• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Enhanced Trust Based Access Control for Multi-Cloud Environment

    2021-12-15 07:07:16RejinPaulandPaulRaj
    Computers Materials&Continua 2021年12期

    N.R.Rejin Pauland D.Paul Raj

    1R M K College of Engineering and Technology,Puduvoyal,Gummidipoondi, 601206,India

    2R M D Engineering College,Kavaraipettai,Gummidipoondi, 601206,India

    Abstract:Security is an essential part of the cloud environment.For ensuring the security of the data being communicated to and from the cloud server, a significant parameter called trust was introduced.Trust-based security played a vitalrole in ensuring that the communication between cloud users and service providers remained unadulterated and authentic.In most cloud-based data distributionenvironments,emphasis is placed on accepting trusted client users’requests,but the cloud servers’integrity is seldom verified.This paper designs a trust-based access control model based on user and server characteristics in a multi-cloud environment to address this issue.The proposed methodology consists of data encryption using Cyclic Shift Transposition Algorithm and trust-based access control method.In this trust-based access control mechanism framework, trust values are assigned to cloud users using direct trust degrees.The direct trust degree is estimated based on the following metrics:success and failure rate of interactions,service satisfaction index,and dishonesty level.In addition to this,trust values are assigned to cloud servers based on the metrics:server load,service rejection rate,and service access delay.The role-Based Access control policy of each user is modified based on his trust level.If the server fails to meet the minimum trust level,then another suitable server will be selected.The proposed system is found to outperform other existing systems in a multi-cloud environment.

    Keywords: Cloud computing; trust; access control; cloud service provider;cloud data user; CSTA

    1 Introduction

    Cloud computing is an open standard model, which can empower universal computing and pride request-based access to a pool of configurable computing devices.It is a promising cuttingedge computing worldview that fundamentally depends on innovations, for example, virtualization,utility computing, Service Oriented Architecture, etc.It is Internet-driven and gives the entirety of its assets as administrations, for example, stockpiling, calculation and correspondence.It is a one-of-a-kind mix of capacities and development innovations.It needs negligible administration exertion from specialist co-ops and conveys versatile and dynamic foundation, remote access, and use control and evaluating [1].With the rise of enterprise-level cloud computing activities, cloud computing has become more of a reality than just an idea [2].

    Since a cloud domain includes different assets having numerous customers cooperating in difficult habits, appropriate access control to these assets is essential [3].The idea of trust will compare to many relations among substances interested in a social procedure.These relations all around include two substances, the specialist co-op is named trustor, and the subject expecting access to the administrations of trustor is named trustee.Trust foundation depends on the information or encounters gathered from the past associations of substances.Since in any relationship,trust precedes approval, there is a compelling need for research towards a trust-based security environment and instrumentation inside cloud condition.Nonetheless, there exist not many trusts the board models in cloud computing condition [4].

    Both the cloud clients and specialist co-ops ought to have a confided relationship.(i.e.,) Both elements ought to be trusted.Be that as it may, many works consider it confided in clients as it were.In [5], different degrees of trust is viewed as, for example, client’s trust, supplier’s trust,gadget’s trust dependent on which various jobs are allocated.Be that as it may, it neglects to rattle off the components considered for trust assessment.In [6], the intra-area and between-space trusts are resolved depending on the client connection and administration fulfillment.In any case,it ought to consider the server’s remaining burden and disappointment probabilities.In [7], the client’s criticism, the server’s outstanding task at hand, and the number of solicitation dismissals made by the server are considered for trust estimation.However, it neglects to consider the trust value of cloud clients.

    To overcome the issues mentioned above, we propose a trust-based access control framework for a multi-cloud environment.The proposed ACM is designed based on server-level trust value and user-level trust value.Using this method, we can avoid unauthorized user login.To further tighten the security to avoid data leakage, the stored data is encrypted with the CSTA algorithm’s help.In this way, we can avoid sensitive information loss and un-authorized user login processes.The significant contribution of the proposed methodology is listed below;

    ? A novel user-server trust-based access control mechanism is proposed to overcome the intrusion of the unauthorized user.

    ? CSTA algorithm is used to encrypt data to avoid data leakage on communications.

    ? The proposed system is compared with existing systems in terms of various evaluation metrics like encryption, decryption time, running time, memory consumed, success rate, and access delay.

    2 Related Works

    Many researchers have developed various access control mechanisms on the cloud.Indrajit Ray has planned a trust-based access control model in such access control models, which characterizes many components and relations between those components with trust-based limitations characterized on these relations.To support access verification of applications and data in cloud infrastructure, a trusted cloud client was set up to run diagnostic tests using the cryptographic hash-based test.Additionally, Yuyu Bie et al.have planned to provide a trust-based access control instrument for a multi-space cloud environment.Right off the bat, trust value is introduced among clients and cloud storage.Also, the contrast between intra-area trust and intra-space trust is analyzed.Besides, a role-based access control system joined with trust degree in multi-area is introduced.Access control in neighborhood space applies RBAC model joined with trust degree,while in multi-area it contains the origination of role interpretation.

    Another security system was proposed around the same time [8], whereinto maintain the predefined trust levels, load offsetting observation on security conditions with proactive activities are monitored.A notoriety-based trust model assessed specialist organizations’notoriety [9] by utilizing a trust assessment calculation that will take clients’input, server dismissal rate, and server outstanding tasks at hand into thought.The trials show that the trust result is progressively effective.

    Another trust-based model for security participation [10], named DBTEC, was built to advance vehicles’security collaboration in VCC.This joins the circuitous trust estimation in the Public security board and the immediate trust estimation in the Private security board to process the trust estimation of vehicles while picking agreeable accomplices; a reliable participation way producing a plan is proposed to guarantee the wellbeing of collaboration and increment the participation finishing rates in VCC.Correspondingly, Tawalbeh et al.[11] have read the cloudlet engineering for MCC.They discovered that utilizing this model improved the exhibition of numerous applications and lessened the system’s idleness.Numerous QoS components like accessibility,adaptability, and throughput were improved when utilizing the cloudlet model over non-cloudlet cloud engineering.Likewise, they introduced secure usage and model for the cloudlet MCC model utilizing the dynamic trust appointment procedure to give better security and protection to the client’s information in MCC.

    In addition to all the trust-based systems under review, the encryption mechanism employed for data access plays a key role in deciding the integrity of the data and the system’s security in use.The initial models used are a modified Searchable Symmetric Encryption (SSE) algorithm called Two-Round Searchable Encryption (TRSE) [12] that helps in avoiding data leakage with major cipher text operation on the server-side.With the evolution on peer–to–peer cloud storage (P2P), the idea of Ciphertext Policy Attribute-Based Encryption (CP-ABE) with proxy re-encryption scheme [13,14] gained popularity as they provide secure and efficient access control.

    As security in data storage became the priority, the validity of data came into the limelight.To ensure the credibility of the data accessed, Identity based Encryption on Revocable Storage(RS–IBE) elements was suggested [15].This forward/backward security of cyphertext showed better performance in the case of efficiency and functionality.However, [16] questioned this algorithm’s correctness and suggested using self-updatable encryption that could boost the RS-IBE algorithm’s performance.

    As data protection became feasible and quite frankly mandatory in all cloud storage access,the degree of usability was the next performance metric that gained attention.Hence a data protection mechanism with a self-contained module called Role-based access control enhanced using data-centric attribute-based encryption (DC–RBAC) was popularized [17].The encryption was further strengthened by adding a trust value calculated using a Fuzzy Analytic Hierarchy Process (FAHP) [18] that provided better granularity and flexibility.Thus, add a trust value seemed like the best option to provide flexible yet best data security.

    The most common encryption algorithm for access control was Ciphertext Policy-Driven Attribute-Based Encryption (CP-ABE).They form the basis for many mobile multimedia data sharing [19,20].In addition to other attributes, sometimes data creation and data access are also considered an attribute that helps in dual data access control and data integrity verifiability,thereby strengthening the CP-ABE one parameter at a time [21].After a thorough examination of different encryption algorithms and various access control models, it is clear that not many have dealt with trust values as the main factor, and even then, the concept of cyclic shifting is seldom heard.So, we have decided to proceed with our work along the tracks of cyclic shift-based encryption for securing data and a trust-based model for access control and compared its results with the existing models.

    3 System Model

    The outline of the system proposed is shown in Fig.1.The system consists of three entities,namely, data owner (DO), Data server (DS), and Cloud Service Provider (CSP).

    Figure 1:System model

    ? Data Owner (DO)–DO is responsible for collecting the data from different resources.For security reasons and to avoid data loss, the collected data is encrypted before storage by the data owner.

    ? Cloud Service Provider (CSP)–CSP manages and stores data in the cloud.When the user wants data from CSP, a request is sent.If the request is valid, the CSP sends back the requested data.

    ? Data server (DS)–DS is responsible for checking the request sent to CSP and sending the secure data back to the user.This is done by checking the checksum in ACM.

    4 Proposed Methodology

    The purpose of the proposed methodology is to securely transmit or store the data on the cloud using a trust-based access control mechanism with the CSTA approach.As to the growing size of data, industries now prefer cloud-based data storage.Due to the enormous amount of data floating around us, single-cloud-based storage is avoided as they face many issues like limited free storage, vendor lock-in, and data loss.Keeping these issues in mind, multi-cloud storage services are preferred as they provide a single platform configuration for multiple cloud storage services.Moreover, security is a key issue in this multi-cloud storage system.To avoid facing many security issues, in this paper, multi-level security frameworks are introduced.In the first level, data are encrypted using a novel algorithm called the CSTA algorithm and the second one is the trustbased access control mechanism.The former provides data security while the latter is to avoid the unauthorized user login process.

    4.1 Data Security Using Cyclic Shift Transposition Algorithm

    One of the key issues of the cloud is security.Due to security issues, companies are reluctant to store cloud data.Therefore, data confidentiality is an essential task in the cloud.To avoid this problem, CSDA has introduced an efficient security mechanism in this paper.The proposed CSTA algorithm does not depend on any centralized authority like the central management system.Using this can avoid major related issues.This method consists of two steps, namely, encryption and decryption.The encryption process is used to convert the original data into ciphertext.And decryption is the process of converting ciphertext into original data without losing original information.The step-by-step process of CSTA is explained below;

    4.1.1 Encryption Process

    Encryption is the process of original hiding information using secret codes.The encryption process is done using the CSTA algorithm that performs row and column transition-based partitioning and primary and secondary diagonal transformation.The encryption process is explained in detail in the following steps

    Step 1:Let the input document containing data beDi.To start the process, the input documentDiis converted intoN×Nmatrix format.

    Step 2:After that, the Shift Column (SC) operation is applied to theN×Nmatrix.The SC calculation is given in Eq.1.

    whereshift(r,Mb)depends only on the key value.The key can take up any value between 0 and 9.It denotes the number of elements that need to be shifted, and the mod represents the arithmetic function.

    Step 3:After the SC operation, the Shift Row (SR) operation is applied.The SR calculation is given in Eq.(2).

    Step 4:Then, we performed Diagonal Shift (DS) operation.In DS operation, the diagonal elements from top left to right bottom are shifted.The DS function can be written as following,Eq.(3).

    Step 5:Then, again, we perform the DS operation in the order given.The function can be written as Eq.(4);

    Step 6:Then, the output is derived from the given values, Eq.(5).

    Step 7:Now, the output is converted to ASCII format to obtain encrypted text.

    Step 8:Finally, we compute the hash value with the timestamp to be sent along with the encrypted data and store it in the cloud.

    4.1.2 Decryption Process

    Decryption is the process of reversing the ciphertext of the encryption process to its original form.In general, all data sent from cloud servers are encrypted before transmission to the cloud user, who then decrypts it to retrieve the original message.The decryption process is explained below;

    Step 1:Initially, the hash value is calculated along with a timestamp from the encrypted data,and this hash value and timestamp are transferred to the receiver.

    Step 2:Then, encrypted data is converted into ASCII format.

    Step 3:After that, the SR operation is applied into a specific order.

    Step 4:Then, we applied SC operation in a specific order

    Step 5:Then, the DS operation is applied diagonally.

    Step 6:After that, again DS operation is applied to the output in a specific order.

    Step 7:Finally, we obtain the decrypted output.

    4.2 Trust-Based Access Control Framework Based on User and Server Characteristics

    Malicious users have been a complicated problem in a cloud setup that jeopardizes the safety of communicating sensitive data.Access control models (ACM) play a vital role in implementing security for these sensitive data.Access control is checking the requests sent by every user and scrutinizing the legitimate ones from it.The request is either granted or denied based on the pre-defined control policies framed by different models.There are some ACMs proposed by various authors before.But due to the constantly revamping security needs and non-predictive user behaviors that make the sensitive data vulnerable, the models face many threats and challenges and require constant upgradation.To overcome this obstacle, A Trust-Based Access Control (TBAC)Framework is introduced.TBAC is designed based on the characteristics of the user and server.Fig.2 shows the architecture of the TBAC framework.

    Figure 2:Architecture of TBAC-USC framework

    In this framework, trust values are assigned to cloud users from direct and recommendation trust degrees.The trust degree is calculated by combining metrics such as number of successful interactions, index of service satisfaction, dishonesty for a user (access violations), number of failed interactions.Similarly, trust values are assigned to cloud servers based on the following metrics:server load, the number of rejected requests, and service access delay.Then RBAC is assigned to each cloud user after checking his current trust value.If his current trust value does not meet the necessary conditions pre-defined for this system, his request will be denied.Similarly,if the service provider fails to meet the minimum requirements, then another suitable provider will be selected.

    4.2.1 Estimation of Trust Degree for Users(TRuser)

    In the given domain, an interaction trust valueTRintis assigned when a userUjcompletes the interaction with another userUi.The value is determined based on the number of successful or failed transactions.The success rate afterkinteractions is given by Eq.(6).

    where,No_Suc_IntandTot_Intrepresent the number of successful interactions and total interactions.

    Similarly, the failure rate afterkinteractions is given by Eq.(7).

    where,No_Fail_IntandTot_Intrepresent the number of failed interactions and total interactions.

    The interaction trust value ofUiassigned byUjafter thekthinteraction is given by Eq.(8).

    A service satisfaction index SSindex is assigned in the operation domain when an entity obtains multiple services from another entity.Afterkinteractions, theSSindexof userUiassigned by userUjis given by Eq.(9).

    The service provider is capable of tracking the access privileges of any malicious userUi.Then, the dishonest level (DH) of userUiis calculated using Eq.(10).

    where NO_AV represents the number of access violations performed byUi.

    Then, the total trust degree of userUiover all other usersUj,j=1,2,...,ncan be derived as Eq.(11)

    4.2.2 Estimation of Trust Degree for Cloud Server(TRS)

    Initially, the server will be ideal.When a user sends service requests, all requests will be in the queue to get service.The server load is calculated using relative transaction timeTtransof service requests.The server’s delay time is noted while calculating the trust evaluation of each server.The Server Load (SL) with m user’s request is then given by Eq.(12).

    whereTtrans(Ui)represents the transaction time of service request of userUi.

    The request rejection rateRRrateof a server is based on the number of service requests rejected by the server.

    whereNo_Rej_Reqrepresents the number of service requests of allmusers.

    The service access delayDsais the time taken between issuing the service request to the CSP and obtaining access to the requested service, Eq.(14).

    Trepand Treqare when the service reply is received and when the service request is issued,respectively, by usersUi,i=1,2,...,m.

    Then the total trust degree of serverSican be derived as Eq.(15)

    wherew1,w2andw3are weight values ranging from [0, 1].

    4.3 Trust Based Access Control

    A type of access control called Role-Based Access Control (RBAC) is predominantly used within organizations for administrating and controlling the type of concessions of communications.This is achieved using permissions on functional roles rather than individual identities.The access decisions depend on the users’roles within the organization, which furthers decides the users’membership.This paper combines trust parameters and access control models to provide a trust-based access control framework in the cloud computing environment.RBAC’s trust degree reflects cloud users’fundamental property, servers, and the transmitted resources.The Trusted Authority Centre (TAC) is responsible for access control authentication and trust management in the cloud computing environment.

    In this framework, users can obtain their access rights initially based on their roles, but they need to possess the required trust degree to use the assigned rights.When a cloud user requests access to a cloud service or resource, the TAC will check whether the user’s trust level matches the threshold defined by the system.If the user’s request for access is authorized, TAC provides a certificate to the requested user to obtain permission to use the access rights corresponding to his role.The access control for cloud users based on their trust degree levels is shown in Tab.1.The threshold values T1, T2, and T3, are fixed based on theTRusertrust degree levels.

    Table 1:Access control levels for different users based on trust degree

    The following algorithm summarizes the steps involved in the Trust based access control for cloud users.

    ?

    ?

    According to Algorithm-1, a user with a minor trust degree could not access the resources,and a user with the highest trust could perform all functions on the resources.

    4.4 Server Selection Based on Trust Level

    Once a user’s service request is received, the CSP will allocate a server based on its trust degree.The following algorithm summarizes the steps involved in the server selection process:

    Algorithm 2:Algorithm for CSP Let {RS}={S1, S2, .....Sr} be the set of registered servers in a CSP.Let Uij be the set of users Ui who accessed the services from server Sj Let TRSth be the threshold value of the trust degree of a server 1.Start 2.For each user Uij 3.If Uij completes its service, then 4.Uij feedbacks its service completion status [accepted or rejected] and Dsa to TAC 5.End If 6.End For 7.TAC obtains SL (Sj) from CSP 8.The feedback of Uij, TAC computes RRrate using Eq.(8)9.TAC then calculates TRSj using Eq.(10)10.If TRSj <TRSth, then 11.TRSj is a trusted server 12.Else 13.TRSj is not trusted 14.TAC send notification about TRSi to CSP 15.CSP shifts all the resources and services to Sk, k images/BZ_64_2034_2820_2070_2866.png j 16.End If 17.Stop

    In Algorithm 2, if the trust degree of a serverSjis below the thresholdTRSth, then that server will be removed by the CSP.All the resources and services corresponding toSjwill be shifted to another server whose trust degree is aboveTRSth.The subsequent service requests from the users will then be submitted to this new server.

    5 Experimental Results

    To validate the TBAC-CSC framework presented in this paper, the implementation is done using a java-based CP-ABE toolkit and the Java Pairing-Based Cryptography library (JPBC).The proposed TBAC-CSC framework’s performance has been compared with the traditional RBAC model and TBAC policy scheme.The experiments are carried out using Java on the system with an Intel Core processor at 3.00 GHz and 4 GB RAM running Windows 7 Ultimate.The results are taken as an average of 10 trial data exchanges.Tab.2 shows the experimental settings used in the simulation.The available number of servers registered users and malicious users were fixed on values from the previous works studied to compare them.

    Table 2:Experimental settings

    The main objective is to securely store and transmit the data on multi-cloud using a trustbased access control mechanism with the CSTA approach.In this paper, ACM is utilized not to allow any unauthorized person to access the data.To further improve data security, the CSTA algorithm is utilized.The performance of the proposed methodology is analyzed in this section and is compared with different existing systems.Tab.3 shows the values for Running Time,Encryption Time, Decryption Time, Memory Size of Cyclic Shift Transposition Algorithm

    Table 3:Evaluation metrics for CSTA algorithm

    In Fig.3, the Running time of the proposed methodology is analyzed.For data security, in this paper CSTA algorithm is utilized.Our algorithm compared with two different cryptography algorithms, namely, Advanced Encryption Standard (AES) and Data Encryption Standard (DES),to prove the proposed methodology’s effectiveness.In Fig.3,X-axisshows the file size n KB,and the y-axis represents the running time in seconds.The proposed method takes 755s.to run 10000kbof data, which is 850s.When using the AES algorithm and 830s.when using the DES algorithm.Similarly, as file size increases, the running time also increases gradually.

    Figure 3:Running time

    The encryption time for varying data sizes is analyzed in Fig.4.A sound system should take minimum time for encrypting the data.When analyzing Fig.5, our proposed method is taken 153425sfor encrypting 2000kb, 175638sfor 4000kb, 196342sfor 6000kb, 202253sfor 8000kb,and 243263sfor 10000kbe.Compared to the existing method, the proposed method is taken minimum time for the encryption process.This is due to the decentralized architecture that does not depend on a third-party system for encryption.

    Figure 4:Encryption time

    Figure 5:Decryption time

    The decryption time of varying file sizes is analyzed for the proposed method.When analyzing Fig.5, the proposed method taken minimum time to decrypt the data compared to existing methods.

    Fig.6 shows the memory size (in bits) secured by the proposed method.Accordingly, our proposed method has taken 22152362bitsof memory for securing 2000kbfile, 23643725 bits for 4000kbfile, 25783425bitsfor 6000kbfile, 27563902bitsfor 8000kbfile, and 28764523bitsfor 10000kbfile.The memory utilization of existing methods are high compared to the proposed method.

    Figure 6:Memory size

    Fig.7 shows the success rate of service requests granted by the CSP based on user and server trust values.Success rate is directly proportional to the trust degree of a server, that is, when a service request is handled successfully by a server the level of reliability of the server increases.Since RBAC concentrates more on the role and not trust for users, it has the least success rate in users’presence, successful service requests for genuine users are low for RBAC.TBAC does not check the servers’trust value, and it achieves a lesser success rate than TBAC-CSC.Hence TBAC-CSC has a 6% higher success rate than RBAC and a 2% higher success rate than TBAC.

    Figure 7:The success rate for service requests

    Fig.8 shows the delay over various service requests for the varying number of users.It usually reflects the level of server trust.the delay in a service request is inversely proportional to the trust degree of the server, (i.e.,) when the delay is minimum the accessibility of the server increases.Since RBAC does not maintain any users’trust values, the service requests are usually not granted easily to malicious users.Hence the delay in service is higher.Since TBAC does not check the trust value of servers, it achieves a higher delay than TBAC-CSC.Hence TBAC-CSC has a 37%lesser delay rate than RBAC and 18% lesser delay than TBAC.

    Figure 8:Service access delay for service requests

    Fig.9 shows the trust value of servers.It shows that server 4 has the highest trust value,followed by servers 1, 3, and 2.The trust values can change based on the server load, service delay and so on which will be reflected in the graph.

    Figure 9:Trust values of servers

    6 Conclusion

    This paper has presented a trust-based access control framework with secure data storage in a multi-cloud environment.A trust-based access control framework is based on user and server Characteristics.In this framework, trust values are assigned to cloud users using direct trust degrees.The direct trust degree is estimated based on the following metrics:success and failure rate of interactions, service satisfaction index, and dishonesty level.In addition to this, trust values are assigned to cloud servers based on the metrics:server load, service rejection rate, and service access delay.The role-Based Access Control (RBAC) policy of each user is modified based on his trust level.If the server fails to meet the minimum trust level, then another suitable server will be selected.Further, enhance data security, the data has been encrypted using CSTA and stored on the cloud.The basic CSTA algorithm is found to be sufficient for the current application.Enhancements to the algorithm can be done on demand for the future systems it is applied to Experimental results show that the proposed framework achieves reduced access delay with an increased success ratio compared to the RBAC model and TBAC scheme.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产一区亚洲一区在线观看| 青春草国产在线视频| 亚洲国产精品国产精品| 成人免费观看视频高清| 成人手机av| 日韩av免费高清视频| 99九九在线精品视频| 啦啦啦啦在线视频资源| 亚洲视频免费观看视频| 欧美精品一区二区大全| 久久久精品94久久精品| 麻豆乱淫一区二区| 久久婷婷青草| 色精品久久人妻99蜜桃| 亚洲精品国产色婷婷电影| 一本大道久久a久久精品| 亚洲精品在线美女| 亚洲精品美女久久av网站| 大香蕉久久成人网| 欧美久久黑人一区二区| 另类精品久久| 亚洲国产精品999| 亚洲精品视频女| 国产男女内射视频| 一二三四在线观看免费中文在| 欧美97在线视频| 免费女性裸体啪啪无遮挡网站| 精品一区二区三区四区五区乱码 | 赤兔流量卡办理| 国产熟女欧美一区二区| 久久这里只有精品19| 国产99久久九九免费精品| 激情视频va一区二区三区| 亚洲精华国产精华液的使用体验| av在线观看视频网站免费| 国产亚洲最大av| 免费日韩欧美在线观看| 人妻 亚洲 视频| 中文天堂在线官网| 青春草亚洲视频在线观看| 国产精品久久久久久精品电影小说| 在线观看人妻少妇| 国产福利在线免费观看视频| 精品午夜福利在线看| 中文字幕精品免费在线观看视频| 青春草视频在线免费观看| 国产成人精品久久久久久| 国产精品亚洲av一区麻豆 | a级毛片在线看网站| 亚洲综合色网址| 免费日韩欧美在线观看| 亚洲精华国产精华液的使用体验| 少妇被粗大猛烈的视频| 人妻人人澡人人爽人人| 国产淫语在线视频| 最新的欧美精品一区二区| 国产人伦9x9x在线观看| 亚洲精品在线美女| 午夜福利免费观看在线| 18禁裸乳无遮挡动漫免费视频| 国语对白做爰xxxⅹ性视频网站| av线在线观看网站| 美女脱内裤让男人舔精品视频| 性少妇av在线| 色婷婷久久久亚洲欧美| 国产不卡av网站在线观看| 亚洲精品视频女| 国产视频首页在线观看| 久久久久久久大尺度免费视频| 看免费成人av毛片| 日日撸夜夜添| 亚洲国产精品成人久久小说| 亚洲第一青青草原| 少妇被粗大猛烈的视频| 2021少妇久久久久久久久久久| 国产日韩欧美在线精品| 这个男人来自地球电影免费观看 | 久久久国产精品麻豆| 人人妻人人澡人人看| 国产99久久九九免费精品| 午夜精品国产一区二区电影| 精品国产乱码久久久久久男人| 日韩大片免费观看网站| 国产亚洲av高清不卡| 1024香蕉在线观看| 又大又爽又粗| 久久 成人 亚洲| 九九爱精品视频在线观看| 捣出白浆h1v1| 久久这里只有精品19| 人妻人人澡人人爽人人| 亚洲视频免费观看视频| bbb黄色大片| 王馨瑶露胸无遮挡在线观看| 国产精品香港三级国产av潘金莲 | 欧美日韩亚洲国产一区二区在线观看 | 日韩大片免费观看网站| 在线免费观看不下载黄p国产| 久久精品aⅴ一区二区三区四区| 国产精品久久久久久人妻精品电影 | 自拍欧美九色日韩亚洲蝌蚪91| 亚洲国产最新在线播放| 美女午夜性视频免费| 国产女主播在线喷水免费视频网站| 十分钟在线观看高清视频www| 不卡av一区二区三区| 日韩视频在线欧美| 黄片无遮挡物在线观看| 日日爽夜夜爽网站| 国产精品麻豆人妻色哟哟久久| 亚洲一码二码三码区别大吗| 欧美日韩视频高清一区二区三区二| 悠悠久久av| 成人亚洲精品一区在线观看| 一边亲一边摸免费视频| 免费黄色在线免费观看| 亚洲av日韩精品久久久久久密 | svipshipincom国产片| 国产精品国产三级国产专区5o| 亚洲久久久国产精品| 欧美日韩福利视频一区二区| 五月天丁香电影| 国产精品香港三级国产av潘金莲 | 青青草视频在线视频观看| 悠悠久久av| 国产成人精品在线电影| 国产精品三级大全| 在线亚洲精品国产二区图片欧美| 51午夜福利影视在线观看| 男女边吃奶边做爰视频| 亚洲熟女毛片儿| 看免费成人av毛片| 亚洲精品国产一区二区精华液| 一级黄片播放器| 99国产精品免费福利视频| 日韩不卡一区二区三区视频在线| 欧美日韩av久久| 久久av网站| 久久精品久久久久久噜噜老黄| 最近手机中文字幕大全| 在线精品无人区一区二区三| 一本色道久久久久久精品综合| 国产精品99久久99久久久不卡 | 亚洲欧美清纯卡通| 久久av网站| 亚洲欧美成人综合另类久久久| 无限看片的www在线观看| 秋霞伦理黄片| 亚洲天堂av无毛| netflix在线观看网站| 久久国产精品男人的天堂亚洲| 视频在线观看一区二区三区| 午夜91福利影院| 亚洲国产看品久久| 视频区图区小说| 国产精品熟女久久久久浪| 欧美变态另类bdsm刘玥| 日本wwww免费看| 女性被躁到高潮视频| a级片在线免费高清观看视频| 国产精品成人在线| 我要看黄色一级片免费的| 国产精品国产av在线观看| av福利片在线| 国产精品免费视频内射| 国产av精品麻豆| 日韩av免费高清视频| 另类精品久久| 肉色欧美久久久久久久蜜桃| 天美传媒精品一区二区| 久久精品熟女亚洲av麻豆精品| 国产黄频视频在线观看| 免费日韩欧美在线观看| 午夜福利免费观看在线| 黑人欧美特级aaaaaa片| 欧美在线黄色| 日韩不卡一区二区三区视频在线| 欧美成人午夜精品| 亚洲第一区二区三区不卡| 午夜久久久在线观看| 亚洲av综合色区一区| 人体艺术视频欧美日本| 黄片播放在线免费| 亚洲国产看品久久| 菩萨蛮人人尽说江南好唐韦庄| 老司机深夜福利视频在线观看 | h视频一区二区三区| 国产一区二区三区av在线| 好男人视频免费观看在线| h视频一区二区三区| 99精品久久久久人妻精品| 免费日韩欧美在线观看| 久久久久精品人妻al黑| av一本久久久久| 狠狠精品人妻久久久久久综合| 亚洲国产精品一区二区三区在线| 中文字幕av电影在线播放| 国产又爽黄色视频| 亚洲美女视频黄频| 久久精品久久久久久久性| 最近中文字幕2019免费版| 欧美少妇被猛烈插入视频| 成年av动漫网址| 成人毛片60女人毛片免费| 精品少妇久久久久久888优播| 国产成人系列免费观看| 国产国语露脸激情在线看| 曰老女人黄片| 波野结衣二区三区在线| av一本久久久久| 亚洲国产精品国产精品| 免费观看a级毛片全部| 在线 av 中文字幕| 亚洲av电影在线进入| www.熟女人妻精品国产| 日本欧美视频一区| 久久久精品国产亚洲av高清涩受| 另类精品久久| 婷婷色麻豆天堂久久| netflix在线观看网站| 亚洲欧美成人精品一区二区| 一级片'在线观看视频| 久久久久久人人人人人| av在线观看视频网站免费| 婷婷色综合www| 深夜精品福利| www.熟女人妻精品国产| 美女午夜性视频免费| 操出白浆在线播放| 久久久精品区二区三区| 男女免费视频国产| av国产久精品久网站免费入址| 国产成人午夜福利电影在线观看| 亚洲av男天堂| 日韩制服丝袜自拍偷拍| 亚洲天堂av无毛| 久久久久精品性色| av.在线天堂| 黄色怎么调成土黄色| 巨乳人妻的诱惑在线观看| 日本午夜av视频| av女优亚洲男人天堂| 五月开心婷婷网| 国产亚洲最大av| 无遮挡黄片免费观看| 国产精品无大码| 女性被躁到高潮视频| 女性生殖器流出的白浆| 日韩成人av中文字幕在线观看| 亚洲国产看品久久| 少妇的丰满在线观看| 丝袜在线中文字幕| 久久精品亚洲av国产电影网| 欧美国产精品va在线观看不卡| 美女高潮到喷水免费观看| 成人影院久久| 国产精品久久久人人做人人爽| 女人精品久久久久毛片| 成年av动漫网址| 免费人妻精品一区二区三区视频| 亚洲欧美一区二区三区国产| 国产熟女欧美一区二区| 亚洲国产欧美网| 亚洲久久久国产精品| 国产精品三级大全| 亚洲国产看品久久| 色婷婷av一区二区三区视频| 久久久久久人妻| 欧美亚洲 丝袜 人妻 在线| 一本大道久久a久久精品| 19禁男女啪啪无遮挡网站| 伦理电影免费视频| 午夜福利一区二区在线看| 成人国语在线视频| 亚洲av在线观看美女高潮| 久久精品亚洲av国产电影网| 国产日韩欧美视频二区| 久久免费观看电影| av女优亚洲男人天堂| 女人久久www免费人成看片| 一本—道久久a久久精品蜜桃钙片| 中文乱码字字幕精品一区二区三区| 久久天堂一区二区三区四区| 哪个播放器可以免费观看大片| 日韩欧美精品免费久久| 成人亚洲精品一区在线观看| 啦啦啦在线免费观看视频4| 亚洲精华国产精华液的使用体验| √禁漫天堂资源中文www| 欧美精品高潮呻吟av久久| 国产国语露脸激情在线看| 热re99久久精品国产66热6| 久久久久久久久久久久大奶| 女性被躁到高潮视频| 国产av精品麻豆| 中文字幕av电影在线播放| 久久av网站| 黑人猛操日本美女一级片| 免费黄频网站在线观看国产| 最新在线观看一区二区三区 | 亚洲国产看品久久| 色综合欧美亚洲国产小说| 亚洲av在线观看美女高潮| 欧美人与性动交α欧美精品济南到| 国产精品免费视频内射| 久久99一区二区三区| 亚洲欧美一区二区三区久久| 大陆偷拍与自拍| 一二三四中文在线观看免费高清| 成年人免费黄色播放视频| 亚洲情色 制服丝袜| 人妻 亚洲 视频| 中文精品一卡2卡3卡4更新| 十八禁高潮呻吟视频| 国产国语露脸激情在线看| 黄色 视频免费看| av在线观看视频网站免费| 亚洲欧美精品综合一区二区三区| 色精品久久人妻99蜜桃| 97精品久久久久久久久久精品| 国产免费福利视频在线观看| 伦理电影免费视频| 午夜激情av网站| 欧美人与善性xxx| 国产精品无大码| 国产 一区精品| 午夜91福利影院| av视频免费观看在线观看| 女性生殖器流出的白浆| 如日韩欧美国产精品一区二区三区| 日日摸夜夜添夜夜爱| 午夜免费观看性视频| 国产国语露脸激情在线看| 99久国产av精品国产电影| 一本一本久久a久久精品综合妖精| 视频区图区小说| 最近2019中文字幕mv第一页| 欧美激情极品国产一区二区三区| 午夜激情久久久久久久| 丝袜在线中文字幕| 男女免费视频国产| 精品少妇内射三级| a级片在线免费高清观看视频| 一本色道久久久久久精品综合| 激情视频va一区二区三区| 国产高清不卡午夜福利| 欧美97在线视频| 欧美xxⅹ黑人| 黄片播放在线免费| 自线自在国产av| 一级片免费观看大全| 久久久久人妻精品一区果冻| 99久久人妻综合| 欧美日韩成人在线一区二区| 色婷婷久久久亚洲欧美| 免费高清在线观看日韩| 黄色怎么调成土黄色| av视频免费观看在线观看| 操美女的视频在线观看| 亚洲国产成人一精品久久久| 国产精品久久久久久人妻精品电影 | 99香蕉大伊视频| 国产人伦9x9x在线观看| 女的被弄到高潮叫床怎么办| 国产成人精品无人区| 久久久久久久精品精品| 一级爰片在线观看| 久久精品亚洲av国产电影网| 美女福利国产在线| 在线观看人妻少妇| 久久99一区二区三区| 久久综合国产亚洲精品| 国产精品一二三区在线看| 女人被躁到高潮嗷嗷叫费观| 人成视频在线观看免费观看| 久久韩国三级中文字幕| 午夜福利一区二区在线看| 色婷婷av一区二区三区视频| 欧美成人午夜精品| 欧美日韩综合久久久久久| 成人漫画全彩无遮挡| 久久狼人影院| 少妇人妻久久综合中文| 亚洲三区欧美一区| 亚洲成人av在线免费| 一区二区三区四区激情视频| 久热这里只有精品99| 亚洲国产av新网站| 精品少妇一区二区三区视频日本电影 | 99国产综合亚洲精品| 亚洲一级一片aⅴ在线观看| 国产免费一区二区三区四区乱码| 久久精品aⅴ一区二区三区四区| 99久久精品国产亚洲精品| 老司机靠b影院| 黄片无遮挡物在线观看| 日韩 亚洲 欧美在线| 99国产综合亚洲精品| 中文字幕最新亚洲高清| 伊人久久大香线蕉亚洲五| 成人毛片60女人毛片免费| 综合色丁香网| 国产野战对白在线观看| 哪个播放器可以免费观看大片| 亚洲一区中文字幕在线| 黑丝袜美女国产一区| 久久综合国产亚洲精品| 少妇被粗大的猛进出69影院| 自拍欧美九色日韩亚洲蝌蚪91| 91成人精品电影| 婷婷色综合大香蕉| 97人妻天天添夜夜摸| 亚洲国产日韩一区二区| 久久ye,这里只有精品| 嫩草影视91久久| 黄色一级大片看看| 男人添女人高潮全过程视频| av在线观看视频网站免费| 高清欧美精品videossex| videosex国产| av天堂久久9| av在线老鸭窝| 国产麻豆69| 狠狠精品人妻久久久久久综合| 久久精品亚洲av国产电影网| 在线 av 中文字幕| 九草在线视频观看| 精品一区在线观看国产| 国产深夜福利视频在线观看| 免费人妻精品一区二区三区视频| 2021少妇久久久久久久久久久| 一本一本久久a久久精品综合妖精| 色吧在线观看| 天天躁夜夜躁狠狠躁躁| 大话2 男鬼变身卡| 久久国产精品大桥未久av| 亚洲国产中文字幕在线视频| 精品人妻一区二区三区麻豆| 亚洲一卡2卡3卡4卡5卡精品中文| 曰老女人黄片| 亚洲av日韩精品久久久久久密 | 街头女战士在线观看网站| 一区二区三区激情视频| 日本黄色日本黄色录像| 人人妻人人澡人人看| 丝袜在线中文字幕| 日本色播在线视频| 国产亚洲av高清不卡| 51午夜福利影视在线观看| 久久韩国三级中文字幕| www.av在线官网国产| 午夜日本视频在线| 黄色视频在线播放观看不卡| 满18在线观看网站| 夜夜骑夜夜射夜夜干| 天天添夜夜摸| 最近中文字幕高清免费大全6| 久久av网站| 国产精品 欧美亚洲| 女人高潮潮喷娇喘18禁视频| 国产精品无大码| 国产 精品1| 久久久精品国产亚洲av高清涩受| 最近2019中文字幕mv第一页| 肉色欧美久久久久久久蜜桃| 中文字幕av电影在线播放| 国产不卡av网站在线观看| 又粗又硬又长又爽又黄的视频| 午夜激情久久久久久久| 亚洲成人一二三区av| a级毛片在线看网站| 高清欧美精品videossex| 熟女av电影| 老司机影院毛片| 一边亲一边摸免费视频| 色婷婷av一区二区三区视频| 性色av一级| 日韩人妻精品一区2区三区| 老司机影院成人| 51午夜福利影视在线观看| 老司机亚洲免费影院| 国产免费福利视频在线观看| 亚洲欧美清纯卡通| 五月开心婷婷网| 好男人视频免费观看在线| 人人妻人人澡人人爽人人夜夜| 毛片一级片免费看久久久久| 亚洲人成77777在线视频| 卡戴珊不雅视频在线播放| 黄片小视频在线播放| 亚洲欧洲日产国产| 80岁老熟妇乱子伦牲交| √禁漫天堂资源中文www| 秋霞伦理黄片| 欧美中文综合在线视频| 日本91视频免费播放| 午夜老司机福利片| 中文字幕亚洲精品专区| 日本欧美视频一区| 久久精品国产亚洲av涩爱| 亚洲国产精品一区三区| 久久婷婷青草| 桃花免费在线播放| 欧美av亚洲av综合av国产av | 麻豆精品久久久久久蜜桃| 成人手机av| 999久久久国产精品视频| 国产一区二区在线观看av| 午夜福利视频在线观看免费| 少妇人妻 视频| 亚洲少妇的诱惑av| 免费不卡黄色视频| 国产又爽黄色视频| 亚洲欧洲日产国产| 亚洲,欧美精品.| 啦啦啦中文免费视频观看日本| 伦理电影大哥的女人| 亚洲国产欧美网| 女性生殖器流出的白浆| 成人漫画全彩无遮挡| 久久亚洲国产成人精品v| 丰满迷人的少妇在线观看| 久久久欧美国产精品| 天天躁狠狠躁夜夜躁狠狠躁| 成人亚洲欧美一区二区av| 人人妻人人添人人爽欧美一区卜| 国产免费又黄又爽又色| 亚洲av男天堂| 新久久久久国产一级毛片| 国产一区二区在线观看av| 亚洲情色 制服丝袜| 黄色视频在线播放观看不卡| 在线看a的网站| 王馨瑶露胸无遮挡在线观看| 久久精品人人爽人人爽视色| 最近中文字幕高清免费大全6| 精品酒店卫生间| 高清欧美精品videossex| 高清黄色对白视频在线免费看| 亚洲欧美日韩另类电影网站| 最黄视频免费看| 免费黄频网站在线观看国产| 免费av中文字幕在线| 亚洲久久久国产精品| 啦啦啦在线免费观看视频4| 男女床上黄色一级片免费看| 卡戴珊不雅视频在线播放| 午夜福利在线免费观看网站| 国产精品久久久久成人av| 男女下面插进去视频免费观看| 秋霞在线观看毛片| 欧美日韩一级在线毛片| 老熟女久久久| 亚洲av福利一区| 精品视频人人做人人爽| 2018国产大陆天天弄谢| 国产免费又黄又爽又色| 啦啦啦在线观看免费高清www| 一区福利在线观看| 丰满乱子伦码专区| 亚洲欧美成人精品一区二区| 久久午夜综合久久蜜桃| 国产在线视频一区二区| 一区二区三区四区激情视频| 看十八女毛片水多多多| 在线观看人妻少妇| 视频在线观看一区二区三区| 免费在线观看视频国产中文字幕亚洲 | 久久国产精品大桥未久av| 最近手机中文字幕大全| 国产福利在线免费观看视频| 久久久久国产精品人妻一区二区| 亚洲人成电影观看| 性色av一级| 亚洲欧洲国产日韩| 高清在线视频一区二区三区| 国产精品秋霞免费鲁丝片| 97在线人人人人妻| 中国三级夫妇交换| 亚洲欧美色中文字幕在线| 国产精品三级大全| 久久久欧美国产精品| 天堂8中文在线网| 91精品三级在线观看| 香蕉丝袜av| av天堂久久9| 欧美黄色片欧美黄色片| 色视频在线一区二区三区| 伦理电影大哥的女人| 亚洲自偷自拍图片 自拍| 亚洲一码二码三码区别大吗| 天堂俺去俺来也www色官网| 国产精品秋霞免费鲁丝片| 久久精品熟女亚洲av麻豆精品| 综合色丁香网| 中文字幕另类日韩欧美亚洲嫩草| 亚洲三区欧美一区| 亚洲av男天堂| 蜜桃在线观看..| 好男人视频免费观看在线| 欧美精品人与动牲交sv欧美| 亚洲国产欧美日韩在线播放| 成年女人毛片免费观看观看9 | 日日爽夜夜爽网站| 高清在线视频一区二区三区| 亚洲综合色网址| 欧美老熟妇乱子伦牲交| 亚洲,一卡二卡三卡| 99国产综合亚洲精品| a级毛片黄视频| 久久精品亚洲av国产电影网| 久久久久久久国产电影| 久久毛片免费看一区二区三区| 伊人亚洲综合成人网| 亚洲精品第二区|