• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Personalized Privacy Protecting Model in Mobile Social Network

    2019-05-10 03:59:42PingshuiWangZechengWangTaoChenandQinjuanMa
    Computers Materials&Continua 2019年5期

    Pingshui Wang ,Zecheng WangTao Chen and Qinjuan Ma

    Abstract:With the rapid development of the new generation of information technology,the analysis of mobile social network big data is getting deeper and deeper.At the same time,the risk of privacy disclosure in social network is also very obvious.In this paper,we summarize the main access control model in mobile social network,analyze their contribution and point out their disadvantages.On this basis,a practical privacy policy is defined through authorization model supporting personalized privacy preferences.Experiments have been conducted on synthetic data sets.The result shows that the proposed privacy protecting model could improve the security of the mobile social network while keeping high execution efficiency.

    Keywords:Mobile social network,privacy policy,personalized privacy preference,models.

    1 Introduction

    With the rapid development of Internet,cloud computing,big data and artificial intelligence in the new generation of information technology,especially the application of Web 2.0 techniques,mobile social networks (MSNs) have experienced exponential growth in recent years.All kinds of social network products were introduced to the Internet,such as Facebook,Twitter,Myspace,RenRen,Microblog,WeChat,QQ,etc.MSNs provide users with a platform for communication,sharing information,making friends.With the popularity and development of social networks,social networking sites store a large number of users’ personal data,which brings much convenience to data analysis.At the same time,it also causes great threat and challenge to individuals’privacy,because MSNs data may contain personal private information.Protecting the privacy of users against unwanted disclosure in such circumstance poses challenging problems.Issues on privacy disclosure are the greatest threat to the personal information security in the era of big data [Garcia,Goel,Agrawal et al.(2018); Heravi,Mubarak and Raymond (2018); Liu,Wang and Yang (2014); Rathore,Sharma and Loia (2017); Wang,Sun and Ma (2012); Yang,Huang,Li et al.(2018)].

    In recent years,the issues on privacy protection in mobile social network are deeply researched,and lots of effective privacy preserving technologies have been developed.

    The existing researches on mobile social network privacy protection concentrate mainly on privacy preserving data publishing,data mining and access control [Cheng,Park and Shu (2016); Kokciyan and Yolum (2016); Kumar and Kumar (2017); Schlegel,Chow,Huang et al.(2017); Soliman,Bahri and Girdzijauskas (2016); Sun,Yu,Kong et al.(2014); Such and Criado (2016); Tai,Yu,Yang et al.(2011); Thapa,Liao,Li et al.(2016);Wang,Srivatsa and Liu (2012); Zou,Chen and Ozsu (2009)],in which anonymization is the main privacy preserving technology for social network data release,so that the data released can meet the need of data analysis while user privacy is not compromised; and social network access control techniques mainly focuse on designing social network access control model to solve the problem of social network data access authorization[Adam,Atluri,Bertino et al.(2002); Carminati,Ferrari and Perego (2006);Cirio,Cruz and Tamassia (2007); Jayaraman,Rinard and Tripunitara (2011); Li,Tang and Mao (2009); Ma,Tao,Zhong et al.(2016) ; Yuan and Tong (2005)].However,there is relatively less research work on personalized privacy protection of social network data,so that it increases the risk of privacy disclosure and the complexity of user privacy settings.In this paper,we summarize the main access control models in mobile social network,analyze their contribution and point out their disadvantages.On this basis,a practical privacy policy is defined through authorization model supporting personalized privacy preferences.

    The rest of the paper is organized as follows:In Section 2,we analyze the main access control models in mobile social network; In Section 3,we introduce some concepts about privacy policy definition; Section 4 provides a personalized privacy policy description and authorization model; In Section 5,we conduct a privacy policy conflict analysis; In Section 6,we design a personalized privacy policy management system for social network; Section 7 contains our conclusions and future work.

    2 The related work of access control model in mobile social network

    Access control in mobile social network is one of the most common manners of users’privacy protection.Several access control models have been proposed.We review them briefly as follows.

    Role based access control model [Li,Tang and Mao (2009)] implements access control according to a pre-set role and the corresponding access privilege.However,the method mainly aims at the determined user community and cannot solve the problem of access authorization to unknown users and dynamic resources.

    Attribute based access control model can provide a better solution to the above problem[Adam,Atluri and Bertino (2001); Cirio,Cruz and Tamassia (2007); Yuan and Tong(2005)].It realizes the dynamic access control in open environment using a set of attribute authorization rules based on the subject attribute,object attribute and environment attribute constraints.But the model is only applied to the situation that the owner and manager of resource are integrated in the same social network,in which access control policy is developed by the manager of resource,so it is not suitable for the condition that the owner and manager of resource are separated,and it cannot satisfy the requirement of social network users’ personalized privacy preferences.

    Rule based access control model [Carminati,Ferrari and Perego (2006)] defines the relationship between the visitor and owner of resource,the maximum topological distance and minimum confidence and other restrictions by rules,so that the automatic and flexible access control is achieved on the basis of rules reasoning.But due to the large number of rules,it is prone to result in conflicted policy and cannot guarantee the consistency of authorization and the effective implementation of policies.

    Authorization rules based access control model [Jayaraman,Rinard and Tripunitara(2011); Ma,Tao,Zhong et al.(2016)] adds the concepts of user attributes and permissions allocation rules on the basis of rule based access control model.It achieves the dynamic role permission assignment,but the model does not meet the demand of user-defined privacy policies.

    In view of the above problems,we have proposed an authorization model for personalized privacy preferences,which describes user privacy preference by using firstorder logic and supports user-defined personalized dynamic privacy policy,strategy analysis of consistency of automation by using logic programming method and the implementation of authorization inference rules.

    3 Basic concepts about privacy policy definition

    Privacy policies are mainly composed of the subject,object,action and the restriction conditions that the access authorization needs to meet,which are introduced briefly in this following.

    Definition 1 (Subject).Subject refers to the visitors who access the social network resources,and all subject set is represented asUserS.The feature of the subject is called attribute,which consists of attribute name and attribute value.For example,attributes of the subject include identity card number,name,gender,birthday,phone,email,address,education,hobbies,etc..

    Definition 2 (Object).Object refers to the secret resources that visitors try to access,and all object set is represented asResS.The secret resources are divided into attribute information and data resources according to the type of resources,and data resources refers to the user's publishing information such as personal diary,speech,comment,photo,video,etc..

    Object tag is composed of tag name and tag value,which is the identification method of data resources.Because the user has many data resources,to realize flexible grouping and segmentation of data resources,data resources for users can add labels such as “type”,“time”,“place” ,“importance”,and so on.

    Definition 3 (Action).Action refers to the subject’s operation executed on the object,such as accessing,reading,commenting,sharing,etc.,and all action set is represented asActS.

    Definition 4 (Permission).Permission refers to the action performed on an object,which is denoted as ,in whichr∈ResSanda∈ActS.All permission set is expressed asPerS.

    Definition 5 (Role).Role is the user group marked according to the demand for subject’s attribute,and all role set is represented asRoleS.The directly logical relationship between subject and permission can be insulated by correlating the role and authority.

    Definition 6 (Role Hierarchy,RH).A partial order relation defined on the set of roles.We assume that there are n groups of roles,such as (role1,…,rolen),RH:rolei× rolej,in whichroleiandrolejbelongs toRoleS,roleiis called a senior role androlejis lower whenroleiis greater than or equal torolej,the senior role inherits permissions from the lower,and the lower role succeeds users from the senior

    Definition 7 (Predicate).Description that an entity has a property or a relationship exists among multiple entities,which consists of two parts:the name of predicate and the parameters,expressed asPredicate(x1,x2,.,xn),in whichxi(i=1,.,n) may be constant,variable or first-order predicate,the set of all the predicate is denoted asPredS.

    For example:Is(x.role,'teacher'),which means that the role of the subjectxis a teacher;Is(y.tag,‘red'),which means that the tag of the objectyisred.

    Definition 8 (Constraint).Basic conditions and limitations that need to be met for access permission,which may be predicate or predicate logic expression,expressed as:prd1Θprd2…Θprdn,Θ may be “and” or “or” logical operators,prdibelongs toPredS(i=1,.,n).

    According to the constraint content,the constraints are divided into 3 categories:subject attribute constraints,object tag constraints and environmental constraints.

    ● Subject attribute constraints refer to the subject's age,gender,address,profession,hobby and other constraints,and all the subject attribute constraint set is expressed asSAttrC.For example,Larger(x.age,'18') ^Is(x.gender,'male'),requires subject “x”be male over 18 years old;

    ● Object tag constraints refer to the object tag condition required for authorization of data resources,and all the object tag constraints set is represented asRtagC.For example,Is(y.type,'video') ^Is(y.tag,'workshop'),means the object access authorization is limited to workshop video;

    ● Environmental constraints refer to constraints such as time,address,system state,context,etc.,and all the environment constraints set is represented asEnvC.For example,TimeWithin(‘14:00’,‘18:00’) represents the time constraint [14:00,18:00];participated(x,'workshop') indicates that the subjectxparticipated in workshop.Introducing environmental constraints for the development of privacy policy may provide the access control strategy with real-time and good interaction,and improve the security of user private resources.

    4 Authorization model supporting personalized privacy preferences

    In this section,we propose an authorized model supporting personalized privacy preferences,which extends role-based access control models and adds subject attributes based visitor role authorization rules and role permissions assignment rules based on object tags,as shown in Fig.1.In the model,according to authorization rules of the visitor role,visitors meeting the subject attribute constraints obtain permissions; according to role permission authorization rules,visitors meeting the object label constraints are assigned to the corresponding role,and they also contain inherited permissions caused by the role hierarchy relationship.So visitors obtain permissions by user role and hierarchy.The relevant rules are defined as follows.

    Figure1:An authorized model supporting personalized privacy preferences

    Definition 9 (Visitor role permissions rules,VR-Rule).assign_role(u,role) ←Q1x1…Qmxm(sc1Θsc2…Θscn),in whichu∈UserS,role∈RoleS,Θ may be logical operators such as “and”(^) or “or”(v),sci∈SAttrC,i=1,…,n.xjis an instance variable,j=1,…,m,Qi∈{?,?}; ? is existential quantifier and ? is universal quantifier,that is the visitor “u” gets the role “role” while satisfying all subject attribute constraints.

    Example 1.assign_role(x,'college classmate') ←?xLarger(x.age,'18') ^Is(x.class,'12computer-1') ^Is(x.graducate,'AUFE') means that peoples satisfy the rule of over 18 years old and come from ‘AUFE’and'12computer-1' are ‘college classmate’.

    Definition 10 (Role permission assignment rules,RP-Rule).P_assign[D_assign] (role,r,a)Q1x1… Qmxm(re1Θre2…Θren),in whichrole∈RoleS,r∈ResS,a∈ActS,Θ may be logical operators such as“and”(^) or “or”(v),rei∈{RtagC; EC},i=1,…,n.xjis an instance variable,j=1,…,m,Qi ∈{?,?}; ? is existential quantifier and ? universal quantifier,P_assignpositive andD_assignnegative authorization,that is in anECenvironment,meeting all constraints object permissions for the is/[is not] assigned to role “role”.

    Examples 2.P_assign('college classmate',y,'comment') ←?y Is(y.type,'photo') ^Is(y.tag,'graduation'),said the college classmates can comment graduation photos.

    Definition 11 (privacy policy).The same user defined the set of visitor-role authorization rules and role- permission assignment rules.

    Example 3.privacy policy ={VR-Rule1,PR-Rule1},VR-Rule1:assign_role(x,'college classmate') ←?x Is(x.class,'12computer-1') ^Is(x.graducate,'AUFE');PR-Rule1:P_assign('college classmate',y,'comment') ←?yIs(y.type,'photo') ^Is(y.tag,'graduation').The information of user Alice is stored in the system as follows:name=’Alice’,class=’12computer-1’,graducate=’AUFE’; the label of object photo1 is described as follows:type=‘photo’,tag={graduation,AUFE,12computer-1}.Aliceis assigned the role of college classmate according toVR-Rule1,at the same time,if resourcesphoto1meet the object tag constraint,Alicegets permission to comment on photo1 through the role of college classmate.

    The advantage of authorized model supporting personalized privacy preferences is reflected in two aspects:on the one hand,the privacy policy is descripted on the basis of first-order logic,which could meet users’ personalized privacy needs,such as the finegrained authorization requirements of resources protection,clearly express the clear semantic demand of user's privacy will and support the strategy reasoning authorization without an explicit description; on the other hand,access control is achieved for the unknown users in social networks and a large number of dynamic data resource.The reasoning based on the role authorization of subject attribute constraints can realize the automatic and dynamic visitor role authorization,which could solve the problem of access request of unknown users in social network; meanwhile,users in social networks have many data resources,which are often added and modified,so the traditional authorization model aiming at the specific resources becomes difficult to maintain.The proposed role permission assignment rules based on object tag constraints can realize the permissions assignment to large,dynamic resources.

    However,due to the overlapping or hierarchical relationship among rules’ subject attributes,resource attributes and action attributes,there may be logical inconsistencies in the formulation of privacy policies,for example,both positive authorization and negative authorization maybe exist on the same subject and object in different strategies,which will result in the privacy policy conflict.

    5 Privacy policy conflict analysis

    Due to the overlap or hierarchical relationship among the subject attributes,resource attributes and action attributes of rules,there may be logic inconsistencies in the formulation of privacy policies.For example,in different policies,there are both positive authorization and negative authorization for the same subject and object,which results in privacy policy conflicts.According to whether the cause of policy conflict is related to specific data,it can be divided into logical conflict and instance conflict.

    5.1 Logical conflict

    Logical conflict refers to the logical inconsistency in the process of policy definition,such as role contradiction delegation,which refers to the logical conflict that the same role is assigned both positive and negative authorization.

    Example 4.privacy policy={VR-Rule1,PR-Rule1,PR-Rule2},whereVRRule1:assign_role(x,'groupmember')←?xIs(x.project,'mobile Application') ;PRRule1:P_assign('groupmember',y,'read') ← ?yIs(y.type,'log')Is(y.tag,'work')TimeWithin('8:00AM','6:00PM');PR-Rule2:D_assign('groupmember',y,'read')←?y Is(y.type,'log')^Is(y.tag,'work')DayWithin('Saturday','Sunday').VR-Rule1indicates that groupmembers are participated in the same project;PR-Rule1indicates that groupmembers can view the work log from 8:00 to 18:00;PR-Rule2indicates that groupmembers cannot view the work log on weekends.

    Another typical logical conflict is the privilege inheritance conflict,which is the contradiction between authorization and explicit authorization caused by role hierarchy.As shown in Fig.2,the circle represents the role,the square represents the privilege,+P and-P represent the positive and negative authorization to the same resource respectively,the arrow represents the role hierarchy,and the solid line indicates an existing rolepermission assignment relationship,the dashed line represents the newly added roleprivilege assignment relationship.According to the inheritance relationship of permissions in the role hierarchy [Wang,Sun and Ma (2012)],when lower-level roles are assigned positive authorization,higher-level roles inherit positive authorization from lower-level roles to higher-level roles according to positive authorization.If negative authorization is added to higher-level roles,it would conflict with the positive authorization of lower-level roles and cause policy conflicts,such as Fig.2(a) .When lower-level roles are assigned negative authorization,the added positive authorization of higher-level roles does not cause policy conflicts.When high-level roles are assigned negative authorization,the negative authorization of high-level roles to resources must imply negative authorization of low-level roles according to negative authorization propagation from high-level to lowlevel,and if the positive authorization of low-level roles is added,it would conflict with the positive authorization of high-level roles,resulting in policy conflicts,as shown in Fig.2(b); When high-level roles include multiple low-level roles and there are mutually exclusive privileges between low-level roles,if a new negative authorization is added to high-level roles,it would conflict with the negative authorization of low-level roles and cause policy conflicts,as shown in Fig.2(c).

    Figure2:Example of permission inheritance conflict

    Example 5.privacy policy ={VR-Rule1,VR-Rule1,VR-Rule2,PR-Rule1,PR-Rule2},whereVR-Rule1:assign_role(x,'schoolmate')←?xIs(x.graducate,'AUFE');VR-Rule2:assign_role(x,'classmate')←?xIs(x.graducate,'AUFE') ^Is(x.class,'12computer-1');PRRule1:P_assign('schoolmate',y,'tag')←?yIs(y.type,'log') ^Is(y.tag,'personal');D_assign('classmate',y,'tag')←?yIs(y.type,'log') ^Is(y.tag,'personal').VR-Rule1means schoolfellows who graduated fromAUFE;VR-Rule2means students who graduated fromAUFEand whose class name is 12computer-1;PR-Rule1means schoolfellows can mark personal logs; andPR-Rule2students can't mark personal logs.According to the rule ofVR-Rule 1andVR-Rule 2,classmates are greater than or equal to schoolfellows,due to the role hierarchy,the authorization of classmates to inherit the role of schoolfellows can mark personal logs,but the explicit definition ofPR-Rule 2indicate that classmates cannot mark personal logs,which results in policy conflicts.

    5.2 Instance conflict

    Instance conflict means that there is no logical conflict on the policy definition itself,but there are policy conflicts caused by the instances in the database which trigger policy conflict conditions.In the authorization model that supports personalized privacy preference,users are authorized by VR-Rule and PR-Rule.In the process of defining two kinds of rules,there may be a user instance that satisfies two kinds of role constraints simultaneously,which leads to the application of two opposite strategies at the same time and results in policy conflicts.

    Example 6privacy policy ={VR-Rule1,VR-Rule2,PR-Rule1,PR-Rule2},whereVR-Rule1:assign_role(x,'college classmate') ←Is(x.class,'12computer-1') ^Is(x.graducate,'AUFE');VR-Rule2:assign_role(x,' groupmember')←?xIs(x.project,'mobile Application');PRRule1:P_assign('collegeclassmate',y,'comment') ←?yIs(y.type,'photo') ^Is(y.tag,'graduation');PR-Rule2:D_assign('groupmember',y,'read') ← ?y Is(y.type,'photo') ^Is(y.tag,'red').VR-Rule1indicates that people in the class of 12computer-1 and graduate fromAUFEare college classmates;VR-Rule2indicates that people involved in the same project are groupmembers;PR-Rule1indicates that college classmates can comment on graduation photos; andPR-Rule2indicates that groupmembers cannot view photos marked red.The information of userAliceis stored in the system as follows:name=’Alice’,class=’12computer-1’,graducate=’AUFE’,project=’mobileApplication’,Alicesatisfies the subject constraints of two roles: ‘college classmate’and ‘groupmember’,andAlicehas two roles at the same time; the label of object photo1 istype=‘photo’,tag={graduation,red},According toPR-Rule 1,Alicecan comment on photophoto1,butPR-Rule 2makes it impossible forAliceto view photophoto1,which causes a policy conflict.

    6 Design of personalized privacy policy management system for social network

    In order to effectively integrate the authorization model supporting personalized privacy preference into the existing social network system,we design a personalized privacy policy management system,which allows users to define personalized privacy policies and implement access control based on privacy policy.The system structure diagram is shown in Fig.3.The main components include subject attribute base,resource attribute base,environment attribute base,privacy policy base,policy management module,and policy evaluation module,etc.,among which the subject attribute base is used to storage user's principal attributes,resource attribute base is used to storage resource attributes and resource labels,environment attribute base is used to storage context environment information,and privacy policy base is used to storage privacy policies.

    Figure3:The system structure diagram

    6.1 Policy management module

    Policy management module implements personalized privacy policy definition.The main functions include:create new roles and role hierarchies by creating roles; add data resource tags by creating resource tags; define the range of role subject constraints for role assignment through user-role authorization; define the object constraints,authorization action and authorization role to complete the permission assignment by role-permission assignment; and provide the functions of modification and deletion of the above definition.

    6.2 Policy analysis module

    Policy analysis module implements automatic strategy conflict detection.The main functions include:rule parsing,which automatically parses user privacy policy and database data into Prolog facts and stores the results in Prolog files.In the part of rule query analysis,users make query analysis requests according to the predefined policy conflict rules,judge whether the policy meets the consistency according to the query results,and correct the conflicting policy prompts to ensure the correct implementation of the policy.

    6.3 Policy evaluation module

    Policy evaluation module implements policy-based access control.When a visitor sends a request to access a resource,it inquires the information of the subject property,the resource attribute and the environment property,and matches the visitor's principal attribute with the subject attribute constraint to get the visitor role,traverses the authorization permission of the role set,and extracts the information about the access resources in the database,matches object attributes and tags in the permission set.If the match is successful,the resource is open to the visitor,and the specified operation is performed,otherwise the visitor's request is rejected and the results of the access evaluation are fed back to the visitor.

    6.4 The system database

    The system database is mainly composed of subject table (subject),role table (role),object table (object),object tag table (object_tag),action table (action),permission table(permission),subject-role assignment table (S-R) and role-permission assignment table (RP).Through user role assignment table,the relationship between user table and role table is mapped to “one to one”,“one to many” or “many to many”.In the same way,rolepermission assignment table also maps the relationships of “one to one”,“one to many” or“many to many” between role table and permission table,and the database E-R diagram is shown in Fig.4.

    Figure4:The database E-R diagram

    6.5 The system implementation

    In order to facilitate the implementation of policy definition for non-professional users through a visual interface,we have developed a personalized privacy policy management system for social networks.Experiments have been conducted on synthetic data sets.The result shows that the proposed privacy protecting model could improve the security of the mobile social network while keeping high execution efficiency.The system experimental environment is described as follows.CPU:Intel(R) Core(TM) i7-6500U @2.50GHz,RAM:8G,software environment:Windows 7,development language:Python 3.64,Database System:SQL-Server 2012.

    Aiming at different ways of conflict query,we first test the impact of the number of users on query performance.Suppose that the user information table has 10 attributes,according to each additional 10 users for a group of experiments,each group of queries carry on 50 tests,we calculate the average query time of 10 rounds.The experimental results are shown in Fig.5,where the direct conflict query refers to querying instance conflict rules directly without setting query restriction range,that isconflict(User,Object,Action),represented by dotted lines.Personalized query refers to restricting certain variables to query user authorization path rules,that isconflict(User,photo1,Action),restrictingObject=photo1,which is expressed in a straight line.The experimental results show that with the increase of the number of users,the direct conflict query time increases linearly,because the direct conflict query is detected by enumeration,the number of users increases,and the enumeration query number increases correspondingly,which leads to the rapid growth of the query time; comparing with the direct conflict query execution,the personalized query is more efficient than direct conflict query,because personalized queries limit some variables,which can quickly locate the causes of policy conflicts,and is less affected by the number of users.

    Figure5:The impact of the number of users on query performance

    Secondly,we test the impact of resource quantity on query performance.The number of selected users is 100.The experimental results are shown in Fig.6,where the direct conflict query isconflict (User,Object,Action),represented by dotted lines,and the personalized query named asquery_per (User,Role,Permission Limit,Object,Action)is restricted toUser =’Alice’,represented by a straight line.The experimental results show that with the increase of the number of resources,the direct conflict query time increases linearly first and then gradually stabilizes,because the access authorization of the model is aimed at satisfying all the resources of the object label,not the authorization of a resource.Although the number of resources increases,the policy conflict query time is relatively stable when the resources satisfying the object label constraint are determined;personalized query is more efficient than direct conflict query,and less affected by resource quantity.Finally,we test the effect of the number of users on the performance of personalized queries under different conditions.The experimental results are shown in Fig.7.Queries with three variables,query_per ('Alice',Role,Permission Limit,‘photo1','read'),are restricted by three query conditions:User =‘Alice’,Object =‘photo1’,Action =‘read’,whose query time is represented by a solid line.Queries restrict one query condition,that isquery_per (User,Role,Permission Limit,‘photo1',Action),which indicates that a query conditionObject=‘photo1’is restricted,and its query time is represented by a dotted line.The experimental results show that personalized query has high execution efficiency,and the more restrictive query conditions,the better query performance.

    Figure6:The impact of the resource quantity on query performance

    Figure7:The impact of the resource quantity on query performance of personalized query

    7 Conclusions and future work

    In recent years,privacy preservation has been widely concerned in academic and industrial fields.Many privacy preservation techniques in mobile social network have been proposed.In this paper,we summarize the main access control models in mobile social network,analyze their contribution and point out their disadvantages,on this basis,a practical privacy policy is defined through authorization model supporting personalized privacy preferences,which can meet the user's personalized privacy policy needs.However,due to the overlapping or hierarchical relationship among rules’ subject attributes,resource attributes and action attributes,there may be logical inconsistencies in the formulation of privacy policies,for example,both positive authorization and negative authorization maybe exist on the same subject and object in different strategies,which will result in the privacy policy conflict.The next step is fully analyze the possible conflict between the privacy strategy and comprehensively consider the strategy conflict brought by the resource level relationship,meanwhile,we verify the feasibility of the model by experiments on real datasets .

    国产一区有黄有色的免费视频| 国内精品宾馆在线| 热re99久久精品国产66热6| 99热这里只有精品一区| 看免费成人av毛片| 26uuu在线亚洲综合色| 免费av中文字幕在线| 2021少妇久久久久久久久久久| 晚上一个人看的免费电影| 久久这里有精品视频免费| 你懂的网址亚洲精品在线观看| 午夜福利在线在线| 欧美性感艳星| 免费看日本二区| 人妻 亚洲 视频| 成人毛片60女人毛片免费| 精品一区二区免费观看| 午夜免费鲁丝| 91精品国产九色| 伦精品一区二区三区| 男人舔奶头视频| 九色成人免费人妻av| 日本一二三区视频观看| 日韩视频在线欧美| 国产爱豆传媒在线观看| 丰满乱子伦码专区| 麻豆精品久久久久久蜜桃| a级一级毛片免费在线观看| 高清黄色对白视频在线免费看 | 亚洲aⅴ乱码一区二区在线播放| 少妇人妻精品综合一区二区| 国产av一区二区精品久久 | 免费观看无遮挡的男女| 亚洲精品乱码久久久v下载方式| 国产在线视频一区二区| 久久久久精品久久久久真实原创| 大片免费播放器 马上看| 欧美成人精品欧美一级黄| 国产伦在线观看视频一区| 亚洲精品乱码久久久久久按摩| 色吧在线观看| 中文乱码字字幕精品一区二区三区| videos熟女内射| 色网站视频免费| 菩萨蛮人人尽说江南好唐韦庄| 欧美zozozo另类| 91精品国产九色| 一个人看视频在线观看www免费| 自拍偷自拍亚洲精品老妇| 狂野欧美激情性xxxx在线观看| 最近2019中文字幕mv第一页| 日韩成人伦理影院| 哪个播放器可以免费观看大片| 一级毛片久久久久久久久女| 国产成人aa在线观看| 91精品国产九色| 国产高清三级在线| 欧美97在线视频| 美女中出高潮动态图| 久久亚洲国产成人精品v| 国产黄片美女视频| 三级国产精品欧美在线观看| 这个男人来自地球电影免费观看 | 欧美成人一区二区免费高清观看| 午夜激情福利司机影院| av线在线观看网站| 插逼视频在线观看| 国产亚洲午夜精品一区二区久久| 久久久久国产精品人妻一区二区| 国产伦在线观看视频一区| 欧美精品一区二区免费开放| 综合色丁香网| 99久久人妻综合| 免费av不卡在线播放| 菩萨蛮人人尽说江南好唐韦庄| 欧美日韩国产mv在线观看视频 | 国国产精品蜜臀av免费| 亚洲精品中文字幕在线视频 | 日本免费在线观看一区| 麻豆国产97在线/欧美| 丝袜脚勾引网站| 成人一区二区视频在线观看| 国产真实伦视频高清在线观看| 日韩成人av中文字幕在线观看| 男人狂女人下面高潮的视频| 久久国产精品大桥未久av | 一区二区三区免费毛片| 大又大粗又爽又黄少妇毛片口| 高清黄色对白视频在线免费看 | 乱系列少妇在线播放| 在线观看一区二区三区激情| 这个男人来自地球电影免费观看 | 色哟哟·www| 在现免费观看毛片| 尾随美女入室| 男女下面进入的视频免费午夜| 久久精品久久精品一区二区三区| 中文在线观看免费www的网站| 美女脱内裤让男人舔精品视频| 97超视频在线观看视频| 亚洲精品第二区| 亚洲精品一二三| 亚洲精品,欧美精品| 免费大片18禁| 国产乱人偷精品视频| 国产男女超爽视频在线观看| 99热网站在线观看| 狂野欧美激情性bbbbbb| 国产在线免费精品| 九色成人免费人妻av| 亚洲精品第二区| 欧美激情国产日韩精品一区| 日韩精品有码人妻一区| 国产淫片久久久久久久久| 久久久欧美国产精品| 亚洲精品日韩av片在线观看| 午夜福利影视在线免费观看| 91精品一卡2卡3卡4卡| 亚洲欧美精品专区久久| 一区二区三区乱码不卡18| 在线观看一区二区三区激情| 国产中年淑女户外野战色| 美女中出高潮动态图| 亚洲精品日韩在线中文字幕| 男男h啪啪无遮挡| 精品亚洲成国产av| 交换朋友夫妻互换小说| 欧美zozozo另类| 中文字幕人妻熟人妻熟丝袜美| 亚洲欧美一区二区三区黑人 | 男人爽女人下面视频在线观看| 日韩一区二区视频免费看| 国产黄色免费在线视频| 欧美xxxx黑人xx丫x性爽| 国产一区有黄有色的免费视频| 午夜福利高清视频| 天美传媒精品一区二区| 丝袜喷水一区| 蜜臀久久99精品久久宅男| 黄色怎么调成土黄色| 九九爱精品视频在线观看| 永久网站在线| 欧美少妇被猛烈插入视频| 天堂俺去俺来也www色官网| 十八禁网站网址无遮挡 | 插阴视频在线观看视频| 欧美高清成人免费视频www| 深夜a级毛片| 亚洲成人手机| 国产午夜精品一二区理论片| 成人黄色视频免费在线看| 高清不卡的av网站| 久久婷婷青草| 亚洲av成人精品一二三区| 日本欧美国产在线视频| 国产精品99久久久久久久久| av又黄又爽大尺度在线免费看| 免费黄色在线免费观看| 老司机影院毛片| 高清av免费在线| 成年免费大片在线观看| 夜夜看夜夜爽夜夜摸| 一级a做视频免费观看| 天堂俺去俺来也www色官网| 成人亚洲精品一区在线观看 | 亚洲美女搞黄在线观看| 91午夜精品亚洲一区二区三区| 欧美一区二区亚洲| 久久久久久久亚洲中文字幕| 精品人妻视频免费看| 欧美成人一区二区免费高清观看| 欧美老熟妇乱子伦牲交| 国产成人91sexporn| 麻豆成人午夜福利视频| 黄色一级大片看看| 国产精品人妻久久久影院| 熟女人妻精品中文字幕| 伦理电影大哥的女人| 国产一区亚洲一区在线观看| 香蕉精品网在线| 熟女电影av网| 精品少妇久久久久久888优播| 涩涩av久久男人的天堂| 久久久久久久久久人人人人人人| 一区在线观看完整版| 色婷婷av一区二区三区视频| 午夜激情久久久久久久| 久久国产亚洲av麻豆专区| 亚洲人成网站在线播| 大香蕉久久网| 婷婷色综合大香蕉| 国产黄片视频在线免费观看| 99热这里只有是精品在线观看| 另类亚洲欧美激情| 日韩欧美 国产精品| 啦啦啦在线观看免费高清www| 最近手机中文字幕大全| 伊人久久国产一区二区| 三级经典国产精品| 3wmmmm亚洲av在线观看| av国产精品久久久久影院| 韩国高清视频一区二区三区| 欧美三级亚洲精品| 少妇猛男粗大的猛烈进出视频| 精品人妻一区二区三区麻豆| av播播在线观看一区| 最近手机中文字幕大全| 少妇高潮的动态图| 舔av片在线| 乱码一卡2卡4卡精品| 91久久精品电影网| 男男h啪啪无遮挡| 80岁老熟妇乱子伦牲交| 99久久中文字幕三级久久日本| a级毛色黄片| 亚洲成人av在线免费| 伦理电影免费视频| 亚洲三级黄色毛片| 高清日韩中文字幕在线| 欧美成人精品欧美一级黄| 国产精品一区二区性色av| 观看美女的网站| 又黄又爽又刺激的免费视频.| 亚洲精品,欧美精品| 婷婷色综合www| 欧美激情国产日韩精品一区| 欧美另类一区| 久久国产精品男人的天堂亚洲 | 久久精品国产a三级三级三级| 亚洲av中文av极速乱| 亚洲婷婷狠狠爱综合网| 中国美白少妇内射xxxbb| 草草在线视频免费看| 秋霞在线观看毛片| 国产免费一级a男人的天堂| 女人十人毛片免费观看3o分钟| 女的被弄到高潮叫床怎么办| 亚洲一区二区三区欧美精品| 91午夜精品亚洲一区二区三区| 国产精品福利在线免费观看| 十分钟在线观看高清视频www | 亚洲va在线va天堂va国产| 最后的刺客免费高清国语| 亚洲成人一二三区av| 亚洲人成网站高清观看| 久久亚洲国产成人精品v| av在线观看视频网站免费| 成人无遮挡网站| 18+在线观看网站| 精品一区二区免费观看| 国产精品久久久久久久久免| 亚洲精品视频女| 国模一区二区三区四区视频| 看免费成人av毛片| 一级二级三级毛片免费看| 中文字幕人妻熟人妻熟丝袜美| av在线观看视频网站免费| 最近手机中文字幕大全| 国产黄片美女视频| 久久青草综合色| 美女中出高潮动态图| 国内揄拍国产精品人妻在线| 免费看av在线观看网站| 91午夜精品亚洲一区二区三区| av国产久精品久网站免费入址| 亚洲国产精品999| 亚洲精品乱久久久久久| 精品亚洲乱码少妇综合久久| 日本午夜av视频| 亚洲欧美一区二区三区国产| 欧美三级亚洲精品| 成人无遮挡网站| 国产探花极品一区二区| 在线观看国产h片| 精品久久久噜噜| 欧美bdsm另类| 热re99久久精品国产66热6| 成人毛片60女人毛片免费| 大片免费播放器 马上看| 久久av网站| 久久人人爽人人爽人人片va| av在线app专区| av免费观看日本| 亚洲精品第二区| 制服丝袜香蕉在线| 婷婷色综合www| 大香蕉久久网| av国产精品久久久久影院| 80岁老熟妇乱子伦牲交| 日韩av免费高清视频| 亚洲精品一区蜜桃| 亚洲av成人精品一二三区| 性色av一级| 国产永久视频网站| 中文乱码字字幕精品一区二区三区| 三级经典国产精品| 久久 成人 亚洲| 麻豆成人av视频| 精品久久久久久久久av| 亚洲人成网站高清观看| 最近最新中文字幕免费大全7| 免费看日本二区| 亚洲精品日韩在线中文字幕| 日韩 亚洲 欧美在线| 国产av码专区亚洲av| 一区二区三区四区激情视频| 麻豆成人av视频| av一本久久久久| 国产免费又黄又爽又色| 精品午夜福利在线看| 久久久久久久久久久丰满| 免费观看a级毛片全部| 一级黄片播放器| 制服丝袜香蕉在线| 日本欧美国产在线视频| 午夜福利在线观看免费完整高清在| 亚洲aⅴ乱码一区二区在线播放| 亚洲无线观看免费| 欧美性感艳星| 亚洲欧美清纯卡通| 久久久久久久久久成人| 深爱激情五月婷婷| 日日摸夜夜添夜夜添av毛片| 日韩强制内射视频| 亚洲人成网站在线观看播放| 夫妻午夜视频| 赤兔流量卡办理| 久久久国产一区二区| 精品人妻一区二区三区麻豆| 亚洲综合色惰| av在线app专区| 国内揄拍国产精品人妻在线| 蜜桃久久精品国产亚洲av| 日本色播在线视频| 国产精品久久久久久精品古装| 国产爱豆传媒在线观看| 精品人妻熟女av久视频| 日韩一本色道免费dvd| 99久国产av精品国产电影| 国产精品一区二区在线观看99| av国产精品久久久久影院| 国产成人一区二区在线| 一级二级三级毛片免费看| 小蜜桃在线观看免费完整版高清| 亚洲国产欧美人成| 亚洲人成网站在线观看播放| 国产亚洲最大av| 国产淫语在线视频| 大片电影免费在线观看免费| 夜夜爽夜夜爽视频| 一区二区三区精品91| 精品一区在线观看国产| 亚洲综合精品二区| 久久久久久久大尺度免费视频| h日本视频在线播放| 男人舔奶头视频| 久久久成人免费电影| 亚洲精品国产av成人精品| 欧美97在线视频| 永久免费av网站大全| 少妇人妻久久综合中文| 亚洲精品第二区| 亚洲久久久国产精品| 国产一区二区在线观看日韩| 嫩草影院新地址| 韩国av在线不卡| 欧美最新免费一区二区三区| 国产成人精品婷婷| 人妻系列 视频| 女性生殖器流出的白浆| 777米奇影视久久| 国产精品久久久久久精品电影小说 | 久久毛片免费看一区二区三区| 欧美bdsm另类| 女性被躁到高潮视频| 亚洲性久久影院| 亚洲综合色惰| 国产中年淑女户外野战色| 一个人看的www免费观看视频| 亚洲欧洲日产国产| 中文字幕亚洲精品专区| 日本黄大片高清| 亚洲精品久久午夜乱码| 久久久久久久亚洲中文字幕| 日韩精品有码人妻一区| 香蕉精品网在线| 最黄视频免费看| 中文字幕免费在线视频6| 日韩伦理黄色片| 亚洲国产成人一精品久久久| 亚洲av成人精品一二三区| 亚洲av在线观看美女高潮| 搡女人真爽免费视频火全软件| 蜜桃久久精品国产亚洲av| 日本wwww免费看| 亚洲国产精品国产精品| 亚洲一级一片aⅴ在线观看| 99热这里只有是精品50| 男女边吃奶边做爰视频| 18+在线观看网站| 一级二级三级毛片免费看| 99国产精品免费福利视频| 午夜免费鲁丝| 波野结衣二区三区在线| 日本欧美国产在线视频| 午夜福利高清视频| 一级毛片我不卡| 亚洲精品一二三| 国产国拍精品亚洲av在线观看| 91精品国产九色| 一区二区三区精品91| av不卡在线播放| 亚洲国产精品999| 黑人高潮一二区| 18禁动态无遮挡网站| 男人舔奶头视频| 我要看黄色一级片免费的| 成年女人在线观看亚洲视频| 国产黄色免费在线视频| 一级毛片久久久久久久久女| 亚洲国产精品国产精品| 亚洲精品久久久久久婷婷小说| 久久精品久久精品一区二区三区| 精品亚洲乱码少妇综合久久| 2022亚洲国产成人精品| 最后的刺客免费高清国语| 国产精品国产av在线观看| 美女国产视频在线观看| 简卡轻食公司| 精品少妇黑人巨大在线播放| 日韩大片免费观看网站| 妹子高潮喷水视频| 一级毛片黄色毛片免费观看视频| 高清日韩中文字幕在线| 免费黄色在线免费观看| 国产高清不卡午夜福利| 18禁在线播放成人免费| 国产免费又黄又爽又色| 国产精品av视频在线免费观看| 超碰97精品在线观看| 精品人妻视频免费看| 欧美高清性xxxxhd video| 日韩大片免费观看网站| 小蜜桃在线观看免费完整版高清| 久久青草综合色| 色网站视频免费| 国产老妇伦熟女老妇高清| 中文字幕av成人在线电影| 成年免费大片在线观看| 九九久久精品国产亚洲av麻豆| 校园人妻丝袜中文字幕| 免费在线观看成人毛片| av天堂中文字幕网| 亚洲国产精品一区三区| 国产 一区 欧美 日韩| 精品人妻偷拍中文字幕| av国产久精品久网站免费入址| 国产免费又黄又爽又色| 欧美日韩视频精品一区| 在线 av 中文字幕| 亚洲欧美日韩东京热| 丰满乱子伦码专区| av在线app专区| 成人黄色视频免费在线看| 水蜜桃什么品种好| 欧美日韩一区二区视频在线观看视频在线| 久久影院123| 成人一区二区视频在线观看| 亚洲综合色惰| 香蕉精品网在线| 美女主播在线视频| 亚洲国产毛片av蜜桃av| 在线观看国产h片| 女性生殖器流出的白浆| 亚洲精品日本国产第一区| 午夜日本视频在线| 欧美 日韩 精品 国产| 黑人猛操日本美女一级片| 免费看光身美女| 午夜福利影视在线免费观看| 久久久午夜欧美精品| 久久久久久久国产电影| 一级片'在线观看视频| 亚洲精华国产精华液的使用体验| 国产成人a∨麻豆精品| 三级国产精品欧美在线观看| 超碰97精品在线观看| 久久久久久久久大av| 久久久精品免费免费高清| 亚洲精品久久午夜乱码| 免费观看av网站的网址| 韩国av在线不卡| 精品国产三级普通话版| 精品视频人人做人人爽| 色视频在线一区二区三区| 99视频精品全部免费 在线| 欧美xxxx性猛交bbbb| av国产免费在线观看| 少妇精品久久久久久久| 深爱激情五月婷婷| 高清午夜精品一区二区三区| a级毛色黄片| www.色视频.com| 午夜视频国产福利| 午夜免费鲁丝| 亚洲欧美精品自产自拍| 99热这里只有是精品在线观看| 菩萨蛮人人尽说江南好唐韦庄| av专区在线播放| 国产av国产精品国产| 永久网站在线| 国产一级毛片在线| 五月玫瑰六月丁香| 免费看光身美女| 一本一本综合久久| 男女边摸边吃奶| 欧美成人午夜免费资源| 免费av中文字幕在线| 成人免费观看视频高清| 国产精品99久久99久久久不卡 | 国产免费一级a男人的天堂| 欧美3d第一页| 国产一区亚洲一区在线观看| 精品少妇黑人巨大在线播放| 男人和女人高潮做爰伦理| 亚洲熟女精品中文字幕| 夜夜爽夜夜爽视频| 国产av国产精品国产| 两个人的视频大全免费| 国产91av在线免费观看| 国产精品欧美亚洲77777| 看免费成人av毛片| 丝袜脚勾引网站| 久久精品久久久久久噜噜老黄| 日韩电影二区| 一区二区三区四区激情视频| 中文天堂在线官网| 内地一区二区视频在线| 男女国产视频网站| 精品国产一区二区三区久久久樱花 | 亚洲第一av免费看| 91在线精品国自产拍蜜月| 1000部很黄的大片| 欧美日韩亚洲高清精品| 男女边吃奶边做爰视频| 免费av不卡在线播放| 99热6这里只有精品| 日本vs欧美在线观看视频 | 亚洲精品,欧美精品| 国产 一区 欧美 日韩| 青青草视频在线视频观看| 熟女电影av网| 国产精品久久久久久精品古装| 在线观看三级黄色| 大香蕉久久网| 少妇 在线观看| 亚洲av男天堂| 亚洲无线观看免费| 日韩亚洲欧美综合| 看非洲黑人一级黄片| 大又大粗又爽又黄少妇毛片口| 免费观看无遮挡的男女| 亚洲精品亚洲一区二区| 老女人水多毛片| 天美传媒精品一区二区| 国产女主播在线喷水免费视频网站| 极品教师在线视频| 多毛熟女@视频| 欧美日韩综合久久久久久| 天堂俺去俺来也www色官网| 国产欧美另类精品又又久久亚洲欧美| 国产成人freesex在线| 人妻少妇偷人精品九色| 少妇人妻 视频| 欧美老熟妇乱子伦牲交| 国产精品熟女久久久久浪| av免费观看日本| 人妻 亚洲 视频| 精品久久久精品久久久| 哪个播放器可以免费观看大片| 精品一品国产午夜福利视频| 六月丁香七月| 街头女战士在线观看网站| 成人美女网站在线观看视频| 久久国产亚洲av麻豆专区| 2022亚洲国产成人精品| 国产成人a区在线观看| 久久 成人 亚洲| 日日啪夜夜撸| 国产色爽女视频免费观看| 亚洲色图综合在线观看| 亚洲av国产av综合av卡| 亚洲人成网站高清观看| 久久 成人 亚洲| av在线观看视频网站免费| 夜夜爽夜夜爽视频| 美女内射精品一级片tv| 国产精品偷伦视频观看了| 男女无遮挡免费网站观看| 欧美xxxx黑人xx丫x性爽| 国产一区二区三区av在线| av专区在线播放| 国语对白做爰xxxⅹ性视频网站| 亚洲欧美精品专区久久| 成年女人在线观看亚洲视频| 日韩欧美精品免费久久| 亚洲成人中文字幕在线播放| 赤兔流量卡办理| 国内精品宾馆在线| 亚洲美女视频黄频| 亚洲久久久国产精品| 最近2019中文字幕mv第一页| 黑人高潮一二区| 人人妻人人澡人人爽人人夜夜| 久久99热6这里只有精品|