• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Location Privacy in Device-Dependent Location-Based Services:Challenges and Solution

    2019-06-12 01:24:00YuhangWangYanbinSunShenSuZhihongTianMohanLiJingQiuandXianzhiWang
    Computers Materials&Continua 2019年6期

    Yuhang WangYanbin SunShen SuZhihong TianMohan LiJing Qiu and Xianzhi Wang

    Abstract:With the evolution of location-based services (LBS),a new type of LBS has already gain a lot of attention and implementation,we name this kind of LBS as the Device-Dependent LBS(DLBS).In DLBS,the service provider(SP)will not only send the information according to the user's location,more significant,he also provides a service device which will be carried by the user.DLBS has been successfully practised in some of the large cities around the world,for example,the shared bicycle in Beijing and London.In this paper,we,for the first time,blow the whistle of the new location privacy challenges caused by DLBS,since the service device is enabled to perform the localization without the permission of the user.To conquer these threats,we design a service architecture along with a credit system between DLBS provider and the user.The credit system tie together the DLBS device usability with the curious behaviour upon user's location privacy,DLBS provider has to sacrifice their revenue in order to gain extra location information of their device.We make the simulation of our proposed scheme and the result convince its effectiveness.

    Keywords:Location privacy,device-dependent location-based service,location-based service,credit system,location privacy preserving mechanism,shared bicycle.

    1 Introduction

    Location-based services(LBSs)have changed the way of getting information in daily life.Different kind of LBSs,such as positioning,navigation,POI searching and social network check-in,are already the fundamental applications in almost everyone's smartphone.Though may be different in details,all of these LBSs belong to the information service,which means that the user will send her location (along with other query or personal information)information to the certain LBS provider,and the provider send back the information the user needs.One most basic fact is that the location is firstly generated on the user side (for example,a smartphone)and then be sent to the LBS provider,LBS provider cannot know the user's location till the user wills it.

    Meanwhile,location privacy preservation has gain increasing attention along with the popularity of LBSs,tremendous of works have been focused on the location privacy preserving mechanism (LPPM),and a lot of outstanding works have been proposed to preserve the location privacy of the user while she enjoying LBS.The LPPM will ensure the location privacy has been preserved before the location was sent to the LBS provider.Although various of schemes such as anonymity,obfuscation and noise addition have been performed by these LPPMs,the threat that the LBS provider may steal the user's location unknowingly is out of the LPPM's concern.

    The recently noteworthy evolution of LBS may change the whole picture of LBS and the LPPM upon it.In this paper,we define this novel LBS as the Device-dependent Location-based Service(DLBS).Quite different from LBS,which is considered as a pure information service,DLBS provides not just the location-based information,but also the entity device-dependent service.The types of device are usually the common used utilities,such as bicycle,laptop,and the mobile power supply equipments.Moreover,these devices are smart chip embedded and self-localizable,and these ability enable the device to be aware of its situation and so as to maintain the DLBS system.

    Although DLBS has greatly expanded the concept of LBS,however,from the view of location privacy,it also completely overturned the architecture and the threat model of the existing LPPMs.This huge change mainly comes down to the alter of the way of location obtaining by the service provider.Just as the location privacy has been regarded as the part of the basic human rights,the very right of the DLBS provider to know the location of their own device is also a solid fact.This two basic rights belonging to the user and the DLBS provider has formed a subtle conflict,which needs to be solved and the traditional LPPMs failed to.

    In order to solve this conflict,which means that to preserve the location privacy of DLBS user and at the same time enable the DLBS provider to be aware of the location of their device,in this paper,we design a DLBS service framework,including the system architecture and the judge-and-weight credit system.Our scheme encourage the DLBS provider to obtain the device location that just enough to maintain their service.As to the force query of the device location,DLBS provider has to sacrifice the usability of the whole DLBS system.

    In general,we mainly make contributions as follows:

    1.To the best of our knowledge,we for the first time defined a new type of device-dependent LBS,and we pointed out the location privacy challenges caused by DLBS.

    2.To conquer the location privacy threats in DLBS,we designed a DLBS framework,in which we bind together the location privacy and the usability of the DLBS system,DLBS provider has to be cautious when he is curious on the location of user.

    3.We proposed the credit system rules to balance the location privacy and DLBS usability,and we analysed these rules with game theory,the result shows that the location privacy can be preserved on the best utmost.

    4.We simulate our system on a virtual shared bicycle system,and the simulation result verifies the effectiveness of our scheme.

    The remainder of the paper is organized as follows.Section 2 Introduce the DLBS in details,and list the changes and the challenges it brings to location privacy.We describe the design details of our scheme in Section 3.Sections 4provide the analyse and the experimental simulation.Section 5briefly reviews the related work,and finally,Section 6 concludes the paper.

    2 Location privacy challenges in DLBS

    2.1 Device-dependent location-based service

    DLBS greatly expands the range of LBS,as its a newly practiced form of LBS,in this section,we fist list the features of DLBS which this paper refers to.

    1.A localizable service device is involved in the procedure of DLBS,the device will serve the user,while at the same time perform the localization and communicate with the DLBS provider all by itself and without the awareness of user.

    2.DLBS devices are separated in the urban area and ready to serve.In order to enjoy DLBS,user needs to move close to a DLBS device and activate it.For instance,scanning the QR code of the device with her smart phone.

    3.During the service,the device will offer the user the special capacity,also it will be taken by the user.During DLBS,the locations of the device and the user are regarded as the same.

    4.For the purpose of maintaining the DLBS system,and also by his proprietary rights on the DLBS devices,DLBS provider need to learn the locations of the devices.This requirement(also it is his right)go against the location privacy preservation need of the user.In the most basic condition,DLBS provider at least needs to know the locations of those devices which are not in service,so that the DLBS provider can ensure the maintenance of the DLBS system.

    2.2 Location privacy challenges

    Due to the features mentioned above,in DLBS scenario,traditional LPPMs and their threat model are facing the challenges.

    1.LPPMs in traditional LBS scenario do not have to consider the situation that the service provider are able to obtain the location without the permission of user.But in DLBS,this assumption no longer exist due to the localizable device.This is a disastrous challenge to those LPPMs that only considering how to perform the preservation on the location information which are about to send to the service provider.

    2.In general,from the legal perspective,the DLBS provider do have the right to know the location of their DLBS device.This is at least an equally right than the proposition of location privacy in the user side.This contradiction also beyond the scope of capacity of traditional LPPMs.New type of LPPM is needed to balance the location privacy demands and the"right to know"fact.

    3.Specifically,in DLBS scenario,the activation location,where the user takes the device and activates the DLBS,is almost impossible to hide,since the DLBS provider has to know the location of his own device.

    Combining the above mentioned DLBS features and the location privacy challenges,in this paper,we design a brand new DLBS framework to cope with these issues.Generally,in our framework,both the location privacy demands and the requirement of location-awareness from the user and DLBS provider side will be respected,protected and fulfilled.The basic principle of our framework is that we only encourage the DLBS provider to ask for the location information which is just enough for the maintenance at the minimum level of satisfaction.Finally,our framework have the compatibility to the traditional LPPMs,user is still available to use their LPPM to preserve their location privacy on our framework.In the next section,we will introduce it in detail.

    3 Our proposed schemes

    In our framework,we firstly unbundle the direct communication between the user and the DLBS provider,also between the DLBS provider and their devices.A trusted third party proxy is introduced here to perform the credit system.Fig.1 shows our system architecture.

    Figure 1:System architecture of our framework.TTP proxy maintain the location updating of the user and DLBS device,and the credit score system

    In general,DLBS provider broadcasts the locations of the devices to the TTP proxy,and the user query the available device from TTP proxy.When the location information is needed,the TTP proxy receives the location request from the DLBS provider,decides whether to fulfill him depending on his credit value.On the user side,if the location request is approved,she can use the LPPM to perform a certain degree of preservation,and send back the preservation result to the DLBS provider.Next,we details the design of our scheme.

    3.1 Basic idea

    As DLBS provider has the right to know the location of their devices when necessary,and this is also a natural right,so we cannot assume the real motivation of DLBS provider to obtain the location.Therefore,different from the traditional LPPMs,here in DLBS,we put the user's location privacy and the usability of the DLBS system on the two sides of the scale.In other word,we allow the DLBS provider to know the device's location(protected by LPPM),but he must bear the corresponding cost.From the perspective of interests,the DLBS provider must maintain the balance of the scale so that to make his own DLBS system functional.This means that it cannot excessively grab the user's location privacy,but can only obtain the appropriate location information just enough to maintain the operation of DLBS.

    Our system assumption are as follow:

    1.The user is honest,she enjoys the DLBS without any wicked idea.She always takes the DLBS device along with him,and reports her location,although preserved by LPPM,honestly.

    2.The activation location of the user is beyond the protection of our scheme,as introduced about the features of DLBS,we consider the activation location as the necessary cost to pay by the user who wants to enjoy DLBS.What we want to preserve in our framework,is the trajectory information during the DLBS.

    3.The DLBS provider is untrusted,curious by honest,he knows the location information of all the deactivated devices,and he has the right to query the location of the activated device,if the TTP proxy approve his request,the user has to report a location to him.On the other hand,since the location query will hurt the usability of DLBS system,the DLBS provider will always seeking for the benefit maximization between the location privacy and the system usability.

    3.2 The credit score system of DLBS provider

    To minimize the location information requirement of maintaining the DLBS system,the DLBS provider only needs to know the deactivation location of device,where the user terminates the DLBS and leave the device at.DLBS provider will obtain this location and updates the state of the device in order to get ready for the next round of service.

    In our framework,we set up the credit score system to encourage the DLBS provider to only request from the TTP proxy the deactivation location of his device.We introduce the concept of "Trust Coin" which are used by the DLBS provider to get the location information in exchange on the TTP proxy.We details how this system works as follows:

    1.For each time a user activate a DLBS,the system will create a certain amount of TCoin,and give them to DLBS provider.In basic condition,for each time of DLBS service,1 TCoin will be created and will be given to the DLBS.

    2.For the in service devices,DLBS provider has to"purchase"the locations of them.He proposes the bargain to TTP proxy,and TPP proxy will inform the user of this request.Due to the"right to know"principle,the user has to response this request,however,it is up to the user who can determine the level of precision of the location DLBS provider could obtain.

    3.We define the precise location worths 1 TCoin,and the value of location output from the LPPMs depends on the granularity of the privacy level.The lower precision the location is,the cheaper it will be.

    4.Due to the one-to-many relationship between DLBS provider and the users,the DLBS provider may have the"balance"of TCoin during the runtime of DLBS system.Apparently,the lesser TCoin remains,the more trustworthy DLBS provider will be.Therefore,in our system,we define the credit rating of DLBS provider as a number between 0 to 1,1 indicates that the DLBS provider have no balance of TCoin,and 0 means the balance of TCoin is equal or greater than the number of the current active users.At last,we further define the amount of TCoins when created at the beginning of service as 1×CTCoins.

    Given the credit score system above and our system assumption,we can ensure the DLBS provider will behave to maintain the usability of his DLBS system,for the rational situation,this is prior to obtaining the location privacy of users.In our system,the ideal case is that the DLBS provider always spend his TCoin on requesting the precise location after the end of DLBS.Since no redundant TCoins left,he will always get 1 TCoin when a DLBS start,and always spend 1 TCoin after the DLBS end.

    In the next section,we will analyse the credit score system,and the behaviors of the DLBS provider and the user under such rules.Next,based on this credit score system,we introduce some other detail features and designs of our framework.

    3.2.1 LPPM preservation metric

    We use the location privacy metric defined in[Shokri,Theodorakopoulos,Le Boudec et al.(2011)] and quantify the user's location privacy as the adversary's expected error.This metric also indicates how fuzzy the location is after the LPPM's preservation.Then,we can use this value to price the cost by DLBS provider to obtain the locations.

    3.2.2 Device hiding

    For the abuse of TCoins and unable to afford the location obtaining after the DLBS,for the purpose of practical application,we use the device hiding instead of just letting the device disappear for ever as the punishment.If the DLBS provider does not require the device's location after DLBS,TTP proxy will hide the existence of this device long enough,for example,24 hours.This will causes DLBS provider certain financial loss.

    3.2.3 Deactivation delaying

    To avoid the deactivation location of DLBS reveals the current location of user,in our scheme,when a DLBS is end up by the user,we set up a time interval between the end time of DLBS and the searchable time of DLBS provider.DLBS provder could spend 1 TCoin for the device location after this delaying period,if he wish to obtain the device location inside this period,he still has to spend extra TCoins for it.

    4 Privacy analysis and system simulation

    In this Section,we first analyse our scheme from the view of the DLBS provider and the user separately.Then we simulate our framework and show its performance against various of behaviors.In practical,we choose the shared bicycle as the prototype of our simulation,and the parameters involved in our frameworks are assumed to be rational.

    4.1 Analysis

    Although the request of the device location from DLBS provider has to be fulfilled,our system provides a strong repellence against the malicious behaviour upon the location privacy of users.

    First,if the DLBS provider spend his TCoins on requesting the location during DLBS,he would be incapable to obtain the location of his device after the DLBS,and that means the property lost as well as the reduction of usability of DLBS system,this is not acceptable for the DLBS provider.

    Second,when the DLBS provider seeks out some balance of TCoins and ready to use them to obtain more location privacy,he can only remains a time window to do so,because due to the TCoin generating mechanism,more balance means lesser TCoins gain in each time of DLBS,and in order to maintain the DLBS system,the provider always needs to spend 1 TCoin each time to obtain the device's location.this deficit will soon wipes out the DLBS provider's TCoins.

    At last,even in the situation that the DLBS provider,regardless about all usability and the benefits,trying very hard to obtain the user's location,he will get the location information not better than what he can get in the traditional LBS scenario,because the LPPM of the user side controls the granularity of the location information send back.

    4.2 Simulation

    We implement the simulation of our framework on our PC with Intel 8 Core 2.4 Hz CPU and 16 GB ROM.1000 devices were launched into a 100 km2square area.We randomly trigger the DLBS services and the corresponding random trajectories with different frequency,the observed outputs are shown and explained in this section.We design the architecture and the credit score system,different types of behaviors are also involved in the simulation.

    4.2.1 Functionality of the framework

    We investigate our framework to see if it can support the DLBS system running smoothly.Fig.2 shows the simulation result of the credit rating,the TCoin balance of the DLBS provider,and the percentage of the current missing device.

    Figure 2:Tvs. TCoins balance,the credit rating and the number of missing device,within a 24 hours simulation.Random number in normal distribution of users visit the DLBS system and use the device in a random time interval

    We assume a honest DLBS provider here to measure the functionality of our framework.The number of missing devices,which are loss of communication due to the DLBS cannot afford the request,remain 0 in the whole simulation,since the DLBS keeps holding a reasonable balance of TCoins.During the mid-term of the simulation when the number DLBS rises,the balance rises together,and that leads the credit rating of the DLBS provider declines.Then,as shown in the latter period,the balance keeps consuming,and the credit rating return to the normal level.

    4.2.2 Regulatory mechanism

    The regulatory mechanism of the credit score system is tested by performing a shoot up of the TCoin balance.Fig.3 shows the change of balance and the score rating when we assign the balance with 200 upon the same condition in the previous simulation.The shoot up of balance may happens in real-world situation if the DLBS provider carries out the collusion attack with the collaborators by sacrificing the usability of DLBS system.

    As shown in Fig.3,the shoot up of balance directly crushed down the credit rating to 0.03 at the beginning,as the result,barely income is generated in the previous few hours,and the net outflow of TCoin in order to obtain the deivces' location nearly exhausts the balance in 8 hours.In other word,even in such a extreme case,the time window for the DLBS provider to perform the malicious obtaining is less than 8 hour in our simulation.

    Figure 3:Tvs. TCoin balance and the credit rating.When we assign the balance of the beginning as 200

    4.2.3 Regulatory mechanism

    We further consider the situation that the DLBS provider is willing to sacrifice the DLBS usability and is very curious about the user's location privacy.In the former case of simulation,we consider that the DLBS will use the TCoins to request extra location information,and the user will use the basic obfuscating LPPM to preserve her location privacy.Fig.4 shows the result of this behavior.

    Figure 4:Tvs. TCoin balance and the missing devices in percentage.When DLBS provider spend the balance to request more locations

    When DLBS provider spend extra TCoin on requesting the devices'location,the balance soon falls close to zero,while remains numbers of in service devices'location need to be obtained at later time.As the result,the percentage of missing devices begin to increase,in our simulation,45%of all the DLBS devices are missing in the last period,and this is a disastrous result for the malicious behavior.

    5 Related works

    Recent researches tried to built up the entire mechanism of location privacy preservation.These LPPMs have been well surveyed in Liu et al.[Liu,Darabi,Banerjee et al.(2007);Ahmadi and Bouallegue (2017);Chow and Mokbel (2011);Krumm (2009)].Upon these works,it is necessary to measure how many privacy these LPPMs really offered to the location,and the location privacy metric were studies in Wernke et al.[Wernke,Skvortsov,Dürr et al.(2014);Wang,Zhang and Yu(2015);Damiani and Cuijpers(2013);Tippenhauer,Rasmussen,P?pper et al.(2009)].For the LBS scenario,these researches focused on how to use the location safely.

    On the other hand,researches devoted to preserve location privacy in the location getting scenario,which can be described as how to get the location safely.Literatures such as Li et al.[Li,Sun,Zhu et al.(2014);Wang,Zhang,Su et al.(2018);Wang,Tian,Zhang et al.(2018)]provides efficient methods to cope with this threat.

    In general,methods including anonymity,obfuscation,noise addition,differential privacy and the encryption-based method are well deployed and deeply studied in the pas decades of research.No matter what specific method they wish to perform,they almost shared the same system model as well as the boundary assumptions.When in the LBS scenario,they did not concern about the LBS provider could get the location information without the awareness of the user,or where the location came from.On the other hand,in location getting scenario,researches also do not care how the location could be generated.In the new service scenarios such as proposed in Tian et al.[Tian,Cui,An et al.(2018);Li,Sun,Jiang et al.(2018);Hou,Wei,Wang et al.(2018)],it is inevitable that the location might be obtained beyond the awareness of the user.

    To the best of our knowledge,few of the researches paid enough attention on the development of LBS and the following location privacy challenge.We for the first time define the DLBS and the new privacy challenges along with it.Our proposed scheme is the forefront research which can solve the location privacy challenges in DLBS scenario.

    6 Conclusion

    In this paper,we defined a new type of location-based service which named the device-dependent location-based service.For DLBS,traditional LPPMs will be invalid since the overturning system model.Then,based on the credit score system and the proxy architecture,we designed a brand new DLBS framework,which can preserve the location privacy efficiently.We balance the location privacy with the usability of DLBS system,this can leads to the fact that the malicious behavior on location privacy will be bound to the harm on the usability to the DLBS system.The simulation result indicates that our framework can preserve the location privacy effectively in the real circumstance.

    Acknowledgement:This work was supported by National Natural Science Foundation of China (Grant Nos.61871140,61702223,61702220,61572153,61723022,61601146),and the National Key research and Development Plan (Grant No.2018YFB0803504,2017YFB0803300).

    国产综合懂色| 美女国产视频在线观看| 狂野欧美激情性xxxx在线观看| 日本在线视频免费播放| 插阴视频在线观看视频| 边亲边吃奶的免费视频| 18+在线观看网站| 亚洲图色成人| 国产亚洲av嫩草精品影院| av在线天堂中文字幕| 免费不卡的大黄色大毛片视频在线观看 | 中文字幕av成人在线电影| 尾随美女入室| 日韩大尺度精品在线看网址| 国产精品永久免费网站| 国产又黄又爽又无遮挡在线| 亚洲久久久久久中文字幕| 国产精品一二三区在线看| 久久人人爽人人爽人人片va| 亚洲精品乱码久久久久久按摩| 欧美3d第一页| 国产视频内射| 国内揄拍国产精品人妻在线| 欧美又色又爽又黄视频| 久久人人精品亚洲av| 久久久久久久久大av| 深爱激情五月婷婷| 少妇猛男粗大的猛烈进出视频 | 久久久久久久午夜电影| 久久人人爽人人爽人人片va| 亚洲欧美精品专区久久| 亚洲激情五月婷婷啪啪| 日本五十路高清| 热99在线观看视频| 国产av不卡久久| 99九九线精品视频在线观看视频| 久久久色成人| 成人鲁丝片一二三区免费| 国产精品电影一区二区三区| 1000部很黄的大片| 五月玫瑰六月丁香| 能在线免费观看的黄片| 国产探花在线观看一区二区| 国产熟女欧美一区二区| 99热只有精品国产| 欧美色视频一区免费| 亚洲在线自拍视频| 精品一区二区免费观看| 欧美xxxx黑人xx丫x性爽| 国产一级毛片在线| 白带黄色成豆腐渣| 精品人妻视频免费看| 日韩欧美三级三区| 免费观看人在逋| 国产精品一区二区三区四区久久| av在线蜜桃| 免费人成在线观看视频色| 国产精品久久久久久久久免| 国产一区二区亚洲精品在线观看| 91麻豆精品激情在线观看国产| 亚洲乱码一区二区免费版| 九草在线视频观看| 欧美变态另类bdsm刘玥| 亚洲在线观看片| 天天躁日日操中文字幕| 精品久久久久久久久亚洲| 亚洲婷婷狠狠爱综合网| 看黄色毛片网站| 国产色爽女视频免费观看| 国产人妻一区二区三区在| 一本一本综合久久| 亚洲aⅴ乱码一区二区在线播放| 综合色av麻豆| 最新中文字幕久久久久| 国语自产精品视频在线第100页| 国产免费男女视频| 国产精品99久久久久久久久| 日韩国内少妇激情av| 欧美高清成人免费视频www| 99热精品在线国产| 国产单亲对白刺激| 国产av一区在线观看免费| 国产乱人偷精品视频| 成年免费大片在线观看| 免费在线观看成人毛片| 成人鲁丝片一二三区免费| 内地一区二区视频在线| 又黄又爽又刺激的免费视频.| 国产精品麻豆人妻色哟哟久久 | 日韩视频在线欧美| 成人美女网站在线观看视频| 直男gayav资源| 日本撒尿小便嘘嘘汇集6| 亚洲欧美中文字幕日韩二区| 男插女下体视频免费在线播放| 九九热线精品视视频播放| 久久精品久久久久久噜噜老黄 | 直男gayav资源| 韩国av在线不卡| 国产真实乱freesex| 国产美女午夜福利| 可以在线观看的亚洲视频| av视频在线观看入口| 少妇的逼好多水| 大型黄色视频在线免费观看| 亚洲欧美日韩高清在线视频| 午夜爱爱视频在线播放| a级毛片a级免费在线| 亚洲欧美精品专区久久| 观看免费一级毛片| 51国产日韩欧美| 69人妻影院| 男人舔女人下体高潮全视频| 男的添女的下面高潮视频| 黄色配什么色好看| 男女那种视频在线观看| 一本久久中文字幕| 好男人视频免费观看在线| 久久精品国产亚洲网站| 最近最新中文字幕大全电影3| 伊人久久精品亚洲午夜| 自拍偷自拍亚洲精品老妇| 久久人人爽人人爽人人片va| 久久午夜福利片| 非洲黑人性xxxx精品又粗又长| 国产高清三级在线| 久久鲁丝午夜福利片| www.av在线官网国产| 只有这里有精品99| 有码 亚洲区| 日韩欧美精品免费久久| 久久精品国产亚洲av天美| 国产精品99久久久久久久久| 成人三级黄色视频| av在线天堂中文字幕| 免费观看的影片在线观看| 狂野欧美白嫩少妇大欣赏| 高清在线视频一区二区三区 | 成人午夜高清在线视频| 十八禁国产超污无遮挡网站| 一进一出抽搐gif免费好疼| 久久精品国产清高在天天线| 狠狠狠狠99中文字幕| 一级av片app| 国产精品人妻久久久久久| 精品一区二区三区人妻视频| 精品国产三级普通话版| 午夜精品在线福利| 啦啦啦观看免费观看视频高清| 日本成人三级电影网站| 男女下面进入的视频免费午夜| 18禁在线播放成人免费| 女人被狂操c到高潮| 少妇的逼水好多| 日日啪夜夜撸| 一级毛片久久久久久久久女| 可以在线观看的亚洲视频| 99热精品在线国产| 亚洲美女视频黄频| 中国美女看黄片| 国产精品久久久久久久久免| 国产毛片a区久久久久| 亚洲精品成人久久久久久| 欧美性猛交╳xxx乱大交人| 一进一出抽搐动态| 日韩一区二区视频免费看| 国产午夜福利久久久久久| 国产蜜桃级精品一区二区三区| 国产成人a∨麻豆精品| 女的被弄到高潮叫床怎么办| 色综合色国产| 国产一区二区三区av在线 | 国产高清三级在线| 午夜福利在线观看免费完整高清在 | 亚洲精品色激情综合| 性色avwww在线观看| 日本在线视频免费播放| 美女脱内裤让男人舔精品视频 | 精品久久久久久久末码| 中文在线观看免费www的网站| 精品少妇黑人巨大在线播放 | 精品久久久久久久久亚洲| 天美传媒精品一区二区| 蜜桃久久精品国产亚洲av| 人妻制服诱惑在线中文字幕| 热99在线观看视频| 丝袜美腿在线中文| 国产视频内射| h日本视频在线播放| 亚洲美女视频黄频| 亚洲四区av| 国产色爽女视频免费观看| 久久精品91蜜桃| 国产高清激情床上av| 日韩亚洲欧美综合| 亚洲av成人精品一区久久| 91aial.com中文字幕在线观看| 欧美日韩乱码在线| 又黄又爽又刺激的免费视频.| 久久精品91蜜桃| 国产成年人精品一区二区| 亚洲最大成人手机在线| 国产 一区 欧美 日韩| av福利片在线观看| 国产精品人妻久久久影院| 亚洲欧美清纯卡通| 国产欧美日韩精品一区二区| 久久精品人妻少妇| 狠狠狠狠99中文字幕| 夜夜夜夜夜久久久久| 欧美+日韩+精品| 日产精品乱码卡一卡2卡三| 欧美性猛交黑人性爽| 简卡轻食公司| 国产精品电影一区二区三区| 最好的美女福利视频网| 久久6这里有精品| 日本一本二区三区精品| 欧美+日韩+精品| 国产av在哪里看| 丰满的人妻完整版| 嫩草影院新地址| 一级av片app| 久久久久久久久久成人| 国产高清激情床上av| 18禁裸乳无遮挡免费网站照片| 久久精品国产亚洲av天美| 在线观看66精品国产| 日韩一本色道免费dvd| 床上黄色一级片| 毛片女人毛片| 联通29元200g的流量卡| 成人毛片60女人毛片免费| 波多野结衣高清作品| 免费观看的影片在线观看| 成人午夜精彩视频在线观看| 日本黄大片高清| 高清日韩中文字幕在线| 午夜精品在线福利| 国产伦精品一区二区三区四那| 神马国产精品三级电影在线观看| 青春草亚洲视频在线观看| 久久99热6这里只有精品| 久久精品国产亚洲av涩爱 | 久99久视频精品免费| 午夜免费男女啪啪视频观看| 日韩精品青青久久久久久| 国产精品爽爽va在线观看网站| 亚洲成a人片在线一区二区| 麻豆成人av视频| 天堂中文最新版在线下载 | 精品国产三级普通话版| 能在线免费看毛片的网站| 国产 一区 欧美 日韩| 边亲边吃奶的免费视频| 舔av片在线| 婷婷色av中文字幕| 亚洲经典国产精华液单| 亚洲18禁久久av| 国产麻豆成人av免费视频| 国产精品人妻久久久久久| 中文欧美无线码| 日本av手机在线免费观看| 亚洲欧美精品综合久久99| 成年版毛片免费区| 五月玫瑰六月丁香| 别揉我奶头 嗯啊视频| av在线观看视频网站免费| 亚洲最大成人手机在线| 成人午夜精彩视频在线观看| 91av网一区二区| 免费人成视频x8x8入口观看| 久久久a久久爽久久v久久| av在线蜜桃| 少妇的逼好多水| 三级毛片av免费| 国产精品99久久久久久久久| 少妇丰满av| 午夜免费激情av| 一级av片app| 看片在线看免费视频| 日韩欧美 国产精品| 亚洲美女视频黄频| av女优亚洲男人天堂| 人人妻人人看人人澡| 日本五十路高清| 欧美zozozo另类| 亚洲天堂国产精品一区在线| 亚洲精品久久久久久婷婷小说 | 亚洲内射少妇av| 午夜激情福利司机影院| 老熟妇乱子伦视频在线观看| 国产高清视频在线观看网站| 亚洲精品国产av成人精品| 18+在线观看网站| 亚洲国产欧洲综合997久久,| 国产在线精品亚洲第一网站| 免费av毛片视频| 男人狂女人下面高潮的视频| 91午夜精品亚洲一区二区三区| 给我免费播放毛片高清在线观看| 国产老妇女一区| 一级毛片电影观看 | 国产在线精品亚洲第一网站| 美女黄网站色视频| 男女那种视频在线观看| 菩萨蛮人人尽说江南好唐韦庄 | 久久精品夜色国产| 人人妻人人澡人人爽人人夜夜 | 日本撒尿小便嘘嘘汇集6| 看免费成人av毛片| 色哟哟·www| 国产色爽女视频免费观看| 日本五十路高清| 我要搜黄色片| 国产久久久一区二区三区| 成人三级黄色视频| 成人性生交大片免费视频hd| 高清午夜精品一区二区三区 | 在线免费观看不下载黄p国产| 全区人妻精品视频| 日日干狠狠操夜夜爽| av黄色大香蕉| 亚洲欧洲国产日韩| 一级黄片播放器| 亚洲av二区三区四区| 女人十人毛片免费观看3o分钟| 国产精品麻豆人妻色哟哟久久 | 真实男女啪啪啪动态图| 亚洲欧美精品专区久久| 一本一本综合久久| 99久久精品一区二区三区| 深夜精品福利| 精品99又大又爽又粗少妇毛片| 日本黄大片高清| 亚洲av第一区精品v没综合| 亚洲在线自拍视频| 成人国产麻豆网| 熟女人妻精品中文字幕| .国产精品久久| 久久久久久国产a免费观看| 91精品国产九色| 亚洲成人久久性| 嫩草影院新地址| 欧美激情国产日韩精品一区| 欧美一区二区国产精品久久精品| 成年av动漫网址| 91午夜精品亚洲一区二区三区| 日日摸夜夜添夜夜爱| 日韩一区二区视频免费看| av免费观看日本| 好男人在线观看高清免费视频| 熟妇人妻久久中文字幕3abv| 99在线人妻在线中文字幕| 国产精品一区www在线观看| 色5月婷婷丁香| 亚洲av男天堂| 亚洲在线自拍视频| 精品久久久久久久久亚洲| 99久国产av精品国产电影| 欧美+日韩+精品| 国产精品,欧美在线| 日韩一区二区三区影片| 色哟哟哟哟哟哟| 免费人成视频x8x8入口观看| 日韩大尺度精品在线看网址| 久久精品国产亚洲av香蕉五月| 亚洲国产精品成人综合色| 久久久久久久久久成人| 欧美一区二区国产精品久久精品| 又爽又黄a免费视频| 亚洲综合色惰| 欧美xxxx性猛交bbbb| 亚洲国产日韩欧美精品在线观看| 自拍偷自拍亚洲精品老妇| 欧美激情在线99| 午夜老司机福利剧场| 看黄色毛片网站| 综合色av麻豆| 联通29元200g的流量卡| 精品一区二区免费观看| 国产高清三级在线| 久久精品久久久久久噜噜老黄 | 精品无人区乱码1区二区| 久久精品人妻少妇| 亚洲欧美日韩高清专用| 看免费成人av毛片| 美女内射精品一级片tv| 日韩国内少妇激情av| 爱豆传媒免费全集在线观看| 久久精品国产鲁丝片午夜精品| 成人毛片a级毛片在线播放| 国产黄色小视频在线观看| 日韩国内少妇激情av| 国产av不卡久久| 国产精品永久免费网站| 在线观看一区二区三区| 成年免费大片在线观看| 99久久久亚洲精品蜜臀av| 亚洲成人久久爱视频| 夫妻性生交免费视频一级片| 日日干狠狠操夜夜爽| 在线国产一区二区在线| 亚洲自偷自拍三级| 尤物成人国产欧美一区二区三区| 久久中文看片网| 亚洲人成网站在线播| 少妇丰满av| a级毛色黄片| 久久国产乱子免费精品| 1024手机看黄色片| 波野结衣二区三区在线| 亚洲欧美日韩卡通动漫| 国产探花极品一区二区| 综合色丁香网| 深夜精品福利| 国产av麻豆久久久久久久| 亚洲无线在线观看| 伊人久久精品亚洲午夜| 好男人视频免费观看在线| 成年版毛片免费区| 精品免费久久久久久久清纯| 日本在线视频免费播放| 中文亚洲av片在线观看爽| 在线免费观看的www视频| 国产精品久久视频播放| 国产一级毛片在线| 亚洲性久久影院| 男女啪啪激烈高潮av片| a级毛片a级免费在线| 亚洲精品456在线播放app| 伦理电影大哥的女人| 久久精品国产清高在天天线| 亚洲欧美日韩高清专用| 日韩在线高清观看一区二区三区| 免费电影在线观看免费观看| 午夜激情欧美在线| 可以在线观看毛片的网站| 日本与韩国留学比较| 亚洲精品国产成人久久av| 欧美成人免费av一区二区三区| 在线a可以看的网站| 99在线人妻在线中文字幕| 精品人妻熟女av久视频| 亚洲无线观看免费| 男女做爰动态图高潮gif福利片| 精品一区二区三区视频在线| 特级一级黄色大片| 97超视频在线观看视频| 国产日本99.免费观看| 精品日产1卡2卡| 国产精品一区二区在线观看99 | 日韩av不卡免费在线播放| 性色avwww在线观看| 国产毛片a区久久久久| 欧美性猛交黑人性爽| 中文字幕免费在线视频6| 黄色日韩在线| 99热只有精品国产| 久久久久性生活片| 日韩欧美在线乱码| 亚洲久久久久久中文字幕| 成人综合一区亚洲| 久久精品人妻少妇| or卡值多少钱| 精品人妻熟女av久视频| 亚洲无线观看免费| 免费观看a级毛片全部| 六月丁香七月| 亚洲在线自拍视频| 欧美又色又爽又黄视频| 免费人成视频x8x8入口观看| 99久久精品一区二区三区| 亚洲成人精品中文字幕电影| 偷拍熟女少妇极品色| 又爽又黄a免费视频| 91久久精品电影网| 69人妻影院| 日韩视频在线欧美| 欧美bdsm另类| 国产v大片淫在线免费观看| 我的老师免费观看完整版| 日本欧美国产在线视频| 美女脱内裤让男人舔精品视频 | 日本欧美国产在线视频| 悠悠久久av| 久久久色成人| 精品熟女少妇av免费看| 99riav亚洲国产免费| 99视频精品全部免费 在线| 亚洲高清免费不卡视频| 三级男女做爰猛烈吃奶摸视频| 日本免费a在线| 欧美日本视频| 亚洲av成人av| 丝袜喷水一区| 国产精品免费一区二区三区在线| 日韩欧美在线乱码| 亚洲最大成人av| 国产精品人妻久久久久久| 亚洲国产欧美人成| 亚洲最大成人中文| 久久国内精品自在自线图片| 中文欧美无线码| 别揉我奶头 嗯啊视频| 精品久久久久久久久av| 国产精品国产高清国产av| 免费观看的影片在线观看| 只有这里有精品99| 国产亚洲av片在线观看秒播厂 | 99热这里只有精品一区| eeuss影院久久| 又爽又黄无遮挡网站| 最近最新中文字幕大全电影3| 99久久九九国产精品国产免费| 最近视频中文字幕2019在线8| 乱码一卡2卡4卡精品| eeuss影院久久| 国产视频内射| 人人妻人人澡人人爽人人夜夜 | 国产成人精品婷婷| 成人二区视频| 少妇高潮的动态图| 国产精品三级大全| 国产精品蜜桃在线观看 | 久久久久久久久久久免费av| 天堂√8在线中文| 亚洲国产精品成人久久小说 | 久久久久久伊人网av| 久久久久性生活片| 亚洲人成网站在线播放欧美日韩| 国产精品一区二区三区四区久久| 亚洲精品456在线播放app| 在线观看av片永久免费下载| 亚洲av第一区精品v没综合| 精品国内亚洲2022精品成人| 国产亚洲91精品色在线| 久久久久久久亚洲中文字幕| 欧美精品国产亚洲| 久久这里有精品视频免费| 国产精品爽爽va在线观看网站| 亚洲无线观看免费| 国产一区二区三区在线臀色熟女| 国产午夜精品论理片| 嫩草影院新地址| 国产精品国产高清国产av| 国产成人a∨麻豆精品| 国产高清不卡午夜福利| 亚洲欧美日韩卡通动漫| 天天一区二区日本电影三级| 女人十人毛片免费观看3o分钟| 麻豆成人av视频| 91精品国产九色| 黑人高潮一二区| 国产伦一二天堂av在线观看| 亚洲精品久久国产高清桃花| 久久久久久久久久成人| 乱人视频在线观看| 亚洲丝袜综合中文字幕| 国产一区二区三区在线臀色熟女| 欧美日韩国产亚洲二区| 最近中文字幕高清免费大全6| 国产白丝娇喘喷水9色精品| 18禁裸乳无遮挡免费网站照片| 寂寞人妻少妇视频99o| 老司机影院成人| 欧美区成人在线视频| 一个人观看的视频www高清免费观看| 97超碰精品成人国产| 国产一区二区三区在线臀色熟女| 两性午夜刺激爽爽歪歪视频在线观看| 69人妻影院| 网址你懂的国产日韩在线| 一区二区三区免费毛片| 你懂的网址亚洲精品在线观看 | 精品免费久久久久久久清纯| av在线亚洲专区| 校园人妻丝袜中文字幕| 男的添女的下面高潮视频| 国产视频内射| 五月伊人婷婷丁香| 久久久久久久久久久丰满| 亚洲av免费在线观看| 欧美一级a爱片免费观看看| 狠狠狠狠99中文字幕| 国产老妇女一区| 免费观看的影片在线观看| 久久久久久九九精品二区国产| 午夜激情欧美在线| 国产精品无大码| 午夜久久久久精精品| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 欧美又色又爽又黄视频| 最近2019中文字幕mv第一页| 亚洲乱码一区二区免费版| 卡戴珊不雅视频在线播放| 日本-黄色视频高清免费观看| 精品人妻偷拍中文字幕| 亚洲婷婷狠狠爱综合网| 日韩国内少妇激情av| 久久韩国三级中文字幕| 中文字幕久久专区| 亚洲国产欧洲综合997久久,| 亚洲欧美精品综合久久99| 丰满人妻一区二区三区视频av| 乱码一卡2卡4卡精品| 亚洲精品色激情综合| 国内久久婷婷六月综合欲色啪| 一区福利在线观看| 久久人人爽人人片av| 久久精品国产自在天天线| 国内久久婷婷六月综合欲色啪| 国产高清激情床上av| 欧美高清成人免费视频www| 一级毛片电影观看 |