• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Blockchain-as-a-Utility for Next-Generation Healthcare Internet of Things

    2021-12-14 09:57:50AlaaOmranAlmagrabiRashidAliDaniyalAlghazzawiAbdullahAlBarakatiandTahirKhurshaid
    Computers Materials&Continua 2021年7期

    Alaa Omran Almagrabi,Rashid Ali,Daniyal Alghazzawi,Abdullah AlBarakati and Tahir Khurshaid

    1Department of Information Systems,Faculty of Computing and Information Technology,King Abdulaziz University,Jeddah,21589,Saudi Arabia

    2School of Intelligent Mechatronics Engineering,Sejong University,Seoul,05006,Korea

    3Department of Electrical Engineering,Yeungnam University,Gyeongsan,38541,Korea

    Abstract: The scope of the Internet of Things (IoT) applications varies from strategic applications, such as smart grids, smart transportation, smart security,and smart healthcare,to industrial applications such as smart manufacturing,smart logistics,smart banking,and smart insurance.In the advancement of the IoT, connected devices become smart and intelligent with the help of sensors and actuators.However, issues and challenges need to be addressed regarding the data reliability and protection for signifcant nextgeneration IoT applications like smart healthcare.For these next-generation applications, there is a requirement for far-reaching privacy and security in the IoT.Recently,blockchain systems have emerged as a key technology that changes the way we exchange data.This emerging technology has revealed encouraging implementation scenarios,such as secured digital currencies.As a technical advancement, the blockchain network has the high possibility of transforming various industries, and the next-generation healthcare IoT(HIoT) can be one of those applications.There have been several studies on the integration of blockchain networks and IoT.However, blockchain-as-autility(BaaU)for privacy and security in HIoT systems requires a systematic framework.This paper reviews blockchain networks and proposes BaaU as one of the enablers.The proposed BaaU-based framework for trustworthiness in the next-generation HIoT systems is divided into two scenarios.The frst scenario suggests that a healthcare service provider integrates IoT sensors such as body sensors to receive and transmit information to a blockchain network on the IoT devices.The second proposed scenario recommends implementing smart contracts, such as Ethereum, to automate and control the trusted devices’subscription in the HIoT services.

    Keywords: blockchain; next-generation IoT; privacy and security; healthcare IoT; complex healthcare applications

    1 Introduction

    The Internet of Things (IoT) has widely evolved and undergone rapid advancements, leading to several complex applications, for example, smart cities, smart industries, and smart healthcare.It is expected that more than 30 million smart devices will be part of the IoT by 2020 [1].The blend of billions of connected devices equipped with sensors and actuators improves the user’s quality of experience (QoE).The IoT is expected to contribute more than USD 7 trillion to the world economy by 2020 [1].Although the IoT improves users’ QoE, it faces various privacy and security challenges because of the numerous connected smart devices utilizing existing wireless communication technologies.For example, Wi-Fi, ZigBee, and Bluetooth [2], particularly for security-related applications, such as healthcare IoT (HIoT).Fig.1 shows a typical HIoT architecture, where the information created in a healthcare framework by different sensors goes to the handling layer with varying communication assistance technologies.The privacy and security issues to such a piece of information are known to the researchers.However, they are either ignored or observed as a reconsideration.It is signifcant for the HIoT to improve its operational structure from an expensive, unreliable, and centralized design to an intelligent, more reliable, and decentralized framework [3].Such a decentralized model guarantees reduced network deployment costs, network scalability, system self-suffciency, protection and privacy in a trustless setting,user-level safety, and most signifcantly, a network attack control infrastructure.

    Figure 1:A typical layered architecture of an IoT-based healthcare system

    Today, the information is easily trusted from industrial and government institutions, such as hospitals and healthcare centers, without guaranteeing that the data has not been manipulated or falsifed by the attackers.It usually happens if data security systems are centralized.The attackers exploit data as per their advantages, bringing a threat to sensor device reliability.Consequently,privacy and security frameworks are essential to ensure that the data have never been altered.One of the potential arrangements in the HIoT to bring trust is to execute a distributed model,where all the participating healthcare devices trust and assure that the data stays unchanged.For instance, if all the healthcare devices have the data and demonstrate to one another that the data have not been altered, it is conceivable to accomplish trustworthiness and security.For this reason, blockchain systems are now being considered by researchers as one of the potential frameworks [4–9] to acknowledge the required decentralized trustworthiness in the IoT.

    Recently, blockchain technology arose as a decentralized, trustless verifcation system for monetary exchanges of Bitcoin cryptographic money (digital currency).The cryptographic security advantages of blockchain inspire researchers to utilize IoT systems to address privacy and security issues, such as pseudonymous identities (PIDs), decentralization, variation to non-critical failure,the openness of the transactions, and access [6].Thus, blockchain as a distributed setup and alteration-free system can handle security issues, fundamentally in the HIoT [10] for information privacy and reliability.Usually, the HIoT structures are distributed, and the decentralized peerto-peer (P2P) condition of the blockchain network is in a perfect form for the HIoT systems.The comprehensive record-keeping blockchain systems keep track of the transactions (TXs) in the HIoT network among numerous devices in a decentralized way.It leads to an agile system setup and lessens the risks of single point network failure.In a few of the related research works [11,12], the researchers propose solutions for specially selected vehicular ad hoc networks(VANETs).The blockchain network also holds TXs in a certain inconclusive way to ensure validity.Specifcally, the receiving user’s signature in TXs guarantees the legitimacy and nonrepudiation of the TXs.This hashed chain structure of a blockchain network insists the data integrity.Consensus mechanisms in a blockchain system ensure the integrity and precision of the hashed chain.

    Additionally, consensus contracts tolerate attacks and failures in the network.For instance,as detailed in [13], the proof-of-work (PoW) consensus protocol suffers attacks from twelve hash power attackers, and a similar situation occurs from thirteen attackers using a practical Byzantine fault tolerance (PBFT) consensus protocol.These issues are serious for the HIoT applications,where the heterogeneous kind of sensor devices with heterogeneous system situations produce the diverse type of IoT information.

    Table 1:List of abbreviations and acronyms used in this paper

    Furthermore, because of its capacity to utilize alterable open keys as client PIDs to shield privacy and security [14], a blockchain network has a high degree of encryption.Therefore, a blockchain network can be linked to the IoT applications and services, especially those requiring reliable communication [15], such as the HIoT applications.However, current blockchain systems have constraints on fexibility, TX affrmation, higher capacity prerequisites, high power consumption, and computational requirements, and, most essentially, security leakage because of the trustless supporting structure.These barriers mean a comprehensive challenge of the blockchain network before being utilized for a trustworthy HIoT in a protected and effective manner.

    Similarly, to encourage the selection of blockchain systems for reliable HIoT networks, a signifcantly out-of-the-way investigation is expected to explore how current blockchain systems can be utilized as a reliability tool for the HIoT.Moreover, the diffculties confronted by HIoT applications are exploiting the blockchain system’s privacy and security issues.This paper outlines a precise overview of the blockchain network technology to solve threats to HIoT privacy and security necessities.We propose the use of two of the blockchain innovations in detail; smart contracts (SCs) and the consensus mechanisms, to assess a viable blockchain-as-a-Utility (BaaU)framework for security assurance in the HIoT systems.We propose using the BaaU framework in cloud network administration and correspondence layers to meet the numerous security needs of the HIoT systems, for example, validation of the healthcare devices, support, authorization,data assurance, and low latency in critical data transmission.Tab.1 lists all the abbreviations and acronyms used in the paper.

    2 An Overview of Blockchain

    2.1 Blockchain:A Defnition

    The trustworthiness in the distributed data frameworks is critical because of the absence of confrmation mechanisms, mainly on account of sensitive information, for example, the utilization of digital currencies in direct money TXs.Nakamoto [16] presented Bitcoin as a virtual digital currency that works in a decentralized way without any centralized server.Bitcoin stores money TXs securely in a decentralized P2P system of verifable nodes (known as actors).In addition to Bitcoin, Nakamoto sets forth the idea of blockchain, the adoption of which gained signifcantly more popular than the cryptographic digital currency.The blockchain checks currency-related TXs performed by untrustworthy actors.The blockchain network is distributed in its nature,everlasting, open, steady, and auditable.The genuine signifcance is that a client can transparently look at the entirety of the system’s previous exchanges.Similarly, every activity of the frameworks can be verifed at any time and can be approved by any actor.

    2.2 Structure of a Blockchain

    A basic blockchain structure can be divided into three layers:A fundamental P2P working layer, an overall ledger layer, and various application layers, as shown in Fig.2.The essential frst layer of P2P connected devices ensures unconstrained contact among the geographically distributed actors.Although such actors are physically distributed devices, the application of the actors has proportional privileges.Such devices engage in the routing measure by fnding and keeping up the associations between neighboring devices, thus inducing and affrming the network TXs.As such, devices in the framework synchronize the blockchain’s information blocks (data structure), which are the characteristics of a distributed blockchain network.

    The data structure in a blockchain network enlists information on TXs performed at a given time.Every block within a blockchain is referenced by the previous block’s header hash, as shown in Fig.3.The framework’s peers include the functionalities of routing, limit, wallet association,and TX mining to facilitate the blockchain system [17].The devices are placed into four categories based on these functionalities:Core devices, maximum functionality devices, private minor devices,and light wallet devices.The entire blockchain’s replication and lighter devices form a portion of the connected devices’ chain.The security keys are kept in the wallet allowing devices to perform network TXs, for instance, managing Bitcoins.Finally, authorizing the PoW agreement to include new blocks is the mining feature of a device.The miners are the devices that execute these functionalities through mining.The miners gather recently created Bitcoins and are provided with digital currency as a compensation fee for their services.The PoW is the core of a trustless consensus technique in a blockchain network, which comprises a computationally rigorous task that is very complicated for new blocks to solve.The miners in a blockchain network fnish the PoW to distribute a new block; at that point, the remaining devices in the network affrm its legitimacy before adding to the chain; due to different miners’ simultaneous association with the chain of the blocks, blockchain forks into various branches.The miners include the lengthiest legal extension of blocks to determine this circumstance.These steps bring about an advanced,distributed calculation of trustless consensus.In that case, a malicious attacker must get hold of at least 51% of the framework’s computational resources.Thus, corrupting blocks in a blockchain is nearly impossible.

    Figure 2:A conventional layered architecture of the blockchain network

    The SC is a technological advancement in the form of a digital protocol presented by the blockchain, which permits the programmed implementation of a contract based on predefned conditions.An SC decides the reason for the execution of an exchange with the digital currency substitute.A typical SC indicates limits and necessities outside digital currency exchange, such as acknowledging benefts in a specifc extent of interactions with non-monetary segments, making it an ideal part for a blockchain advancement in different research areas.Ethereum [18] was one of the frst blockchain networks to implement SCs.

    2.3 Types of a Blockchain Network

    The blockchain networks are partitioned into two groups; permissioned blockchain networks or permissionless blockchain networks.There are numerous kinds of blockchain networks dependent on such defnitions, for example, public, private, hybrid, and consortium blockchain networks.Tab.2 shows the critical difference between different types of blockchains.A blockchain network can be characterized as permissioned or permission-less based on the limitations to connect new blocks of TXs.A permission-less blockchain network includes new blocks of TXs by any of the users; however, only authorized devices can deal with TXs in a permissioned blockchain network [19].

    Figure 3:Connected blocks in a typical blockchain network

    Table 2:Comparison between permissioned and permission-less blockchain networks

    2.3.1 Public Blockchain

    A public blockchain network exists in the permission-less blockchain category, which gives free and open access to the digital ledger from any device in the system [20].The mining of new blocks is often focused on the ultimate rewards to incentivize the miners.In a public blockchain network,the correspondence between the devices takes more time to add the TXs.System transparency is protected by making all TXs accessible to shared devices.Thus, user information security concerns and issues are rising in such a blockchain network.Since there is a weak TX certainty,there is a low TX throughput in the public blockchain, generally determined in transactions per second (TPS).A few examples of public blockchains include Bitcoin, Ethereum, Litecoin [21], and Lisk [22].

    2.3.2 Private Blockchain

    A typical private blockchain is an approved ledger with a limited number of known miners.This type of blockchain has restricted handling of TXs for the predefned miners.Moreover,miners have access to their directly connected TXs [19].One example of a private blockchain,Hyperledger-Fabric [23], ensures the secrecy of TXs utilizing multiple private channels.Such private channels are called restricted communication methods that one-of-a-kind miners use to secure TX protection and confdentiality.The private blockchains are unquestionably looser as compared to the public blockchains.Since private blockchains have a low quantity of approved miners,they are faster than public blockchains and have a higher throughput [20].However, some private blockchains utilizing Byzantine fault tolerance (BFT) consensus experience low versatility issues due to the limited number of validators.Zheng et al.[10] depict that the partially incorporated TX blocks can be altered in a private blockchain.Examples of private blockchain models include Hyperledger, Multichain [24], and Quorum [25].

    2.3.3 Hybrid/Consortium Blockchain

    A hybrid blockchain network is a partially decentralized blockchain that balances between a private and a public blockchain [18].In this type of blockchain network, the consensus technique is overseen by a portion of the pre-chosen devices.For instance, in the Hyperledger blockchain,miners maintain a mining device in the blockchain network.Approval of a block in the Hyperledger includes signing in from at least seven devices.In this situation, the explicit network devices may have free perusal access to the blockchain or maybe restricted otherwise [19].Subsequently,this form of the blockchain network is called partially decentralized.In any case, a consortium blockchain is relatively easy to tamper with [10] because of reduced decentralization.

    3 Major Blockchain Technologies

    In this section, we frst present a recently rising blockchain network innovation, that is,the SC, that performs random measurements rather than moving digital money.At the end of the section, we explain the consensus mechanism’s primary mechanism to utilize a trustless blockchain network.

    3.1 Smart Contract

    An SC is a determination to set out the terms and conditions for an agreement’s digital TXs.It presents contractual provisions in the structure.In the beginning, the idea of an SC was considered unviable.However, the blockchain included SC as one of its critical features after the realization of its strengths.As a part of the blockchain network, the SC has signifcant commitments and moved blockchain to its next generation, known as Blockchain 2.0.These automatically executed contracts promise to change the way current TXs work in a decentralized environment.Fig.4 illustrates SC’s workings in a standard blockchain network between a buyer and a seller.The SC code exists in the blockchain, and a specifc ID (address) has been established.The users use an SC address to request their transactions.The blockchain’s trust process governs the contract (see the next section for further details).The implementation of the SCs in a blockchain provides advantages, including openness, lowered costs, smoother transaction delivery,consistency, and experience.It supports the association of numerous imaginative advancements over an assortment of research areas of this study.Bitcoin utilizes a primary scripting language;thus, it is not essential to embrace the SC framework.It prompts the usage of next generation blockchain networks where SC innovation is being applied, for example, Ethereum.The users view Ethereum as one of the most dependable SC blockchain networks.It contains an advanced Turing-machine programming language that determines SCs and the delivered resources.The SCs access information about various states and activities utilizing the oracles.These artifacts are essential to the signifcant consolidation of the SCs.However, they bear additional complexity due to the certainty provisioning in the oracles [26].The SCs are yet helpless against many network attacks, such as [27] explains the fascinating new diffculties and issues faced by the SCs.Another problem with the SC is the resultant concern when vulnerabilities are found in the agreement code since it is irreparable and unchangeable.The real-world agreements typically incorporate terms and conditions that are not recent.Subsequently, an SC requires a great deal of exertion in checking the agreements’ details, intending to perceive and measure execution by a network framework [28].

    Figure 4:The working of the smart contracts in a blockchain network

    3.2 Consensus Mechanism

    The consensus mechanism is one of the fundamental parts of the blockchain network and is liable for blockchain information [29].The consensus mechanism’s essential motivation is to apply the SC rules in a decentralized, trustless network.Various blockchain networks utilize a few authentication strategies, including proof of work (PoW), proof of service (PoS), leased proof of stake (LPoS), proof of burn (PoB), and Practical Byzantine fault tolerance (PBFT).In the following subsections, we outline some noticeable consensus mechanisms, also summarized in Fig.5.

    Figure 5:Some of the prominent consensus mechanisms used in the blockchain networks

    3.2.1 Proof of Work(PoW)

    Initially, PoW was the essential consensus mechanism for Bitcoin, which expects miners to comprehend a computationally expensive challenge that is simple to verify before adding a new block.The arrangement of these undertakings is written in a PoW consensus protocol before comparing blockchain with any node.Later, the nodes confrm and associate this recently added block with the blockchain over the network [30].The technique for including new blocks happens simultaneously in numerous parts of the network, resulting in a hierarchical structure in the chain.Accordingly, the blockchain network frequently incorporates a few separate divisions simultaneously.Before embedding another node in the network, each peer in the network checks this branch as the longest part of the blockchain, which should be legitimate.The main issue with such a consensus mechanism is that it requires thorough computation.The standard form of attack on Bitcoin, as previously mentioned, is the 51% attack.Inducements from the PoW expressly support centralism as the distribution of mining pool endorsement.Several drawbacks, such as higher latency, lower TX rate, and higher power consumption, make the PoW unacceptable for various applications, particularly energy-constrained applications.Several researchers have proposed numerous endeavors to change the PoW.

    3.2.2 Proof of Service(PoS)

    The PoS algorithm is a notable alternate strategy to the PoW consensus mechanism in a blockchain network.The PoS framework executes the algorithm since the node with more compensation is concerned with the chain’s presence and the blockchain network’s specifc activity,thereby establishing an additional ftting solution for network security.The fundamental motivation behind utilizing a PoS technique is to move forthcoming external costs into the network’s inwardness.One of the PoS consensus technique issues is the absence of chances for miners to establish themselves.It empowers the redesign of the current consensus initiatives.Examples of the blockchains utilizing this sort of consensus are PeerCoin [31] and Ethereum.One of the blockchain network, Bitshare [32] uses the PoS variant known as DPoS delegates.In the DPoS,different observers access TX marks and timestamps in the blockchain network.The client is compensated each time a block is effectively added to the blockchain.Affrmation of the TXs is made more accessible by permitting users to set the blocks’ latency and size.

    3.2.3 Leased Proof of Stake(LPoS)

    In the LPoS [33], a client can rent assets to different clients to be trusted and selected to make new establishments.This technique expands the number of selectable individuals in the organization, diminishing the risk of a specifc group of users limiting the blockchain network.In such a consensus mechanism, all the participating users divide their incentives relatively.The Waves-blockchain [33] is one example of LPoS consensus protocols.

    3.2.4 Proof of Burn(PoB)

    Another type of blockchain consensus is PoB [34], which proposes consuming coins to construct a new block in the chain.The PoB is similar to a PoW consensus mechanism, that is, hard to evaluate and simple to check.However, it has higher energy consumption [34].It also incorporates strategic suggestions that can add to a better environment.In this consensus mechanism, clients consume their coins so they can mine blocks onto the blockchain.A PoB moves the cost of the consumer onto the miner.As clients are focused on consuming their coins in the blockchain network to gain more advantages from mining, PoB supports a task’s long-term consumer interest.A high percentage of long-term users of a blockchain network will ultimately infuence such coins’ price stability.One of the problems facing the PoB is that there is a lot of resource wastage and that much of the mining capacity belongs to those miners who consume more coins.Slimcoin [35] makes use of PoB as the consensus network protocol.

    3.2.5 Proof of Importance(PoI)

    The PoI [36] links a signifcant rate for building a stable interface for each user’s blockchain network.The likelihood that the consumer will be chosen to create a block depends on this signifcance limit.The estimation of this critical rate often considers the sum of the coins used and the number of positive TXs.This consensus system determines all the eligible users to add a block to a blockchain network through harvesting.The user that inserts a block into the blockchain network earns the block-relevant transaction fees.The higher the signifcant factor is, the higher the probability that a customer will be picked to collect the blocks.The PoI protocol is a userbased support network where users can deposit their coins and transfer them across the network.It is a non-PoS algorithm that is known to help collectors.This consensus protocol was applied to the blockchain networks by NEM [36].

    3.2.6 Proof of Activity(PoA)

    A new version of the PoW and the PoS protocol for cryptocurrencies called proof of activity(PoA) has been introduced in [37].A PoA consensus mechanism indicates reasonable protection against potential realistic attacks on a blockchain network, which has somewhat limited storage connectivity repercussions.In a PoA, the conventional PoW algorithm uses block mining continues, with miners competing to be the frst to crack a puzzle and seeking their rewards [37].The only distinction is that the successfully mined blocks do not enclose TXs.Instead, they are merely templates that include header and reward address information.After practical mining of this virtually blank block, the PoA nodes use the PoS protocol.The header information is used to select a random group of validators to sign the blockchain block.If some or more of the chosen validators remain unsigned after a given amount of time, the nodes discard a block as incomplete.The PoA consensus protocol was criticized, yet a single block of mining always requires a lot of expense.A double signing of the block by a single miner is still a challenge for a PoA algorithm [37].The Espers cryptocurrency [38] uses the PoA form of consensus.

    3.2.7 Proof of Elapsed Time(PoET)

    An Intel-developed blockchain network known as the PoET consensus system was implemented by Intel SawtoothLake (also known as IntelLedger) [30].The PoET was designed to run in a time execution environment (TEE), such as the Device Protection Extension SGX for Intel [39].The PoET uses a random leader election model (also known as a lottery-based electoral model),where the protocol chooses the next member randomly to fnalize the sequence.Later, it deals with the untrusted and open-ended users of the consensus algorithm.In this consensus method, both miners can run the TEE using Intel SGX to request a wait time from the TEE code.The leader is the miner with the shortest remaining time.A certifed miner claiming to be the block formation leader can also produce verifable proof created by all other users using the TEE.This compromise method has the downside of being based on expensive high-performance computing hardware.

    3.2.8 Practical Byzantine Fault Tolerance(PBFT)

    Hyperledger-Fabric [23] is a famous blockchain that offers a scalable framework with a consensus plug-in mechanism.Hyperledger-Fabric supports PBFT, which executes non-deterministic blockchain codes.The PBFT was introduced in [40,41] as the frst practical solution for Byzantine weaknesses.A PBFT uses the concept of a replicated state computer and replica voting for block validation.It has several optimization functions, such as validating and encrypting TXs between replicas and users.The scale and number of TXs the system would face in practical terms with Byzantine faults.A representation of 3f+1 is needed to toleratefnodes that fail, according to the PBFT consensus mechanism.In this phase, the overhead on the output of the repeated resource is reduced.However, the overhead TXs substantially rise as the number of replicas increases [42].A comprehensive study on creating consensus structures for different blockchain networks was carried out.Nevertheless, there is a shortfall of work seeking to use these two tools to protect IoT privacy, especially for HIoT applications.

    4 Related Research Overview

    Researchers from universities and industries have recently published several research works on blockchain-based IoT innovation [5–10,43].This theoretical framework either focuses on the blockchain network’s general uses in the IoT or only examines specialized viewpoints on computerized digital currency forms.Their studies lack insight into the blockchain network’s problems with IoT privacy protection.Frankenfeld [34] provide issues from the cryptocurrency’s viewpoint,such as a distributed denial-of-service (DDoS) attack, 51% attack, data elasticity, verifcation, and ease of use.In [44], the authors performed an in-depth study of blockchain technology and its impacts on the developments.This work further highlights Bitcoin’s issues and call for a focus on the future applications of decentralized networks.However, this study addresses the IoT as a short subcategory in the long list of blockchain technologies’ potential use cases.In [45], the authors address numerous blockchain versions, such as Ethereum [46], Ripple [47], and Gridcoin [48],and detail some of the core blockchain-based solutions.However, they do not consider the issues around blockchain networks and IoT amalgamation in their study.The authors of [49]propose a lightweight blockchain protocol for IoT implementations in smart home applications.Their theoretical work includes preventing intensive computing, TX validation delay, and the Bitcoin network’s blockchain scalability.Conoscenti et al.[50] suggest one use case for blockchain and IoT convergence, which uses SC blockchains to customize and control IoT devices.Their proposed architecture is designed to resolve security and synchronization concerns within an IoT client-server network.All the connected IoT devices in their proposed solution are vulnerable to security attacks if the server is malicious.In [48], the authors proposed Ethereum SCs as a secure open framework for IoT applications to take advantage of the blockchain networks.Pham et al.[51] performed a comprehensive literature review of the blockchain implementations outside cryptocurrencies and discussed their integration with IoT-based performance.Several systems have proposed different ways of integrating the blockchain networks on privacy sites to accommodate IoT applications.However, most architectures need many computing rounds to protect privacy and end up with massive energy usage and high device costs.Our proposed architectures increase the system’s effciency to suit an essential IoT function such as the HIoT.

    Table 3:Summary of related research works

    Chakraborty et al.[52] suggested a centralized e-healthcare system that involves healthcare providers, healthcare facilities (hospitals and clinics), doctors, and patients.In their proposed solution, numerous sensors collect health-related information from patients in real-time and use the Ethereum SC model to store information in the blockchain, known as TESTRPC.However,health-related information requires absolute protection and privacy; thus, the authors of [53]propose moderating this problem.Recently, Ethereum has been used to address high-profle online healthcare services; participatory, customized, accurate, predictive, proactive, and preventive [54] features.Kuo et al.[55] explored patient health’s loaded conditions by integrating a blockchain network and the IoT into a healthcare system.A general blockchain framework was used to provide future biomedical and eHealth services.Badr et al.[56] propose the multilayered pseudonym-based encryption (PBE), allowing a user to access, verify, and update health-related information on a multilayered IoT.Yu et al.[57] propose a framework called IoTChain to provide healthcare and information to patients with blockchain and IoT technology’s assistance.In [58],authors propose an IoT-based blockchain-assisted mobile platform for dyslexia healthcare in which dyslexic patients and their caregivers use, store, and access dyslexic design in a multimodal data allocation method.Salahuddin et al.[59], on the other hand, propose a softwarized blockchain-IoT platform for e-healthcare services with improved adaptability, cost viability, and stability.For this purpose, the authors of [60] developed an IoT-based patient-centric agent to encourage end-to-end services using a blockchain for consistent patient observations.

    The related research work explored a few signifcant research issues and challenges in the HIoT integration of the existing IoT-blockchain, which should be understood and used effectively to harness the BaaU for the HIoT.Tab.3 summarizes the key contributions of the authors from the related research works.We note a shortage of research studies that address the importance of using a blockchain network for the next-generation HIoT.In such a scenario, there is no discussion of the blockchain consensus mechanisms.Methodological use cases for the IoT-enabled blockchain for the HIoT have also not been discussed.In this article, we propose two solutions for the next-generation HIoT that uses BaaU.

    5 Blockchain-as-a-Utility(BaaU)Model for Privacy Preservation in the HIoT

    In this paper, we outline a BaaU model for the protection of privacy within the HIoT systems.We suggest two circumstances in which the blockchain networks can be used to ensure HIoT trustworthiness (as shown in Fig.6).The frst recommendation indicates that a healthcare provider in the HIoT integrates IoT sensors, such as body sensors, to receive and transmit information and interfaces it to a blockchain network on these devices.The blockchain network now gives the linked HIoT devices the capacity to exchange data, process orders, and complete TXs.Thus, the blockchain network’s privacy protection capability mitigates the security assaults, as the attacker uses trustless indirect access to target the network [52].The sensor devices directly send their information to the central gateway, which provides adequate energy and memory resources.The blockchain network is updated at the edge device in this scenario, which keeps records of all the sensor devices that join the network and are approved for sending and receiving information.Thus, the blockchain networks may detect a malicious attack to mimic a system that has been approved.All sensor devices also track the information they send and update the data accordingly.Since the gateway keeps track of the amount of data sent and received from the devices, it can easily distinguish data anomalies and restrict the problem’s source.Additionally, the cloud maintains a more extensive blockchain network, which executes similar standards to improve the framework’s fexibility.Therefore, the collected information is optimized using big data analysis.The Blockchain traffc fow analysis at the gateway helps to identify security threats in real-time.

    Figure 6:Proposed blockchain-as-a-utility (BaaU) model scenarios for privacy preservation in the healthcare IoT (HIoT) infrastructures

    This paper’s second proposed scenario suggests implementing SCs (such as Ethereum) to automate and control the HIoT services subscribed by the trusted devices/nodes.The Ethereum,as discussed earlier, is a worldwide, open-source blockchain SC for decentralized IoT systems that gives the ability to compose code that controls digital data, runs exactly as it is customized,and can be accessed over the Internet.The rationale for the proposed solution is that using an Ethereum for security preservation issues in the HIoT frameworks will provide a consistent and stable exchange of the TXs between associated devices, similar to how it works blockchain-based digital cryptocurrencies [9].The facilities provided by the customer are governed by the terms and conditions of the SC.If there are any violations of the terms and conditions, counteractive measures can be automatically carried out.Our proposed BaaU framework uses a private blockchain.It is possible to base the consensus process on the PoS for such applications with extended facilities like proof of healthcare stack (PoHS) or proof of medical stack (PoMS) [61].In this consensus mechanism, device stakeholders who defne their initial tokens, depending on the quantity of healthcare data they contribute, are the SCs.The tokens can then be dynamically updated based on their behavior (willingness to verify transactions) [62].By implementing high sanctions, malicious actions will be tackled.Suppose a breach of the HIoT safety and dignity can specifcally affect patients’ health or have legal and legislative implications.In that case, the authorization for misuse of voting power can be effect-related, for example, depending on the tokens retained and the potential effects of the violation in the worst case.It is important to note that authorizations can be represented in multiple ways; economic or reputational.The reputational might mean that the device’s voting power (impact) is halved (and equally compensated for good conduct over time) for each breach.

    6 Conclusion

    The HIoT consists of a multi-sensor system that periodically tracks the physio-synthetic information provided by the body’s physiological reactions.A massive amount of health-related information is transmitted to the cloud continues to analyze further and treat patients.The information shared is susceptible and vital, requiring immunity to unauthorized alterations.The blockchain networks have recently emerged as a critical technology that transforms the way we exchange information.This technology has exhibited promising application scenarios, such as protected digital currencies.As a technical development, the blockchain network has the drastic potential to transform many industries, and a HIoT could be one of the next generations of such applications.There have been various studies on the convergence of the blockchain networks and the IoT; however, these lack a formal structure for using blockchain-as-a-utility (BaaU) for HIoT privacy and security systems.In this paper, we overview the blockchain networks in the HIoT applications for privacy preservation.Besides, we suggest using blockchain’s decentralized and robust capabilities as a utility (BaaU) in a system to mitigate these protection and privacy issues for the HIoT applications.Our proposed architecture proposes two BaaU scenarios to execute the blockchain in the HIoT for security and privacy conservation.The frst recommendation suggests that a healthcare service provider integrates IoT sensors such as body sensors to transmit information to a blockchain network on the IoT devices.The second proposed scenario recommends implementing smart contracts, such as Ethereum, to automate and control the HIoT services.

    Acknowledgement:The authors gratefully acknowledge DSR technical and fnancial support for RG-2-611-41.

    Funding Statement:This work was supported by the Deanship of Scientifc Research (DSR), King Abdulaziz University, Jeddah, under Grant No.RG-2-611-41 (A.OA.received the grant).

    Conficts of Interest:The authors declare that they have no conficts of interest to report regarding the present study.

    亚洲,一卡二卡三卡| 亚洲成人手机| 欧美另类一区| 欧美国产精品一级二级三级| 美女国产视频在线观看| 久久这里只有精品19| 国产熟女午夜一区二区三区| 这个男人来自地球电影免费观看 | www.色视频.com| 国产极品粉嫩免费观看在线| 波多野结衣一区麻豆| 精品国产乱码久久久久久小说| 久久免费观看电影| 午夜福利网站1000一区二区三区| 国产男女超爽视频在线观看| 国产av精品麻豆| 日韩熟女老妇一区二区性免费视频| 黄色配什么色好看| 色94色欧美一区二区| 欧美日韩综合久久久久久| 久久久久久久久久久免费av| 久久精品国产亚洲av涩爱| 国产在线视频一区二区| 欧美日本中文国产一区发布| 久久久国产精品麻豆| 极品少妇高潮喷水抽搐| 久久人人爽人人片av| 久久人人爽人人片av| 亚洲成人一二三区av| 高清毛片免费看| 十八禁高潮呻吟视频| 午夜福利视频在线观看免费| 精品一品国产午夜福利视频| 蜜桃在线观看..| 久久久久国产网址| 90打野战视频偷拍视频| 国产av精品麻豆| 欧美日韩一区二区视频在线观看视频在线| 高清黄色对白视频在线免费看| 亚洲av中文av极速乱| 在线观看免费日韩欧美大片| 街头女战士在线观看网站| 视频区图区小说| 国产一区亚洲一区在线观看| 精品一区在线观看国产| 日韩成人av中文字幕在线观看| 国产成人a∨麻豆精品| 嫩草影院入口| videossex国产| 2021少妇久久久久久久久久久| 亚洲人与动物交配视频| 秋霞在线观看毛片| 丰满饥渴人妻一区二区三| 午夜激情av网站| 欧美丝袜亚洲另类| 中文字幕制服av| 97在线人人人人妻| 久久久久久久亚洲中文字幕| 在线观看免费视频网站a站| 蜜桃在线观看..| 在线精品无人区一区二区三| 女人久久www免费人成看片| 国产亚洲精品第一综合不卡 | 97超碰精品成人国产| 日韩在线高清观看一区二区三区| 久久鲁丝午夜福利片| 波野结衣二区三区在线| 国产男女超爽视频在线观看| 精品福利永久在线观看| 91午夜精品亚洲一区二区三区| 免费人妻精品一区二区三区视频| 美女主播在线视频| 草草在线视频免费看| 又粗又硬又长又爽又黄的视频| 欧美少妇被猛烈插入视频| 美女xxoo啪啪120秒动态图| 久久国产亚洲av麻豆专区| 热99国产精品久久久久久7| 2021少妇久久久久久久久久久| 亚洲国产色片| 国产无遮挡羞羞视频在线观看| 久热久热在线精品观看| 久久精品国产a三级三级三级| 男人添女人高潮全过程视频| 亚洲性久久影院| 最近中文字幕2019免费版| 汤姆久久久久久久影院中文字幕| 精品国产乱码久久久久久小说| 美女国产视频在线观看| 伦理电影免费视频| 亚洲成人手机| 久久久久国产精品人妻一区二区| 国产精品一二三区在线看| 女的被弄到高潮叫床怎么办| 国产在线一区二区三区精| 日韩电影二区| 在线天堂中文资源库| 欧美日韩综合久久久久久| 国产精品 国内视频| 日韩不卡一区二区三区视频在线| 久久精品国产自在天天线| 精品久久久久久电影网| 国产精品国产三级国产av玫瑰| 中国三级夫妇交换| 色哟哟·www| 免费大片18禁| 午夜91福利影院| 美女国产高潮福利片在线看| 国产成人aa在线观看| 性色av一级| 国产亚洲av片在线观看秒播厂| 日韩制服骚丝袜av| 欧美日韩精品成人综合77777| 亚洲成国产人片在线观看| 久久久久人妻精品一区果冻| 久久精品久久精品一区二区三区| 日韩欧美精品免费久久| 国产精品99久久99久久久不卡 | 国产黄色免费在线视频| av福利片在线| 国产成人精品婷婷| 亚洲av电影在线观看一区二区三区| 在线观看免费高清a一片| 美国免费a级毛片| 熟女人妻精品中文字幕| 亚洲精品456在线播放app| 亚洲精品一区蜜桃| 国产69精品久久久久777片| 亚洲三级黄色毛片| 精品少妇黑人巨大在线播放| 国产熟女欧美一区二区| 中文欧美无线码| 一级毛片 在线播放| 男女边吃奶边做爰视频| 校园人妻丝袜中文字幕| 热99国产精品久久久久久7| 婷婷成人精品国产| 久久久a久久爽久久v久久| 赤兔流量卡办理| 亚洲成色77777| 男女边摸边吃奶| 一区二区av电影网| 一本—道久久a久久精品蜜桃钙片| 多毛熟女@视频| 国产亚洲最大av| 美女xxoo啪啪120秒动态图| 99久久综合免费| 最近的中文字幕免费完整| av线在线观看网站| 青春草视频在线免费观看| 亚洲久久久国产精品| 亚洲成人av在线免费| 免费高清在线观看视频在线观看| 桃花免费在线播放| 中文字幕最新亚洲高清| 在线 av 中文字幕| 久久精品国产a三级三级三级| 精品一品国产午夜福利视频| 成人免费观看视频高清| 日韩人妻精品一区2区三区| 日韩伦理黄色片| 中国国产av一级| 国产精品久久久久成人av| 欧美 日韩 精品 国产| 欧美97在线视频| 亚洲精品美女久久久久99蜜臀 | 日本免费在线观看一区| 欧美亚洲 丝袜 人妻 在线| 99热网站在线观看| 精品第一国产精品| videossex国产| 晚上一个人看的免费电影| 国产色婷婷99| 90打野战视频偷拍视频| 汤姆久久久久久久影院中文字幕| 五月玫瑰六月丁香| 亚洲 欧美一区二区三区| 51国产日韩欧美| 精品亚洲成国产av| 亚洲久久久国产精品| 人成视频在线观看免费观看| 极品人妻少妇av视频| 在线观看美女被高潮喷水网站| 老司机亚洲免费影院| 久久久久久久大尺度免费视频| 人妻 亚洲 视频| 免费观看在线日韩| 免费播放大片免费观看视频在线观看| 国产片内射在线| 亚洲av免费高清在线观看| 国产在线一区二区三区精| kizo精华| 寂寞人妻少妇视频99o| 日本wwww免费看| 日本爱情动作片www.在线观看| 国产精品一区www在线观看| av黄色大香蕉| 国产欧美亚洲国产| freevideosex欧美| 亚洲综合色惰| 国产成人免费无遮挡视频| 韩国av在线不卡| 日韩视频在线欧美| 90打野战视频偷拍视频| 日本色播在线视频| 欧美国产精品一级二级三级| 人妻人人澡人人爽人人| 丝瓜视频免费看黄片| 人妻一区二区av| 1024视频免费在线观看| 亚洲av男天堂| 9色porny在线观看| 99久国产av精品国产电影| 欧美日韩亚洲高清精品| 亚洲丝袜综合中文字幕| videosex国产| 少妇被粗大猛烈的视频| 综合色丁香网| 熟女人妻精品中文字幕| 国产成人精品一,二区| 久久久久久久久久人人人人人人| 欧美日韩精品成人综合77777| 亚洲欧洲日产国产| 夜夜骑夜夜射夜夜干| 欧美成人午夜免费资源| 黄色一级大片看看| 亚洲激情五月婷婷啪啪| 又粗又硬又长又爽又黄的视频| 亚洲欧美清纯卡通| 国产深夜福利视频在线观看| 精品久久久久久电影网| 视频中文字幕在线观看| 国产乱来视频区| 久久这里有精品视频免费| 制服丝袜香蕉在线| 亚洲一级一片aⅴ在线观看| 免费观看性生交大片5| 丰满饥渴人妻一区二区三| 少妇的逼水好多| 午夜福利网站1000一区二区三区| 色婷婷av一区二区三区视频| 黄色毛片三级朝国网站| 少妇熟女欧美另类| 国产色爽女视频免费观看| 女性生殖器流出的白浆| 精品国产乱码久久久久久小说| 欧美少妇被猛烈插入视频| 九色亚洲精品在线播放| 国产xxxxx性猛交| 老司机影院毛片| 亚洲av成人精品一二三区| 啦啦啦中文免费视频观看日本| 久久久久国产精品人妻一区二区| 国产又爽黄色视频| 黑丝袜美女国产一区| 国产麻豆69| 看免费av毛片| 黄色 视频免费看| 捣出白浆h1v1| 欧美精品一区二区免费开放| 亚洲av电影在线观看一区二区三区| 久久久久国产精品人妻一区二区| 免费人成在线观看视频色| 日韩av在线免费看完整版不卡| 欧美国产精品一级二级三级| 水蜜桃什么品种好| 亚洲丝袜综合中文字幕| 日韩一本色道免费dvd| 2018国产大陆天天弄谢| 在现免费观看毛片| 老女人水多毛片| 永久网站在线| 一边亲一边摸免费视频| 精品卡一卡二卡四卡免费| 亚洲少妇的诱惑av| 男女下面插进去视频免费观看 | 精品午夜福利在线看| 亚洲高清免费不卡视频| 新久久久久国产一级毛片| 国产熟女欧美一区二区| 七月丁香在线播放| 一级毛片我不卡| 丁香六月天网| 九九在线视频观看精品| 少妇人妻久久综合中文| 日日爽夜夜爽网站| 亚洲国产欧美日韩在线播放| 成人亚洲精品一区在线观看| 五月伊人婷婷丁香| 91在线精品国自产拍蜜月| 蜜桃国产av成人99| 国产在线视频一区二区| 欧美bdsm另类| 国精品久久久久久国模美| 九九爱精品视频在线观看| 成人免费观看视频高清| 一区二区av电影网| 精品久久久精品久久久| 91成人精品电影| av.在线天堂| 久久久国产一区二区| 99久国产av精品国产电影| 日韩精品免费视频一区二区三区 | 国产成人91sexporn| 久久午夜福利片| 亚洲精品久久成人aⅴ小说| 亚洲av中文av极速乱| 高清不卡的av网站| 丁香六月天网| 久久99一区二区三区| 久久久精品94久久精品| 激情视频va一区二区三区| 色5月婷婷丁香| 观看av在线不卡| 亚洲色图综合在线观看| 99久久人妻综合| 香蕉丝袜av| 一本色道久久久久久精品综合| 人妻少妇偷人精品九色| 在线观看免费视频网站a站| 一级,二级,三级黄色视频| 久久ye,这里只有精品| 婷婷色av中文字幕| 黄色配什么色好看| 亚洲av.av天堂| 在线 av 中文字幕| 日本欧美视频一区| 亚洲第一区二区三区不卡| 搡老乐熟女国产| 久久久久久人妻| 成人毛片a级毛片在线播放| av国产精品久久久久影院| 久久久久久久亚洲中文字幕| 香蕉丝袜av| 亚洲成av片中文字幕在线观看 | 亚洲精品成人av观看孕妇| 丁香六月天网| 久久精品久久久久久噜噜老黄| 国产亚洲一区二区精品| 伦理电影大哥的女人| 免费久久久久久久精品成人欧美视频 | 爱豆传媒免费全集在线观看| 一级黄片播放器| 99国产精品免费福利视频| 黑人高潮一二区| 久久久久久久大尺度免费视频| 国产黄色免费在线视频| 99久久精品国产国产毛片| 久久鲁丝午夜福利片| 一级片'在线观看视频| 男人舔女人的私密视频| 久久久亚洲精品成人影院| 一二三四中文在线观看免费高清| 亚洲欧美色中文字幕在线| 久久精品久久久久久噜噜老黄| 下体分泌物呈黄色| 大香蕉久久网| 男女高潮啪啪啪动态图| 国产乱人偷精品视频| 日本av免费视频播放| 国产精品一区www在线观看| 人人妻人人澡人人爽人人夜夜| 伦理电影免费视频| 国产日韩欧美在线精品| 最新中文字幕久久久久| 亚洲国产精品成人久久小说| 极品人妻少妇av视频| 久久久精品区二区三区| 黄色一级大片看看| 午夜影院在线不卡| 肉色欧美久久久久久久蜜桃| av一本久久久久| 亚洲图色成人| 亚洲经典国产精华液单| 国产男人的电影天堂91| 五月开心婷婷网| 少妇的丰满在线观看| 国产日韩欧美视频二区| 亚洲精品美女久久av网站| 最黄视频免费看| 亚洲欧美中文字幕日韩二区| 日本黄色日本黄色录像| 日日撸夜夜添| 在线免费观看不下载黄p国产| 99国产精品免费福利视频| 日日撸夜夜添| 侵犯人妻中文字幕一二三四区| 99国产综合亚洲精品| 亚洲精品久久午夜乱码| 免费黄频网站在线观看国产| 亚洲人成77777在线视频| 国产精品欧美亚洲77777| 国产深夜福利视频在线观看| 亚洲第一区二区三区不卡| 天美传媒精品一区二区| 天天影视国产精品| 99热国产这里只有精品6| 亚洲精品第二区| 美女脱内裤让男人舔精品视频| 国产高清国产精品国产三级| av线在线观看网站| 男的添女的下面高潮视频| 久久99热这里只频精品6学生| 久久久久久久亚洲中文字幕| 久久99蜜桃精品久久| 午夜福利影视在线免费观看| 不卡视频在线观看欧美| 一级a做视频免费观看| 18禁动态无遮挡网站| 在线看a的网站| 一二三四中文在线观看免费高清| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 美女xxoo啪啪120秒动态图| 久久国产精品男人的天堂亚洲 | 欧美成人午夜免费资源| 日本午夜av视频| 成人二区视频| 十八禁网站网址无遮挡| 在线观看美女被高潮喷水网站| 久久精品aⅴ一区二区三区四区 | 国产极品天堂在线| 老司机亚洲免费影院| 在线天堂最新版资源| 美女内射精品一级片tv| 久久鲁丝午夜福利片| 黑人欧美特级aaaaaa片| 成人综合一区亚洲| 如日韩欧美国产精品一区二区三区| 国产老妇伦熟女老妇高清| 国产高清不卡午夜福利| 国产视频首页在线观看| 日本91视频免费播放| 日本与韩国留学比较| 国产 精品1| 国产福利在线免费观看视频| 色视频在线一区二区三区| 少妇被粗大的猛进出69影院 | 老司机影院成人| videosex国产| 国产av国产精品国产| 亚洲,欧美精品.| 高清av免费在线| 久久人人爽av亚洲精品天堂| 成人二区视频| 亚洲精品视频女| 国产免费一区二区三区四区乱码| 国产成人午夜福利电影在线观看| 精品一区二区三区四区五区乱码 | 亚洲欧美一区二区三区国产| 男女免费视频国产| 亚洲国产色片| 午夜福利网站1000一区二区三区| 亚洲婷婷狠狠爱综合网| 精品人妻熟女毛片av久久网站| 久久久久人妻精品一区果冻| 国产日韩一区二区三区精品不卡| av在线老鸭窝| 搡女人真爽免费视频火全软件| 另类精品久久| 国产黄色免费在线视频| 国产 精品1| 男女免费视频国产| 日韩免费高清中文字幕av| 国产成人精品在线电影| 日本爱情动作片www.在线观看| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 男女边吃奶边做爰视频| 国产探花极品一区二区| 亚洲欧美清纯卡通| 2022亚洲国产成人精品| 午夜精品国产一区二区电影| 各种免费的搞黄视频| 人妻 亚洲 视频| 欧美日韩视频高清一区二区三区二| 精品酒店卫生间| av不卡在线播放| 国产极品天堂在线| 99久久人妻综合| 久久久国产一区二区| 高清视频免费观看一区二区| 18禁在线无遮挡免费观看视频| 午夜福利网站1000一区二区三区| 999精品在线视频| 桃花免费在线播放| 国产不卡av网站在线观看| 日日爽夜夜爽网站| 国产福利在线免费观看视频| 欧美亚洲日本最大视频资源| 女人精品久久久久毛片| 亚洲精品一二三| 午夜福利视频精品| 亚洲av欧美aⅴ国产| 亚洲精品中文字幕在线视频| 国产精品国产三级国产av玫瑰| 久久久精品免费免费高清| av国产精品久久久久影院| 免费观看av网站的网址| 久久精品久久久久久久性| 精品国产一区二区久久| 精品一品国产午夜福利视频| 日本av手机在线免费观看| 国产精品久久久久久久电影| 日韩一区二区三区影片| 国产麻豆69| 久久精品aⅴ一区二区三区四区 | a级毛片黄视频| 午夜av观看不卡| 精品亚洲成国产av| 国产精品一区二区在线不卡| 亚洲人成77777在线视频| 日韩 亚洲 欧美在线| 国产熟女午夜一区二区三区| 国产又爽黄色视频| 精品少妇久久久久久888优播| 丝袜人妻中文字幕| 精品99又大又爽又粗少妇毛片| 国产成人精品婷婷| 在线天堂中文资源库| 国内精品宾馆在线| 国产一区二区三区av在线| 一个人免费看片子| 欧美日韩视频高清一区二区三区二| 最近中文字幕2019免费版| 少妇人妻精品综合一区二区| 日韩制服骚丝袜av| 国产不卡av网站在线观看| 精品卡一卡二卡四卡免费| 一级,二级,三级黄色视频| 日韩制服丝袜自拍偷拍| 男女高潮啪啪啪动态图| 老司机影院毛片| 少妇人妻精品综合一区二区| 精品一区二区免费观看| 午夜免费男女啪啪视频观看| 精品国产国语对白av| 这个男人来自地球电影免费观看 | 999精品在线视频| 五月玫瑰六月丁香| 成年人免费黄色播放视频| 国内精品宾馆在线| 婷婷色综合大香蕉| 高清在线视频一区二区三区| 久久午夜综合久久蜜桃| 全区人妻精品视频| 国产精品久久久久久精品古装| 精品久久蜜臀av无| 国产在线视频一区二区| 国产精品久久久久久精品电影小说| 最黄视频免费看| 午夜免费观看性视频| 91精品国产国语对白视频| 中文天堂在线官网| 黑人巨大精品欧美一区二区蜜桃 | 黄色配什么色好看| 欧美精品亚洲一区二区| 国产一区二区在线观看av| 亚洲精品一二三| 婷婷色综合www| 欧美精品一区二区免费开放| 夜夜爽夜夜爽视频| 少妇猛男粗大的猛烈进出视频| 日韩av在线免费看完整版不卡| 亚洲国产精品国产精品| 久久午夜综合久久蜜桃| 精品熟女少妇av免费看| 久久久久久人人人人人| 一级毛片电影观看| 久久国产精品大桥未久av| 韩国高清视频一区二区三区| 精品午夜福利在线看| 日韩,欧美,国产一区二区三区| 亚洲精品日本国产第一区| 日韩精品有码人妻一区| 久久毛片免费看一区二区三区| 大片免费播放器 马上看| av在线观看视频网站免费| av在线老鸭窝| 久久99热这里只频精品6学生| 亚洲av欧美aⅴ国产| 乱人伦中国视频| 国产精品女同一区二区软件| 亚洲第一区二区三区不卡| 女人被躁到高潮嗷嗷叫费观| 免费av中文字幕在线| 国产av码专区亚洲av| 妹子高潮喷水视频| 自拍欧美九色日韩亚洲蝌蚪91| av有码第一页| 秋霞在线观看毛片| 精品午夜福利在线看| 女性生殖器流出的白浆| 国产乱来视频区| 一本色道久久久久久精品综合| 国产欧美亚洲国产| 亚洲精品第二区| 久久久久视频综合| 国产精品.久久久| 少妇人妻精品综合一区二区| 各种免费的搞黄视频| 五月开心婷婷网| a级毛色黄片| 一级片'在线观看视频| 波野结衣二区三区在线| 久久久精品区二区三区| 免费久久久久久久精品成人欧美视频 | 亚洲国产精品999| 中文乱码字字幕精品一区二区三区| 最新中文字幕久久久久| 国产伦理片在线播放av一区| 亚洲av免费高清在线观看| 一区二区av电影网| 深夜精品福利| 亚洲欧美一区二区三区国产| 免费不卡的大黄色大毛片视频在线观看| 精品酒店卫生间|