• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Towards Privacy-Preserving Cloud Storage:A Blockchain Approach

    2021-12-15 07:06:38JiaShunZhangGangXuXiuBoChenHaseebAhmadXinLiuandWenLiu
    Computers Materials&Continua 2021年12期

    Jia-Shun Zhang,Gang Xu,Xiu-Bo Chen,Haseeb Ahmad,Xin Liu and Wen Liu

    1Information Security Center,State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing,100876,China

    2School of Information Science and Technology,North China University of Technology,Beijing,100144,China

    3Department of Computer Science,National Textile University,Faisalabad,37610,Pakistan

    4Inner Mongolia University of Science&Technology,School of Information Engineering,Baotou,014010,China

    5State Key Laboratory of Media Convergence and Communication,Communication University of China

    6School of Computer Science and Cybersecurity,Communication University of China

    7Key Laboratory of Convergent Media and Intelligent Technology Communication University of China,Ministry of Education,Beijing,102204,China

    Abstract:With the rapid development of cloud computing technology,cloud services have now become a new business model for information services.The cloud server provides the IT resources required by customers in a selfservice manner through the network, realizing business expansion and rapid innovation.However, due to the insufficient protection of data privacy, the problem of data privacy leakage in cloud storage is threatening cloud computing.To address the problem, we propose BC-PECK, a data protection scheme based on blockchain and public key searchable encryption.Firstly,all the data is protected by the encryption algorithm.The privacy data is encrypted and stored in a cloud server,while the ciphertext index is established by a public key searchable encryption scheme and stored on the blockchain.Secondly,based on the characteristics of trusted execution of smart contract technology,a control mechanism for data accessing and sharing is given.Data transaction is automatically recorded on the blockchain,which is fairer under the premise of ensuring the privacy and security of the data sharing process.Finally,we analyzed the security and fairness of the current scheme.Through the comparison with similar schemes, we have shown the advantages of the proposed scheme.

    Keywords: Blockchain; privacy protection; smart contract; public encryption keyword search

    1 Introduction

    In recent years, the vigorous development of cloud computing technology has emerged as a new vitality in the information industry.Compared with traditional IT system, cloud computing provides various convenient and reliable services by deploying servers in the cloud, allowing users to manage their business flexibly and efficiently.However, at the same time, user’s weak control of cloud server has brought security problem of data stored in the cloud server.In this context, encrypting has become an effective way to enhance the privacy and security of cloud-stored data.Schemes such as homomorphic encryption [1], provable data possession [2],proof of retrievability [3] and some related schemes [4–7] mainly focus on the data integrity and confidentiality, but the data sharing process is inefficient.With the development of cryptography,Searchable Encryption (SE) technology has received widespread attention which can balance the security of cloud storage data and convenience of management.

    According to the encryption method, Searchable Encryption can be divided into Symmetric Searchable Encryption (SSE) and Public key Encryption with Keyword Search (PEKS).In 2000,Song et al.[8] firstly constructed an SSE scheme using a linear scan method of keyword ciphertext based on symmetric encryption.Since SSE uses a symmetric key to encrypt ciphertext, it is more suitable for single-user scenarios.In 2004, Boneh et al.[9] switched symmetric encryption to public-key encryption technology and proposed a PEKS scheme in the background of email data encryption.Boneh et al.used a public-key encryption algorithm in their scheme and upgraded the single-user model to a multi-user model.They also defined data owners, data users, and cloud storage servers in their scheme.This change makes searchable encryption technology more suitable for data storage and exchange in the multi-user scenario, thereby increasing the value of the searchable encryption technology.

    In schemes [8,9], there is only one index keyword for retrieving ciphertext, and it should be accurate and correct, which makes data search easily fails due to the existence of synonyms.To improve the usability of data searching, Li et al.[10] gave a symmetric fuzzy keyword searchable encryption scheme using a keyword edit distance method.When the keyword spelling or format is wrong, their scheme can compare the similarity of keywords and obtain correct search results, thereby enhancing the practicality of keyword search.In 2013, based on homomorphic encryption technology, Dong et al.[11] proposed an interactive fuzzy keyword PEKS scheme.Compared with the fuzzy search scheme of Li et al., the scheme of Dong et al.improves the computational efficiency.

    Another method to enhance the accuracy of the search process is the searchable encryption technology that supports joint keyword queries.This idea was first proposed by Park et al.[12].They constructed two Public Key Encryption with Conjunctive Field Keyword Search (PECK)schemes.Adding a single query keyword to multiple keyword queries effectively improve the accuracy of the search, but there are some shortages in schemes of Park et al.The first scheme of Park et al.requires multiple bilinear pairing calculations to encrypt keywords, while the second scheme requires a private key proportional to the number of keywords, increasing the complexity of schemes.Later in 2007, Hwang et al.[13] proposed an efficient PECK scheme based on Decision Linear Diffie-Hellman (DLDH) problem, which can effectively implement multi-keyword joint query by using only one key.In 2013, Hu et al.[14] designed a PECK scheme to sort the search results.By sorting, only the most similar results are returned, which guarantees the multi-keyword query while improving the performance of the query.Wang et al.[15] gave a sortable PECK scheme based on the inverted index technology in 2015.Using multiplication and exponentiation operations, this scheme performs better than previous bilinear calculation schemes.It causes less computational overhead in practical applications.Wu et al.[16] realized a searchable encryption scheme with revocable data access rights while supporting joint keyword query, thereby improving the management ability of PEKS.

    In the above schemes, the data retrieval process is performed by the cloud server that stores target data.Therefore, the cloud server in the above literature is specified as honest but curious, that is, it will not maliciously and intentionally perform search operations by mistake.In other words, the above schemes are difficult to resist attacks from malicious servers due to credibility defects.

    In the last decade, blockchain technology has become a research hotspot.As an emerging distributed database technology, blockchain technology has the characteristics of credibility and unforgeability.With the development of technology, more blockchain applications with unique features are gradually documented [17–20].Compared to those blockchain-based encrypted digital currencies [21], one of the major breakthroughs is the blockchain application that implements smart contract.With the help of smart contract, blockchain supports fixed-step trusted transactions without any third party.These transactions are traceable and undeniable.This feature makes blockchain qualified as a reliable manager in the data management process.Wang et al.[22] proposed a blockchain-based data protection method in the Internet of Things environment through a new type of RSA accumulator.While Deng et al.[23] designed an electronic medical record protect scheme based on proofs of retrievability and blockchain.In 2020, Gao et al.[24] gave a blockchain-based data protection scheme, which effectively provides a reliable control method for data privacy in the multimedia field.

    The trusted, traceable, and non-tamperable characteristics of the blockchain coincide with a fair and trustworthy server environment in searchable encryption.With the development of blockchain technology, SE starts combining blockchain technology.For example, Hu et al.[25]combined SSE with Ethereum and designed a scheme for effective management and encryption of E-mail data.Chen et al.[26] designed and implemented a medical record transaction scheme based on SE technology.In 2020, based on blockchain technology, Yan et al.[27] gave a SE scheme that can achieve more fine-grained access control by combining attributes encryption and symmetric searchable encryption, effectively restricting malicious server.

    Considering the lack of the cloud server’s credibility in the existing SE schemes, this article combines public-key searchable encryption and blockchain technology to construct a PECK scheme based on smart contracts.This scheme aims to solve the privacy and credibility issues in the context of cloud storage.The main contributions of this article are as follows:

    (1) We propose BC-PECK, a cloud storage data privacy protection scheme based on blockchain and smart contracts.Blockchain and smart contract are fair and credible to ensure the data sharing process.It demonstrates the potential of blockchain technology in enhancing data privacy protection.

    (2) We introduce a PECK technology in our scheme.The data sharing process in multi-user scenarios is realized with the help of PECK.Moreover, our scheme allows a more complex and accurate query process using multi-keyword retrieval.This effectively enhances the practicability of our scheme.

    (3) We prove the security of BC-PECK, and ensured that our scheme could effectively prevent the leakage of private data and realize ciphertext query simultaneously.We also ensure the feasibility of our scheme in practical applications through performance analysis.

    The rest of our article is organized as follows.In Section 2, background knowledge is introduced.The model and algorithm flow of the scheme are given in Section 3.In Section 4, we describe the detailed execution process of the scheme.In Section 5, we analyze and evaluates the performance of our scheme.Finally, in Section 6, the whole article is summarized, and the future research directions are discussed.

    2 Preliminaries

    2.1 Ethereum&Smart Contract

    Ethereum is a blockchain platform that uses proof of work consensus mechanism and generates chain structure.The Ethereum client constructs a turing complete virtual machine called Ethereum virtual machine [17].It is associated with a programming language called Solidity.Therefore, Ethereum is programmable, and can deploy smart contract programs for distributed trusted applications.

    Smart contract is defined by [28] as a method to automatically execute pre-defined electronic contracts.With the development of blockchain technology, smart contract has received extensive attention in the field of blockchain.In Ethereum, smart contract is programmed according to the predetermined process, and then deployed to the Ethereum blockchain network.Smart contract ensures that its content is fixed and cannot be changed, which coincides with the characteristics of Ethereum.Through smart contract, the fairness and credibility of Ethereum can be effectively enhanced.

    2.2 Bilinear Pair

    Supposing G1,G2are two cyclic groups of orderp, andgis a generator of G1.There is a mapping:G1×G1→G2, then this set of mappings should satisfy:

    (2) Non-degenerate.There existsx∈G1that(x,x)1.

    (3) Computable.There are efficient algorithms making it possible to compute(x,y)for anyx,y∈G1.

    2.3 Decision Linear Diffie-Hellman Assumption

    The DLDH hypothesis was proposed by Boneh et al.[29].It is assumed that there are groups G1,G2and map:G1×G1→G2, andg1,g2,g3as a random element of G1,a,b,care random elements of.Then the DLDH problem in G1is defined as, for two six-tuplesandthe adversary without polynomial time can distinguish the above two six-tuples with non-negligible advantages.

    3 System Model

    3.1 Definition of System Structure

    The structure of our scheme is shown in Fig.1.There are four major participants, namely data owner (DO), data user (DU), cloud server (CS) and smart contract (SC).The relationship between each participant is shown in Fig.1, and the specific operations of each participant are as follows:

    Figure 1:The structure of BC-PECK

    (1) Data Owner.DO holds documents to be stored on CS and these data can be selling to other data users.The document owned by DO contains multiple keywords.DO will extract keywords contained in the file to construct ciphertext index and ciphertext file.Then the corresponding content will be sent to the smart contract and cloud server.In addition, DO needs to generate trapdoors for searching data after submitting requests for data users.

    (2) Data User.DU wants to pay a certain price to use the data uploaded by DO, so DU needs to submit a search request to DO through SC.If the search results are correct and the data is complete, DU will pay to DO a bid for the data.Otherwise, there is no need for DU to pay.

    (3) Smart Contract.SC stores ciphertext index and verification data.It will verify the correctness of search results through a predefined process.In addition, smart contracts can also use blockchain for fair payments.

    (4) Cloud Server.The cloud storage server will store the encrypted files of DO.After SC verifies above data sharing process, CS transmits the corresponding ciphertext file to DU.

    3.2 System Work Flow

    Based on the PECK algorithm [13], we construct a PECK scheme based on blockchain called BC-PECK.The process can be described by a five-tuple (Setup, Index, Trapdoor, Test, Verify):

    (1) Setup:DO generate the public parameterParamsand the public and private key pair used by each participant in the subsequent steps.In addition, DO also needs to initialize smart contracts for the management process and fair payment.

    (2) Index:DO extracts a keyword setWfrom the data fileDand generates an encrypted keyword indexS.DO also uses an encryption algorithm to encryptDand obtain ciphertext fileC, calculate the hash valueHofC.After sendingCto CS, DO obtain the stored serial numberN, and send verify data (S,N,H) to SC for fair payment.

    (3) Trapdoor:DU requests search authorization from DO through the smart contract.After DO uses SC to confirm the request, DU sends authorized search keywordsQto DO through a secure channel.DO calculates the keyword trapdoorTq, and sendsTqto SC for retrieval operation.

    (4) Test:According to indexSgenerated in previous step and the search trapdoorTq, SC calculates whether the keyword of the trapdoor query matches the file.When the file matches, SC changes the variable of the data stored in SC as the result of the query.Otherwise, the value of the variable will not be changed.

    (5) Verify:According to the query result, DU applies for the ciphertext fileCto CS after the query result is the required document, and CS queries SC for query result.After getting the affirmation, send ciphertext to the DU.Then DU calculates the hash valueHof the ciphertext after obtaining data to ensure that data has not been tampered with by CS.If the hashHis confirmed to be valid, SC will automatically use the search fee deposited by DU to pay the data fee to DO and storage service fee to CS.Otherwise, DU’s money will be refunded to his own account.After verification, the ciphertext fileCwill be sent to DU.Then DU decrypts the encrypted document and uses it after receiving the ciphertext document from the CS.

    3.3 Security Goals

    In this subsection, the security goals of our scheme can be divided into following two aspects.

    (1) Confidentiality.The confidentiality here means that our scheme does not leak the keyword information during the data storage process and the data query process.Assuming the ciphertext file is safe, then only the confidentiality of ciphertext index and search trapdoor needs to considered.That is to say the adversary cannot obtain extra information through the analysis of ciphertext index and trapdoor.

    (2) Fairness.Fairness requires that each role in the system correctly executes the algorithm in accordance with the regulations and completes the content of the specific steps to obtain the corresponding incentives.If the wrong operation of one party leads to failure,he cannot get the corresponding income.Furthermore, the operation that already happened should not be denied.Fairness means every participant is motivated to perform correct operations.

    4 The Detail Construction of BC-PECK

    In this section, we will introduce the BC-PECK scheme process in detail.

    (1) Setup(k):DO generates a public parameterParams=based on the secret parameterk.The elements inParamsare cyclic group G1and G2,H1:{0,1}logw→G1andH2:{0,1}logw→G1are two different anti-collision hash functions, andgis a generator of G1.Then DO arbitrarily selects a random numberxoncalculatesy=gx, and finally obtains a public and private key pair(pk,sk)=(y,x).

    In addition, DO also needs to deploy and initialize the smart contract.He also needs to set a purchase price for the data.

    (2) Index(pk,W,D):DO extracts the keyword setW={w1,···wn} contained in the fileD,then uses a common encryption algorithm to encrypt the fileENC(D)=C, and calculates the hash valueHof the ciphertextC.Then DO generates two random numbersrandsfor the keyword setW, and calculates the ciphertext index informationS={A,B,C1,···,Cl}for search,where:

    Next, DO transmits the ciphertext data to CS and obtains the stored serial numberNof the file, and transmits index and verification information(N,H,S)to SC.

    (3) Trapdoor(sk,Q):DU sends a request for searching data to DO through the smart contract.After DO confirms it on SC, DU calculates hash ofQand a random valuesalt, and sendH(Q+salt)to SC.Then he sends the search keyword setQ=to DO through a secure channel.After DO obtains the search keyword setQ, he generates a random numbertand calculates:

    Finally, DO construct the search trapdoora nd uploadTQto SC to execute the search operation.

    If the search result is correct, SC updates the variable that records the search result in smart contract to confirm the search result.

    (5) Verify(C):After the search results are obtained, DU applies for ciphertext data to CS.Then CS verifies the search results stored in the smart contract.If the result is correct, CS sends the ciphertext dataCto DU, while DU calculates the hash value of the ciphertext and transmits it with DO on SC.When the result is correct, DU pays to DO.After DO obtains the income, he sends the key for data decryption to DU through a secure channel.Finally, DU can decryptC,and get the plaintext fileD.

    5 Security Analysis and Performance Evaluation

    5.1 Security Analysis

    The security of the scheme relies on the confidentiality and fairness of the data.Therefore,the index confidentiality, trapdoor confidentiality and the fairness of the scheme will be analyzed in this subsection.

    5.1.1 Index Confidentiality

    Refer to the chosen ciphertext attack game given in [9,13], as shown in Fig.2, we present the security certification process of our scheme for index confidentiality here:

    Figure 2:The flow of security game of ciphertext index

    (1) Initialize.The challenger initializes relevant information and generates a key pair(pk,sk),and then sends the public key to the adversary.

    (2) Phase 1.The adversary sends different query keyword set to challenger, challenger generates the corresponding trapdoor, and then responds to adversary.

    (3) Challenge.Adversary sends a query keyword setW1that is different from the previous query to challenger.Challenger constructs a random word setRwhich is similar in structure toW1, then challenger generates corresponding ciphertext indexS1=Index(pk,W1)andS2=Index(pk,R).Then, challenger selects a random index, and sends it to adversary.

    (4) Guess.Adversary chooses if he gets the set of keywords sent by himself after getting the index from challenger.If Adversary’s choice is right, he wins the game.When the probability of adversary success is greater than 1/2, it means the adversary has the advantagek=|Pr(Advwin)-1/2|to break the scheme.Whenkis infinitely small, it means that the adversary cannot break through the scheme.

    When the game comes to the guess phase, the opponent needs to guess whetherSchallenge={A,B,C1,···,Cl}is the keyword set sent by himself or randomly generated by the challenger.At this time, according to the previous scheme process, indexesS1andS2can form two tuples in accordance with the DLDH problem, whereRiis the value ofCiin the index generated by the random keyword setR:

    Since this six-tuple is constructed, the adversary needs to break the DLDH problem to win the game.Then the confidentiality of the ciphertext index can be reduced to the DLDH problem,which is a hard problem according to [29].That is to say, BC-PECK can ensure the confidentiality of the ciphertext index.

    5.1.2 Trapdoor Confidentiality

    Similarly, the process of trapdoor confidentiality is shown in Fig.3:

    Figure 3:The flow of security game of search trapdoor

    (1) Initialize.The challenger initializes relevant information and generates a key pair(pk,sk),and then sends the public key to the adversary.

    (2) Phase 1.The adversary sends different query keywords set to challenger, challenger generates the corresponding trapdoor, and then responds to adversary.

    (3) Challenge.Adversary sends two query keyword setsW1andW2different from previous query to challenger.Challenger generates corresponding search trapdoorsTq1=Trapdoor(sk,W1)andTq2=Trapdoor(sk,W2).Then, challenger sends a random trapdoor to the adversary.

    (4) Guess.The adversary guesses which keyword generated the trapdoor he received.If adversary’s choice is right, he wins the game.When the adversary’s success probability is greater than 1/2, it means that the adversary has the advantagek=|Pr(Advwin)-1/2|to break the scheme.

    In our scheme, the calculation of trapdoor is divided into three parts.Since each time of the trapdoor generation process uses a new random number, even the same trapdoor generated each time is different.Therefore, it is difficult for adversary to attack the trapdoor content through statistical analysis attacks.That is to say, the adversary can only randomly guess the keyword by coin flipping, and it is difficult to obtain information from the trapdoor with a nonignorable advantage.Moreover, the request for data generation trapdoor needs to be recorded on blockchain, many repeated search requests can also be expressed through the blockchain, thereby ensuring data security from another perspective.

    5.1.3 Fairness

    Compared with traditional searchable encryption schemes, BC-PECK adjusts the operation authority of cloud server to smart contract deployed on the blockchain.It stores the operation records of data retrieval on the blockchain by calling the smart contract.Since blockchain is a distributed database whose data cannot be tampered with, once the data is confirmed and recorded in the blockchain, it cannot be modified and denied.In this way, the operation records of each role in the implementation process of the scheme can be trusted to implement the audit process.Therefore, relying on the credibility of blockchain and smart contract, BC-PECK can effectively verify the non-compliant operation of a certain role and avoid to get the income that is not its due.On the other hand, cryptocurrency in blockchain provides corresponding pointto-point payments after the process is executed, which also effectively enhances the fairness of the scheme.

    5.2 Performance Evaluation

    In this subsection, we will compare the features and computation cost of BC-PECK with schemes in [16,27].

    5.2.1 Feature Comparison

    As shown in Tab.1, both BC-PECK and scheme of reference [16] are PEKS schemes and support multi-keyword query.However, compared to scheme of reference [16], BC-PECK uses blockchain and smart contracts to search ciphertext.That is to say there is no need to introduce a third party, which can effectively reduce risks and enhance credibility.BC-PECK can also make fair payments for the data transmission process based on the cryptocurrency of blockchain.Compared with the scheme of [27], our scheme uses public key searchable encryption technology which is more suitable for actual multi-user scenarios.Moreover, our scheme supports multikeyword search.This means that our scheme can effectively enhance the accuracy of keyword search, and is more practical.

    Table 1:Comparison of scheme features

    5.2.2 Computation Cost

    Compared with general data storage scheme, searchable encryption adds several cryptographic calculation processes to enhance the privacy and security of data.Therefore, we judge the cost of calculation of three schemes.The symbols used in calculation in these schemes are shown in Tab.2.

    Table 2:Symbols of cryptographic calculations

    As shown in Tab.3, it is not difficult to find that different schemes require relatively more calculations in the index generation stage.Among these schemes, [16] need to perform multiple exponential calculations and pseudo-random function calculations for the system attributes of the access tree.While [27] requires the number of attributes of the encrypted access strategy and pseudo-random function calculations for document keywords.While BC-PECK only needs exponential calculation and hash calculation that are multiples of the number of document keywords.The amount of calculation is relatively small.In the trapdoor generation stage, although BC-PECK requires three exponentials and hash calculation with twice number of query keywords,which is more complicated than only one pseudo-random function in [27].Nevertheless, the calculation is performed locally, the impact on our scheme efficiency is relatively small.In the search stage, the calculation advantage of our scheme compared to the scheme of [16] is obvious,but for the realization of multi-keyword query, the efficiency is not as good as that in [27].Finally,in the verification phase, compared with the three bilinear pairing calculation operations required in [16], both BC-PECK and [27] only need one hash calculation ensuring that the verification phase does not require excessive calculations and effectively reduces the computational overhead.

    Table 3:Cryptographic calculations costs of different schemes

    In summary, BC-PECK is practical and feasible in terms of computational overhead.Meanwhile, it can rely on PECK to ensure data privacy and security.In addition, by combining blockchain and smart contract, the fairness and credibility of the data sharing process can be realized.

    6 Conclusion

    Cloud computing service is becoming the technical support for the transformation and upgradation of various industries worldwide, but the privacy of data in the cloud storage environment has become a serious threat to privacy information.This article resorts to blockchain technology to construct a credible and reliable cloud storage data privacy management scheme.The data is stored and transmitted in the form of ciphertext to ensure data privacy and security.Moreover,through the PECK technology, the accuracy and efficiency of the multi-keyword query of the data sharing process is realized.In addition, the use of blockchain technology and smart contract technology helps to achieve fair and credible access control of data in the multiple users’scenario.Finally, the feasibility and effectiveness of the scheme are proved through security analysis and performance evaluation.In the future, more fine-grained control capabilities will be considered in the data retrieval process, while simplifying the execution steps to further optimize the efficiency of our scheme.

    Funding Statement:This work is supported by the NSFC (Grant Nos.92046001, 61671087,61962009), the Fundamental Research Funds for the Central Universities (Grant No.2019XDA02), the Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data (Grant Nos.2018BDKFJJ018, 2019BDKFJJ010, 2019BDKFJJ014), the High-quality and Cutting-edge Disciplines Construction Project for Universities in Beijing (Internet Information, Communication University of China), the Open Research Project of the State Key Laboratory of Media Convergence and Communication, Communication University of China, China (Grant No.SKLMCC2020KF006).Inner Mongolia Major science and technology projects (2019ZD025),Baotou Kundulun District Science and technology plan project (YF2020013), Inner Mongolia discipline inspection and supervision big data laboratory open project fund (IMDBD2020020),the Natural Science Foundation of Inner Mongolia (2021MS0602), Huawei Technologies Co.Ltd (No.YBN2020085019), and the Scientific Research Foundation of North China University of Technology.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产毛片a区久久久久| 亚洲人成伊人成综合网2020| 成人欧美大片| 日本免费a在线| 波多野结衣高清无吗| 99热这里只有精品一区 | 亚洲国产日韩欧美精品在线观看 | 日本a在线网址| 婷婷精品国产亚洲av在线| 欧洲精品卡2卡3卡4卡5卡区| 51午夜福利影视在线观看| 亚洲中文字幕一区二区三区有码在线看 | 日本与韩国留学比较| 国产综合懂色| 在线播放国产精品三级| 99精品在免费线老司机午夜| 757午夜福利合集在线观看| 999久久久精品免费观看国产| 三级国产精品欧美在线观看 | 成人高潮视频无遮挡免费网站| 手机成人av网站| 日本在线视频免费播放| 国产成人精品无人区| 日韩精品青青久久久久久| 一区二区三区国产精品乱码| 99久久国产精品久久久| 欧美zozozo另类| 久久精品国产清高在天天线| 欧美一区二区精品小视频在线| 国产成人欧美在线观看| 岛国在线免费视频观看| 日韩人妻高清精品专区| 久久国产精品人妻蜜桃| 国产精品一区二区三区四区久久| 国产亚洲精品av在线| 99久久国产精品久久久| 19禁男女啪啪无遮挡网站| 成人av一区二区三区在线看| 久久午夜综合久久蜜桃| 1024手机看黄色片| 亚洲av日韩精品久久久久久密| 日韩欧美精品v在线| 国产99白浆流出| 亚洲av片天天在线观看| 九色国产91popny在线| av片东京热男人的天堂| 后天国语完整版免费观看| 丝袜人妻中文字幕| 国产伦人伦偷精品视频| 国产精品久久久av美女十八| 免费无遮挡裸体视频| 亚洲色图 男人天堂 中文字幕| av在线蜜桃| 视频区欧美日本亚洲| 夜夜夜夜夜久久久久| 一本综合久久免费| 免费电影在线观看免费观看| 午夜免费激情av| 国产爱豆传媒在线观看| 国产精品乱码一区二三区的特点| 成熟少妇高潮喷水视频| 亚洲片人在线观看| 在线观看午夜福利视频| 一区二区三区激情视频| 99在线人妻在线中文字幕| 99在线视频只有这里精品首页| 99精品在免费线老司机午夜| 亚洲成人久久性| 变态另类丝袜制服| 午夜激情福利司机影院| 老熟妇乱子伦视频在线观看| tocl精华| h日本视频在线播放| 亚洲国产精品999在线| 九九热线精品视视频播放| 中国美女看黄片| 日本一本二区三区精品| 免费在线观看影片大全网站| 草草在线视频免费看| 给我免费播放毛片高清在线观看| 亚洲天堂国产精品一区在线| 亚洲中文字幕日韩| 嫩草影院精品99| 法律面前人人平等表现在哪些方面| 国产av麻豆久久久久久久| 中文字幕人成人乱码亚洲影| 免费看美女性在线毛片视频| 俺也久久电影网| 久久午夜亚洲精品久久| 亚洲av电影不卡..在线观看| 三级国产精品欧美在线观看 | 色哟哟哟哟哟哟| av国产免费在线观看| 99热精品在线国产| 一边摸一边抽搐一进一小说| 黄色 视频免费看| xxx96com| 69av精品久久久久久| 97碰自拍视频| 精品久久久久久成人av| 男女之事视频高清在线观看| 国产精品综合久久久久久久免费| 老司机午夜福利在线观看视频| 国产午夜精品久久久久久| 大型黄色视频在线免费观看| 男女那种视频在线观看| 香蕉丝袜av| 国产av在哪里看| 亚洲国产精品久久男人天堂| or卡值多少钱| 日韩精品中文字幕看吧| 操出白浆在线播放| 国产一区二区激情短视频| 小说图片视频综合网站| 首页视频小说图片口味搜索| 淫秽高清视频在线观看| 黄色 视频免费看| 国产又黄又爽又无遮挡在线| 日韩欧美免费精品| 欧美又色又爽又黄视频| 人人妻人人看人人澡| 性色avwww在线观看| 一区福利在线观看| 国产99白浆流出| 午夜精品久久久久久毛片777| 久久久水蜜桃国产精品网| 精品一区二区三区视频在线观看免费| 国产精品美女特级片免费视频播放器 | 夜夜看夜夜爽夜夜摸| 精品国产乱子伦一区二区三区| 国产伦精品一区二区三区四那| 久久精品综合一区二区三区| 久久婷婷人人爽人人干人人爱| 悠悠久久av| 少妇熟女aⅴ在线视频| 欧洲精品卡2卡3卡4卡5卡区| 成年免费大片在线观看| 一个人观看的视频www高清免费观看 | 成人鲁丝片一二三区免费| 亚洲人成电影免费在线| 男女视频在线观看网站免费| 老汉色av国产亚洲站长工具| 亚洲片人在线观看| 18禁观看日本| 欧美日韩瑟瑟在线播放| 亚洲在线观看片| 日韩欧美国产在线观看| 法律面前人人平等表现在哪些方面| 日韩有码中文字幕| 欧美在线一区亚洲| 舔av片在线| a级毛片a级免费在线| 国产精品,欧美在线| 午夜福利欧美成人| 亚洲成人中文字幕在线播放| 老熟妇乱子伦视频在线观看| 手机成人av网站| 亚洲精品在线美女| 国产一区二区三区视频了| 国产亚洲精品久久久久久毛片| 久久久久国产精品人妻aⅴ院| 欧美乱码精品一区二区三区| 国产熟女xx| 两个人看的免费小视频| 成人三级做爰电影| 丰满人妻熟妇乱又伦精品不卡| 精品日产1卡2卡| aaaaa片日本免费| 夜夜夜夜夜久久久久| 亚洲一区高清亚洲精品| 中出人妻视频一区二区| 中文字幕精品亚洲无线码一区| 欧美日韩一级在线毛片| 三级毛片av免费| 1024手机看黄色片| 麻豆国产av国片精品| 热99re8久久精品国产| 国产成人av教育| 久久久国产成人免费| 久久久色成人| 亚洲国产色片| 亚洲成人久久爱视频| 美女高潮的动态| 国产综合懂色| 国产伦在线观看视频一区| 国产视频一区二区在线看| 日本与韩国留学比较| 搡老岳熟女国产| 国产精品一区二区三区四区久久| 舔av片在线| 麻豆成人午夜福利视频| 国产精品久久电影中文字幕| 国产激情偷乱视频一区二区| h日本视频在线播放| 亚洲 国产 在线| 亚洲精品一区av在线观看| 日韩成人在线观看一区二区三区| 久久久国产欧美日韩av| 一区福利在线观看| www.自偷自拍.com| 女人高潮潮喷娇喘18禁视频| 精品国产亚洲在线| 天天躁狠狠躁夜夜躁狠狠躁| 久久欧美精品欧美久久欧美| 国内少妇人妻偷人精品xxx网站 | 国产又色又爽无遮挡免费看| 国产高清激情床上av| 岛国视频午夜一区免费看| 欧美黑人欧美精品刺激| 一二三四社区在线视频社区8| 国产一区二区激情短视频| 久久精品综合一区二区三区| 少妇裸体淫交视频免费看高清| 一边摸一边抽搐一进一小说| 99精品久久久久人妻精品| 久久久国产成人精品二区| 国产v大片淫在线免费观看| 午夜福利成人在线免费观看| av黄色大香蕉| 免费观看精品视频网站| 成人精品一区二区免费| 日日夜夜操网爽| 国产午夜精品论理片| 老熟妇乱子伦视频在线观看| 亚洲午夜理论影院| 国产成人精品久久二区二区免费| 国产伦一二天堂av在线观看| 黑人操中国人逼视频| www日本在线高清视频| 99国产精品一区二区三区| 白带黄色成豆腐渣| 精品电影一区二区在线| 两个人的视频大全免费| 国产三级中文精品| 色噜噜av男人的天堂激情| 国产欧美日韩精品亚洲av| 最近最新中文字幕大全免费视频| 国产成人影院久久av| 男插女下体视频免费在线播放| 一边摸一边抽搐一进一小说| 一本一本综合久久| 久久久久性生活片| 色av中文字幕| 国产高清videossex| 欧美大码av| 亚洲中文字幕日韩| 日韩精品青青久久久久久| 国产精品久久久久久亚洲av鲁大| 一进一出好大好爽视频| 国产一区二区三区在线臀色熟女| 我要搜黄色片| 18禁裸乳无遮挡免费网站照片| 日本一二三区视频观看| 好男人在线观看高清免费视频| 国产成人aa在线观看| bbb黄色大片| www国产在线视频色| 成人性生交大片免费视频hd| 久久欧美精品欧美久久欧美| 国产一区二区三区视频了| 国产av在哪里看| 伊人久久大香线蕉亚洲五| 国产一级毛片七仙女欲春2| 国内少妇人妻偷人精品xxx网站 | 国产黄片美女视频| 国产乱人伦免费视频| 中文资源天堂在线| 欧美不卡视频在线免费观看| 亚洲中文字幕日韩| 久久欧美精品欧美久久欧美| 色综合亚洲欧美另类图片| 九色成人免费人妻av| 国产精品久久视频播放| 最近在线观看免费完整版| 亚洲精品456在线播放app | 欧美日韩乱码在线| 美女cb高潮喷水在线观看 | 夜夜躁狠狠躁天天躁| 亚洲一区二区三区不卡视频| 日本黄色视频三级网站网址| 女人高潮潮喷娇喘18禁视频| 亚洲自拍偷在线| 老汉色av国产亚洲站长工具| 精品久久久久久久末码| 欧美日韩一级在线毛片| 免费搜索国产男女视频| 精品乱码久久久久久99久播| 欧美日韩中文字幕国产精品一区二区三区| 美女cb高潮喷水在线观看 | 手机成人av网站| 精品国产亚洲在线| 精品国产三级普通话版| 免费看美女性在线毛片视频| xxxwww97欧美| 亚洲天堂国产精品一区在线| 国产精品99久久久久久久久| 久久欧美精品欧美久久欧美| 久久精品综合一区二区三区| 国产淫片久久久久久久久 | 午夜两性在线视频| 宅男免费午夜| 国产精品 国内视频| 99久久成人亚洲精品观看| 日韩精品中文字幕看吧| 巨乳人妻的诱惑在线观看| 国产三级黄色录像| 成年人黄色毛片网站| 伦理电影免费视频| 免费av不卡在线播放| 色吧在线观看| 免费观看的影片在线观看| 天堂影院成人在线观看| 老熟妇乱子伦视频在线观看| 在线视频色国产色| 一个人免费在线观看电影 | 国产一区二区三区视频了| 一进一出好大好爽视频| 午夜福利在线观看吧| 一卡2卡三卡四卡精品乱码亚洲| 国产午夜精品论理片| 久久精品人妻少妇| 成年女人永久免费观看视频| 中国美女看黄片| 日本三级黄在线观看| 国产精品国产高清国产av| 村上凉子中文字幕在线| 亚洲av第一区精品v没综合| 国产97色在线日韩免费| netflix在线观看网站| 久久久久亚洲av毛片大全| 亚洲精品国产精品久久久不卡| 亚洲成av人片免费观看| 夜夜躁狠狠躁天天躁| 国产一级毛片七仙女欲春2| 国产91精品成人一区二区三区| 一边摸一边抽搐一进一小说| 国产人伦9x9x在线观看| 久久精品91蜜桃| 一二三四社区在线视频社区8| 又大又爽又粗| 观看免费一级毛片| 国产极品精品免费视频能看的| 久久婷婷人人爽人人干人人爱| 欧美zozozo另类| 精品日产1卡2卡| 亚洲成av人片在线播放无| 国产男靠女视频免费网站| 香蕉丝袜av| 国产精品亚洲av一区麻豆| 欧美精品啪啪一区二区三区| 亚洲自拍偷在线| 男女之事视频高清在线观看| 精品午夜福利视频在线观看一区| 国产伦在线观看视频一区| 日本与韩国留学比较| 日韩欧美免费精品| 亚洲第一欧美日韩一区二区三区| 欧美日韩国产亚洲二区| 国产三级在线视频| 国产黄色小视频在线观看| 精品日产1卡2卡| 欧美不卡视频在线免费观看| 午夜a级毛片| 免费搜索国产男女视频| 亚洲avbb在线观看| 亚洲国产高清在线一区二区三| 国产成人一区二区三区免费视频网站| 制服人妻中文乱码| 国产精品久久久久久久电影 | 日本免费一区二区三区高清不卡| 亚洲精品国产精品久久久不卡| 精品一区二区三区四区五区乱码| 天堂av国产一区二区熟女人妻| 好男人电影高清在线观看| 狠狠狠狠99中文字幕| 亚洲国产欧美网| 99热只有精品国产| 美女 人体艺术 gogo| 国产精品99久久99久久久不卡| 深夜精品福利| 热99re8久久精品国产| 搡老熟女国产l中国老女人| 美女午夜性视频免费| 桃红色精品国产亚洲av| 丁香六月欧美| 亚洲美女黄片视频| 色精品久久人妻99蜜桃| 日本一本二区三区精品| 色哟哟哟哟哟哟| 亚洲性夜色夜夜综合| 亚洲avbb在线观看| 国产午夜福利久久久久久| 国产一区二区三区在线臀色熟女| 久久久国产成人精品二区| 国产午夜精品论理片| 18禁黄网站禁片免费观看直播| 这个男人来自地球电影免费观看| 免费在线观看日本一区| 男人舔奶头视频| 狠狠狠狠99中文字幕| www.熟女人妻精品国产| 亚洲中文字幕日韩| 欧美一区二区国产精品久久精品| 狂野欧美激情性xxxx| 久久国产精品影院| 九色成人免费人妻av| e午夜精品久久久久久久| av福利片在线观看| 午夜福利免费观看在线| 蜜桃久久精品国产亚洲av| 身体一侧抽搐| 亚洲九九香蕉| 国产精品永久免费网站| 亚洲专区中文字幕在线| 一个人观看的视频www高清免费观看 | 在线免费观看不下载黄p国产 | 免费无遮挡裸体视频| 九色成人免费人妻av| 国产精品亚洲av一区麻豆| 免费av不卡在线播放| 一二三四社区在线视频社区8| 成人鲁丝片一二三区免费| 精品一区二区三区视频在线观看免费| 91av网站免费观看| 最新美女视频免费是黄的| 人人妻,人人澡人人爽秒播| 色播亚洲综合网| 99精品在免费线老司机午夜| 亚洲成人中文字幕在线播放| 麻豆国产av国片精品| 亚洲自偷自拍图片 自拍| 久久中文看片网| 国产精品亚洲av一区麻豆| 久久精品91蜜桃| 国产精品av久久久久免费| 午夜久久久久精精品| 99国产极品粉嫩在线观看| 免费人成视频x8x8入口观看| 99热这里只有是精品50| 亚洲精品在线观看二区| 最近最新中文字幕大全免费视频| 久久热在线av| 男女午夜视频在线观看| 国模一区二区三区四区视频 | 一进一出好大好爽视频| 国产成人一区二区三区免费视频网站| 亚洲色图av天堂| 哪里可以看免费的av片| 国产精品,欧美在线| 欧美日韩中文字幕国产精品一区二区三区| 亚洲欧美精品综合久久99| 欧美一区二区精品小视频在线| 老鸭窝网址在线观看| 精品久久久久久久人妻蜜臀av| 久久精品夜夜夜夜夜久久蜜豆| 后天国语完整版免费观看| 免费在线观看视频国产中文字幕亚洲| 丰满人妻一区二区三区视频av | 日韩三级视频一区二区三区| 亚洲avbb在线观看| 一区二区三区高清视频在线| 日日干狠狠操夜夜爽| 一级毛片女人18水好多| 久久精品夜夜夜夜夜久久蜜豆| 免费在线观看成人毛片| 成人特级黄色片久久久久久久| 亚洲五月天丁香| 国产精品98久久久久久宅男小说| 免费观看人在逋| 亚洲一区二区三区不卡视频| 亚洲av日韩精品久久久久久密| 真人做人爱边吃奶动态| 美女高潮喷水抽搐中文字幕| 久久久久国产一级毛片高清牌| 色哟哟哟哟哟哟| a级毛片在线看网站| 91九色精品人成在线观看| 国产精品一区二区三区四区久久| 免费看日本二区| 欧美又色又爽又黄视频| 亚洲欧美日韩高清专用| 在线观看66精品国产| 免费看美女性在线毛片视频| 国产av麻豆久久久久久久| 香蕉av资源在线| 欧美一级毛片孕妇| 欧美又色又爽又黄视频| 久久久色成人| 国产精品一区二区精品视频观看| 噜噜噜噜噜久久久久久91| 最近最新中文字幕大全电影3| 国产男靠女视频免费网站| av天堂中文字幕网| 长腿黑丝高跟| 欧美日韩亚洲国产一区二区在线观看| 一区二区三区高清视频在线| 欧美在线一区亚洲| 国产伦在线观看视频一区| 欧美日韩中文字幕国产精品一区二区三区| 高清在线国产一区| 亚洲专区中文字幕在线| 国产精华一区二区三区| 国产精品1区2区在线观看.| 舔av片在线| 久久午夜综合久久蜜桃| 国产真人三级小视频在线观看| 午夜激情福利司机影院| 一区二区三区激情视频| 免费人成视频x8x8入口观看| 搡老熟女国产l中国老女人| 99在线人妻在线中文字幕| 丰满人妻熟妇乱又伦精品不卡| 村上凉子中文字幕在线| 日本撒尿小便嘘嘘汇集6| 每晚都被弄得嗷嗷叫到高潮| 国产精品久久视频播放| 日韩精品中文字幕看吧| 国产精品精品国产色婷婷| 9191精品国产免费久久| 久久香蕉国产精品| 国产高清videossex| 美女午夜性视频免费| 久久精品国产99精品国产亚洲性色| 亚洲成人久久性| 亚洲五月婷婷丁香| 小说图片视频综合网站| 一个人观看的视频www高清免费观看 | 两人在一起打扑克的视频| 亚洲专区中文字幕在线| 好男人在线观看高清免费视频| 国产视频一区二区在线看| 亚洲七黄色美女视频| 国产午夜精品论理片| 少妇丰满av| 人妻久久中文字幕网| 天天躁狠狠躁夜夜躁狠狠躁| 非洲黑人性xxxx精品又粗又长| 久久精品人妻少妇| 欧美成狂野欧美在线观看| 国产精品98久久久久久宅男小说| 听说在线观看完整版免费高清| 国产激情欧美一区二区| 欧美黄色片欧美黄色片| 精品久久久久久久久久久久久| 精品国产三级普通话版| 老司机福利观看| 午夜福利在线在线| 三级毛片av免费| 神马国产精品三级电影在线观看| 好男人在线观看高清免费视频| 夜夜看夜夜爽夜夜摸| 午夜免费激情av| 又紧又爽又黄一区二区| 精品久久久久久久末码| 成年版毛片免费区| 日韩av在线大香蕉| 国产精品99久久99久久久不卡| 99国产精品一区二区蜜桃av| 亚洲va日本ⅴa欧美va伊人久久| 欧美日韩乱码在线| 欧美乱码精品一区二区三区| 叶爱在线成人免费视频播放| 香蕉久久夜色| 日韩欧美免费精品| 日本熟妇午夜| 91在线精品国自产拍蜜月 | 成人精品一区二区免费| 久久久久久大精品| 国产亚洲精品综合一区在线观看| 亚洲精品粉嫩美女一区| 国产激情欧美一区二区| 国产亚洲欧美在线一区二区| 99久久精品一区二区三区| 国产一区二区激情短视频| 国产精品电影一区二区三区| 国产成人福利小说| 少妇的逼水好多| 亚洲性夜色夜夜综合| 亚洲专区字幕在线| 亚洲av第一区精品v没综合| 国产伦在线观看视频一区| 黄频高清免费视频| 99国产精品一区二区三区| 两个人视频免费观看高清| 欧美日韩瑟瑟在线播放| 免费看十八禁软件| 日本黄色视频三级网站网址| 久久九九热精品免费| 日本黄色视频三级网站网址| 国产成人影院久久av| 亚洲国产高清在线一区二区三| 欧美成狂野欧美在线观看| 成年女人看的毛片在线观看| 亚洲国产色片| 久久欧美精品欧美久久欧美| 很黄的视频免费| 久久国产乱子伦精品免费另类| www国产在线视频色| 在线观看一区二区三区| 蜜桃久久精品国产亚洲av| 国产私拍福利视频在线观看| 欧美一级a爱片免费观看看| 国产精品一区二区三区四区久久| 亚洲 欧美一区二区三区| 九九热线精品视视频播放| 久久久久免费精品人妻一区二区| 少妇裸体淫交视频免费看高清| 欧美日韩瑟瑟在线播放| 久久天躁狠狠躁夜夜2o2o| 熟女电影av网| 99在线视频只有这里精品首页| 亚洲av成人不卡在线观看播放网| x7x7x7水蜜桃| 亚洲国产精品999在线| 成人亚洲精品av一区二区|