• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Shared-data chain: a new anti-internal leakage shared data scheme using negative database with blockchain

    2019-03-29 08:01:44,,

    , ,

    (Software College, Shenyang Normal University, Shenyang 110034, China)

    Abstract: The rise of computer science and technology has brought a lot of convenience to people, but at the same time, network security faces unprecedented challenges. In order to meet the higher level of security capability in the future based on block chain, we design a new anti-leaked authentication data sharing scheme in this paper. For the process of data sharing between internet enterprises, user’s information is easily stolen or tampered. In particular, employees in the company leak user’s sensitive data unintentionally or intentionally. These behaviors affect the efficiency of data asset sharing. For this reason, this paper uses the negative representation of information to share information. Based on the character of decentralization, openness, difficult to-change, and using the smart contract in the blockchain to reduce costs, solve all problems, improve work efficiency and promote social development of the intelligent.

    Key words: information security; blockchain; smart contract; negative database

    0 Introduction

    The rapid growth in network technologies has provided a flexibility of communication and content that has had a transformative impact to all aspects of society. Therefore, more and more companies in different areas import client authentication data each other. They use this method to realize the realization of traffic monetizing, client’s fund switching and other mutually beneficial operations. For example, Google import client authentication information to Apple, JD.COM import client authentication information to WeChat and so on.

    Cryptology technology is an important security control mechanism. However, it is not highly secure. If internal employee do the improper operation or leak information maliciously, it can cause serious consequences, especially with regard to biometric authentication information (e.g., fingerprint and iris). Thus far, many traditional cryptographic methods[1-3]have been proposed to protect the authentication data. Although these schemes can use encryption and decryption algorithm for protecting shared authentication data, some of them need encrypt and decrypt the database repeatedly for providing the database service. This method must highly reduce efficiency. Some other schemes have a valid access control to the positive database, but this method does not eliminate all security risks, such as the threat of the disclosure of biometric information, or the threat of an offline decryption of authentication information to obtain the entity’s long-term key. In order to solve the problem, the company is necessary to adopt new methods and techniques.

    Therefore, the technology of negative information algorithm is adopted. Negative representation of information was first proposed by Esponda et al in 2004[4-6]which was inspired by the negative selection mechanism in the biological immune system. Negative database (NDB) is one of the main models of negative information representation. TheNDBrealizes data security, privacy protection and other purposes by storing the original data collection[4,7-8]. At present, theNDBis used in some application scenarios. For example, theNDBcan be used to protect the user’s privacy data in [5]. It has a series of operation operators on theNDB, which can support database operation under the premise of protecting the positive database security, such as schemes in [9-10]. It also can be used for data hiding and it “hides” the original data by using complementary set information contained in aNDB, such as scheme in [11].

    Negative representation of information is a new kind of information representation method to achieve the goal of protecting data security and privacy. When the problem of sharing authentication data is solved, the contract issue is coming. For example, no one can prove the validity of the agreement and no one can guarantee that party B will not deny the data and so on. At this time, the traditional way is to sign a legal agreement. But the scheme is extremely inefficient. For this problem, a smart contract based on block chain is adopted. The phrase “smart contracts” was first coined by computer scientist Nick Szabo in [12]. Emerging smart contract systems over decentralized cryptocurrencies allow mutually distrustful parties to transact safely without trusted third parties[13]. Within the block chain context, smart contracts are scripts stored on the block chain. Compared with the traditional contract, it can save a lot of manpower, time and resources, but can bring more stable and safer benefits.

    In this paper, based on block chain, we design a new anti-leaked authentication data sharing scheme. In other words, theNDBwhich is generated through aNDBalgorithm can be embedded as a smart contract and chained to block chain. The scheme provides authentication data protection to enhance the security without increasing much cost and manpower. Moreover, the proposed scheme can be adopted in large data set and biometric authentication. Overall, our contributions are:

    1) We propose the authentication data sharing based on block chain. Therefore, it can protect the contract. We analyze the security of the proposed scheme and show that it can resist hostile attacks, data leakage, biometric authentication information attacks and internal offline dictionary attacks.

    2) We propose the authentication data shared by this scheme is negative information. So a company can share and receive the authentication data trustingly that can’t be afraid of being leaked.

    The rest of the paper is organized as follows: We outline preliminaries in Section 1. Next, a primary generic construction idea of authentication data sharing and a concrete scheme is presented in Section 1. Then, the security and efficiency analysis are given in Section 3. This paper is finally concluded in Section 4.

    1 Preliminaries

    1.1 Blockchain Technology

    The concept of blockchain was first proposed by Satoshi Nakamoto in 2008[14]. In the years that followed, it has become a central component of the electronic currency bitcoin: the public ledger of all transactions.

    The core advantage of blockchain technology is decentralization.It has some unique features like data irreversibility, data tamper-resistant and data maintenance by all participants, which make blockchain technology become a natural “distributed ledger”.

    Blockchain can be divided into six levels: data layer, network layer, consensus layer, incentive layer, contract layer and application layer. Figure 1 shows this infrastructure model.

    Among them, the data layer encapsulates the underlying data blocks, relevant data encryption, timestamp, other basic data and algorithms. The network layer includes distributed networking mechanism, data transmission mechanism and data verification mechanism. The consensus layer mainly encapsulates all kinds of consensus algorithms of network nodes. The incentive layer integrates economic factors into the block chain technology system, including the distribution mechanism and distribution mechanism of economic incentives. Contract layer mainly encapsulates all kinds of scripts, algorithms and intelligent contracts, which is the basis of block chain programmable characteristics. The application layer encapsulates various application scenarios and cases of blockchain. In this model, the structure based on timestamp, the consensus mechanism of distributed nodes, the economic incentive based on consensus computing force and the flexible programmable intelligent contract are the most representative innovation points of block chain technology.

    Blockchain technology can improve the security of data, reduce the cost of data maintenance and promote the intelligent development of organizations. In the future, it will have a wide range of application prospects in these fields of banking, auditing, copyright andsocial contact.

    1.2 Negative Database

    Negative database was first proposed and given the basic concept by Esponda et al in 2004[15]. The concept ofNDBis of great significance in the field of cryptography.NDBcan be described as: suppose the database is a data set composed of n-bit binary strings, andUis a complete set composed of n-bit binary strings, thenNDBstores a compressed form of contents in (U-DB). Since theNDBhas a many-to-one relationship with the original database, we use the notation “*” to represent “don’t care”. We represent the alphabet in theNDBas {0,1,*}, if the value of a bit of a record inNDBis “*”, this bit is called an indeterminate position; if the value of a bit of a record inNDBis “0” or “1”, this bit is called a determinate position. Tab.1 illustrates this example in detail.

    Subsequently, a gaussian negative survey was proposed in [16], which made the probability of participants choosing negative options subject to the high probability distribution. It also used the gaussian negative survey to collect clustered spatial data and support regional clustering query. In 2007, Horey and his colleagues[17]applied negative surveys to anonymous data collection in sensor networks. Groat and his colleagues proposed a multi-dimensional negative survey in [18-19], which can be used to construct a data aggregation model in participatory perception applications. In 2012, Horey et al[20]. Applied negative survey to location privacy protection. They proposed a negative quadtree model and showed that their model had high efficiency and accuracy. Bao, Luo and Zhang pointed out in literature [21] that unreasonable negative values may be generated in the original negative survey model, and proposed two effective methods to solve this problem. In [22], Bao, Luo and Lu proposed the confidence calculation method of negative survey, which can be used to evaluate the quality of reconstruction results. Du, Luo and Zhao proposed a privacy protection data publishing method based on negative survey in [23], which is called negative data publishing.

    At present, some negative database generation algorithms have been proposed. Typically, the prefix algorithm[24]is the first algorithm used to generate binary negative databases. In order to generate a negative database that is difficult to solve[24], also proposes anRNDBalgorithm. In 2005, Jia et al. proposed a q-hidden algorithm for generating difficultSATinstances[25]. Liu et al[26]. Proposed hybrid-NDBpublic algorithm by combining prefix algorithm and q-hidden algorithm. In [27], Liu, Luo and Yue also proposed p-hidden algorithm.

    2 The Proposed Shared-Data Chain

    In this section, we outline our proposed dynamic identity-based negative authenticated scheme. Our proposed scheme in this paper is based on theNDB. TheNDBand hash function are employed to preserve security of theID, in which forward security and forward anonymity are preserved by use the dynamicID. In addition, replay attacks are prevented by using a smart card. Using our protocol, either party can’t incur loss. A blockchain is like a monitor recording everyone’s behavior. Every action or transaction is stored in a block and connected to the blockchain securely. No one can tamper with these records. We write smart contracts on the blockchain, which are self-enforcing code that executes commands.

    Tab.2 Notation

    For clarity, we describe the protocol regarding three network participants that we call user (U), the server of companyA(severA) and the server of companyB(serverB). This protocol comprises three phases: registration phase, authentication phase and password changing phase.

    2.1 Notation Description

    The notations used in this paper are shown in Table 2.

    2.2 Registration Process

    If a user wants to be a legitimate user of a server, he/she must first register with the server. The server controls the access of system resources by authenticating the user whether it is legal or not, and protects the resource security. In this phase, the server generates system parameters. First, definewis the chosen key size, the serverSselect a finite fieldFqover a large prime numberq, whereq>2w. An elliptic curve equationE:y2=x3+ax+b(modq) overFqis determined, wherea,b∈Fq, and it satisfies the condition of 4a3+27b2≠0(modq). Meanwhile, serverSselects a public pointPwith the ordernoverE, and utilizesPto generate a cyclic additive groupGof order n overE. Hash function {0,1}*→{0,1}liis denoted byHi, wherei∈{0,1,2,3} andliis the output bit length ofHi. When user wishes to register his/her to sever, the following operations are performed, can be seen in Fig.2.

    Fig.2 Registration Process

    First, the user chooses his/herid, and the user sends his/heridto serverA. Thisidis saved and acknowledged by serverA. After serverAreceiving the registration request message from the user, serverAchooses a random numberγ, then computesID=H0(id) andPW=H3(ID‖pw0‖γ), wherepw0is the initial password. Next, serverAstores (ID,γ) in the registration table. At the same time, serverAstores[γ,PW,Hi(i=0,1,2,3)(·),G] in the user’s smart card, and return it to user. After above, the user must change the password immediately in the password changing phase. Server A publishes the block onto the blockchain. From this moment, the block can’t be tampered with.

    2.3 Authentication Data Sharing Process

    In order to avoid the repeated registration of user, after the serverAreceives the authentication information of user successfully, the data information of user is shared to the serverBand linked to the blockchain. The authentication data sharing stage is shown in Fig.3.

    Fig.3 Authentication Data Sharing Process

    In this phase, serverAwill generate timestampTand random numbern, and use negative database generation algorithm to calculateG(PW). Then calculateV=H4(T‖n‖ID‖G(PW)) and publishV, afterwards, the smart contract code agreed by both parties on the blockchain, and sendID,G(PW),T,n,Vto the server of companyBfor integrity check. Shared data can only be used if the validation integrity check and DPoS is successfully published on the blockchain. Finally,ID,G(PW),T,n,Vand smart contract code will be recorded on the blockchain.

    2.4 User Authentication Process

    After registering, if the user wishes to use the server resource, he/she can initiate a login request to the server. After receiving the user’s login request, the server provides the authentication service. We can see Fig.4 for the process of this stage.

    Fig.4 User Authentication Process(Get B Company’s Services)

    The steps for this stage are described below.

    1) The user inserts his/her smart card into the card reader, input his/heridU,pwU, and open a session with the serverB.

    2) The serverBchooses a random number s, and computesv=H1(IDU‖IDS‖PW),V=vP,S=sP,S*=S+V. Then the serverBsends {IDS,S*} to the user.

    2.5 Rerelease Process

    If an employee within the company leaks information about the user, this scheme can adjust the i value inGi(·) and invalidate the original negative database. Then repeat steps 2.2~2.4.

    2.6 Design of Smart Contract

    The smart contract in this paper is mainly designed for the cooperation details between companies. In blockchain, the relevant contract terms are automatically executed in the form of smart contracts. The full life cycle activities of this smart contract mainly include: clause generation, clause release,code verification and code execution. Clause generation is to fill in the clause template, including the clause number, theIDof the clause proposer, the clause code and its hash. Clause release refers to the posting of signed clauses on the blockchain. Code verification is the process of checking code before it is executed, if there has any error, the designer will fix bug patches in time. Code execution means that when the blockchain receives the transaction signal, it reads the code from the blockchain and executes it, then finally returns the execution result to the blockchain.

    3 Security and Efficiency Analysis

    3.1 Security Analysis

    3.1.1 Security Analysis of Negative Database

    Negative database is a new technology of data security. At present, there are few effective studies on negative database. But it can’t negate the advantage of negative databases. First, negative databases can perform some operations and calculations like positive databases. In today’s big data era, negative database has no complex operation like repeated encryption and decryption. It can be more convenient and secure without consuming too much computer resources. Second, it is easy to convert a positive database to a negative database, but difficult to convert a negative database to a positive database, this characteristic adds to the safety. Third, negative database generation algorithm has randomness, so a positive database can generate many different negative databases. In addition, it is difficult to determine the size of the negative database corresponding to the positive database.

    3.1.2 Security Analysis of Smart Contract

    In this scheme, the details of cooperation between companies are represented by computer code as smart contracts, which are written into the distributed network system of blockchain in advance. When an event occurs in a contract, the smart contract is triggered and automatically executes the corresponding contract terms. Smart contracts on blockchain are written and executed in code. Once signed, they must be performed. Besides, traceability and tamper ability of blockchain can avoid contract disputes. The user information is finally recorded on the distributed ledger, the blockchain can automatically imports, automatically classifies, automatically shares, and automatically performs the intelligent contract to facilitate the protection of user information.

    3.1.3 Security Analysis of This Scheme

    The following reasons prove that our scheme is very secure.

    First, this scheme is based on blockchain. All IoT collaborations on the blockchain will be added to the timestamp to guarantee availability for future generations. At the same time, smart contracts on the blockchain can be applied to the blockchain data, and commercial terms can be implemented in the communications of the IoT to ensure the effectiveness and security of the IoT in large-scale application.

    Second, this scheme shows that the code is the rule. It provides trust, recording, transparency and communication support to users on the Internet.

    Then, this scheme uses negative database generation algorithms, hash functions and ECC algorithms. If an attacker wants to solve the scheme, he must break the algorithms simultaneously. But in fact, it’s very hard to break one of these algorithms. For example, the biggest advantage of ECC is that it uses shorter keys to achieve greater security. Elliptic curve discrete logarithm algorithm is the most difficult problem to solve in ECC. In other words, based on the current known mathematical methods, there is no way to calculate the difference between positive and negative values of the one-way function. This means that solving the discrete logarithm problem of an elliptic curve is much more difficult than factoring for the same number of digits. Because the denser the computational space of an algorithm means the more powerful a cryptosystem is, the ECC is very difficult to breach.

    Finally, a negative database is a complement to a positive database. A system can have an infinite number of negative databases, so you can generate an infinite number of versions of the user’s authentication information. If someone finds the parameter of the negative database where the authentication information is located and leaks the user’s authentication information, the system will identify the information, mark the negative database, discard it forever, and regenerate a new negative database different from the previous parameters.

    3.2 Efficiency Analysis

    This scheme needs to store all user information in a negative database. It is assumed that there aremvalid legal users and the user information length isl, then the space complexity isO(m×l). However, this scheme uses the hash function to map the data in the original negative database to a smaller negative database, so the space complexity is lower, the storage space required is less, and the required space is easier to obtain.

    Compared to RSA and DSA, ECC uses shorter keys for higher efficiency. This scheme can select SHA-512 algorithm whose time complexity isO(n)[28]. Moreover, if we choose K-hidden algorithm as negative database generating algorithm, the time complexity of generating a negative database will beO(n×r×K)[29]. In general,kandrare relatively small, so its time complexity can be approximately equal toO(n). Therefore, the computational workload used in the algorithm is very low, the time required is very short, and the efficiency is very high.

    4 Conclusion and Prospect

    4.1 Conclusion

    Network information security has become a key issue affecting the development of network information technology. Cryptography is an important means to realize network information security. Encryption algorithm is the key part of cryptographic protocol. But traditional cybersecurity measures are increasingly vulnerable, it is particularly important to design an information security technology that is safe and efficient and can absolutely adapt to the current network environment. From the perspective of the trend of global technology and finance and the current development level of network security, blockchain is undoubtedly the best choice. Compared with the pure big data technology, blockchain will become a technology of great concern in the technology and financial industry. Blockchain technology will break the monopoly of the traditional big data, avoid the illegal factors of big data applications, data application and extend to all walks of life. It can ensure the true and traceability of big data,and also really solve the problem of the ownership of large data. The negative database adopted by this scheme has been used in some application scenarios. A series of operators on negative database can support database operation under the premise of protecting the security of positive database.

    4.2 Prospect

    As the study of negative database is still in its infancy, there are still many problems to be solved, such as the optimization of negative database algorithm, improvement of instance generation algorithm, implementation of basic operations (such as the insertion, deletion, modification, intersection and union of negative database) and exploration of new application fields.

    Blockchain technology has become a hot industry at present. Many enterprises have begun to explore the blockchain market, which has a broad prospect, but the technology itself is still not mature enough, and there is still a lot of room for expansion. In the future, many fields in the society are expected to use the application technology based on blockchain to create a new industrial ecological chain, reduce transaction costs and realize a more efficient and convenient transaction mechanism.

    国产伦在线观看视频一区| 久久综合国产亚洲精品| 少妇猛男粗大的猛烈进出视频 | 欧美激情国产日韩精品一区| 熟妇人妻久久中文字幕3abv| 日本色播在线视频| 亚洲av男天堂| 国产视频首页在线观看| 久久久精品94久久精品| 国产高清有码在线观看视频| 欧美成人精品欧美一级黄| 亚洲欧美成人精品一区二区| 老熟妇乱子伦视频在线观看| 1000部很黄的大片| 麻豆国产97在线/欧美| 美女cb高潮喷水在线观看| 久久久久久久久久久丰满| 少妇熟女aⅴ在线视频| av天堂在线播放| 男女边吃奶边做爰视频| 秋霞在线观看毛片| 国产伦在线观看视频一区| 日本五十路高清| 日韩精品青青久久久久久| 亚州av有码| 一区二区三区免费毛片| 亚洲天堂国产精品一区在线| 永久网站在线| 国产一区二区在线av高清观看| 给我免费播放毛片高清在线观看| 亚洲一区高清亚洲精品| 黄色配什么色好看| 婷婷六月久久综合丁香| 99riav亚洲国产免费| 别揉我奶头 嗯啊视频| www.av在线官网国产| 欧美日韩在线观看h| 中国国产av一级| 欧美xxxx性猛交bbbb| 免费人成在线观看视频色| 国产精品一区二区性色av| 国产精品国产三级国产av玫瑰| 中国美女看黄片| 蜜桃久久精品国产亚洲av| 黄色一级大片看看| 精品一区二区免费观看| 99久久精品国产国产毛片| 中文字幕人妻熟人妻熟丝袜美| 亚洲av二区三区四区| 热99在线观看视频| 国产精华一区二区三区| 真实男女啪啪啪动态图| 夜夜看夜夜爽夜夜摸| 国产蜜桃级精品一区二区三区| 一个人观看的视频www高清免费观看| 人妻久久中文字幕网| 亚洲欧美日韩东京热| 精品人妻视频免费看| av在线天堂中文字幕| 国产日本99.免费观看| 午夜免费男女啪啪视频观看| 久久国产乱子免费精品| 亚洲婷婷狠狠爱综合网| 国产成人精品一,二区 | 女人被狂操c到高潮| 麻豆成人av视频| 深夜a级毛片| 欧美日韩乱码在线| 亚洲美女搞黄在线观看| 全区人妻精品视频| 色哟哟·www| 国产片特级美女逼逼视频| 亚洲av成人精品一区久久| 永久网站在线| 听说在线观看完整版免费高清| 99热6这里只有精品| 晚上一个人看的免费电影| 欧美变态另类bdsm刘玥| av天堂中文字幕网| 成人三级黄色视频| 日韩欧美精品免费久久| 国产 一区 欧美 日韩| 久久亚洲精品不卡| 一个人看视频在线观看www免费| 天天躁夜夜躁狠狠久久av| 国国产精品蜜臀av免费| 久久精品夜色国产| 九草在线视频观看| 我的女老师完整版在线观看| 99在线视频只有这里精品首页| 啦啦啦观看免费观看视频高清| 精品一区二区三区人妻视频| 久久久久久久午夜电影| 国产v大片淫在线免费观看| 看免费成人av毛片| 亚州av有码| av女优亚洲男人天堂| 免费一级毛片在线播放高清视频| 日韩人妻高清精品专区| 免费观看人在逋| 中出人妻视频一区二区| 欧美三级亚洲精品| 亚洲最大成人av| 麻豆av噜噜一区二区三区| 欧美激情国产日韩精品一区| 少妇丰满av| 亚洲高清免费不卡视频| 国产探花在线观看一区二区| 蜜臀久久99精品久久宅男| 我要搜黄色片| 精品久久久久久久久久久久久| 国产精品久久久久久久电影| 欧美性猛交黑人性爽| 久久99热6这里只有精品| 亚洲,欧美,日韩| 日韩中字成人| 国产精品嫩草影院av在线观看| 99热精品在线国产| 免费观看a级毛片全部| 校园人妻丝袜中文字幕| 久久久a久久爽久久v久久| 不卡一级毛片| 超碰av人人做人人爽久久| 成人亚洲精品av一区二区| 一级黄色大片毛片| 国国产精品蜜臀av免费| 嘟嘟电影网在线观看| 看十八女毛片水多多多| 亚洲av成人av| 亚洲成a人片在线一区二区| 九草在线视频观看| 日韩欧美三级三区| 国产日本99.免费观看| 亚洲国产精品合色在线| 亚洲av成人av| 女的被弄到高潮叫床怎么办| 国产老妇女一区| 亚洲av成人av| 又爽又黄无遮挡网站| 亚洲性久久影院| 波多野结衣高清无吗| 最近视频中文字幕2019在线8| 免费看av在线观看网站| 黄色一级大片看看| 又粗又硬又长又爽又黄的视频 | 国产激情偷乱视频一区二区| 欧美日韩精品成人综合77777| 日韩av在线大香蕉| 国产精品电影一区二区三区| 亚洲成人精品中文字幕电影| 99久久精品国产国产毛片| 天堂av国产一区二区熟女人妻| 最好的美女福利视频网| 亚洲欧美清纯卡通| 日日摸夜夜添夜夜添av毛片| 97超视频在线观看视频| 免费看av在线观看网站| 三级国产精品欧美在线观看| 亚洲av一区综合| 别揉我奶头 嗯啊视频| 国产精品一区二区性色av| 中文字幕熟女人妻在线| 观看免费一级毛片| 成人三级黄色视频| 人妻少妇偷人精品九色| 网址你懂的国产日韩在线| 精品午夜福利在线看| 午夜激情福利司机影院| 欧美最新免费一区二区三区| 国产精品三级大全| 国产一级毛片在线| 身体一侧抽搐| 一个人免费在线观看电影| 99久久成人亚洲精品观看| 91久久精品电影网| а√天堂www在线а√下载| 国产视频内射| 欧美激情国产日韩精品一区| АⅤ资源中文在线天堂| 国产69精品久久久久777片| 国产精品1区2区在线观看.| 变态另类丝袜制服| 亚洲美女搞黄在线观看| 人人妻人人澡欧美一区二区| 国内精品宾馆在线| 国产毛片a区久久久久| 爱豆传媒免费全集在线观看| 国产精品久久久久久久久免| 日本免费一区二区三区高清不卡| 亚洲av第一区精品v没综合| 国产综合懂色| 日韩欧美 国产精品| 国产精品女同一区二区软件| 精品久久久噜噜| 久久99精品国语久久久| 能在线免费看毛片的网站| 精品久久久久久久人妻蜜臀av| 日韩中字成人| 精品无人区乱码1区二区| 亚洲av免费高清在线观看| 久久亚洲国产成人精品v| 看非洲黑人一级黄片| 久久久色成人| 在线播放无遮挡| 悠悠久久av| 九九热线精品视视频播放| 国产亚洲av嫩草精品影院| 亚洲欧美日韩高清在线视频| 亚洲欧洲国产日韩| 国产视频内射| 国产精品一区二区性色av| 日韩成人av中文字幕在线观看| 观看免费一级毛片| 少妇被粗大猛烈的视频| 一级黄片播放器| 变态另类成人亚洲欧美熟女| 欧美性猛交╳xxx乱大交人| 尤物成人国产欧美一区二区三区| 亚洲成人精品中文字幕电影| 在线免费十八禁| 久久久久久久久久成人| 九色成人免费人妻av| 免费看av在线观看网站| 精品一区二区三区人妻视频| 中国美女看黄片| 亚洲成av人片在线播放无| 婷婷六月久久综合丁香| 啦啦啦啦在线视频资源| 国产爱豆传媒在线观看| 亚洲欧美清纯卡通| 少妇高潮的动态图| 美女xxoo啪啪120秒动态图| 又爽又黄a免费视频| 久久久久久九九精品二区国产| 亚洲欧美日韩卡通动漫| 国产精品人妻久久久久久| 亚洲美女视频黄频| 亚洲成a人片在线一区二区| 国产精品久久久久久久电影| 男女视频在线观看网站免费| 亚洲精华国产精华液的使用体验 | 国产在视频线在精品| 亚洲av中文av极速乱| 日本爱情动作片www.在线观看| 又黄又爽又刺激的免费视频.| 国产极品天堂在线| 99在线视频只有这里精品首页| 亚洲最大成人中文| 精品久久久久久久久av| 国产乱人偷精品视频| 久久久午夜欧美精品| 久久午夜福利片| 久久久久久久久中文| 亚洲欧美成人综合另类久久久 | 国产精品不卡视频一区二区| 少妇的逼好多水| 成年av动漫网址| 国产乱人视频| 老司机影院成人| 久久久久国产网址| 听说在线观看完整版免费高清| 丝袜喷水一区| 久久久成人免费电影| 韩国av在线不卡| 久久精品91蜜桃| 两个人视频免费观看高清| 亚洲av中文字字幕乱码综合| 国产一区亚洲一区在线观看| 中文字幕人妻熟人妻熟丝袜美| 日韩欧美精品v在线| 麻豆成人午夜福利视频| 亚洲中文字幕日韩| 亚洲精品影视一区二区三区av| 久久亚洲国产成人精品v| 精品午夜福利在线看| 校园春色视频在线观看| 18禁黄网站禁片免费观看直播| 午夜爱爱视频在线播放| 三级国产精品欧美在线观看| 性色avwww在线观看| 国产精品99久久久久久久久| 噜噜噜噜噜久久久久久91| av在线老鸭窝| 丰满的人妻完整版| 欧美另类亚洲清纯唯美| 少妇人妻一区二区三区视频| 麻豆成人午夜福利视频| 寂寞人妻少妇视频99o| 六月丁香七月| 免费无遮挡裸体视频| 国产精品精品国产色婷婷| 欧美最黄视频在线播放免费| 深夜精品福利| 亚洲人成网站高清观看| 亚洲一级一片aⅴ在线观看| 成人亚洲精品av一区二区| 国产亚洲5aaaaa淫片| 亚洲欧美日韩高清专用| 国产一级毛片七仙女欲春2| 美女内射精品一级片tv| 亚洲色图av天堂| 深爱激情五月婷婷| 看黄色毛片网站| 免费不卡的大黄色大毛片视频在线观看 | 国产精品福利在线免费观看| 一进一出抽搐动态| 久久久久久九九精品二区国产| 亚洲欧美清纯卡通| 你懂的网址亚洲精品在线观看 | 人妻久久中文字幕网| 国产精品福利在线免费观看| 99热这里只有是精品在线观看| 久久久久久九九精品二区国产| 99久久精品国产国产毛片| 国产高清不卡午夜福利| 国产精品久久视频播放| 网址你懂的国产日韩在线| 亚洲av第一区精品v没综合| 国产亚洲精品av在线| 国产一区二区亚洲精品在线观看| av专区在线播放| 亚洲av免费在线观看| 别揉我奶头 嗯啊视频| 精品久久久久久久久亚洲| 成年免费大片在线观看| 久久99精品国语久久久| 色视频www国产| 此物有八面人人有两片| 中文字幕精品亚洲无线码一区| 日本黄大片高清| 午夜免费激情av| 夫妻性生交免费视频一级片| 欧美成人一区二区免费高清观看| 欧美最新免费一区二区三区| 亚洲精品久久国产高清桃花| 精品不卡国产一区二区三区| 亚洲精品国产av成人精品| 国产精品1区2区在线观看.| 欧美zozozo另类| 国产伦一二天堂av在线观看| 青青草视频在线视频观看| 免费av观看视频| 国产一区二区在线av高清观看| 国产色婷婷99| 男女边吃奶边做爰视频| 亚洲人成网站在线观看播放| 欧美性猛交黑人性爽| 免费一级毛片在线播放高清视频| 一级毛片电影观看 | 国产成人一区二区在线| 亚洲av一区综合| 91狼人影院| 国产一区二区三区在线臀色熟女| 91狼人影院| 国产精品精品国产色婷婷| 看黄色毛片网站| 丰满乱子伦码专区| 91精品一卡2卡3卡4卡| 久久久精品94久久精品| 亚洲国产日韩欧美精品在线观看| 一级毛片电影观看 | 色综合色国产| 嫩草影院入口| 中文亚洲av片在线观看爽| 午夜老司机福利剧场| 国产精品.久久久| 欧美zozozo另类| 国产精品国产高清国产av| 一夜夜www| 不卡视频在线观看欧美| 成人特级av手机在线观看| 99久久精品一区二区三区| 国产一区二区激情短视频| 联通29元200g的流量卡| 国产精品日韩av在线免费观看| 欧美潮喷喷水| a级毛片a级免费在线| 欧美变态另类bdsm刘玥| 美女xxoo啪啪120秒动态图| 日日摸夜夜添夜夜添av毛片| 我要看日韩黄色一级片| 久久精品国产亚洲av涩爱 | 欧美不卡视频在线免费观看| 超碰av人人做人人爽久久| 熟妇人妻久久中文字幕3abv| 亚洲国产精品成人综合色| 亚洲国产精品合色在线| 好男人视频免费观看在线| 三级经典国产精品| 亚洲精品国产av成人精品| 日本-黄色视频高清免费观看| 给我免费播放毛片高清在线观看| 欧美一区二区精品小视频在线| 可以在线观看的亚洲视频| 日韩av不卡免费在线播放| 非洲黑人性xxxx精品又粗又长| 久久精品人妻少妇| 国产视频内射| 久久精品国产自在天天线| 欧洲精品卡2卡3卡4卡5卡区| 久久精品国产清高在天天线| 亚洲av成人精品一区久久| 久久人人爽人人爽人人片va| 99热精品在线国产| 激情 狠狠 欧美| 色5月婷婷丁香| 嫩草影院新地址| 岛国毛片在线播放| 美女内射精品一级片tv| 国产午夜福利久久久久久| 亚洲国产色片| 国产极品天堂在线| 精品日产1卡2卡| 在线观看一区二区三区| 精品久久久久久久久久久久久| 3wmmmm亚洲av在线观看| 级片在线观看| 久久精品影院6| 波多野结衣巨乳人妻| av在线天堂中文字幕| 天天一区二区日本电影三级| 一边摸一边抽搐一进一小说| 国产女主播在线喷水免费视频网站 | 深夜精品福利| 国产伦精品一区二区三区四那| a级毛片a级免费在线| 亚洲,欧美,日韩| 丝袜美腿在线中文| 在线天堂最新版资源| 久久久久网色| 日日啪夜夜撸| 老司机福利观看| 色综合亚洲欧美另类图片| 国产亚洲av片在线观看秒播厂 | 亚洲成人av在线免费| 日韩欧美精品免费久久| 麻豆久久精品国产亚洲av| 国产美女午夜福利| 国产精品无大码| 欧美另类亚洲清纯唯美| 黑人高潮一二区| 天堂av国产一区二区熟女人妻| 99九九线精品视频在线观看视频| 看十八女毛片水多多多| 日韩亚洲欧美综合| 久久欧美精品欧美久久欧美| 男人狂女人下面高潮的视频| 热99在线观看视频| 国产在线精品亚洲第一网站| 淫秽高清视频在线观看| 免费一级毛片在线播放高清视频| 日本熟妇午夜| 狠狠狠狠99中文字幕| .国产精品久久| 国产亚洲精品久久久com| 大型黄色视频在线免费观看| 中出人妻视频一区二区| 久久精品国产清高在天天线| 成人欧美大片| 校园人妻丝袜中文字幕| 中文亚洲av片在线观看爽| 国产精品一区www在线观看| 日本与韩国留学比较| 校园春色视频在线观看| 亚洲18禁久久av| 亚洲精华国产精华液的使用体验 | 国产极品精品免费视频能看的| 国产人妻一区二区三区在| 日本五十路高清| 国产精品久久电影中文字幕| 亚洲熟妇中文字幕五十中出| 日韩成人伦理影院| 国产精品久久久久久av不卡| 边亲边吃奶的免费视频| 夜夜夜夜夜久久久久| 婷婷色综合大香蕉| 国产在线精品亚洲第一网站| 国产精品精品国产色婷婷| 成年版毛片免费区| 亚洲国产精品成人久久小说 | 国产大屁股一区二区在线视频| 亚洲国产欧洲综合997久久,| 久久久久免费精品人妻一区二区| 91久久精品国产一区二区成人| 插逼视频在线观看| 国产麻豆成人av免费视频| 亚洲精品成人久久久久久| 丝袜喷水一区| 成人漫画全彩无遮挡| 亚洲av二区三区四区| 亚洲国产色片| 五月伊人婷婷丁香| 精品久久久噜噜| 久久综合国产亚洲精品| 九九在线视频观看精品| 99热全是精品| 国产高清激情床上av| 成人综合一区亚洲| 免费观看人在逋| 熟女电影av网| 久久99热6这里只有精品| 九九久久精品国产亚洲av麻豆| 可以在线观看毛片的网站| 观看美女的网站| 亚洲成人av在线免费| 欧美xxxx性猛交bbbb| 在线观看一区二区三区| 亚洲丝袜综合中文字幕| 一区二区三区四区激情视频 | 午夜激情福利司机影院| 亚洲欧美成人综合另类久久久 | 亚洲中文字幕一区二区三区有码在线看| 国产中年淑女户外野战色| 搡女人真爽免费视频火全软件| 99精品在免费线老司机午夜| 69人妻影院| 成年女人看的毛片在线观看| 欧美3d第一页| 99热只有精品国产| av在线亚洲专区| 午夜老司机福利剧场| 神马国产精品三级电影在线观看| 亚洲第一电影网av| 欧美性猛交黑人性爽| 人人妻人人澡人人爽人人夜夜 | 噜噜噜噜噜久久久久久91| 婷婷精品国产亚洲av| 最近2019中文字幕mv第一页| 午夜a级毛片| 99久久精品一区二区三区| 欧美在线一区亚洲| 国产女主播在线喷水免费视频网站 | 国产一区二区三区在线臀色熟女| 一级黄色大片毛片| 国产日本99.免费观看| 亚洲综合色惰| 亚洲国产日韩欧美精品在线观看| 18禁裸乳无遮挡免费网站照片| 99国产极品粉嫩在线观看| 级片在线观看| 国产精品女同一区二区软件| 亚洲第一区二区三区不卡| 婷婷色av中文字幕| 亚洲熟妇中文字幕五十中出| 九草在线视频观看| 国产成人aa在线观看| 婷婷六月久久综合丁香| 日韩在线高清观看一区二区三区| 国产成人影院久久av| 亚洲欧美精品专区久久| 国产成人a区在线观看| 亚洲av第一区精品v没综合| 色哟哟哟哟哟哟| 欧美成人精品欧美一级黄| 国产国拍精品亚洲av在线观看| 日本熟妇午夜| 乱系列少妇在线播放| 男女做爰动态图高潮gif福利片| 久久这里有精品视频免费| 国产精品久久久久久av不卡| 午夜福利在线在线| 国产色爽女视频免费观看| 国产黄色小视频在线观看| 两个人的视频大全免费| 亚洲美女搞黄在线观看| 中文字幕熟女人妻在线| 久久精品91蜜桃| 极品教师在线视频| 亚洲内射少妇av| 国产黄片美女视频| 麻豆乱淫一区二区| 国产精品,欧美在线| 久久久久久久久久成人| 麻豆成人午夜福利视频| 搡女人真爽免费视频火全软件| 欧美高清成人免费视频www| 在线观看午夜福利视频| 日韩欧美精品v在线| 国产探花在线观看一区二区| 国产精品乱码一区二三区的特点| av女优亚洲男人天堂| 男女做爰动态图高潮gif福利片| kizo精华| 久久午夜亚洲精品久久| 日韩精品有码人妻一区| 亚洲精华国产精华液的使用体验 | 国产亚洲5aaaaa淫片| 久久久久久久亚洲中文字幕| 亚洲欧美日韩卡通动漫| 亚洲av中文av极速乱| 又黄又爽又刺激的免费视频.| 狠狠狠狠99中文字幕| 91午夜精品亚洲一区二区三区| 一本精品99久久精品77| 国产黄片视频在线免费观看| 天天躁夜夜躁狠狠久久av| 中文在线观看免费www的网站| 欧美一区二区亚洲| 亚洲一区二区三区色噜噜| 亚洲美女搞黄在线观看| 一级二级三级毛片免费看| 成人毛片60女人毛片免费| 国产精品永久免费网站| 我要搜黄色片| 天天躁夜夜躁狠狠久久av| 乱码一卡2卡4卡精品| 两个人视频免费观看高清| 亚洲av中文av极速乱| 亚洲在线自拍视频| 国产成人a∨麻豆精品| 久久人人精品亚洲av| 国产欧美日韩精品一区二区| 欧美成人一区二区免费高清观看| 亚洲国产精品sss在线观看| 可以在线观看毛片的网站|