• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain

    2021-12-14 03:49:42LejunZhangMinghuiPengWeizhengWangYansenSuShunaCuiandSeokhoonKim
    Computers Materials&Continua 2021年1期

    Lejun Zhang,Minghui Peng,Weizheng Wang,Yansen Su,Shuna Cui and Seokhoon Kim

    1College of Information Engineering,Yangzhou University,Yangzhou,225127,China

    2School Math &Computer Science,Quanzhou Normal University,Quanzhou,362000,China

    3Division of Computer Science,University of Aizu,Aizu–Wakamatsu,9658580,Japan

    4Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education,School of Computer Science and Technology,Anhui University,Hefei,230601,China

    5Medical College of Yangzhou University,Yangzhou,225001,China

    6Department of Gynecology and Obstetrics,Affiliated Hospital of Yangzhou University,Yangzhou,China

    7Department of Computer Software Engineering,Soonchunhyang University,Asan,Korea

    Abstract:In the digital era,electronic medical record(EMR)has been a major way for hospitals to store patients’medical data.The traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic balance between privacy protection and data sharing.The storage capacity of blockchain is limited and single blockchain schemes have poor scalability and low throughput.To address these issues,we propose a secure and efficient medical data storage and sharing scheme based on double blockchain.In our scheme,we encrypt the original EMR and store it in the cloud.The storage blockchain stores the index of the complete EMR,and the shared blockchain stores the index of the shared part of the EMR.Users with different attributes can make requests to different blockchains to share different parts according to their own permissions.Through experiments,it was found that cloud storage combined with blockchain not only solved the problem of limited storage capacity of blockchain,but also greatly reduced the risk of leakage of the original EMR.Content Extraction Signature(CES)combined with the double blockchain technology realized the separation of the privacy part and the shared part of the original EMR.The symmetric encryption technology combined with Ciphertext-Policy Attribute-Based Encryption(CP–ABE)not only ensures the safe storage of data in the cloud,but also achieves the consistency and convenience of data update,avoiding redundant backup of data.Safety analysis and performance analysis verified the feasibility and effectiveness of our scheme.

    Keywords:Cloud storage;blockchain;electronic medical records;access control;data sharing;privacy

    1 Introduction

    With the rapid development of information technology,medical data has become the key to discovering and treating diseases[1].More and more data is transferred from paper to electronic equipment because of the digitization of electronic storage[2,3].EMR has been a major way for hospitals to store patients’medical data.The emergence of EMR has brought great opportunities to the development of wise medical practice[4].Because the value inherent in EMR has given birth to business entities[5,6],EMR sharing is considered to be a promising approach[7,8].However,there are few critical problems in this environment.1)It is difficult for patients to obtain the data stored in the hospital[9].2)The conventional solutions are still vulnerable to information loss[10].3)Different medical institutions are loath to share their data[11].To address these issues and meet the high demands on data sharing[12],some researchers proposed to use a third–party cloud instead of a private database for data sharing[13,14],and some cryptographic schemes have been proposed to solve these issues,though the disadvantages still exist[15,16].For the storage and sharing of EMR,there are still some challenges,such as interoperability[17],data security,and privacy[18,19].For the hospital,the sheer volume of data stored with third parties is not reassuring[20].The consistency and interoperability of the different types of data from different medical institutions are big problems for data sharing[21].The emergence of blockchain ensure security and transparency[22].In recent years,the distributed healthcare blockchain system[23]has emerged[24,25].

    Although the emergence of blockchain provides the possibility to solve these issues,the storage capacity of blockchain is limited and single blockchain schemes have poor scalability and low throughput.To address these issues,we propose an EMR storage and sharing scheme based on double blockchain.The main contributions of this paper are summarized as follows:

    1.CES combined with the double blockchain technology realizes the separation of the privacy part and the shared part of the original EMR.

    2.Cloud storage combined with the double blockchain technology not only solves the problem of the limited storage capacity of the blockchain and reduces the risk of medical data leakage,but also improves throughput and enhances scalability.

    3.The symmetric encryption technology combined with the CP–ABE technology not only ensures the storage security of data in the cloud,but also achieves the consistency and convenience of data update.

    The rest of the article is organized as follows:in Section 2,we review the related work about the storage and sharing of EMR,and then discuss their limitations.The related technologies of this paper will be described in Section 3.Next in Section 4,the system model of this paper will be described.In Section 5,the process of EMR storage,sharing and management in this scheme will be described in detail.In Section 6,we will conduct security analysis and performance analysis on our scheme.Finally,Section 7 concludes the paper and illustrates future expansion.

    2 Related Work

    In this section,we outline the research status of cloud services and blockchain technology to achieve secure storage and efficient sharing of EMR.

    Zhang et al.[26]propose a secure medical record storage and sharing scheme based on double blockchain.In this article,patients encrypt their EMR with private keys and store them in a third-party cloud server.In fact,there is no reliable third party in the real world.The system designed by Xi et al.[27]is based on a permissioned blockchain which allows access to invited users and verified users.The strict access control reduces the efficiency of EMR sharing.The above two schemes both have the same problem in the sharing process of EMR.When a third party needs to view part of the EMR,the compete EMR must be transmitted.It is easy to leak the privacy of the patient and cause waste of resources.To solve this problem and improve efficiency,scientific researchers have proposed CES.Liu et al.proposed a blockchain—based privacy—preserving data sharing scheme[28].This scheme uses CES to achieve the separation of the private part and shared part of EMR.After patients remove the private part of the EMR,each shared part is encrypted and uploaded to the cloud,and the indexes are stored in the blockchain.Because the cloud only stores the shared part,the patient cannot retrieve the complete EMR.

    The traditional centralized medical system and semi-trusted cloud storage are difficult to achieve a dynamic balance between privacy protection and data sharing.The storage capacity of blockchain is limited and single blockchain schemes have poor scalability and low throughput.To address these issues,we propose a secure and efficient medical data storage and sharing scheme based on double blockchain.In our scheme,we encrypt the original EMR and store it in the cloud.The storage blockchain stores the index of the complete EMR,and the shared blockchain stores the index of the shared part of the EMR.Users with different attributes can make requests to different blockchains to share different parts of the EMR according to their own permissions.

    3 Preliminaries

    3.1 Blockchain

    Blockchain technology is the basic technology of Bitcoin[29]invented by the mysterious Satoshi Nakamoto in 2008.The block header contains information such as version number,previous block hash,nonce,Merkle root,timestamp and target difficulty.The blockchain operates in a peer-to-peer manner.After all transactions are broadcast in the blockchain network,all transactions will be allocated to each network maintenance node in the blockchain for verification.Only when 51% of the participating nodes in the blockchain network reach a consensus can the block be validated and added to the blockchain.All legal transactions are stored in data blocks.The basic structure of the blockchain is shown in Fig.1.

    Figure 1:Blockchain basic structure

    3.2 Smart Contract

    The concept of smart contract was first proposed in 2014.Although the idea of smart contracts was proposed long ago,it has never been able to be implemented.It was not until the emergence of blockchain technology that it provided a supportable platform for smart contracts.Smart contracts are modular,reusable,and automatically executed scripts that run on the blockchain.Once the preset conditions are met,the smart contract can be performed automatically without a third party,and the results are written into the blockchain.Through using smart contracts,we can achieve trusted transactions,and these transactions are traceable and irreversible.For users who violate smart contracts,the smart contract setter has the right to revoke the user’s authority.

    3.3 Content Extraction Signature

    When a third party needs to view part of the EMR,the compete EMR must be transmitted.But it is easy to leak patients’ privacy and cause waste of resources.Therefore,there is a need for a digital signature scheme based on fine-grained level which must ensure that users can sign at any granular level and the signer can control the extraction method of the signed content.CES can meet the above requirements,and this method is more efficient in terms of computation and communication.CES allows users to remove private data according to their wishes and extract the shared data[30].It has been widely used in many fields.

    3.4 Ciphertext Policy Attribute Based Encryption

    The concept of attribute-based encryption not only realizes one-to-many communication means,but also enhances the information confidentiality.The attribute encryption mechanism is divided into Key Policy Attribute Based Encryption(KP–ABE)and CP–ABE.The specific process is described as follows:Firstly,the authority sets public parameters and master key.Secondly,the data owner can define his own access control policy.The ciphertext adopts a tree structure to describe the access policy.Thirdly,the data owner encrypts the message to form a ciphertext.Fourthly,after users submit their attributes to the certification authority,they will obtain their own public key and private key.Finally,only when their attributes satisfied the access policy,the user can decrypt the ciphertext.

    4 EMR Storage and Sharing Model Based on Double Blockchain

    4.1 Notations

    Notations and corresponding descriptions are given in Tab.1.

    Table 1:Notations

    Table 1(continued).NotationsDescription KpatiP’s symmetric encryption key Mshare/Mprivate/Mfull/extShared part/privacy part/complete EMR/extraction part δi /δfull //δextSignature of sub-message/full signature/extract signature AUU’s attribute set SKAU/SKAU g/SKAU pU//Ug/Up’s attribute private key AC-CPThe access policy Indexshare/IndexfullMshare’s index/Mfull’s index CfullCiphertext stored in the cloud urlfullCfull’s storage address PKSystem public parameters MKSystem master key CEASContent extraction access structure H A hash function T A timestamp Tagshare/TagfullMshare’s tag/Mfull’s tag AC-CPshare /AC-CPprivateMshare’s AC-CP/Mprivate’s AC-CP

    4.2 System Model

    As shown in Fig.2,our model is divided into three layers.The role of these three layers is introduced as follows.

    Data Acquirement Layer.In the data acquirement layer,DgeneratesMfulland δfull.Pcan extract the sub-messages fromMfull.AfterPuploads corresponding information to the cloud,the cloud will returnurlfull.Pcan generateIndexshareandIndexfullaccording tourlfull.

    Data Storage Layer.The main function of this layer is to storeIndexfull,IndexshareandCfull.We use the storage blockchain to storeIndexfulland use the shared blockchain to storeIndexshare.The cloud stores the ciphertext of sub-message,the corresponding symmetric key ciphertext,and the signature of the submessage.

    Data Sharing Layer.We achieve the data sharing ofMfullandMshare.Upcan obtainMfullafter making a request to the storage blockchain.Ugcan send requests to the sharing blockchain to achieve sharingMshare.

    5 EMR Storage and Sharing Scheme Based on Double Blockchain

    5.1 EMR Storage Based on Double Blockchain

    5.1.1 EMR Storage Based on Double Blockchain

    Figure 2:System overall framework

    5.1.2 Extraction of Sub-Messages

    5.1.3 Encryption of Sub-Messages

    Figure 3: Ki’s tree structure access control policy,i ∈ 1,8,9{}

    AfterPuploads the ciphertext to the cloud,Pwill receive the storage addressurlfull.The ciphertext stored in the cloud is shown in Eq.(5).

    5.1.4 Index Generation

    In this section,Pgenerates indexes ofMshareandMfullrespectively according tourlfull.The two index generation methods are introduced as follows.

    Figure 4: Ki’s tree structure access control policy,i ∈{2,3,4,5,6,7}

    5.1.5 Index Release

    5.2 EMR Sharing Based on Double Blockchain

    5.2.1 Double Blockchain Access Authentication

    In order to achieve the sharing of EMR,first of all,patients first need to make a request to the blockchain to obtain the cloud data storage address.The steps to obtain the cloud data storage address are the same for both sharingMshareand sharingMfull.Uinitiates an EMR request transactionReqUto the blockchain network.The requestReqUis shown in Eq.(14).Once the preset conditions are met,the smart contract can be performed automatically without a third party,and the results are written into the blockchain.Through using smart contracts,we can achieve trusted transactions,and these transactions are traceable and irreversible.For users who violate smart contracts,the smart contract setter has the right to revoke the user’s authority.

    5.2.2 Ciphertext Acquisition

    In this section,Pwill obtain the ciphertext stored in the cloud according to the obtained index.The detailed process is described as follows.

    Ugfirst send a request to the sharing blockchain.If the request meets the access control preset by the smart contract,the smart contract will be automatically induced to useSKpatto decryptIndexshare,thenUgcan obtainurlfull,Tagshareand δIndexshare.AfterUgsubmits these data to the cloud server,the cloud server will verify the correctness of the signature,if the signature is correct,the cloud server will send the ciphertextCmi,the corresponding symmetric encryption key ciphertextCKiand the corresponding signature δitoUg,where i ∈ {2,3,4,5,6,7}.

    The process ofUprequesting to shareMfullis similar toUgrequesting to shareMshare.

    5.2.3 Ciphertext Decryption and Verification

    In order to decrypt and verify the obtained ciphertext,Ufirst submitAUto the authorized institution.After the authorized institution verifies the accuracy of the attribute ofU,the authorized institution will generateSKAU,then the authorized institution sendsSKAUandPKtoU.Therefore,the public key ofUisPKand the private key isSKAU.Because different data users have different permissions,the decryption of ciphertext is divided into two parts:Mshareciphertext decryption andMfullciphertext decryption.The following two detailed decryption processes are introduced as follows.

    (1)Mshareciphertext decryption

    AfterUgobtain the shared part ciphertextCmi,the corresponding symmetric encryption key ciphertextCKiand the corresponding signature {δ2,δ3,δ4,δ5,δ6,δ7},where i ∈ {2,3,4,5,6,7}.Ugwill first decrypt the symmetric encryption key ciphertext,decryption process is shown in Eq.(15).ThenUguse the obtained symmetric encryption key to decryptMshareciphertext,decryption process is shown in Eq.(16).Therefore,Ughave realized the sharing ofMshare.

    (2)Mfullciphertext decryption.

    AfterUpobtain the shared part ciphertextCmi,the corresponding symmetric encryption key ciphertextCKiand the corresponding signature δi,wherei∈1,9[ ].Upwill first decrypt the symmetric encryption key ciphertext,decryption process is shown in Eq.(17),thenUpuse the obtained symmetric encryption key to decryptMfullciphertext,decryption process is shown in Eq.(18).Therefore,Uphave realized the sharing ofMfull.

    5.3 EMR Management Based on Double Blockchain

    5.3.1 Definition of Sub-Message

    5.3.2 Definition of User Rights

    Figure 5: Ki’s tree structure access control policy,i ∈ 1,8,9{}

    Figure 6: Ki’s tree structure access control policy,i ∈ {2,3,4,5,6,7}

    6 Performance Analysis

    6.1 Security Analysis

    Security is a key issue in EMR sharing.Here,we analyze the security of our scheme from the following four aspects.

    1.Anti-tampering:Our scheme encrypts the original EMR and stores it in the cloud,Indexfullis stored in the storage blockchain.Indexshareis stored in the shared blockchain.Therefore,the tamper-proof feature of the blockchain ensures that the original EMR stored in our cloud are immutable and cannot be modified arbitrarily.

    2.Privacy protection:In our scheme,the semi-trusted cloud cannot obtain the plaintext of EMR.Compared with setting strict access control,Pcan separate the private part and shared part of the EMR according to their own wishes in our scheme,the double blockchain technology also realizes the separation of the private data and shared data.Our scheme achieves true privacy protection.

    3.Data consistency:In order to realize that users with different attributes can access different parts,the cloud needs to store a complete EMR and a shared part in traditional schemes.While in our scheme,we use CP–ABE technology to encryptMshareandMprivateseparately so that the cloud only needs to store an original EMR,ensuring the consistency of data update and avoiding redundant backup of data.

    4.Data integrity:From the generation of the complete EMR,to the extraction of the privacy and shared parts,and then to storage and sharing.Throughout these processes,our scheme ensures the integrity and accuracy of EMR.

    6.2 Efficiency Analysis

    6.2.1 Cloud Storage Efficiency Analysis

    We compare the amount of data that the three schemes of traditional scheme,BPDS and our scheme need to store in the cloud,as shown in Tab.2.

    Table 2:Ciphertext storage

    From Tab.2 we can see the comparison of the amount of data that the traditional scheme and our scheme.The cloud needs to storeCMfull,CMshare,δMfulland δMsharein the traditional scheme.Our scheme only needs to storeCmi,CKiand δi,wherei∈1,9[ ],there is no need to back upMshare.Although our scheme stores symmetric encryption ciphertext and signature of the key,the amount of these data is very small compared toMshare.Our scheme not only ensures the safe storage of data in the cloud,but also achieves the consistency and convenience of data update,avoiding redundant backup of data.

    From Tab.2 we can see the comparison of the amount of data between BPDS scheme and our scheme.BPDS scheme only needs to storeCmi,δiin the cloud,wherei∈2,7[ ],while our scheme needs to storedCmi,CKi,δiin the cloud,wherei∈1,9[ ].Although our scheme stores more data,our scheme does not cause redundant backup of data.Compared with BPDS scheme,our scheme can realize thatUpcan accessMfullandUgcan accessMshare.

    It is assumed that the number of sub-messages in each complete EMR isz,the number of sub-messages in the shared part isxand the number of sub-messages in the privacy part isy.z=x+y.In the BPDS scheme,whenPupload an EMR to the cloud,they need to upload the sub-messages of the shared part separately.But in our scheme,Ponly need to upload the EMR once.

    The above results show that the amount of data that our scheme needs to store in the cloud is between the traditional scheme and BPDS scheme.Compared with the traditional scheme,our scheme saves storage space in cloud storage.Compared with BPDS scheme,our scheme saves the time of uploading EMR and the time of index generation,our scheme also provides better server quality.

    6.2.2 Blockchain Storage Efficiency Analysis

    WhenPneed to store and share his own EMR,Pneed to store thesexindexes into the blockchain in BPDS scheme.But in our scheme,Ponly need to store the index of the complete EMR in the storage blockchain,and store the index of the shared part in the shared blockchain.The storage capacity of the blockchain is limited,our scheme better realizes the storage of the indexes and reduces the burden of blockchain storage.

    6.2.3 Blockchain Sharing Efficiency Analysis

    In BPDS scheme,all users request to share the shared part of the EMR on a blockchain.Because each sub-message of the shared part is separate,xrequest needs to be issued for the sharing of an EMR.But in our scheme,we adopt a tamper-proof double blockchain structure to distinguish users,at the same time,users only need to issue one request on a blockchain.Compared with BPDS scheme,our efficiency has improved a lot.The experimental results are shown in Figs.7 and 8.

    Figure 7:Response time of user requests when number of users and shared sub-messages is different

    Figure 8:Average response time of user requests when number of users is different

    As can be seen from Fig.7,when the number of users in the system is fixed,as the number of submessages increases,the response time for processing user requests continues to increase in BPDS scheme.The reason is that each sub-message in BPDS scheme is separated.However,in our scheme,our cloud stores a complete EMR,so the response time for processing user requests is not affected by the number of sharing sub-messages.

    As can be seen from Fig.8,when the number of users does not exceed the carrying capacity of the system,our scheme and BPDS scheme can still quickly process user requests,but as the number of users increases,the double blockchain structure has more and more obvious advantages compared with the traditional single blockchain,in the meanwhile,the double blockchain structure allows users with different attributes to request sharing on different blockchains.

    6.2.4 Analysis of EMR Update Efficiency

    (1)Definition of sub-message:WhenPneed to redefine whether the sub-message of the EMR belongs to private data or shared data in BPDS scheme,Pcannot reset the privacy and shared parts of EMR.But in our scheme,after extracting all the sub-messages of the EMR,Ponly need to re-encrypt the symmetric encryption key corresponding to the sub-message,and replace the original symmetric encryption key ciphertext.

    (2)Definition of user rights:EMR that has been uploaded to the cloud should exist as a kind of historical data.WhenPneed to redefine user rights,Pneed to re-encrypt the EMR and upload them to the cloud in BPDS scheme.The replacement of the original EMR will often lead to inconsistencies in the data.But in our scheme,re-encrypting symmetric encryption keys can realize the redefinition of user rights without changing and replacing the original EMR,our scheme ensures data update consistency and convenience.

    7 Conclusion

    The traditional centralized medical system and semi-trusted cloud storage are difficult to achieve a dynamic balance between privacy protection and data sharing.The traditional EMR storage and sharing scheme based on a single blockchain has poor scalability and low throughput.Our paper proposes an EMR storage and sharing scheme based on double blockchain.The original EMR is encrypted and stored in a semi-trusted cloud.We use a tamper-proof double blockchain structure to store the index of the complete EMR and the index of the shared part.Double blockchain structure allows users with different attributes to request sharing on different blockchains.CES combined with CP–ABE allowsPto share EMR according to their wishes.Through experimental analysis,compared with the traditional scheme and BPDS scheme.our scheme not only saves the cloud storage space,but also ensures the consistency of storage.In our scheme,Pcan achieve complete privacy protection when sharing data.

    Acknowledgement:The authors would like to thank the reviewers for their detailed reviews and constructive comments,which have helped improve the quality of this paper.

    Funding Statement:This work is sponsored by the Natural Science Foundation of Heilongjiang Province of China under Grant No.LC2016024.Natural Science Foundation of the Jiangsu Higher Education Institutions Grant No.17KJB520044 and Six Talent Peaks Project in Jiangsu Province No.XYDXX–108.

    Conflicts of Interest:The authors declare that they have no con icts of interest to report regarding the present study.

    最新美女视频免费是黄的| 亚洲av电影在线进入| 亚洲国产精品久久男人天堂| 激情在线观看视频在线高清| 性色av乱码一区二区三区2| xxx96com| 天堂√8在线中文| 国产又黄又爽又无遮挡在线| 国产高清有码在线观看视频 | 色播亚洲综合网| 色在线成人网| 一本综合久久免费| 老司机午夜十八禁免费视频| 制服丝袜大香蕉在线| 男人舔奶头视频| 熟女少妇亚洲综合色aaa.| 国产成人精品久久二区二区91| 97碰自拍视频| 国产精品久久电影中文字幕| 两个人视频免费观看高清| 久久国产精品男人的天堂亚洲| 精品不卡国产一区二区三区| 最新美女视频免费是黄的| 日本精品一区二区三区蜜桃| 日日爽夜夜爽网站| 最近最新免费中文字幕在线| 精品久久久久久,| 欧美成人午夜精品| 久久久国产成人精品二区| 欧美性猛交╳xxx乱大交人| 美女免费视频网站| 国语自产精品视频在线第100页| 国产亚洲欧美精品永久| 成人午夜高清在线视频 | 亚洲第一电影网av| 国产黄色小视频在线观看| 黄网站色视频无遮挡免费观看| 亚洲av熟女| 亚洲专区中文字幕在线| 高清在线国产一区| 欧美黑人欧美精品刺激| 久久人人精品亚洲av| 一本精品99久久精品77| 国产欧美日韩一区二区精品| 一个人观看的视频www高清免费观看 | 无限看片的www在线观看| 亚洲一码二码三码区别大吗| 亚洲av美国av| 国产精品亚洲一级av第二区| 久久青草综合色| 欧美色欧美亚洲另类二区| 男女之事视频高清在线观看| 久久婷婷人人爽人人干人人爱| 999久久久国产精品视频| 757午夜福利合集在线观看| 日本三级黄在线观看| 国产视频内射| 亚洲五月婷婷丁香| 香蕉丝袜av| 国产私拍福利视频在线观看| 亚洲全国av大片| 成人永久免费在线观看视频| 在线观看舔阴道视频| 国产在线精品亚洲第一网站| 国产成人啪精品午夜网站| 大型av网站在线播放| 免费av毛片视频| 日本五十路高清| 大型黄色视频在线免费观看| 久热爱精品视频在线9| 丁香六月欧美| 精品久久久久久久人妻蜜臀av| 黄色a级毛片大全视频| 亚洲avbb在线观看| 成人国语在线视频| 中文字幕人妻熟女乱码| 欧美乱妇无乱码| 国产av又大| 中文字幕人成人乱码亚洲影| 91九色精品人成在线观看| 国产单亲对白刺激| 最近最新免费中文字幕在线| avwww免费| 老熟妇乱子伦视频在线观看| 亚洲一区高清亚洲精品| 免费搜索国产男女视频| 亚洲中文av在线| 日本精品一区二区三区蜜桃| 一区福利在线观看| 亚洲国产精品999在线| 午夜免费成人在线视频| 自线自在国产av| 精品一区二区三区视频在线观看免费| 国产精品乱码一区二三区的特点| 欧美精品亚洲一区二区| 欧美国产精品va在线观看不卡| 日韩欧美在线二视频| 亚洲精品中文字幕一二三四区| 久久精品影院6| 天天躁夜夜躁狠狠躁躁| 亚洲五月色婷婷综合| 搞女人的毛片| 日日爽夜夜爽网站| 久久久久久久久免费视频了| 校园春色视频在线观看| 亚洲七黄色美女视频| 国产av一区二区精品久久| 美女大奶头视频| 国内少妇人妻偷人精品xxx网站 | 免费在线观看完整版高清| 亚洲精品在线观看二区| 亚洲国产高清在线一区二区三 | 无限看片的www在线观看| 好看av亚洲va欧美ⅴa在| 香蕉久久夜色| 日本一本二区三区精品| 怎么达到女性高潮| 精品欧美一区二区三区在线| 麻豆国产av国片精品| 欧美黑人巨大hd| 久久人妻福利社区极品人妻图片| 欧美性猛交╳xxx乱大交人| 亚洲男人天堂网一区| 亚洲精品久久成人aⅴ小说| 国产主播在线观看一区二区| 精品国产美女av久久久久小说| 精品国产一区二区三区四区第35| 啦啦啦免费观看视频1| 搡老岳熟女国产| 久久亚洲精品不卡| 欧美黑人欧美精品刺激| 精品一区二区三区视频在线观看免费| 日本黄色视频三级网站网址| 久久青草综合色| 欧美中文日本在线观看视频| 后天国语完整版免费观看| 久久天躁狠狠躁夜夜2o2o| 国产午夜精品久久久久久| 国产真人三级小视频在线观看| 悠悠久久av| 老司机靠b影院| 精品国产亚洲在线| 国产成人欧美| 午夜福利在线在线| 国产一区在线观看成人免费| 亚洲成人国产一区在线观看| 国产黄a三级三级三级人| 久久久精品欧美日韩精品| 精华霜和精华液先用哪个| 黄网站色视频无遮挡免费观看| 九色国产91popny在线| 美女扒开内裤让男人捅视频| 亚洲成av人片免费观看| 视频在线观看一区二区三区| 亚洲黑人精品在线| 欧美成人性av电影在线观看| 免费看美女性在线毛片视频| 欧美性猛交╳xxx乱大交人| 黑丝袜美女国产一区| 久久久国产精品麻豆| 色综合站精品国产| 19禁男女啪啪无遮挡网站| 国产精品日韩av在线免费观看| 亚洲中文av在线| 国产精品日韩av在线免费观看| 成人亚洲精品一区在线观看| or卡值多少钱| 久久中文字幕一级| 男女之事视频高清在线观看| 人成视频在线观看免费观看| 日韩欧美免费精品| 成在线人永久免费视频| 欧美日韩亚洲综合一区二区三区_| 欧美激情 高清一区二区三区| 免费电影在线观看免费观看| 国产又色又爽无遮挡免费看| 久久精品国产亚洲av香蕉五月| 哪里可以看免费的av片| 视频区欧美日本亚洲| 亚洲欧美一区二区三区黑人| 亚洲国产精品成人综合色| 欧美日韩福利视频一区二区| 18美女黄网站色大片免费观看| 少妇裸体淫交视频免费看高清 | 侵犯人妻中文字幕一二三四区| 亚洲av成人不卡在线观看播放网| 国产高清视频在线播放一区| 18禁观看日本| 国产又色又爽无遮挡免费看| 国产精品,欧美在线| 成人亚洲精品一区在线观看| 最近最新中文字幕大全免费视频| 久久天躁狠狠躁夜夜2o2o| 国产av又大| 国产v大片淫在线免费观看| 日韩欧美国产在线观看| 久久香蕉激情| 亚洲国产欧美一区二区综合| 亚洲一码二码三码区别大吗| 欧美又色又爽又黄视频| 黄色成人免费大全| 国产精品乱码一区二三区的特点| 一级毛片高清免费大全| 看免费av毛片| 一级毛片女人18水好多| 国产激情偷乱视频一区二区| 成人国产综合亚洲| 夜夜看夜夜爽夜夜摸| 女人高潮潮喷娇喘18禁视频| 国产av一区二区精品久久| 女生性感内裤真人,穿戴方法视频| 91av网站免费观看| 99久久无色码亚洲精品果冻| 亚洲精品中文字幕一二三四区| 宅男免费午夜| 精品久久久久久,| 日韩精品免费视频一区二区三区| 99re在线观看精品视频| 久久亚洲精品不卡| 在线免费观看的www视频| 亚洲精品国产精品久久久不卡| 亚洲九九香蕉| 中国美女看黄片| 国产熟女午夜一区二区三区| 精品一区二区三区四区五区乱码| 国产亚洲欧美精品永久| 黄色a级毛片大全视频| 亚洲专区字幕在线| 亚洲国产高清在线一区二区三 | www日本黄色视频网| 成人亚洲精品一区在线观看| 一级片免费观看大全| 99在线视频只有这里精品首页| 国产单亲对白刺激| 50天的宝宝边吃奶边哭怎么回事| 又黄又粗又硬又大视频| 在线观看www视频免费| 国产精品香港三级国产av潘金莲| 女生性感内裤真人,穿戴方法视频| 男女视频在线观看网站免费 | 久久精品影院6| 国产一区二区激情短视频| 国产精品久久久久久人妻精品电影| 高清毛片免费观看视频网站| 亚洲第一欧美日韩一区二区三区| 日本一本二区三区精品| 亚洲国产欧美网| 欧美日韩精品网址| 人人妻人人澡欧美一区二区| 十八禁网站免费在线| 麻豆av在线久日| x7x7x7水蜜桃| 人妻丰满熟妇av一区二区三区| 成人国产综合亚洲| 2021天堂中文幕一二区在线观 | 色av中文字幕| 亚洲av电影不卡..在线观看| 正在播放国产对白刺激| 最近最新中文字幕大全电影3 | 亚洲成人免费电影在线观看| 亚洲三区欧美一区| 美女午夜性视频免费| 在线观看一区二区三区| 国产一卡二卡三卡精品| 他把我摸到了高潮在线观看| 亚洲精品美女久久av网站| 免费人成视频x8x8入口观看| x7x7x7水蜜桃| 日本一本二区三区精品| www日本在线高清视频| 日韩精品青青久久久久久| 国产精品免费一区二区三区在线| 亚洲av日韩精品久久久久久密| 成人手机av| 99久久综合精品五月天人人| 免费一级毛片在线播放高清视频| 国产精品国产高清国产av| 亚洲av成人一区二区三| 日日爽夜夜爽网站| 一边摸一边做爽爽视频免费| 亚洲美女黄片视频| 长腿黑丝高跟| 女警被强在线播放| 国产激情偷乱视频一区二区| 妹子高潮喷水视频| 国产成人系列免费观看| 老汉色av国产亚洲站长工具| 欧美在线一区亚洲| 日韩有码中文字幕| 成人18禁在线播放| 美国免费a级毛片| 日韩欧美 国产精品| 黄色女人牲交| 久久人妻福利社区极品人妻图片| 后天国语完整版免费观看| 亚洲国产中文字幕在线视频| 亚洲中文日韩欧美视频| 亚洲成人久久性| 一进一出好大好爽视频| 俄罗斯特黄特色一大片| 欧美色欧美亚洲另类二区| 黄色a级毛片大全视频| 久久国产精品影院| 日韩 欧美 亚洲 中文字幕| 国产一区二区在线av高清观看| 18美女黄网站色大片免费观看| 免费在线观看亚洲国产| 亚洲一区二区三区不卡视频| 亚洲精品在线观看二区| 淫秽高清视频在线观看| 国产真实乱freesex| 国产激情偷乱视频一区二区| 欧美又色又爽又黄视频| 日韩三级视频一区二区三区| 亚洲精华国产精华精| 可以免费在线观看a视频的电影网站| 免费在线观看日本一区| 999久久久精品免费观看国产| 国产私拍福利视频在线观看| 99久久无色码亚洲精品果冻| 99热6这里只有精品| 99精品在免费线老司机午夜| 日韩中文字幕欧美一区二区| 在线观看一区二区三区| 免费人成视频x8x8入口观看| 国产亚洲欧美精品永久| 女性被躁到高潮视频| 99re在线观看精品视频| 成人午夜高清在线视频 | 国产精品国产高清国产av| 久久婷婷人人爽人人干人人爱| 天堂√8在线中文| 亚洲五月婷婷丁香| 免费在线观看亚洲国产| 热re99久久国产66热| 亚洲av五月六月丁香网| 国内揄拍国产精品人妻在线 | tocl精华| 亚洲欧美精品综合久久99| 人人妻人人看人人澡| 一级a爱视频在线免费观看| 99国产极品粉嫩在线观看| 极品教师在线免费播放| 日韩有码中文字幕| 成人欧美大片| www.自偷自拍.com| 一个人免费在线观看的高清视频| 国产日本99.免费观看| 久久青草综合色| 91字幕亚洲| 香蕉丝袜av| 老司机福利观看| 超碰成人久久| 一级a爱片免费观看的视频| 欧美日韩乱码在线| 99久久综合精品五月天人人| 搡老熟女国产l中国老女人| 村上凉子中文字幕在线| 久久久水蜜桃国产精品网| 亚洲精品久久国产高清桃花| www.精华液| 老熟妇乱子伦视频在线观看| 中文字幕人成人乱码亚洲影| а√天堂www在线а√下载| 久久草成人影院| 欧美国产精品va在线观看不卡| 99re在线观看精品视频| а√天堂www在线а√下载| 成熟少妇高潮喷水视频| 国产精品乱码一区二三区的特点| 无遮挡黄片免费观看| 国产成人精品久久二区二区91| 成人国语在线视频| 日韩国内少妇激情av| 日韩欧美国产一区二区入口| 天天添夜夜摸| 精品久久蜜臀av无| 国产精品99久久99久久久不卡| 国产精品久久久人人做人人爽| 亚洲五月婷婷丁香| 精品久久久久久久人妻蜜臀av| 国产成人系列免费观看| 叶爱在线成人免费视频播放| 在线看三级毛片| 人人妻人人看人人澡| 久久国产乱子伦精品免费另类| 日本a在线网址| 法律面前人人平等表现在哪些方面| 手机成人av网站| 丁香欧美五月| 母亲3免费完整高清在线观看| www.熟女人妻精品国产| 动漫黄色视频在线观看| 久久久久久国产a免费观看| 国产单亲对白刺激| 曰老女人黄片| 美女高潮喷水抽搐中文字幕| 无人区码免费观看不卡| 少妇熟女aⅴ在线视频| 国产私拍福利视频在线观看| 国产欧美日韩一区二区精品| 欧美绝顶高潮抽搐喷水| 自线自在国产av| 在线天堂中文资源库| 男人的好看免费观看在线视频 | 香蕉国产在线看| 日韩欧美国产在线观看| 白带黄色成豆腐渣| 国产蜜桃级精品一区二区三区| 99精品久久久久人妻精品| 免费在线观看视频国产中文字幕亚洲| 久久中文看片网| 在线观看午夜福利视频| www.熟女人妻精品国产| 亚洲色图av天堂| 国产蜜桃级精品一区二区三区| 操出白浆在线播放| 亚洲中文日韩欧美视频| 国产三级在线视频| 亚洲黑人精品在线| 一级毛片精品| 国产又爽黄色视频| 一区二区三区精品91| 好看av亚洲va欧美ⅴa在| 国产精品香港三级国产av潘金莲| tocl精华| 美国免费a级毛片| 岛国视频午夜一区免费看| 无人区码免费观看不卡| 手机成人av网站| 亚洲精品美女久久av网站| 中出人妻视频一区二区| 午夜激情av网站| 国产精品免费一区二区三区在线| 日韩有码中文字幕| 一本综合久久免费| 男人舔女人下体高潮全视频| 男人的好看免费观看在线视频 | 亚洲专区中文字幕在线| 日本 av在线| 一进一出抽搐动态| 日韩精品中文字幕看吧| 黄片小视频在线播放| 99久久国产精品久久久| 国产精品乱码一区二三区的特点| 久久精品国产亚洲av香蕉五月| 久9热在线精品视频| 亚洲最大成人中文| 免费高清视频大片| 久久精品国产99精品国产亚洲性色| 日本成人三级电影网站| 久久久久久国产a免费观看| 色综合欧美亚洲国产小说| 黄网站色视频无遮挡免费观看| 国产精品自产拍在线观看55亚洲| 在线播放国产精品三级| 韩国精品一区二区三区| 中亚洲国语对白在线视频| 一级毛片精品| av欧美777| 99热6这里只有精品| 亚洲欧美精品综合一区二区三区| 国产一区二区在线av高清观看| 国产精品亚洲av一区麻豆| 亚洲专区国产一区二区| 精品乱码久久久久久99久播| 在线av久久热| 国产精品99久久99久久久不卡| 18禁国产床啪视频网站| 欧美色视频一区免费| 久久久久久久久中文| 岛国视频午夜一区免费看| 国产欧美日韩一区二区精品| netflix在线观看网站| 99re在线观看精品视频| www.www免费av| av电影中文网址| 日韩 欧美 亚洲 中文字幕| 成人手机av| 中文资源天堂在线| 一进一出好大好爽视频| 国产视频内射| 国产午夜福利久久久久久| 两个人视频免费观看高清| 真人做人爱边吃奶动态| 男女做爰动态图高潮gif福利片| 非洲黑人性xxxx精品又粗又长| 亚洲三区欧美一区| 精品国产乱码久久久久久男人| 久久久久久久久免费视频了| 国产真人三级小视频在线观看| 国产国语露脸激情在线看| 亚洲人成网站在线播放欧美日韩| 精品免费久久久久久久清纯| 99久久99久久久精品蜜桃| 免费高清视频大片| 欧美中文综合在线视频| 日韩欧美国产一区二区入口| 国产精品 国内视频| 久久久久免费精品人妻一区二区 | 美女高潮到喷水免费观看| 精品久久久久久成人av| 精品电影一区二区在线| 亚洲五月天丁香| 久久久久免费精品人妻一区二区 | 免费人成视频x8x8入口观看| 国产激情偷乱视频一区二区| 久久99热这里只有精品18| 亚洲人成伊人成综合网2020| 熟女电影av网| а√天堂www在线а√下载| 黄色毛片三级朝国网站| 一区二区日韩欧美中文字幕| 日本撒尿小便嘘嘘汇集6| 国产一级毛片七仙女欲春2 | 美国免费a级毛片| 久久精品影院6| 国内久久婷婷六月综合欲色啪| 男女午夜视频在线观看| 一本一本综合久久| 国产精品99久久99久久久不卡| 国产精品精品国产色婷婷| 国产成人av激情在线播放| 久久亚洲精品不卡| 欧美中文日本在线观看视频| 自线自在国产av| 国产熟女午夜一区二区三区| 亚洲欧美精品综合一区二区三区| 日本免费a在线| 国产亚洲精品综合一区在线观看 | 一进一出好大好爽视频| 中出人妻视频一区二区| 天天躁夜夜躁狠狠躁躁| 久久性视频一级片| 亚洲色图av天堂| 亚洲av第一区精品v没综合| 男男h啪啪无遮挡| 国产av不卡久久| 天堂影院成人在线观看| 一a级毛片在线观看| e午夜精品久久久久久久| 国产高清视频在线播放一区| 桃红色精品国产亚洲av| 一级a爱视频在线免费观看| 亚洲黑人精品在线| 欧美精品亚洲一区二区| 老鸭窝网址在线观看| 一二三四在线观看免费中文在| 欧美zozozo另类| 熟妇人妻久久中文字幕3abv| 久久久久久久午夜电影| 成人一区二区视频在线观看| 欧美激情 高清一区二区三区| svipshipincom国产片| 午夜福利欧美成人| 久久精品国产99精品国产亚洲性色| 午夜福利在线在线| av福利片在线| 亚洲精品中文字幕在线视频| 黄片大片在线免费观看| 亚洲专区国产一区二区| 啪啪无遮挡十八禁网站| 女性被躁到高潮视频| 日本a在线网址| 欧美 亚洲 国产 日韩一| 国产精品自产拍在线观看55亚洲| 99国产精品99久久久久| 国产精品九九99| 欧美最黄视频在线播放免费| 免费高清视频大片| 50天的宝宝边吃奶边哭怎么回事| 亚洲男人天堂网一区| 久久午夜综合久久蜜桃| 国产主播在线观看一区二区| 午夜久久久在线观看| 亚洲第一av免费看| 老司机午夜福利在线观看视频| av在线播放免费不卡| 最新在线观看一区二区三区| 大型黄色视频在线免费观看| 热99re8久久精品国产| 亚洲中文字幕一区二区三区有码在线看 | 日韩欧美免费精品| 国产亚洲精品av在线| 亚洲中文av在线| 国产99久久九九免费精品| 久久久久久久久久黄片| 九色国产91popny在线| 少妇被粗大的猛进出69影院| 一卡2卡三卡四卡精品乱码亚洲| 巨乳人妻的诱惑在线观看| 在线av久久热| 人人妻人人澡欧美一区二区| 在线看三级毛片| 天天躁狠狠躁夜夜躁狠狠躁| 在线av久久热| 丁香欧美五月| www.精华液| 丰满的人妻完整版| 精品第一国产精品| 国产成年人精品一区二区| 国产99久久九九免费精品| 亚洲熟妇中文字幕五十中出| 精品国内亚洲2022精品成人| 国产一区二区在线av高清观看| 黄色毛片三级朝国网站| 亚洲av日韩精品久久久久久密| 亚洲av中文字字幕乱码综合 | 亚洲天堂国产精品一区在线| 黄片小视频在线播放| 我的亚洲天堂| 精品久久久久久久毛片微露脸| 人人妻人人看人人澡| 黄色视频,在线免费观看| 国产免费男女视频|