• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Method for reducing cloud workflow completion time under the task interruption

    2020-06-22 06:51:56YawenWANGYunfeiGUOWenyanLIUShuminHUO
    關(guān)鍵詞:層次性尺度流域

    Yawen WANG, Yunfei GUO, Wenyan LIU, Shumin HUO

    Method for reducing cloud workflow completion time under the task interruption

    Yawen WANG, Yunfei GUO, Wenyan LIU, Shumin HUO

    National Digital Switching System Engineering and Technology Research Center, Zhengzhou, China

    As more and more large-scale scientific workflows are delivered to clouds, the business model of workflow-as-a-service is emerging. But there are many kinds of threats in the cloud environment, which can interrupt the task execution and extend the workflow completion time. As an important QoS parameter, the workflow completion time is determined by the critical task path. Therefore, critical path redundancy method is proposed to create a redundant path having the interact parallel relationship with the critical path, which can provide the protection for the tasks in the critical path and reduce the probability of the critical path interruption. Computing instance allocation is an essential part of the cloud workflow execution, since only the tasks assigned the instance can begin execution. In order to further reduce the workflow completion time, computing instance allocation algorithm based on HEFT (heterogeneous earliest finish time) is proposed. The algorithm considers diverse task dependency relationships and takes full advantages of the critical path redundancy method, which can improve the efficiency of workflow execution. Experimental results demonstrate that the proposed method can effectively reduce the cloud workflow completion time under the task interruption.

    cloud workflow, task interruption, resource allocation, fault tolerance

    1 Introduction

    In many scientific research fields, such as quantum physics, astronomy, bioinformatics and so on, the process of scientific computing often consists of tens of thousands of steps, requiring large-scale data analysis and processing. In order to properly manage, arrange, execute and track these steps, the concept of scientific workflows is presented[1-2]. As the improvement of the complexity of the scientific problems to be solved, the present large scientific workflows often need to be implemented on complex distributed computing envirnments, such as supercomputers, distributed cluster systems and grid systems, but constructing such a system requires extraordinary expensive costs.

    With the development of virtualization technologies, the emergence of cloud computing provides a new deployment and implementation solution for scientific workflow applications. The cloud computing takes the resource renting, application hosting and service outsourcing as the core, builds the computing environments through the integration of distributed resources to meet a variety of service requirements. As cloud customers, they no longer need hardware purchase and software deployment, they just need to pay some fees to easily access the required computing and storage resources through the internet. Due to low costs and the convenient resource access, more and more large-scale scientific workflows are delivered to clouds to complete.

    In the process of scientific workflow execution, resource failures or malicious attacks will lead to the workflow interruption. To avoid such problems, Wang et al[3]propose to implement checkpoint backup of the workflow by storing the workflow intermediate data. When the workflow is interrupted, the abnormal state can be fixed by backtracking to the most recent checkpoint. However, checkpoint backtracking will generate time overhead, resulting in a delay in workflow completion time. For this problem, a method to reduce the cloud workflow completion time under the task interruption is proposed. The main contributions of this paper are listed as follows.

    1) A threat model for cloud workflows is proposed. In the model, tasks can be interrupted due to malicious attacks or resource failures, delaying the workflow completion. And the delay effects are related to the length of the path where the interrupted task is located, the longer the path, the greater the delay effects.

    2) Critical path redundancy method is proposed, which creates a redundant path having the interact parallel relationship with the critical path to reduce the interruption probability of the critical path in the workflow.

    3) A computing instance allocation algorithm based on HEFT algorithm is proposed, the algorithm takes into account diverse task dependency relationships and takes full advantages of the critical path redundancy method, which can improve the efficiency of workflow execution.

    2 Related work

    The workflow completion time is an important QoS parameter, since the consumers always specify deadlines when submitting the workflow execution requests to clouds. Therefore, many scholars have studied how to ensure that the workflow can be completed before the deadline. Abrishami et al[4]design a two-phase scheduling algorithm called partial critical paths to minimize the cost of workflow execution while meeting a user-defined deadline. Similarly, Wu et al[5]present a two-step list scheduling method, which will rank tasks firstly and allocate each task a service which meets the sub-deadline and minimizes the cost. Calheiros et al[6]use the available spare time and budget surpluses between leased cloud computing resources to replicate tasks, thereby ensuring that tasks are completed before deadlines. Considering the execution costs and transmission costs comprehensively, on the basis of genetic algorithm, Verma et al[7]present a deadline constrained scheduling method, which can minimize the cost of the workflow execution while meeting the deadline for delivering the result. Currently, multi-core processors are widely used in clouds, for this reason, Deldari et al[8]propose a deadline-constrained workflow scheduling algorithm for multicore resources in the cloud. Lin et al[9]propose an online-scheduling strategy for continuous submitted scientific workflows on hybrid clouds, aiming to complete the deadline-constrained applications as fast as possible at a lower price. Zheng et al[10]combine the DVFS (dynamic voltage and frequency scaling) technique and heuristic algorithm to reduce overall energy consumption of a workflow given an allocation of tasks to hosts and a deadline to complete the execution. Sahni et al[11]exploit the advantages offered by cloud computing while taking into account the virtual machine performance variability and instance acquisition delay to identify a just-in-time schedule of a deadline constrained scientific workflow at lesser costs. However, the above literatures do not consider the situation where the tasks are abnormally interrupted. The multi-tenant coexistence service mode of the cloud platform can easily introduce malicious attacks. Consequently, the task interruption during the workflow execution should not be ignored.

    In order to avoid the task interruption during the workflow execution, Yao et al[12]consider that the process of rescheduling in cloud systems have great similarities to the immune system which kept the body stable by removing the intrusive antigens, so an immune system inspired failure-aware rescheduling algorithm for the workflow task in clouds is designed to improve the reliability of the workflow. Task redundancy method is often used for improving the workflow reliability. Ding et al[13]propose a primary-backup workflow scheduling strategy, which copies the same task into two replicas and schedules the two replicas to different computing instances. In reference[14], the authors propose cloud scientific workflow execution system based on mimic defense technology, in which each task is executed by three computing instances. Considering the cost and reliability together, Poola et al[15-16]propose to use spot instances to reduce the costs of the task redundancy method. In reference[17], the authors combine rescheduling algorithm and task redundancy together to design a fault-tolerant workflow scheduling algorithm. From the above literatures, it can be found that rescheduling and task redundancy are two common methods to improve the workflow reliability. However, if the task is interrupted, rescheduling will take some time to restore the workflow state, and the time spent will delay the workflow completion. Task redundancy can seamlessly restores abnormal task states, but if each task is replicated into multiple copies and dispatched to different computing instances, it will consume a lot of resources. In reference[18], the authors propose that redundancy method should be used for protecting the important components. Based on this idea, it is proposed to use task redundancy method to protect the important tasks in the workflow.

    3 The workflow model

    3.1 The analysis of the workflow completion time

    Figure 1 A sample workflow

    3.2 The definition of the path length in the workflow

    Therefore, the workflow completion time is decided by the longest path in the workflow, the longest path is called the critical path in the workflow.

    Figure 2 The path division in the workflow

    3.3 The identification of the critical path in the workflow

    There are many kinds of computing instances on the cloud platform, different kinds of computing instances have different computing ability, so if the same task is assigned to different computing instances for execution, the required execution timewill be different. Therefore, in practical applications, the path length can not be used directly to identify the critical path since each task execution time is uncertain before computing instance allocation. For this problem, an algorithm proposed by Topcuoglu[19]to achieve the critical path identification is adopted.

    4 The threat model for the workflow

    In the cloud computing system, many methods can be used to break the execution of cloud workflows. For example, adversaries can bypass logical isolation between VMs via side channels to attack the VMs performing the workflow[20]. A kind of vulnerabilities called VM Escape can be employed to help attackers access privilege domain of Hypervisor, then all the VMs supported by this Hypervisor[21]will be compromised easily. A malicious user can perform guest denial of service attack by starving there sources of the server, the VM applications running on the same server will be slowed down or even interrupted[22]. Furthermore, there are some attacks targeting hardware of the cloud[23], if the hardware of the physical machine on which the cloud workflow is executed fails, the cloud workflow will inevitably be interrupted.

    It demonstrates that the workflow completion time under the task interruption is related to the length of the path in which the interrupted task is located. The length of the path where the interrupted task is located longer, the delay effect is greater.

    5 The proposed method

    From (11) it can be found that there are two ways which can reduce the workflow completion time under the task interruption. One way is reducing the probability of the interruption of the tasks on the longest path. The other is reducing the length of the longest path in the workflow, i.e.in (11).

    In this section, firstly the critical path redundancy method will be presented, which can reduce the probability of task interruption occurring on the critical path. Then computing instance allocation algorithm is proposed to improve the overall workflow execution efficiency, reducingin (11).

    5.1 Critical path redundancy method

    It has been discussed that reducing the interruption probability of the tasks on the critical path is a way to shorten the workflow completion time under the task interruption. Based on this idea, critical path redundancy method is proposed to provide the protection for the tasks in the critical path.

    Figure 3 The independent parallel relationship and the interactive parallel relationship between between the critical path and the redundant path

    Figure 4 The security comparison between the independent parallel relationship and the interactive parallel relationship

    Figure 5 The illustration of critical path redundancy method

    5.2 Computing instance allocation algorithm

    In the workflow, only the tasks that have been assigned computing instances from the cloud platform can be executed, so computing instance allocation is an essential part of cloud workflow execution.

    三是水安全的層次性或尺度性。水安全的不同尺度,產(chǎn)生了國家水安全、流域水安全、區(qū)域或地區(qū)水安全,以及群體水安全和個(gè)體水安全等衍生概念。

    It has been discussed that another way to reduce the workflow completion time under the task interruption is shortening the length of the longest path in the workflow, i.e.in (11), which can be realized by designing reasonable computing instance allocation strategy, since the interdependent tasks in the same instance do not need to transfer dependent data through network, which can save the time spent on the data transmission.

    At the stage of computing instance allocation, a computing instance allocation algorithm is proposed. The proposed algorithm is improved from HEFT algorithm[19]which has proven to be one of the most effective task scheduling algorithms in distributed environments.

    The proposed computing instance allocation algorithm is shown in Algorithm 1.

    3) while there are unscheduled tasks in the list

    8) end

    10) end

    5.3 The procedure of the proposed method

    In this section, a workflow shown is used in Figure 1 to illustrate the procedure of the proposed method. It is assumed that there are 3 computing instances, the time required for each task execution on different computing instances is shown in Table 1. The communication time of each edge is shown in Table 2.

    Table 1 The time required for each task execution on different computing instances

    Table 2 The communication time of each edge in the workflow

    Table 3 ranku, rankd and ranku+d value of each task in the workflow

    4) Performing computing instance allocation algorithm.

    6 Experiment

    In this section, three experiments are designed. ①Evaluating the workflow completion time of the critical path redundancy method. ② Evaluating the workflow completion time of the proposed computing instance algorithm. ③ Evaluating the resource requirements of the proposed method.

    The experiments are conducted with the Workflow Sim toolkit[24], which is an open source software designed for workflow scheduling simulation in clouds. In this software, workflows are described in XML language, which contains the information about tasks and links. The proposed method in this paper mainly includes two steps: the critical path redundancy and computing instance allocation. Similarly, critical path redundancy module is constructed and computing instance allocation module. Critical path redundancy module firstly reads in the original XML file representing workflows. Afterwards it will find the tasks contained in the critical path and build a new redundant path by the proposed method. Then the module will output the new generated workflow in the format of XML. After that computing instance allocation module will be read in the new generated XML file, then it will perform the proposed computing instance allocation algorithm and output the results.

    The workflows used for experiments are CyberShake, Epigenomics, Montage and Inspiral, which are published by Pegasus project[25-26]and widely used to measure the performance of scheduling algorithms. For each type of workflow, four kinds of DAG with different number of jobs and edges are introduced. For example, CyberShake workflow has 4 kinds with 30, 50, 100and 1 000 tasks, respectively. In this experiment, each kinds of workflow with maximum tasks is used for evaluation. The DAG characteristics of these workflows, including the number of nodes and edges, average data size and average task runtime are given in Table 4, the structures of them are shown in Figure 6.

    6.1 Evaluating the workflow completion time of the critical path redundancy method

    In this experiment, the number of available computing instances is 120, the computing ability of each instance is randomly generated from 800 to 1 200 MIPS. It is supposed that each task in the workflow has the same probability of interruption and the time of task interruption is equal to the average task runtime. The probability of task interruption is regarded as the variant to record the average workflow completion time. For comparison, 3 types of workflows are created, which are the original workflow, the workflow with non-critical path redundancy and the workflow with critical path redundancy. The original workflow adopts HEFT algorithm to allocate computing instances and the others employ the proposed computing instance allocation algorithm. The evaluation results are shown in Figure 7. From the figure it can be found that the starting and ending points of the three curves are roughly the same. The starting point represents that the tasks will never be interrupted and the ending point represents that the task must be interrupted. At these points, the length of the critical path in these workflows are the same, so the three curves share the same starting and ending points. Between the starting point and the ending point, the average completion time of path redundancy method is shorter than the original workflow, since the redundant path can reduce the impact of task interruption on workflow completion time to some extent. Compared with the non-critical path redundancy, critical path redundancy method has the better result, because the workflow completion time is decided by the length of the critical path in the workflow, the protection for the critical path will bring the greatest security gain.

    Table 4 The parameters of workflows used for experiments[12]

    Figure 6 The structures of workflows used for experiments

    6.2 Evaluating the workflow completion time of the proposed computing instance allocation algorithm

    Figure 7 The evaluation results of the critical path redundancy method

    6.3 Evaluating the resource requirements of the proposed method

    Figure 8 The evaluation results of computing instance allocation algorithm

    7 Conclusion

    The task interruption in the workflow will delay the workflow completion. For the problem, we firstly analyze and conclude that delay effects caused by the task interruption is related to the length of the path where the interrupted task is located, the longer the path, the greater the delay effects. Then we present the critical path redundancy method to create a redundant path having the interact parallel relationship between the critical path, reducing the interruption probability of the critical path. Furthermore, since only the tasks assigned the instance can begin execution, a computing instance allocation method based on HEFT algorithm is proposed, which takes into account diverse task dependency relationships and takes full advantages of the critical path redundancy method, improving the efficiency of workflow execution. The experiment is conducted on WorkflowSim, four real world workflow models are used for tests. Test results demonstrate that the proposed method can effectively reduce the workflow completion time under the task interruption.

    Figure 9 The evaluation results of resource requirements of the proposed method

    [1] LIU L, ZHANG M, BUYYA R, et al. Deadline-constrained coevolutionary genetic algorithm for scientific workflow scheduling in cloud computing[J]. Concurrency and Computation: Practice and Experience, 2017, 29(5): 1-12.

    [2] RODRIGUEZ M A, BUYYA R. A taxonomy and survey on scheduling algorithms for scientific workflows in IaaS cloud computing environments[J]. Concurrency and Computation: Practice and Experience, 2017, 29(8): 1-23.

    [3] WANG M, ZHU L, Chen J. Risk-aware checkpoint selection in cloud-based scientific workflow[C]//2012 Second International Conference on Cloud and Green Computing. 2012: 137-144.

    [4] ABRISHAMI S, NAGHIBZADEH M, EPEMA D H J. Deadline-constrained workflow scheduling algorithms for infrastructure as a service clouds[J]. Future Generation Computer Systems, 2013, 29(1): 158-169.

    [5] WU Q, ISHIKAWA F, ZHU Q, et al. Deadline-constrained cost optimization approaches for workflow scheduling in clouds[J]. IEEE Transactions on Parallel and Distributed Systems, 2017, 28(12): 3401-3412.

    [6] CALHEIROS R N, BUYYA R. Meeting deadlines of scientific workflows in public clouds with tasks replication[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 25(7): 1787-1796.

    [7] VERMA A, KAUSHAL S. Deadline constraint heuristic-based genetic algorithm for workflow scheduling in cloud[J]. International Journal of Grid and Utility Computing, 2014, 5(2): 96-106.

    [8] DELDARI A, NAGHIBZADEH M, ABRISHAMI S. CCA: a deadline-constrained workflow scheduling algorithm for multicore resources on the cloud[J]. The journal of Supercomputing, 2017, 73(2): 756-781.

    [9] LIN B, GUO W, LIN X. Online optimization scheduling for scientific workflows with deadline constraint on hybrid clouds[J]. Concurrency and Computation: Practice and Experience, 2016, 28(11): 3079-3095.

    [10] ZHENG W, HUANG S. An adaptive deadline constrained energy‐efficient scheduling heuristic for workflows in clouds[J]. Concurrency and Computation: Practice and Experience, 2015, 27(18): 5590-5605.

    [11] SAHNI J, VIDYARTHI D P. A cost-effective deadline-constrained dynamic scheduling algorithm for scientific workflows in a cloud environment[J]. IEEE Transactions on Cloud Computing, 2015, 6(1): 2-18.

    [12] YAO G, DING Y, REN L, et al. An immune system-inspired rescheduling algorithm for workflow in cloud systems[J]. Knowledge-Based Systems, 2016, 99: 39-50.

    [13] DING Y, YAO G, HAO K. Fault-tolerant elastic scheduling algorithm for workflow in cloud systems[J]. Information Sciences, 2017, 393: 47-65.

    [14] WANG Y, WU J, GUO Y, et al. Scientific workflow execution system based on mimic defense in the cloud environment[J]. Frontiers of Information Technology & Electronic Engineering, 2018, 19(12): 1522-1536.

    [15] POOLA D, RAMAMOHANARAO K, BUYYA R. Fault-tolerant workflow scheduling using spot instances on clouds[J]. Procedia Computer Science, 2014, 29: 523-533.

    [16] POOLA D, RAMAMOHANARAO K, BUYYA R. Enhancing reliability of workflow execution using task replication and spot instances[J]. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 2016, 10(4): 30.

    [17] YAO G, DING Y, HAO K. Using imbalance characteristic for fault-tolerant workflow scheduling in cloud systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2017, 28(12): 3671-3683.

    [18] ZHENG Z, ZHOU T C, LYU M R, et al. Component ranking for fault-tolerant cloud applications[J]. IEEE Transactions on Services Computing, 2011, 5(4): 540-550.

    [19] TOPCUOGLU H, HARIRI S, WU M. Performance-effective and low-complexity task scheduling for heterogeneous computing[J]. IEEE transactions on parallel and distributed systems, 2002, 13(3): 260-274.

    [20] VERMA A, MITTAL M, CHHABRA B. The mutual authentication scheme to detect virtual side channel attack in cloud computing[J]. International Journal of Computer Science and Information Security (IJCSIS), 2017, 15(3).

    [21] GROBAUER B, WALLOSCHEK T, Stocker E. Understanding cloud computing vulnerabilities[J]. IEEE Security & privacy, 2010, 9(2): 50-57.

    [22] MISHRA P, PILLI E S, VARADHARAJAN V, et al. Intrusion detection techniques in cloud environment: A survey[J]. Journal of Network and Computer Applications, 2017, 77: 18-47.

    [23] STEWIN P, BYSTROV I. Understanding DMA malware[C]// International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. 2012: 21-41.

    [24] CHEN W, DEELMAN E. WorkflowSim: a toolkit for simulating scientific workflows in distributed environments[C]//2012 IEEE 8th International Conference on E-Science. 2012: 1-8.

    [25] JUVE G, CHERVENAK A, DEELMAN E, et al. Characterizing and profiling scientific workflows[J]. Future Generation Computer Systems, 2013, 29(3): 682-692.

    [26] DEELMAN E, VAHI K, JUVE G, et al. Pegasus, a workflow management system for science automation[J]. Future Generation Computer Systems, 2015, 46: 17-35.

    10.11959/j.issn.2096?109x.2020018

    2019?05?29;

    2019?08?09

    Yawen Wang, 15738321455@163.com

    The National Key R & D Program of China (2018YFB0804004), The Foundation for Innovative Research Groups of the National Natural Science Foundation of China (61521003)

    Yawen WANG, Yunfei GUO, Wenyan LIU, et al. Method for reducing cloud workflow completion time under the task interruption[J]. Chinese Journal of Network and Information Security, 2020, 6(3): 113-125.

    Yawen WANG (1990? ), born in Henan. He is working on his Ph.D degree at National Digital Switching System Engineering and Technological Research Center. His research interests include cloud security and scientific workflow scheduling.

    Yunfei GUO (1963? ), born in Henan. He is a Ph.D supervisor and professor at National Digital Switching System Engineering and Technological Research Center. His research interests include cloud security and telecommunication network security.

    Wenyan LIU (1986? ), born in Henan. He is a lecturer at National Digital Switching System Engineering and Technological Research Center. His research interests include cloud security.

    Shumin HUO (1985? ), born in Shanxi. He is a lecturer at National Digital Switching System Engineering and Technological Research Center. His research interests include cloud security.

    猜你喜歡
    層次性尺度流域
    壓油溝小流域
    小學(xué)數(shù)學(xué)層次性問題設(shè)計(jì)初探
    甘肅教育(2021年10期)2021-11-02 06:14:06
    堡子溝流域綜合治理
    羅堰小流域
    財(cái)產(chǎn)的五大尺度和五重應(yīng)對
    水利規(guī)劃與設(shè)計(jì)(2018年1期)2018-01-31 01:53:37
    宇宙的尺度
    太空探索(2016年5期)2016-07-12 15:17:55
    9
    探析辨證論治的層次性
    價(jià)值觀層次性淺析
    下体分泌物呈黄色| 国产乱人偷精品视频| 亚洲图色成人| 国产淫语在线视频| 亚洲人成77777在线视频| 日韩av在线免费看完整版不卡| 爱豆传媒免费全集在线观看| 不卡av一区二区三区| 99久久人妻综合| 捣出白浆h1v1| 亚洲欧洲国产日韩| 日日爽夜夜爽网站| 亚洲精品国产av蜜桃| 久久亚洲国产成人精品v| 国产精品 国内视频| 国产精品亚洲av一区麻豆 | 男女无遮挡免费网站观看| 精品国产一区二区三区久久久樱花| 免费在线观看黄色视频的| 人人澡人人妻人| 亚洲一区中文字幕在线| 久热这里只有精品99| 国产高清不卡午夜福利| 99热网站在线观看| 高清欧美精品videossex| 日日啪夜夜爽| 亚洲精品美女久久av网站| 欧美日韩成人在线一区二区| 国产日韩一区二区三区精品不卡| 亚洲精品国产区一区二| www.av在线官网国产| 街头女战士在线观看网站| 男女国产视频网站| 在线观看www视频免费| 久久婷婷青草| 国产极品天堂在线| 日本爱情动作片www.在线观看| 国产亚洲一区二区精品| 最近最新中文字幕大全免费视频 | 99久久综合免费| 国产精品蜜桃在线观看| 女人久久www免费人成看片| 99香蕉大伊视频| 久久久久久久精品精品| 国产精品久久久久久精品古装| 亚洲,欧美精品.| 亚洲一区二区三区欧美精品| 人人澡人人妻人| 在线观看www视频免费| 亚洲国产精品999| av在线观看视频网站免费| 多毛熟女@视频| 97人妻天天添夜夜摸| 秋霞伦理黄片| 久久性视频一级片| 观看美女的网站| 啦啦啦啦在线视频资源| 久久久国产精品麻豆| 人人妻人人澡人人看| 久久 成人 亚洲| 狠狠精品人妻久久久久久综合| 老汉色av国产亚洲站长工具| 国产精品秋霞免费鲁丝片| 午夜福利视频精品| 欧美精品高潮呻吟av久久| 欧美激情高清一区二区三区 | 国产精品久久久人人做人人爽| 在线看a的网站| 啦啦啦在线观看免费高清www| 超碰成人久久| 国产又爽黄色视频| 丝袜人妻中文字幕| 国精品久久久久久国模美| 中文字幕亚洲精品专区| av.在线天堂| 亚洲综合色网址| 国产精品嫩草影院av在线观看| 在线观看一区二区三区激情| 国产精品久久久久久人妻精品电影 | 国产精品一区二区在线不卡| 激情视频va一区二区三区| 人人妻人人爽人人添夜夜欢视频| 波多野结衣一区麻豆| 亚洲精品av麻豆狂野| 999久久久国产精品视频| av有码第一页| 少妇人妻久久综合中文| 精品久久久精品久久久| 国产精品久久久av美女十八| 人成视频在线观看免费观看| 久久久久久久久免费视频了| 国产精品久久久久久久久免| 日韩,欧美,国产一区二区三区| 69精品国产乱码久久久| 婷婷色综合www| 搡老岳熟女国产| 纵有疾风起免费观看全集完整版| 人人澡人人妻人| 女的被弄到高潮叫床怎么办| 大陆偷拍与自拍| 国产97色在线日韩免费| 97精品久久久久久久久久精品| 亚洲第一青青草原| 欧美日韩福利视频一区二区| 欧美国产精品va在线观看不卡| 精品一品国产午夜福利视频| 男人操女人黄网站| 国语对白做爰xxxⅹ性视频网站| 亚洲国产毛片av蜜桃av| 最新的欧美精品一区二区| 天堂8中文在线网| 999久久久国产精品视频| 欧美日韩综合久久久久久| 中国三级夫妇交换| 日韩中文字幕欧美一区二区 | 日韩伦理黄色片| 午夜日韩欧美国产| 国产又爽黄色视频| 丝袜人妻中文字幕| 亚洲国产最新在线播放| 国产又色又爽无遮挡免| 少妇被粗大猛烈的视频| 国产精品久久久久久精品电影小说| 少妇被粗大的猛进出69影院| 日本一区二区免费在线视频| 国语对白做爰xxxⅹ性视频网站| 精品国产一区二区三区四区第35| 亚洲精品久久久久久婷婷小说| 天美传媒精品一区二区| 91成人精品电影| 欧美精品人与动牲交sv欧美| 日日摸夜夜添夜夜爱| 精品亚洲成a人片在线观看| 久久精品国产亚洲av高清一级| 男女高潮啪啪啪动态图| 国产精品久久久久久精品古装| 日韩熟女老妇一区二区性免费视频| 最近最新中文字幕免费大全7| 美女国产高潮福利片在线看| 亚洲精品美女久久久久99蜜臀 | 人妻人人澡人人爽人人| 熟女av电影| 在线观看免费午夜福利视频| 五月天丁香电影| 蜜桃在线观看..| 亚洲一卡2卡3卡4卡5卡精品中文| 老司机亚洲免费影院| 少妇被粗大的猛进出69影院| 中文字幕人妻熟女乱码| 色婷婷久久久亚洲欧美| 午夜免费男女啪啪视频观看| 久久这里只有精品19| 2021少妇久久久久久久久久久| 一区二区日韩欧美中文字幕| 国产精品秋霞免费鲁丝片| 久久精品亚洲熟妇少妇任你| 久久天堂一区二区三区四区| 亚洲欧洲国产日韩| 麻豆乱淫一区二区| 久久国产精品大桥未久av| 亚洲av福利一区| 国产乱来视频区| 精品酒店卫生间| 成年女人毛片免费观看观看9 | 嫩草影视91久久| 久久人妻熟女aⅴ| 国产精品一区二区在线不卡| 免费黄频网站在线观看国产| 波多野结衣一区麻豆| 精品久久久精品久久久| 亚洲成av片中文字幕在线观看| 亚洲国产av新网站| 国产 精品1| 十八禁网站网址无遮挡| 波野结衣二区三区在线| 制服人妻中文乱码| 一级爰片在线观看| 69精品国产乱码久久久| 狂野欧美激情性bbbbbb| 天天添夜夜摸| 亚洲国产中文字幕在线视频| 老汉色∧v一级毛片| 成人亚洲欧美一区二区av| 一边亲一边摸免费视频| 熟妇人妻不卡中文字幕| 亚洲人成电影观看| 一本大道久久a久久精品| 亚洲成人国产一区在线观看 | 咕卡用的链子| 男女床上黄色一级片免费看| 啦啦啦在线观看免费高清www| 亚洲av综合色区一区| 欧美日韩亚洲综合一区二区三区_| 亚洲精品国产一区二区精华液| 性色av一级| 美女脱内裤让男人舔精品视频| 国产精品欧美亚洲77777| 晚上一个人看的免费电影| 精品免费久久久久久久清纯 | 热re99久久精品国产66热6| 国产男女超爽视频在线观看| 色视频在线一区二区三区| 一个人免费看片子| 超色免费av| 午夜91福利影院| 另类亚洲欧美激情| 一本色道久久久久久精品综合| 国产日韩欧美视频二区| 久久人妻熟女aⅴ| 91老司机精品| 一区福利在线观看| 国产精品秋霞免费鲁丝片| 国产精品99久久99久久久不卡 | 成年人午夜在线观看视频| 老汉色av国产亚洲站长工具| 国产片内射在线| 久久精品国产a三级三级三级| 一级片免费观看大全| 在线观看免费高清a一片| 精品一品国产午夜福利视频| 国产成人91sexporn| 免费黄色在线免费观看| 在线看a的网站| 国精品久久久久久国模美| 秋霞伦理黄片| 99久久精品国产亚洲精品| 在线免费观看不下载黄p国产| 夫妻性生交免费视频一级片| 午夜免费鲁丝| 国产精品久久久人人做人人爽| 亚洲国产av影院在线观看| 少妇人妻精品综合一区二区| 满18在线观看网站| 欧美乱码精品一区二区三区| 欧美人与善性xxx| 国产精品人妻久久久影院| 老司机靠b影院| 男女免费视频国产| av国产久精品久网站免费入址| 亚洲视频免费观看视频| av网站在线播放免费| 亚洲精品国产av蜜桃| 麻豆av在线久日| 9191精品国产免费久久| 久久鲁丝午夜福利片| 日韩av免费高清视频| 男人舔女人的私密视频| 国产 一区精品| 亚洲精品日本国产第一区| 久久鲁丝午夜福利片| 国产精品 欧美亚洲| 亚洲av在线观看美女高潮| 欧美日韩成人在线一区二区| 国产精品一区二区精品视频观看| 久久人妻熟女aⅴ| 高清不卡的av网站| 80岁老熟妇乱子伦牲交| xxx大片免费视频| 在线观看www视频免费| 国产福利在线免费观看视频| 又黄又粗又硬又大视频| 午夜福利在线免费观看网站| 国产精品女同一区二区软件| 欧美黑人精品巨大| 成人国产av品久久久| 免费高清在线观看视频在线观看| 久久久久精品性色| 制服丝袜香蕉在线| 啦啦啦中文免费视频观看日本| 秋霞伦理黄片| 久久久久国产一级毛片高清牌| 久久久久久久大尺度免费视频| 亚洲欧美精品自产自拍| 一区二区三区乱码不卡18| 不卡视频在线观看欧美| 两个人看的免费小视频| 成人午夜精彩视频在线观看| 久久久久视频综合| 91成人精品电影| 精品国产乱码久久久久久小说| 亚洲精品第二区| 久久精品国产亚洲av高清一级| 男男h啪啪无遮挡| 欧美激情 高清一区二区三区| 又粗又硬又长又爽又黄的视频| 亚洲av成人不卡在线观看播放网 | 伊人亚洲综合成人网| 日韩欧美精品免费久久| 国产精品一区二区在线观看99| 亚洲情色 制服丝袜| 午夜福利视频在线观看免费| 色婷婷av一区二区三区视频| 自线自在国产av| 国产精品成人在线| 国产精品一二三区在线看| 高清黄色对白视频在线免费看| 亚洲婷婷狠狠爱综合网| 日本黄色日本黄色录像| 午夜免费鲁丝| 久久精品国产亚洲av涩爱| 多毛熟女@视频| 国产日韩欧美在线精品| 色婷婷av一区二区三区视频| 18禁动态无遮挡网站| 只有这里有精品99| 国产精品久久久久久精品电影小说| 精品国产一区二区三区久久久樱花| 高清不卡的av网站| 欧美人与善性xxx| 男女高潮啪啪啪动态图| 国产精品久久久人人做人人爽| 在线观看三级黄色| 天天影视国产精品| 中文字幕色久视频| 亚洲少妇的诱惑av| 一级毛片 在线播放| 天天躁夜夜躁狠狠躁躁| 久久久久精品久久久久真实原创| 在线亚洲精品国产二区图片欧美| 在线观看免费午夜福利视频| 午夜精品国产一区二区电影| 91国产中文字幕| 一二三四在线观看免费中文在| 久久精品国产亚洲av高清一级| 一级毛片我不卡| 日韩熟女老妇一区二区性免费视频| 综合色丁香网| 99国产精品免费福利视频| 成人影院久久| 18禁国产床啪视频网站| 9色porny在线观看| 成人午夜精彩视频在线观看| 国产精品欧美亚洲77777| 精品一区二区三卡| 日韩中文字幕视频在线看片| 日本欧美视频一区| 国产97色在线日韩免费| 男女午夜视频在线观看| 中国三级夫妇交换| 亚洲第一av免费看| 热re99久久精品国产66热6| 丝袜人妻中文字幕| 久久久精品区二区三区| 亚洲熟女精品中文字幕| 啦啦啦啦在线视频资源| 日本色播在线视频| 如何舔出高潮| 成人国产麻豆网| 久久久久久人人人人人| 欧美日韩一级在线毛片| 成年av动漫网址| 亚洲精品,欧美精品| 精品少妇一区二区三区视频日本电影 | av网站在线播放免费| 一级爰片在线观看| 美女扒开内裤让男人捅视频| 80岁老熟妇乱子伦牲交| 久久午夜综合久久蜜桃| 巨乳人妻的诱惑在线观看| 波多野结衣一区麻豆| 午夜激情av网站| 大陆偷拍与自拍| 精品少妇久久久久久888优播| 巨乳人妻的诱惑在线观看| 久久久久精品久久久久真实原创| 午夜激情av网站| 成人亚洲欧美一区二区av| 久久热在线av| 精品一品国产午夜福利视频| 欧美另类一区| 亚洲,欧美精品.| 两个人看的免费小视频| 捣出白浆h1v1| 午夜日韩欧美国产| 亚洲人成77777在线视频| 王馨瑶露胸无遮挡在线观看| 在线天堂最新版资源| 中文字幕精品免费在线观看视频| 最近最新中文字幕大全免费视频 | 精品视频人人做人人爽| 丰满乱子伦码专区| 亚洲,欧美精品.| 青青草视频在线视频观看| 男女床上黄色一级片免费看| 黄色毛片三级朝国网站| 精品国产一区二区三区久久久樱花| 欧美乱码精品一区二区三区| 大话2 男鬼变身卡| 一级a爱视频在线免费观看| 纵有疾风起免费观看全集完整版| 免费黄色在线免费观看| 国产精品一国产av| 午夜精品国产一区二区电影| 国产成人免费观看mmmm| 丁香六月天网| 午夜激情久久久久久久| 少妇被粗大的猛进出69影院| 久久综合国产亚洲精品| 伦理电影大哥的女人| 色播在线永久视频| 你懂的网址亚洲精品在线观看| av不卡在线播放| 亚洲七黄色美女视频| 国产片特级美女逼逼视频| 欧美精品一区二区大全| 侵犯人妻中文字幕一二三四区| 亚洲av国产av综合av卡| 999精品在线视频| 别揉我奶头~嗯~啊~动态视频 | 精品国产超薄肉色丝袜足j| 亚洲美女黄色视频免费看| 欧美日韩亚洲高清精品| 国产一区二区在线观看av| 国产亚洲精品第一综合不卡| 亚洲精品国产一区二区精华液| av视频免费观看在线观看| 国产一区二区 视频在线| 老汉色av国产亚洲站长工具| 国产免费一区二区三区四区乱码| 亚洲欧美一区二区三区黑人| 国产精品免费视频内射| 波多野结衣一区麻豆| 自线自在国产av| 色吧在线观看| 80岁老熟妇乱子伦牲交| 日本爱情动作片www.在线观看| 性高湖久久久久久久久免费观看| 亚洲自偷自拍图片 自拍| 欧美精品一区二区大全| 啦啦啦啦在线视频资源| 久久这里只有精品19| 天天躁狠狠躁夜夜躁狠狠躁| 午夜久久久在线观看| 国产精品国产av在线观看| 丰满迷人的少妇在线观看| 捣出白浆h1v1| 亚洲综合精品二区| 久久久久久久久久久久大奶| 婷婷色av中文字幕| 国产一区二区在线观看av| 美女扒开内裤让男人捅视频| 80岁老熟妇乱子伦牲交| xxxhd国产人妻xxx| 国产av精品麻豆| 五月天丁香电影| 又大又爽又粗| 男人舔女人的私密视频| 亚洲国产欧美在线一区| 18禁国产床啪视频网站| 在线观看免费高清a一片| 精品国产乱码久久久久久男人| a级毛片黄视频| 久久99精品国语久久久| 久久人人97超碰香蕉20202| 亚洲免费av在线视频| 国产淫语在线视频| 国产成人av激情在线播放| 午夜福利免费观看在线| a级毛片黄视频| 一区二区三区精品91| 中文字幕制服av| 国产精品亚洲av一区麻豆 | 黄片播放在线免费| 成人亚洲精品一区在线观看| 99久国产av精品国产电影| 婷婷色麻豆天堂久久| 18禁动态无遮挡网站| 成人国产av品久久久| 国产视频首页在线观看| 美女高潮到喷水免费观看| 最近手机中文字幕大全| 午夜日本视频在线| 伊人久久大香线蕉亚洲五| 久久久久视频综合| 欧美激情 高清一区二区三区| 丁香六月欧美| 久久精品国产亚洲av高清一级| 99热全是精品| 亚洲欧洲国产日韩| 久久婷婷青草| av在线播放精品| 欧美日韩亚洲综合一区二区三区_| 丝袜脚勾引网站| 制服诱惑二区| tube8黄色片| av天堂久久9| 午夜福利免费观看在线| 水蜜桃什么品种好| 欧美日韩福利视频一区二区| 国产xxxxx性猛交| 9色porny在线观看| 国产精品av久久久久免费| 一边摸一边抽搐一进一出视频| 两性夫妻黄色片| 精品人妻一区二区三区麻豆| 久久久久精品国产欧美久久久 | 老熟女久久久| svipshipincom国产片| 黄色视频不卡| 久久精品亚洲熟妇少妇任你| 日本av免费视频播放| 亚洲精品一区蜜桃| 伦理电影免费视频| 成人免费观看视频高清| 欧美日韩精品网址| 又大又黄又爽视频免费| 国产精品香港三级国产av潘金莲 | 国产精品久久久久久久久免| 国产一区亚洲一区在线观看| 亚洲成av片中文字幕在线观看| 一区二区三区乱码不卡18| 国产黄色免费在线视频| 精品亚洲乱码少妇综合久久| 国产亚洲最大av| 色94色欧美一区二区| 777久久人妻少妇嫩草av网站| 日本午夜av视频| 少妇精品久久久久久久| 综合色丁香网| 国产免费福利视频在线观看| 亚洲精品国产区一区二| 成年女人毛片免费观看观看9 | 肉色欧美久久久久久久蜜桃| 日韩中文字幕欧美一区二区 | 亚洲四区av| 日本av免费视频播放| 波多野结衣av一区二区av| 制服人妻中文乱码| 国产av码专区亚洲av| 亚洲三区欧美一区| 中国三级夫妇交换| 中文字幕人妻丝袜一区二区 | 性少妇av在线| 久久天堂一区二区三区四区| 日韩欧美精品免费久久| 国产精品偷伦视频观看了| 亚洲成人免费av在线播放| 成人漫画全彩无遮挡| 丝袜美腿诱惑在线| 一边摸一边做爽爽视频免费| 国产成人免费观看mmmm| 午夜福利,免费看| 高清欧美精品videossex| 两性夫妻黄色片| 国产精品久久久av美女十八| 久久青草综合色| 亚洲av日韩在线播放| 亚洲国产欧美日韩在线播放| 大片电影免费在线观看免费| 欧美激情极品国产一区二区三区| 水蜜桃什么品种好| 菩萨蛮人人尽说江南好唐韦庄| 国产午夜精品一二区理论片| 午夜日韩欧美国产| 欧美日韩成人在线一区二区| 欧美精品高潮呻吟av久久| 日本爱情动作片www.在线观看| 国产成人精品久久二区二区91 | 久久精品亚洲av国产电影网| 嫩草影视91久久| 国产人伦9x9x在线观看| 99国产综合亚洲精品| 一区二区三区激情视频| 国产精品人妻久久久影院| 成年人免费黄色播放视频| 欧美日韩精品网址| 日韩一卡2卡3卡4卡2021年| 亚洲,欧美精品.| 日本欧美国产在线视频| 在线观看免费午夜福利视频| 欧美变态另类bdsm刘玥| 日韩欧美精品免费久久| 国产精品成人在线| 欧美97在线视频| 国产免费视频播放在线视频| 久久久亚洲精品成人影院| 日日啪夜夜爽| 欧美日韩视频高清一区二区三区二| 制服丝袜香蕉在线| 男人舔女人的私密视频| 成人影院久久| 亚洲欧美精品自产自拍| 国产爽快片一区二区三区| 黑人猛操日本美女一级片| 精品国产露脸久久av麻豆| 美女视频免费永久观看网站| 国产亚洲午夜精品一区二区久久| 黑丝袜美女国产一区| 亚洲成人一二三区av| 日本猛色少妇xxxxx猛交久久| 免费高清在线观看日韩| 国产精品一二三区在线看| 啦啦啦在线观看免费高清www| videosex国产| 丰满饥渴人妻一区二区三| 精品午夜福利在线看| 久久久久久久久久久免费av| 天堂俺去俺来也www色官网| 成人三级做爰电影| 午夜福利在线免费观看网站| 中文乱码字字幕精品一区二区三区| 亚洲精品视频女| 国产欧美日韩一区二区三区在线| 可以免费在线观看a视频的电影网站 | 人成视频在线观看免费观看| 天堂俺去俺来也www色官网| 日韩精品有码人妻一区| av在线老鸭窝| 一级毛片电影观看| 国产在线视频一区二区| 女人爽到高潮嗷嗷叫在线视频| 欧美在线一区亚洲| 亚洲精品中文字幕在线视频| 少妇人妻久久综合中文| 久久精品aⅴ一区二区三区四区|