales are shown in Tab. 1.

    Table 1: Scales of data sets

    We use the mean square error to measure the query accuracy of the published data, which is shown as follows:

    Where|Q|is the number of queries,Dis the original data set,D’is the distributed data set andqrepresents a query.

    The experimental environment is: Intel Core i5 4570 3.2 GHz, with 8 GB memory, and we use C++ under Windows 7.

    4.2 Comparison and analysis of query efficiency

    4.2.1 The effect of different query numbers on efficiency

    In this experiment, we set different query numbers at each moment to compare the query efficiency of three algorithms. Because the query efficiency on small data set does not change significantly, the experiment only uses WorldCup98, and the size of the query range is set to 32768. The size of sliding window is fixed to 65536 and the decay factorpis 0.9995.

    Different query time of different algorithm is shown in Fig. 5. As the number of queries increases, difference between several algorithms in the running time becomes more obvious. This is because when the number of queries is small, the main influence factor of the efficiency is the cost of model construction. When queries increase, the time spent in the query occupies the dominant position.

    Compare with LP and RTP_DMM, the query time of EX increases most rapidly. This is because EX constructs an interval tree to achieve arbitrary range query within the sliding window. Although it reduces the number of nodes involved in a single query, it has to traverse the tree’s height. So the time complexity for a single query isO(log2W), which is log-linear to the size of the sliding window. So the query efficiency is low. RTP_DMM uses the prefix sum to obtain an arbitrary range of query results withinO(1)time. LP also realizes constant time complexity. However, because of the large number of nodes involved in the calculation, its accuracy is terrible. Compared with LP, RTP_DMM needs more complex calculations to reduce the error which brings a larger constant. Therefore, as the number of queries increases, its running time is slightly larger than LP.

    Figure 5: Efficiency at different query frequency

    4.2.2 The effect of sliding window size on query efficiency

    Then we set different sliding window sizes for further comparison. We still only use the WorldCup98 for the same reason. The size is set to 215, 216, ..., 221, respectively. Range size is set to be half of the window’s size, so that this size increases with the window, and the query frequency is set to be once per time.

    In Fig. 6, we observe that as the size of the sliding window increases, the RTP_DMM and LP are less affected than EX. The reason behind it is that the sliding window’s size only affects RTP_DMM’s space complexity and preprocessing time. For LP, the query efficiency is independent of the window size. However, as for EX, the time complexity isO(log2W) which is log-linear to window size. So the curve of LP and RTP_DMM are below EX’s. Both LP and RTP_DMM achieveO(1) time complexity, so they have close performance in our experiment.

    Figure 6: Efficiency under different sliding window sizes (WorldCup98)

    4.3 Comparison of query accuracy

    We use all three data sets to compare query accuracy between algorithms. Since the scale of Search Logs and NetTrace is small, the length of sliding window is set as the whole data set. As for WorldCup98, Setting the sliding window size to 65536 is suit for further comparison.

    4.3.1 Compare accuracy for random range queries

    We generate one range query of random size within the sliding window at each moment.Under exponential decay, small decay factor will make the decay speed too fast. So we fixed the decay factorpto 0.9995. The experimental comparison results are shown in Figs. 7-9.

    It can be seen from Figs. 7-9 that RTP_DMM reaches significant higher accuracy than LP and EX. This is because RTP_DMM converts range queries into matrix representations,and applies diagonal matrix optimization to improve accuracy. For all three algorithms, the query error increases as the privacy budget decreases. It is because we need larger scale of Laplace noise with smaller privacy budget.

    Figure 7: Comparison of query accuracy (Search Logs)

    Figure 8: Comparison of query accuracy (NetTrace)

    Figure 9: Comparison of query accuracy (WorldCup98)

    4.3.2 Accuracy with different decay factors

    In this experiment, we compare different decay factors to analyze their influence on the query error. We take the decay factors as 0.9991, 0.9992, ..., 0.9999 respectively.

    As the comparison results in Figs. 10-12, the query error is positively correlated with the decay factor, this is because the increase of the decay factor will change the global sensitivity and thus affect the scale of added noise. The EX algorithm calculates the limit of noise scale according to the preset decay factor. Therefore, when the decay factor is close to 1, the average square error caused by the EX algorithm become large. As for the LP algorithm, when the decay factor is small, the weight of the long time nodes tends to be zero which leads to smaller error.

    Figure 10: Accuracy with different decay factors (Search Logs)

    Figure 11: Accuracy with different decay factors (NetTrace)

    Figure 12: Accuracy with different decay factors (WorldCup98)

    Based on the above experiments, it can be concluded that the algorithm RTP_DMM is scalable for different applications with various decay factors and privacy budget. It can reduce query error, and achieve real-time publishing under the sliding window.

    5 Conclusion

    In this paper, we propose an efficient method for real-time differential privacy streaming data publishing under exponential decay. It answers any range query within the sliding window inO(1) time. We further convert the model to a matrix form, using matrix mechanism to optimize the accuracy. Comparison experiments with similar methods show that our RTP_MM guarantees the query accuracy while achieving higher time efficiency.In future studies, it is worth investigation to adapt our method to practical applications with other decay modes.

    Acknowledgement:This work is supported, in part, by the National Natural Science Foundation of China under grant numbers 61300026; in part, by the Natural Science Foundation of Fujian Province under grant numbers 2017J01754 and 2018J01797.

    国产探花极品一区二区| 国产成人欧美在线观看| 欧美性猛交黑人性爽| 成年女人永久免费观看视频| 一进一出好大好爽视频| 精品国产美女av久久久久小说| 欧美av亚洲av综合av国产av| 国产伦精品一区二区三区视频9 | 欧美三级亚洲精品| 国产一级毛片七仙女欲春2| 九九在线视频观看精品| 在线国产一区二区在线| 亚洲天堂国产精品一区在线| 亚洲av熟女| 嫩草影院精品99| 久久亚洲真实| 精品国产美女av久久久久小说| 国产高清激情床上av| 高清日韩中文字幕在线| 久久中文看片网| 十八禁网站免费在线| 淫秽高清视频在线观看| 极品教师在线免费播放| 亚洲七黄色美女视频| 久久久久国内视频| 成年人黄色毛片网站| 午夜激情欧美在线| 日本一二三区视频观看| 成年女人永久免费观看视频| 精品人妻一区二区三区麻豆 | 国产高清视频在线播放一区| 久久久久久人人人人人| 亚洲自拍偷在线| 欧美av亚洲av综合av国产av| 高清日韩中文字幕在线| 琪琪午夜伦伦电影理论片6080| 观看美女的网站| 一边摸一边抽搐一进一小说| 久99久视频精品免费| 国产97色在线日韩免费| 午夜福利成人在线免费观看| 国产高清videossex| 国产成人a区在线观看| 国产免费男女视频| 精品人妻1区二区| 国产一区二区在线av高清观看| 亚洲av免费高清在线观看| 久久伊人香网站| 国产精品99久久99久久久不卡| 最新中文字幕久久久久| 狠狠狠狠99中文字幕| 一级黄片播放器| 高潮久久久久久久久久久不卡| 亚洲电影在线观看av| 亚洲av成人不卡在线观看播放网| 免费高清视频大片| 高清毛片免费观看视频网站| 国产高清videossex| 国产毛片a区久久久久| 波多野结衣高清无吗| АⅤ资源中文在线天堂| 久9热在线精品视频| 精品久久久久久久久久免费视频| 全区人妻精品视频| 亚洲,欧美精品.| 精品久久久久久久末码| 久久久国产成人精品二区| 啦啦啦观看免费观看视频高清| 在线观看免费视频日本深夜| 99久久精品热视频| 欧美黑人巨大hd| 亚洲国产中文字幕在线视频| 亚洲av五月六月丁香网| 久久久成人免费电影| 日本 欧美在线| 久久伊人香网站| 又紧又爽又黄一区二区| 国产精品久久久久久精品电影| 中国美女看黄片| 观看免费一级毛片| 精品一区二区三区人妻视频| 天堂√8在线中文| 久久久国产成人免费| 午夜精品一区二区三区免费看| 不卡一级毛片| 变态另类丝袜制服| 久久久国产成人免费| 麻豆一二三区av精品| 午夜福利在线在线| 国产精品爽爽va在线观看网站| 99久久精品国产亚洲精品| 欧美日本视频| 亚洲精品一区av在线观看| 叶爱在线成人免费视频播放| 蜜桃亚洲精品一区二区三区| 一个人看视频在线观看www免费 | 天堂影院成人在线观看| 精品不卡国产一区二区三区| 中文字幕人妻丝袜一区二区| 成人性生交大片免费视频hd| 在线观看舔阴道视频| 午夜影院日韩av| 男女之事视频高清在线观看| 国产成人啪精品午夜网站| 波野结衣二区三区在线 | 婷婷丁香在线五月| 欧美不卡视频在线免费观看| 久久精品国产亚洲av香蕉五月| 中国美女看黄片| 淫妇啪啪啪对白视频| 人妻夜夜爽99麻豆av| 成人特级av手机在线观看| 日本撒尿小便嘘嘘汇集6| 成人精品一区二区免费| 亚洲最大成人中文| 女人被狂操c到高潮| 日本黄色视频三级网站网址| 成年女人看的毛片在线观看| 亚洲精品在线观看二区| 免费观看精品视频网站| 真人做人爱边吃奶动态| 一级黄色大片毛片| 女人高潮潮喷娇喘18禁视频| 天堂动漫精品| 中国美女看黄片| 99久久综合精品五月天人人| 91九色精品人成在线观看| 人妻夜夜爽99麻豆av| 国产国拍精品亚洲av在线观看 | 国产精品 国内视频| 桃色一区二区三区在线观看| 人妻丰满熟妇av一区二区三区| av天堂中文字幕网| 午夜福利欧美成人| 久久久久久大精品| 久久天躁狠狠躁夜夜2o2o| 97超级碰碰碰精品色视频在线观看| 看黄色毛片网站| av中文乱码字幕在线| 欧美成人性av电影在线观看| 精品久久久久久久久久久久久| 国产免费一级a男人的天堂| 欧美日韩中文字幕国产精品一区二区三区| 亚洲成a人片在线一区二区| 伊人久久精品亚洲午夜| 国产精品久久久久久精品电影| 麻豆国产av国片精品| 欧美乱码精品一区二区三区| 3wmmmm亚洲av在线观看| 最后的刺客免费高清国语| 国内精品久久久久精免费| 嫩草影视91久久| 一个人免费在线观看电影| 亚洲国产精品久久男人天堂| 两个人的视频大全免费| 国产精品自产拍在线观看55亚洲| 午夜福利成人在线免费观看| 亚洲中文字幕一区二区三区有码在线看| 国产三级黄色录像| 蜜桃亚洲精品一区二区三区| 亚洲中文字幕日韩| 欧美性猛交黑人性爽| 99久久综合精品五月天人人| 亚洲电影在线观看av| 一个人免费在线观看的高清视频| 亚洲人成网站在线播| 一区二区三区激情视频| 欧美一区二区国产精品久久精品| 国产成人欧美在线观看| 亚洲 欧美 日韩 在线 免费| 最近视频中文字幕2019在线8| 婷婷丁香在线五月| 国产极品精品免费视频能看的| 久久久国产精品麻豆| 欧美日韩亚洲国产一区二区在线观看| 不卡一级毛片| 欧美一区二区亚洲| 99久久成人亚洲精品观看| 日本免费一区二区三区高清不卡| 一夜夜www| 99久久成人亚洲精品观看| 日本免费一区二区三区高清不卡| 欧美zozozo另类| 黑人欧美特级aaaaaa片| 国产午夜精品久久久久久一区二区三区 | 亚洲欧美一区二区三区黑人| 国产aⅴ精品一区二区三区波| 久久久久久九九精品二区国产| 亚洲欧美一区二区三区黑人| 久久久精品大字幕| 国产真实伦视频高清在线观看 | 国产黄色小视频在线观看| 国产aⅴ精品一区二区三区波| 神马国产精品三级电影在线观看| 免费搜索国产男女视频| 国产探花在线观看一区二区| 日韩 欧美 亚洲 中文字幕| 桃红色精品国产亚洲av| 国产精品亚洲美女久久久| 欧美午夜高清在线| e午夜精品久久久久久久| 国产老妇女一区| 中文字幕熟女人妻在线| 日韩欧美国产在线观看| 国产精品久久久久久亚洲av鲁大| 国模一区二区三区四区视频| 亚洲国产欧美网| av欧美777| 麻豆成人午夜福利视频| 成人高潮视频无遮挡免费网站| 97超视频在线观看视频| 久久草成人影院| 精品一区二区三区人妻视频| 亚洲欧美日韩卡通动漫| 精品国内亚洲2022精品成人| 久久精品国产自在天天线| 国产精品嫩草影院av在线观看 | 欧美黄色淫秽网站| 亚洲中文字幕一区二区三区有码在线看| 免费大片18禁| 亚洲在线自拍视频| 亚洲美女黄片视频| 亚洲最大成人手机在线| 欧美激情久久久久久爽电影| 久久久国产精品麻豆| 99久久成人亚洲精品观看| 精品人妻1区二区| 一本久久中文字幕| 熟妇人妻久久中文字幕3abv| 九色成人免费人妻av| 欧美一级毛片孕妇| 两个人的视频大全免费| 日本 欧美在线| 91在线观看av| 国产精品一及| 首页视频小说图片口味搜索| 国产一区二区三区视频了| 岛国在线免费视频观看| 日日夜夜操网爽| av欧美777| 精品无人区乱码1区二区| 久久国产精品影院| 国内毛片毛片毛片毛片毛片| 午夜精品一区二区三区免费看| 国产一区二区在线观看日韩 | 午夜两性在线视频| 69人妻影院| 日日摸夜夜添夜夜添小说| 国内揄拍国产精品人妻在线| 日韩有码中文字幕| 免费观看精品视频网站| 欧美日韩瑟瑟在线播放| 国产极品精品免费视频能看的| 国产蜜桃级精品一区二区三区| 亚洲国产精品成人综合色| 日本三级黄在线观看| 在线观看66精品国产| 欧美区成人在线视频| 五月玫瑰六月丁香| 久99久视频精品免费| 中文资源天堂在线| 国产一区二区在线观看日韩 | 国产aⅴ精品一区二区三区波| 精品一区二区三区人妻视频| 午夜福利免费观看在线| 非洲黑人性xxxx精品又粗又长| 国产高清videossex| 亚洲av二区三区四区| 人妻丰满熟妇av一区二区三区| 99久久99久久久精品蜜桃| 午夜免费成人在线视频| 免费高清视频大片| 久久久色成人| 99久久九九国产精品国产免费| 亚洲av日韩精品久久久久久密| 国内久久婷婷六月综合欲色啪| 午夜免费成人在线视频| 午夜精品久久久久久毛片777| 老司机在亚洲福利影院| 天美传媒精品一区二区| 人人妻人人看人人澡| 欧美黄色片欧美黄色片| 国产精品 欧美亚洲| 精品久久久久久,| 熟女人妻精品中文字幕| 在线天堂最新版资源| 91在线精品国自产拍蜜月 | 天堂√8在线中文| 尤物成人国产欧美一区二区三区| 日韩欧美精品v在线| 99精品久久久久人妻精品| 在线天堂最新版资源| 亚洲黑人精品在线| 成人永久免费在线观看视频| 90打野战视频偷拍视频| 国产激情欧美一区二区| 亚洲av免费在线观看| 日本在线视频免费播放| 亚洲成人中文字幕在线播放| 免费在线观看成人毛片| 国产高清视频在线播放一区| 亚洲av免费高清在线观看| 久久国产精品影院| 一个人观看的视频www高清免费观看| 欧美日本视频| 久久久久久大精品| 精品国内亚洲2022精品成人| 欧美黑人欧美精品刺激| 99久久成人亚洲精品观看| 久久精品国产自在天天线| 美女高潮的动态| 日韩精品青青久久久久久| tocl精华| 熟女电影av网| 亚洲五月天丁香| 免费看光身美女| 俄罗斯特黄特色一大片| 亚洲中文日韩欧美视频| 麻豆国产97在线/欧美| 亚洲av成人精品一区久久| 搡女人真爽免费视频火全软件 | 婷婷精品国产亚洲av在线| 真人一进一出gif抽搐免费| 波野结衣二区三区在线 | 搡老熟女国产l中国老女人| 国产精品日韩av在线免费观看| 国内精品久久久久精免费| 久久中文看片网| 久久久久精品国产欧美久久久| avwww免费| 国产单亲对白刺激| 2021天堂中文幕一二区在线观| 日韩有码中文字幕| 麻豆久久精品国产亚洲av| 禁无遮挡网站| 午夜两性在线视频| 俺也久久电影网| 在线观看66精品国产| 母亲3免费完整高清在线观看| 久久精品国产亚洲av涩爱 | 夜夜夜夜夜久久久久| 久久欧美精品欧美久久欧美| 麻豆成人午夜福利视频| 身体一侧抽搐| 99riav亚洲国产免费| 天堂av国产一区二区熟女人妻| 九九在线视频观看精品| 熟女少妇亚洲综合色aaa.| 国产伦在线观看视频一区| 精品人妻1区二区| 中国美女看黄片| 亚洲在线观看片| 国产三级中文精品| 久久精品91无色码中文字幕| 久久久久精品国产欧美久久久| 久久久久免费精品人妻一区二区| 亚洲精品日韩av片在线观看 | 噜噜噜噜噜久久久久久91| 精品久久久久久成人av| 欧美日韩黄片免| 国产高清有码在线观看视频| 国产精品电影一区二区三区| 美女大奶头视频| 国产亚洲精品久久久com| 久久精品国产亚洲av涩爱 | 女人高潮潮喷娇喘18禁视频| 男女视频在线观看网站免费| 天天一区二区日本电影三级| 日本a在线网址| 欧美精品啪啪一区二区三区| 日日干狠狠操夜夜爽| 国产亚洲精品一区二区www| 精品久久久久久久毛片微露脸| 欧美高清成人免费视频www| 亚洲av电影在线进入| 真人做人爱边吃奶动态| 午夜福利免费观看在线| 91在线观看av| 午夜亚洲福利在线播放| 欧美+日韩+精品| 欧美一区二区亚洲| 亚洲欧美日韩东京热| 国产高清有码在线观看视频| 网址你懂的国产日韩在线| 欧美黑人巨大hd| 在线观看66精品国产| 最后的刺客免费高清国语| 99视频精品全部免费 在线| 嫁个100分男人电影在线观看| 欧美三级亚洲精品| 日韩亚洲欧美综合| 国产精品综合久久久久久久免费| 一进一出抽搐动态| 神马国产精品三级电影在线观看| 亚洲一区高清亚洲精品| 97人妻精品一区二区三区麻豆| 99久久综合精品五月天人人| 精品国产三级普通话版| 久久久久精品国产欧美久久久| 宅男免费午夜| 99精品在免费线老司机午夜| 国产一区二区三区在线臀色熟女| 亚洲无线观看免费| 听说在线观看完整版免费高清| 男女那种视频在线观看| 午夜福利欧美成人| 欧美+亚洲+日韩+国产| 免费高清视频大片| 最新在线观看一区二区三区| 熟女电影av网| 午夜亚洲福利在线播放| 国产欧美日韩精品一区二区| 亚洲午夜理论影院| 久久亚洲精品不卡| 国内精品久久久久久久电影| 国产视频一区二区在线看| 欧美日韩乱码在线| 一区二区三区国产精品乱码| 亚洲,欧美精品.| 内地一区二区视频在线| 日韩欧美精品v在线| 狂野欧美白嫩少妇大欣赏| 全区人妻精品视频| 日韩av在线大香蕉| 色综合婷婷激情| 久久精品影院6| 制服人妻中文乱码| 一a级毛片在线观看| 国产成人欧美在线观看| 日韩成人在线观看一区二区三区| 黄片大片在线免费观看| 亚洲成av人片在线播放无| av国产免费在线观看| 久久性视频一级片| 一个人看视频在线观看www免费 | 亚洲中文日韩欧美视频| 女同久久另类99精品国产91| 欧美成人性av电影在线观看| 午夜日韩欧美国产| 极品教师在线免费播放| 欧美日韩精品网址| 久久久色成人| 国产精品久久久久久亚洲av鲁大| 亚洲av不卡在线观看| 男女下面进入的视频免费午夜| 天堂影院成人在线观看| 女生性感内裤真人,穿戴方法视频| 人人妻人人看人人澡| 国产伦人伦偷精品视频| 女同久久另类99精品国产91| 国产美女午夜福利| 日韩成人在线观看一区二区三区| 尤物成人国产欧美一区二区三区| 床上黄色一级片| 久久久久免费精品人妻一区二区| 久久6这里有精品| av福利片在线观看| 欧美日韩一级在线毛片| 国产真实伦视频高清在线观看 | 国产97色在线日韩免费| 黄色女人牲交| 久久久久久久亚洲中文字幕 | 日本撒尿小便嘘嘘汇集6| 亚洲国产精品999在线| 亚洲男人的天堂狠狠| 免费电影在线观看免费观看| 国产激情偷乱视频一区二区| 少妇裸体淫交视频免费看高清| 婷婷亚洲欧美| 一本一本综合久久| 色在线成人网| 日本在线视频免费播放| 天堂√8在线中文| 香蕉久久夜色| 午夜老司机福利剧场| 国产爱豆传媒在线观看| 色综合欧美亚洲国产小说| 国产精品,欧美在线| 亚洲中文日韩欧美视频| 国产高清有码在线观看视频| 亚洲精品在线美女| 国产亚洲欧美98| 黄色女人牲交| 波多野结衣巨乳人妻| 狠狠狠狠99中文字幕| 国产老妇女一区| 国产真实乱freesex| 国产三级在线视频| 成人18禁在线播放| 床上黄色一级片| 久久精品国产亚洲av涩爱 | 亚洲在线自拍视频| 欧美一区二区亚洲| 欧美日韩综合久久久久久 | 中文字幕熟女人妻在线| 亚洲av二区三区四区| 麻豆成人午夜福利视频| 18禁黄网站禁片免费观看直播| 法律面前人人平等表现在哪些方面| 亚洲av成人av| 又黄又粗又硬又大视频| 国产亚洲精品久久久com| 国产av在哪里看| 在线播放国产精品三级| 淫秽高清视频在线观看| 老司机在亚洲福利影院| 女警被强在线播放| 搡女人真爽免费视频火全软件 | 18禁国产床啪视频网站| 少妇的逼水好多| 免费搜索国产男女视频| 国产高清视频在线播放一区| 色av中文字幕| 亚洲国产欧洲综合997久久,| 国产伦一二天堂av在线观看| 老鸭窝网址在线观看| 1000部很黄的大片| 色综合欧美亚洲国产小说| www.999成人在线观看| 香蕉久久夜色| 黄片大片在线免费观看| 午夜免费成人在线视频| 中文字幕人妻熟人妻熟丝袜美 | 波野结衣二区三区在线 | 亚洲一区二区三区色噜噜| 成人鲁丝片一二三区免费| 亚洲,欧美精品.| 香蕉久久夜色| 国产亚洲精品久久久com| 国产午夜精品久久久久久一区二区三区 | 99国产精品一区二区三区| 久久久久九九精品影院| 亚洲乱码一区二区免费版| 内地一区二区视频在线| 长腿黑丝高跟| 欧美精品啪啪一区二区三区| 午夜精品久久久久久毛片777| 中文字幕人成人乱码亚洲影| 怎么达到女性高潮| 久久久久久久精品吃奶| 在线观看av片永久免费下载| 日本在线视频免费播放| 嫩草影院精品99| 波野结衣二区三区在线 | 亚洲成人久久性| 午夜福利成人在线免费观看| 国产一区二区在线av高清观看| 成年版毛片免费区| 无人区码免费观看不卡| 九九久久精品国产亚洲av麻豆| 国产激情偷乱视频一区二区| 国产精品久久视频播放| 男人舔奶头视频| 精品人妻一区二区三区麻豆 | 成人欧美大片| 69av精品久久久久久| 精品电影一区二区在线| 国产成人啪精品午夜网站| 九九热线精品视视频播放| 欧美日韩精品网址| 很黄的视频免费| 免费av毛片视频| 搡老熟女国产l中国老女人| 久久性视频一级片| 国产一区在线观看成人免费| 看片在线看免费视频| 男女视频在线观看网站免费| 亚洲精品在线观看二区| 国产高清三级在线| 狠狠狠狠99中文字幕| 日韩免费av在线播放| 欧美中文综合在线视频| 成人特级av手机在线观看| 国产老妇女一区| 久久久国产成人精品二区| 哪里可以看免费的av片| 手机成人av网站| 亚洲人成伊人成综合网2020| 日韩欧美三级三区| 又黄又爽又免费观看的视频| 亚洲人成电影免费在线| 一进一出好大好爽视频| 老司机深夜福利视频在线观看| 男人和女人高潮做爰伦理| 在线观看一区二区三区| 国产激情欧美一区二区| 中国美女看黄片| 亚洲欧美日韩无卡精品| 中文字幕久久专区| 亚洲精华国产精华精| ponron亚洲| 欧美黄色淫秽网站| 国内揄拍国产精品人妻在线| 男女那种视频在线观看| 久久久久久大精品| 一区二区三区国产精品乱码| 偷拍熟女少妇极品色| 欧美乱色亚洲激情| 欧美黑人巨大hd| 精品一区二区三区视频在线观看免费| 国产欧美日韩一区二区精品| 欧美+亚洲+日韩+国产| 91麻豆av在线| 亚洲国产欧美网| 色播亚洲综合网| 一进一出抽搐gif免费好疼| 欧美丝袜亚洲另类 | 人妻丰满熟妇av一区二区三区| 舔av片在线| 国产黄片美女视频| 国产淫片久久久久久久久 | 精品国产亚洲在线| 中文字幕精品亚洲无线码一区| 少妇丰满av| 国产探花在线观看一区二区|