• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A privacy-preserved indexing schema in DaaS model for range queries

    2020-11-27 09:17:20HaoRenzhi郝任之LiJunWuGuangjun
    High Technology Letters 2020年4期

    Hao Renzhi (郝任之), Li Jun , Wu Guangjun

    (*College of Control Science and Engineering, Zhejiang University, Hangzhou 310058, P.R.China)(**School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, P.R.China)(***Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, P.R.China)

    Abstract

    Key words: database-as-a-service (DaaS) model, data privacy and security, data verification, range query

    0 Introduction

    The database as a service (DaaS) model was proposed by Hacigumus et al.[1], and NetDB2, SQLVM[2], PMEL[3]are effective DaaS models. In a DaaS model, a data owner stores encrypted data in a database server of the service provider, and the data user obtains query results from the service provider. In the DaaS model, data owner can access the data freely and can reduce the cost of deploying corresponding software and hardware of database service. Typically, a DaaS model includes 3 parts: (1) The data owner, which is the owner of data, publishes and shares data with data users; (2) The service provider provides service for the data owner and user; (3) The data user accesses and uses data stored in the service provider. Owing to the fact that a service provider cannot be trusted by a data owner, the data owner encrypts data before publishing data. Considering a relation TRADE (tno, cost, date) as an example, a data owner encrypts the original data items into encrypted data, builds index for each item, and publishes and stores them in the database of service provider. However, in current DaaS model, the published data suffers from the risk of privacy leaking to an attacker. In other words, the data owner and the data user do not trust the service provider. To support the following queries over encrypted data, the service provider usually stores the index along with the encrypted data, and an attacker might obtain data distribution and statistical information from the correspond indexing. For example, a tuple in TRADE (tno, cost, date) is recorded as (key1, 5779520.12, 2018/12/3) and it might be represented as (Index onkey1,kVpZCNJqcG8=,lcXxF+LEl9TogO7ADeI/e,JHKIN+iZwiA==). An attacker can obtain the distribution of encrypted data from the index on tno.

    A novel indexing schema is proposed for encrypted data stored in DaaS service provider. In this model, the data owner can use encryption technologies to store data at a service provider. Meanwhile, the model can avoid data privacy leaking and provide the capability of correctness verification to verify the following queries over the encrypted data. The main contributions of this paper are as follows:

    A novel DaaS model using privacy-preserved Hash-based indexing schema is proposed, which is computed by summarization of Hash value from an interval of data items. The schema can support range query and avoid the false fit by a proposed marked data items technique.

    A correctness verification method is described, which uses a verification matrix to check the answer of a range query. The verification matrix is computed by data items signature. The data users can check correctness of an answer for range query that is obtained via the proposed Hash-based indexing.

    An extensive evaluation using 2 data sets to demonstrate the functionality and effectiveness of the proposed approach is conducted. The experimental results show that the approach can protect the statistical information and data distribution using the proposed schema over encrypted data.

    1 The proposed approach

    1.1 Approach overview

    In this section, the overview of proposed approach for privacy-preserved data publishing and queries in a DaaS model is presented. In data owns’ perspective, data privacy of the data owner includes data statistical information, such as maximum data item, minimum data item, and data value distribution.

    This work proposes a privacy-preserved indexing schema for data owner and provides query correctness verification for data users. The core idea of the approach is shown in Fig.1. The method mainly includes 3 stages: (1) The data owners encrypt their data and build a Hash-based indexing. Then, the data owners publish the encrypted data and built index to the service provider; (2) The service provider accepts the published wrapped data, including the encrypted data and the indexing, and stores them in an open database; (3) The data user conducts a range query in the service provider over the encrypted data, obtains the queried result, and verifies the correctness of the answer.

    Fig.1 Overview of the approach in the DaaS model

    1.2 Hash-based indexing

    1.3 Publishing encrypted data and index

    1.4 Query in a DaaS model

    After representing the Hash-based indexing, the process of a range query can be described. The steps can be described as Fig.2. For a range queryQ(a,b), the range query condition is expressed as [a,b]. The query condition can be divided into 2 parts: (1) [a,a1) and (b1,b], which contains the boundary of the query; (2) [a1,b1], which covers the whole internals. To obtain the range query results, the data user firstly maps all the queried range into interval identifiers. For the range [a,a1), which is in one interval supposed as [c,d), the data user calculatesgthat satisfiesc+g×Φi≤aandc+(g+1)×Φi>ato locate the boundary by valuea, and the process of locating the query boundary can be described as Algorithm 1.

    Fig.2 Range query via Hash-based indexing

    Algorithm 1 Computing a range boundary for a range query Input: hash(a), marked item g, hash-based index in one interval, sum=0, boundary=0 While indexes! = NULL index = indexes.next hash = index - sum if index is of marked items if hash>g return boundary else if hash == hash(a) return index boundary = index sum = index return boundary

    1.5 Correctness verification

    To prevent data privacy leaked, the data owner encrypts the data before publishing it. In this section, the schema adopts a verification matrix to verify the query results. Along with each data item, the service provider stores a signature calculated by the data owner. The signature of a data item is determined by 2 adjacent data items as Fig.3.

    Fig.3 The signature chain

    The signature is calculated via the signature function presented as Eq.(1). In Eq.(1),SHash(d) is a Hash function, and it calculates the data item’s Hash value, andMaxP(a,b) calculates the maximum multiple ofbless thana, andbmust be a rounded number. In the Eq.(1),ε1,ε2are error parameters that equal to 1/p1, 1/p2, wherep1andp2are decided by the data owner.

    S(di)=MaxP(SHash(di),1/ε1)

    +MaxP(SHash(d(i-1)),1/ε2)

    (1)

    The schema defines the verification matrixes by the signatures. As described in Fig.3, a data itemdiand its signaturesican be verified through 3 ways: (1) The neighbor verification, which means verification by the relationship betweendi-1andsi; (2) The self-verification, which means verification by the relationship betweendiandsi; (3) The mutual verification, which means verification by the Eq.(1). For the 3 ways, the verifications can be presented as the following equation:

    (si-MaxP(SHash(d(i-1)), 1/ε2))mod(1/ε1)=0

    (2)

    (si-MaxP(SHash(d(i-1)), 1/ε1))mod(1/ε2)=0

    (3)

    si=(MaxP(SHash(di), 1/ε1))

    +MaxP(SHash(d(i-1)), 1/ε2))

    (4)

    The errors of verification Eq.(1) and Eq.(2) areε2, andε2, respectively, andε1·ε2for verification Eq.(3). The schema defines the verification matrixAu:

    The (sij∈{0, 1}) equals to 1 if the data item or the verification signature satisfies the Eqs(2), (3), and (4) respectively, otherwise,sijequals 0. Andβ1=1-ε1,β2=1-ε2,β3=1-ε1·ε2, and define the matrix operation ‘*’ appearing in Eq.(5).

    Ma=Mb*Mc, whereMaij=max(Mbik·Mbkj)

    (5)

    In the verification matrix of the data itemdi,au11indicates the confidence of correctness of the data itemdi,au12for the neighbor data itemdi+1,au21forsi, andau22fordi-1. Based on the verification matrixAu, the data user can verify that the data itemdiis correct with the confidenceau11, and the data user can confirm with the confidenceau21·(1-au22) that the data itemdi-1is lost and with the confidenceau11·(1-au12) that the data itemdi+1is lost. Furthermore, the verification method can be extended to a two-dimensional zone query.

    1.6 Experimental setup

    This work uses 2 types of data sets to evaluate the approach. One data set is the generated relational data TRADE(tno, cost, date), which has 10 000 data items, and the attributes cost is from 0 to 10 000 000 with precision 0.01 and attributes tno is an integer attribute. Another data set is a real data set, which comes from the Labor Statistic Public Database. This work conducted the experiment in a computer with Intel (R) Core (TM) i5-4210M CPU @2.60 GHz, 8 G RAM. The software environment is Ubuntu 17.10, JDBC, and JAVA 1.8, and the DBMS is the PostgreSQL 9.5. Based on the experimental environment, this work conducted the following experimental tests: (1) Data publishing evaluation; (2) Range queries via Hash-based indexing; and (3) Data correctness verification.

    1.7 Hash-based indexing schema evaluation

    Next, this work verifies the functionality of the privacy-preserved indexing on the simulated data set TRADE, whose attribution tno data items are randomly generated from a linear distribution as shown in Fig.4, and Fig.4 shows that the distribution of the index obtained by order-preserving Hash-based function (OPHF)[4]is similar to the data value. Fig.5 shows the original data value distribution and the Hash-based index obtained by the approach, and the Hash-based index of the approach can protect the privacy and statistical information of the data value.

    Fig.4 Original data distribution vs. index distribution in OPHF[4]

    Fig.5 Original data distribution vs. the Hash-based index

    The evaluations use public dataset from the Bureau of Labor Statistics to conduct the evaluation. Fig.6 and Fig.7 present the original data value and Hash-based index by the approach, and the figure demonstrates that the distribution of original data and the Hash-based index by the approach are uncorrelated. The attacker can’t defer the data information via the encrypted data or the Hash-based index accurately.

    Fig.6 Overview of the original data value vs. Hash-based

    Fig.7 Partial view of the original data value vs. Hash-based

    1.8 Correctness verification evaluation

    To test the efficiency of publishing the data items and conducting a range query, this work conducts the experiments on the simulated data set TRADE. Table 1 shows the efficiency of the publishing data items. The data set TRADE includes 100 000 items. This work inserts the data items one by one and calculates the average time for per item. When the number of intervalsNvaries, the time of the approach almost keeps the same as shown in Table 1. Table 1 demonstrates that the approach is more efficient than OPHF[4]whose parameter (xi-xi-1) is assigned 0.01. The evaluation demonstrates that the approach has better efficiency on data publishing and indexing. In the testing, the approach can achieve nearly 10 times and 35 times improvement on data encryption (decryption) and indexing respectively.

    Table 1 Time used for publishing and indexing data

    This work conducts the range query evaluations, in which a data user requests the range queries that cover 20%, 40%, 60%, and 80% of dataset TRADE. The process of a range query includes 4 parts as labeled in Fig.8. Step 1 is the process that the data user maps the interval identifiers and calculates the mark data items, Step 2 is the process that works in the service provider, Step 3 is the process that the data user filters the mark items, and Step 4 is the process that the data user encrypts and decrypts data items. Fig.9 is the process that the data user calculates the signature matrix and verifies the query results. In the DaaS model, the most computation is calculated by the service provider and the process that is executed by the data user uses less proportion time, which reflects the advantage of the DaaS model, and Fig.9 also demonstrates that the process of correctness verification costs reasonable time consumption in the approach.

    Fig.8 Time used for a range query

    Fig.9 Time used for correction verification

    2 Related work

    The database as a service (DaaS) was proposed by Hacigumus et al[1], and they have developed a DaaS instantiation called NetDB2. Some researches demonstrate privacy issue in the DaaS model[1,5,6], and many researches focus on the solution of the problem[7,8]. To keep data security, the data owner set up a reasonable access control mechanism, such as role-based access control (RABC)[9], attribute-based access control (ABAC)[10], discretionary access control (DAC), and mandatory access control (MAC)[11]. Many encryption algorithms, such as DES[12], 3DES, Blowfish[13], RC5[14], IDEA[15], RSA, and Elgamal[16]will be used in DaaS model.

    Order-preservingdataencryptionmethodsBy adopting an order-preserving encryption, the encrypted data would meetEncrypt(d1)

    IndexingmethodsThe bucket partitioning[23]is an effective approach to support the range query on encrypted data. The primary idea of bucket partitioning method is that the data owner divides data domainUintoNdiscrete buckets, and each bucket has an index value. However, the data user might get the false hit data. Order-preserving Hash-based function (OPHF)[4]can be adopted to support range query. This method has a risk of privacy leaking, such that data distribution of the data will be exposed by the Hash index.

    CorrectionverificationThe service providers wouldn’t be trusted absolutely, so it is important to verify the correctness of the query results[24,25]. On the verification of data correctness, the data owner and the data user share a matrix to verify query results[4]. However, the matrix can just show whether there are data items added or deleted. However, when a data item is corrupted, the matrix can’t show this situation. There are some researches using Merkle Hash tree[25]to verify query results.

    3 Conclusion

    The DaaS model makes it easy to share and manage data between different data users. To keep data privacy and security for data owners, the DaaS model needs an efficient and secured strategy to ensure data privacy in the process of data publishing, storage, and sharing between users. This work proposes a novel indexing schema to satisfy privacy-preserved data management requirements. The proposed approach includes 2 parts: the Hash-based indexing for encrypted data and correctness verification for range queries between the DaaS service provider and the data users. The evaluation results demonstrate that the proposed approach can hide statistical information of encrypted data distribution while can also obtain correct answers for range-queries. The future plan is to promote query efficiency over publishing data items.

    18禁美女被吸乳视频| 成人鲁丝片一二三区免费| 精品无人区乱码1区二区| а√天堂www在线а√下载| 亚洲狠狠婷婷综合久久图片| 国产精品日韩av在线免费观看| 99精品欧美一区二区三区四区| 久久精品国产清高在天天线| 国产一区二区在线观看日韩 | 狂野欧美白嫩少妇大欣赏| 亚洲精华国产精华精| 亚洲精品国产精品久久久不卡| 国产成年人精品一区二区| 国产精品香港三级国产av潘金莲| 国产三级在线视频| 日韩欧美 国产精品| 国产精品久久久久久久电影 | 婷婷亚洲欧美| 国产亚洲精品一区二区www| 一区二区三区国产精品乱码| 看免费av毛片| 脱女人内裤的视频| 国产综合懂色| 成人18禁在线播放| 亚洲男人的天堂狠狠| 成熟少妇高潮喷水视频| 国产亚洲欧美98| 无人区码免费观看不卡| 99在线视频只有这里精品首页| 性色avwww在线观看| 搡老妇女老女人老熟妇| 极品教师在线免费播放| 国产91精品成人一区二区三区| 欧美又色又爽又黄视频| 亚洲熟女毛片儿| 日本黄大片高清| 国产精品98久久久久久宅男小说| 亚洲av成人一区二区三| 国产精品一区二区免费欧美| 日韩欧美国产在线观看| 精品久久久久久成人av| 性欧美人与动物交配| 国产亚洲欧美98| 亚洲欧美激情综合另类| 国产成人精品久久二区二区91| 国产成人精品无人区| 偷拍熟女少妇极品色| 视频区欧美日本亚洲| 一二三四社区在线视频社区8| 免费电影在线观看免费观看| 18禁黄网站禁片免费观看直播| 美女大奶头视频| 成人国产一区最新在线观看| 婷婷精品国产亚洲av在线| 亚洲成人中文字幕在线播放| 欧美日韩黄片免| 日韩精品中文字幕看吧| 99国产精品一区二区三区| 久久精品亚洲精品国产色婷小说| 特级一级黄色大片| 韩国av一区二区三区四区| 人人妻人人看人人澡| 欧美最黄视频在线播放免费| 窝窝影院91人妻| 窝窝影院91人妻| 欧美高清成人免费视频www| 小蜜桃在线观看免费完整版高清| 高潮久久久久久久久久久不卡| 亚洲第一电影网av| 亚洲av电影不卡..在线观看| 久久久国产成人精品二区| 两人在一起打扑克的视频| 精品无人区乱码1区二区| 国产真实乱freesex| 在线观看免费午夜福利视频| 成人av在线播放网站| 99久久国产精品久久久| 中文字幕精品亚洲无线码一区| 亚洲成人久久爱视频| 欧美日韩一级在线毛片| 亚洲成人久久爱视频| 午夜激情欧美在线| 午夜激情福利司机影院| 精品无人区乱码1区二区| xxxwww97欧美| 性欧美人与动物交配| 久久久久国产一级毛片高清牌| 校园春色视频在线观看| 亚洲第一电影网av| 天堂影院成人在线观看| 精品久久久久久成人av| 在线播放国产精品三级| 久久伊人香网站| 欧美国产日韩亚洲一区| 色尼玛亚洲综合影院| 99热这里只有精品一区 | 99热精品在线国产| 精品国产乱子伦一区二区三区| 脱女人内裤的视频| 韩国av一区二区三区四区| 亚洲无线观看免费| 好看av亚洲va欧美ⅴa在| 天天一区二区日本电影三级| 国产乱人伦免费视频| av福利片在线观看| 国产午夜福利久久久久久| 老熟妇仑乱视频hdxx| 99国产极品粉嫩在线观看| 日韩欧美 国产精品| 久久精品人妻少妇| 97人妻精品一区二区三区麻豆| www日本黄色视频网| 无遮挡黄片免费观看| 国内揄拍国产精品人妻在线| 久久婷婷人人爽人人干人人爱| 99精品欧美一区二区三区四区| 欧美性猛交黑人性爽| 日韩欧美免费精品| 日本 欧美在线| 久久天躁狠狠躁夜夜2o2o| 亚洲精品久久国产高清桃花| 俺也久久电影网| 99精品久久久久人妻精品| 国产69精品久久久久777片 | 色在线成人网| 中文字幕人成人乱码亚洲影| 久久精品夜夜夜夜夜久久蜜豆| 亚洲av成人av| 亚洲性夜色夜夜综合| 色精品久久人妻99蜜桃| 99riav亚洲国产免费| 女警被强在线播放| 国产v大片淫在线免费观看| av片东京热男人的天堂| 在线播放国产精品三级| 动漫黄色视频在线观看| 亚洲熟女毛片儿| 久久久久久九九精品二区国产| 999久久久国产精品视频| 在线视频色国产色| 亚洲激情在线av| 国产精品九九99| а√天堂www在线а√下载| 免费观看的影片在线观看| 一级作爱视频免费观看| 三级毛片av免费| 欧美中文日本在线观看视频| 日本在线视频免费播放| 欧美最黄视频在线播放免费| 在线国产一区二区在线| 99国产精品一区二区三区| 亚洲中文字幕日韩| 精品电影一区二区在线| 亚洲自拍偷在线| 国产精品av视频在线免费观看| 午夜免费观看网址| 99国产综合亚洲精品| 国产一区二区三区在线臀色熟女| 免费大片18禁| 中国美女看黄片| 国产美女午夜福利| 狂野欧美激情性xxxx| 久久久久精品国产欧美久久久| 国产av麻豆久久久久久久| 黄色日韩在线| 12—13女人毛片做爰片一| 亚洲国产精品999在线| 久久久成人免费电影| 长腿黑丝高跟| 欧美黑人巨大hd| 日韩有码中文字幕| 久久久国产成人精品二区| 久久国产精品人妻蜜桃| 国产熟女xx| 国产精品1区2区在线观看.| 国产精品综合久久久久久久免费| 少妇丰满av| 国产精品爽爽va在线观看网站| 国产成人影院久久av| 非洲黑人性xxxx精品又粗又长| 国产人伦9x9x在线观看| 国产熟女xx| 12—13女人毛片做爰片一| 亚洲片人在线观看| 久久久久久久午夜电影| 亚洲精品中文字幕一二三四区| 成人av在线播放网站| 法律面前人人平等表现在哪些方面| 日韩欧美在线乱码| 成人特级黄色片久久久久久久| 亚洲成人精品中文字幕电影| 国产高清视频在线观看网站| 91久久精品国产一区二区成人 | 久久久水蜜桃国产精品网| 国产成人精品无人区| 国产探花在线观看一区二区| 欧美中文综合在线视频| 99热这里只有精品一区 | 99热这里只有是精品50| 国产成+人综合+亚洲专区| 黑人巨大精品欧美一区二区mp4| 亚洲欧美日韩无卡精品| 亚洲精品粉嫩美女一区| 中亚洲国语对白在线视频| 美女 人体艺术 gogo| 国产精品 欧美亚洲| 欧美色欧美亚洲另类二区| 亚洲精品乱码久久久v下载方式 | 最近在线观看免费完整版| 精品久久蜜臀av无| 亚洲中文日韩欧美视频| 久久国产精品影院| 亚洲乱码一区二区免费版| 香蕉av资源在线| 听说在线观看完整版免费高清| 国产淫片久久久久久久久 | h日本视频在线播放| 国内少妇人妻偷人精品xxx网站 | 成年免费大片在线观看| 日韩欧美在线二视频| 波多野结衣巨乳人妻| 小说图片视频综合网站| 国产又色又爽无遮挡免费看| 色综合站精品国产| 亚洲国产欧美一区二区综合| 国产69精品久久久久777片 | 天天躁狠狠躁夜夜躁狠狠躁| 欧美黑人欧美精品刺激| 国产精品久久久久久人妻精品电影| 亚洲人与动物交配视频| 高清在线国产一区| 欧美激情久久久久久爽电影| 欧美又色又爽又黄视频| 亚洲av成人av| 麻豆av在线久日| 日本撒尿小便嘘嘘汇集6| 91老司机精品| 国产黄片美女视频| 天天躁狠狠躁夜夜躁狠狠躁| 综合色av麻豆| 18禁裸乳无遮挡免费网站照片| 男人和女人高潮做爰伦理| 综合色av麻豆| 搞女人的毛片| 免费搜索国产男女视频| 高清在线国产一区| 日韩欧美国产一区二区入口| 嫩草影视91久久| 午夜a级毛片| 听说在线观看完整版免费高清| 成人性生交大片免费视频hd| 亚洲av成人精品一区久久| 麻豆成人av在线观看| 亚洲国产看品久久| 精品久久久久久久毛片微露脸| 桃红色精品国产亚洲av| 亚洲第一电影网av| 手机成人av网站| 欧美在线黄色| 一夜夜www| 性欧美人与动物交配| 91在线观看av| 97碰自拍视频| 欧美黑人欧美精品刺激| 青草久久国产| 亚洲在线观看片| 国产精品1区2区在线观看.| 久久国产乱子伦精品免费另类| 视频区欧美日本亚洲| 国产成人aa在线观看| 丰满人妻熟妇乱又伦精品不卡| 国产精品一区二区精品视频观看| 精华霜和精华液先用哪个| 久久中文字幕人妻熟女| 国产成人一区二区三区免费视频网站| 国产1区2区3区精品| 国产一级毛片七仙女欲春2| 一进一出好大好爽视频| 国模一区二区三区四区视频 | 大型黄色视频在线免费观看| 亚洲熟妇中文字幕五十中出| 亚洲精品中文字幕一二三四区| 18禁裸乳无遮挡免费网站照片| 伦理电影免费视频| 免费av不卡在线播放| 久久天堂一区二区三区四区| 老鸭窝网址在线观看| 熟女少妇亚洲综合色aaa.| 久久久久国产精品人妻aⅴ院| 啦啦啦免费观看视频1| 亚洲七黄色美女视频| 中出人妻视频一区二区| 亚洲国产精品合色在线| 国产精品香港三级国产av潘金莲| 制服丝袜大香蕉在线| 成年免费大片在线观看| 波多野结衣巨乳人妻| 国产男靠女视频免费网站| 99国产综合亚洲精品| 欧美中文日本在线观看视频| 一本综合久久免费| 国产伦精品一区二区三区视频9 | av天堂在线播放| 听说在线观看完整版免费高清| 又爽又黄无遮挡网站| 99国产精品一区二区三区| 欧美av亚洲av综合av国产av| 舔av片在线| 桃色一区二区三区在线观看| 搞女人的毛片| 国产不卡一卡二| 又大又爽又粗| 国产在线精品亚洲第一网站| 国产精品久久久久久久电影 | 深夜精品福利| 国产淫片久久久久久久久 | 久久精品国产亚洲av香蕉五月| 母亲3免费完整高清在线观看| 级片在线观看| 欧美日韩精品网址| 丰满人妻一区二区三区视频av | 亚洲精品粉嫩美女一区| 久久久色成人| 可以在线观看毛片的网站| 亚洲av成人不卡在线观看播放网| 久久久精品欧美日韩精品| 美女高潮的动态| 亚洲最大成人中文| 热99在线观看视频| 又大又爽又粗| 丁香六月欧美| 人人妻,人人澡人人爽秒播| av在线天堂中文字幕| 少妇的丰满在线观看| 成人高潮视频无遮挡免费网站| 亚洲美女视频黄频| 丝袜人妻中文字幕| 精品一区二区三区av网在线观看| 每晚都被弄得嗷嗷叫到高潮| 综合色av麻豆| 精品日产1卡2卡| 麻豆成人av在线观看| 天堂√8在线中文| 中文字幕精品亚洲无线码一区| 亚洲最大成人中文| 91麻豆精品激情在线观看国产| 麻豆成人午夜福利视频| 亚洲中文日韩欧美视频| 日韩欧美精品v在线| 中亚洲国语对白在线视频| 午夜精品一区二区三区免费看| 国产精品久久久久久亚洲av鲁大| 搡老妇女老女人老熟妇| 亚洲欧洲精品一区二区精品久久久| 国产乱人视频| 亚洲欧美一区二区三区黑人| 在线播放国产精品三级| 黄色 视频免费看| 久久中文字幕一级| 国产激情久久老熟女| 精品一区二区三区视频在线观看免费| АⅤ资源中文在线天堂| 最新在线观看一区二区三区| 日韩国内少妇激情av| 草草在线视频免费看| 亚洲人成电影免费在线| 免费在线观看视频国产中文字幕亚洲| 婷婷六月久久综合丁香| 欧美日韩一级在线毛片| 欧美绝顶高潮抽搐喷水| 一a级毛片在线观看| 真人一进一出gif抽搐免费| 搡老熟女国产l中国老女人| 婷婷六月久久综合丁香| 成人av在线播放网站| 国产精品乱码一区二三区的特点| 久久久成人免费电影| 在线观看日韩欧美| 欧美绝顶高潮抽搐喷水| 丰满人妻一区二区三区视频av | 精品国产乱码久久久久久男人| 99久久成人亚洲精品观看| 久久久久久九九精品二区国产| 日本a在线网址| 淫妇啪啪啪对白视频| 日韩成人在线观看一区二区三区| 十八禁人妻一区二区| 看黄色毛片网站| 在线观看一区二区三区| 久久午夜亚洲精品久久| 老司机深夜福利视频在线观看| avwww免费| 后天国语完整版免费观看| 欧美乱色亚洲激情| 午夜免费观看网址| 国产视频内射| 国产亚洲av高清不卡| 极品教师在线免费播放| 中文字幕最新亚洲高清| 黄色 视频免费看| 久久久久久久精品吃奶| 脱女人内裤的视频| 国产一区二区在线观看日韩 | a级毛片a级免费在线| 色av中文字幕| 女同久久另类99精品国产91| 免费大片18禁| 亚洲在线观看片| 亚洲美女黄片视频| 国产精华一区二区三区| 亚洲av中文字字幕乱码综合| 九九久久精品国产亚洲av麻豆 | 国产精品国产高清国产av| 亚洲乱码一区二区免费版| 99国产精品一区二区蜜桃av| 一级毛片精品| 男女下面进入的视频免费午夜| 别揉我奶头~嗯~啊~动态视频| 久久久久国产精品人妻aⅴ院| 麻豆国产97在线/欧美| 精品久久久久久成人av| ponron亚洲| 亚洲精华国产精华精| 在线观看舔阴道视频| 亚洲,欧美精品.| 欧美成人免费av一区二区三区| 国产爱豆传媒在线观看| 麻豆av在线久日| 一本综合久久免费| 免费高清视频大片| 99久久综合精品五月天人人| ponron亚洲| 99riav亚洲国产免费| 无限看片的www在线观看| 亚洲av成人av| 欧美极品一区二区三区四区| 999久久久国产精品视频| 嫩草影院入口| 久久久久久久久中文| 亚洲国产精品999在线| 亚洲五月婷婷丁香| av福利片在线观看| 欧美日本亚洲视频在线播放| 老鸭窝网址在线观看| 99精品在免费线老司机午夜| 国产精品久久久久久亚洲av鲁大| 色综合站精品国产| 国产精品久久电影中文字幕| 熟女电影av网| 五月玫瑰六月丁香| 国内精品久久久久久久电影| 一区二区三区激情视频| 51午夜福利影视在线观看| 怎么达到女性高潮| 色综合亚洲欧美另类图片| 老司机午夜福利在线观看视频| 亚洲电影在线观看av| 日本a在线网址| 丁香六月欧美| 国产91精品成人一区二区三区| 两人在一起打扑克的视频| 亚洲中文字幕一区二区三区有码在线看 | 国产又色又爽无遮挡免费看| 国产亚洲精品久久久com| 757午夜福利合集在线观看| 一个人免费在线观看的高清视频| 久久人妻av系列| 亚洲成人中文字幕在线播放| 亚洲国产色片| 免费无遮挡裸体视频| 中文字幕熟女人妻在线| 淫妇啪啪啪对白视频| www日本黄色视频网| 非洲黑人性xxxx精品又粗又长| 午夜两性在线视频| 国内毛片毛片毛片毛片毛片| 一级毛片女人18水好多| 国产精品一及| 91麻豆av在线| 大型黄色视频在线免费观看| 又大又爽又粗| 国产精品一区二区三区四区免费观看 | 精品久久久久久久久久久久久| 神马国产精品三级电影在线观看| 亚洲色图 男人天堂 中文字幕| 国产精品1区2区在线观看.| 91在线精品国自产拍蜜月 | 国内久久婷婷六月综合欲色啪| 欧美3d第一页| 麻豆一二三区av精品| 国产三级黄色录像| 啦啦啦观看免费观看视频高清| 亚洲,欧美精品.| 天堂av国产一区二区熟女人妻| 1024香蕉在线观看| 精品久久久久久久久久免费视频| 在线免费观看的www视频| 日日夜夜操网爽| 国产精品自产拍在线观看55亚洲| 一本综合久久免费| 成人无遮挡网站| 麻豆久久精品国产亚洲av| 日韩有码中文字幕| 无遮挡黄片免费观看| 欧美国产日韩亚洲一区| 88av欧美| 久久久久免费精品人妻一区二区| 色精品久久人妻99蜜桃| 老熟妇仑乱视频hdxx| e午夜精品久久久久久久| 久久这里只有精品中国| 真实男女啪啪啪动态图| 亚洲狠狠婷婷综合久久图片| 婷婷亚洲欧美| 99在线视频只有这里精品首页| 午夜影院日韩av| 国产av一区在线观看免费| 19禁男女啪啪无遮挡网站| 免费在线观看视频国产中文字幕亚洲| 性色avwww在线观看| 麻豆久久精品国产亚洲av| 老司机午夜福利在线观看视频| 香蕉av资源在线| 成人精品一区二区免费| 免费人成视频x8x8入口观看| 成人av一区二区三区在线看| 久久久久国产一级毛片高清牌| 美女黄网站色视频| 又黄又粗又硬又大视频| 黄片大片在线免费观看| 国产av在哪里看| 国产精品永久免费网站| 色综合站精品国产| 老司机在亚洲福利影院| 亚洲人成电影免费在线| 男人舔女人下体高潮全视频| 啦啦啦观看免费观看视频高清| 亚洲精品中文字幕一二三四区| 久久精品91蜜桃| 99久久精品国产亚洲精品| 日韩欧美一区二区三区在线观看| 可以在线观看毛片的网站| 狠狠狠狠99中文字幕| 亚洲中文字幕一区二区三区有码在线看 | 成人18禁在线播放| 亚洲国产欧美人成| 成年版毛片免费区| 日韩有码中文字幕| 国产免费av片在线观看野外av| 免费一级毛片在线播放高清视频| 久久亚洲真实| 国产乱人视频| 日韩欧美在线二视频| 女生性感内裤真人,穿戴方法视频| 又黄又爽又免费观看的视频| 国产淫片久久久久久久久 | 亚洲国产精品合色在线| 麻豆国产av国片精品| 精华霜和精华液先用哪个| 夜夜躁狠狠躁天天躁| 男女之事视频高清在线观看| 身体一侧抽搐| 欧美成人免费av一区二区三区| 亚洲av成人av| 又黄又爽又免费观看的视频| bbb黄色大片| 久久婷婷人人爽人人干人人爱| 少妇的逼水好多| 中亚洲国语对白在线视频| 免费av不卡在线播放| 国模一区二区三区四区视频 | 18禁国产床啪视频网站| 最近最新免费中文字幕在线| 久久久久国产精品人妻aⅴ院| 制服丝袜大香蕉在线| 99国产精品一区二区三区| 亚洲七黄色美女视频| 国产精品99久久久久久久久| a级毛片a级免费在线| 人妻丰满熟妇av一区二区三区| 99热只有精品国产| 法律面前人人平等表现在哪些方面| 亚洲自拍偷在线| 国产97色在线日韩免费| 人人妻,人人澡人人爽秒播| 一级作爱视频免费观看| 99久久久亚洲精品蜜臀av| 麻豆成人午夜福利视频| 亚洲成人久久性| 在线观看免费午夜福利视频| 国产亚洲av高清不卡| 夜夜爽天天搞| 在线观看66精品国产| 日韩高清综合在线| 免费无遮挡裸体视频| 亚洲国产欧美一区二区综合| 国产精品一区二区精品视频观看| 日本 欧美在线| 亚洲午夜精品一区,二区,三区| 亚洲av熟女| 欧美不卡视频在线免费观看| 国产成人精品久久二区二区91| 女同久久另类99精品国产91| 香蕉国产在线看| 亚洲精品在线美女| 操出白浆在线播放| 人人妻人人澡欧美一区二区| 亚洲av成人精品一区久久| 两个人视频免费观看高清| 日韩免费av在线播放| 国产高清videossex| а√天堂www在线а√下载| 国产爱豆传媒在线观看| 最近最新中文字幕大全电影3| 男女之事视频高清在线观看|