• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Road Distance Computation Using Homomorphic Encryption in Road Networks

    2021-12-15 07:08:30HainingYuLailaiYinHongliZhangDongyangZhanJiaxingQuandGuangyaoZhang
    Computers Materials&Continua 2021年12期

    Haining Yu,Lailai Yin,*,Hongli Zhang,Dongyang Zhan,2,Jiaxing Qu and Guangyao Zhang

    1School of Cyberspace Science,Harbin Institute of Technology,Harbin,150001,China

    2The Ohio State University,Columbus,43202,USA

    3Heilongjiang Province Cyberspace Research Center,Harbin,150001,China

    4National Internet Emergency Response Center,Harbin,150001,China

    Abstract: Road networks have been used in a wide range of applications to reduces the cost of transportation and improve the quality of related services.The shortest road distance computation has been considered as one of the most fundamental operations of road networks computation.To alleviate privacy concerns about location privacy leaks during road distance computation, it is desirable to have a secure and efficient road distance computation approach.In this paper, we propose two secure road distance computation approaches,which can compute road distance over encrypted data efficiently.An approximate road distance computation approach is designed by using Partially Homomorphic Encryption and road network set embedding.An exact road distance computation is built by using Somewhat Homomorphic Encryption and road network hypercube embedding.We implement our two road distance computation approaches, and evaluate them on the real cityscale road network.Evaluation results show that our approaches are accurate and efficient.

    Keywords: Road network; road distance; homomorphic encryption

    1 Introduction

    Nowadays, road networks have been widely used in many application domains for sciences and engineering, such as closeness testing in spatial social networks, route planning, ride hailing or navigation in road networks, etc.For example, online ride hailing services such as Uber and DiDi employ large road networks with millions or even billions of vertices and edges in their operation.A well-maintained road network computation system plays a significant role.It not only reduces the cost of transportation, both in terms of money and time, but also improves the quality of upper services.

    The shortest road distance computation has been considered as one of the most fundamental operations of road networks computation and has a wide range of applications.There are many efficient shortest distance (path) algorithms, such as Dijkstra’s algorithm and Bellman Ford’s Algorithm.In some application scenarios, the shortest road distance must be computed in encryption form to avoid privacy leaks.As an example, an online ride hailing service enables a rider to find the closest driver to offer ride service.To enjoy this service, both riders and drivers have to update their locations to the online ride hailing service provider, while the service provider computes the shortest road distances from the rider to all drivers, and select the closest driver.But the service providers are not always honest, they may track users or infer their profiles for economic advantage.To alleviate this privacy concerns, the riders and the driver submit their encrypted locations, and the service provider can compute the encrypted road distance over received ciphertexts.However, it is not a trivial problem to compute shortest road distance in ciphertext domain.Some schemes have been presented in the literature to compute shortest road distance in a secure manner, which make use of cryptographic primitives to encrypt the road network itself or the corresponding pre-generated index, e.g., Partially Homomorphic Encryption (PHE), Somewhat Homomorphic Encryption (SHE), Yao’s garbled circuits (GCs).Shen et al.[1] proposed a graph encryption scheme based on symmetric-key primitives and SHE,which enables approximate constrained shortest distance queries.Meng et al.[2] presented three schemes based on distance oracle and structured encryption for approximate shortest distance queries.Wang et al.[3] proposed a secure Graph DataBase (SecGDB) encryption scheme based on PHE and Yao’s GCs, which supports exact shortest distance/path queries.Wu et al.[4] proposed an efficient cryptographic protocol for fully-private navigation based on compressing the next-hop routing matrices, symmetric Private Information Retrieval (PIR) and Yao’s GCs.However, existing schemes are not efficient enough to compute large-scale shortest distances in real time.

    To tackle the practical limitations of the state-of-the-art, we propose two secure road distance computation approaches, which can compute road distance over encrypted data efficiently.We summarize main contributions as:

    ? We propose an efficient approximate road distance computation approach over encrypted data, by using PHE and road network set embedding.Our approach only needs several additive homomorphic operations to compute an encrypted approximate road distance.

    ? We propose an efficient exact road distance computation approach over encrypted data,by using SHE and road network hypercube embedding.Our approach only needs several additive and multiplicative homomorphic operations over packed ciphertexts to compute an encrypted exact road distance.

    ? We implement our approximate road distance computation approach using Paillier Cryptosystem and exact road distance computation approach using FV scheme.Their performance is evaluated on the real city-scale road network.Evaluation results show that they achieve high accuracy, and keep efficient.

    The remainder of this paper is structured as follows.In Section 2, we briefly introduce necessary preliminaries.In Section 3, we propose two road distance computation approaches over encrypted data.In Section 4, we evaluate their performance.Finally, we review the related literature and summarize the paper.

    2 Preliminaries

    2.1 Paillier Cryptosystem

    Partially homomorphic encryption (PHE) allows to carry out operations over ciphertexts.Paillier cryptosystem [5] is a popular PHE scheme, which relies on the decisional composite residuosity assumption.We briefly summarize it as follows for better understanding and description of our plan.

    2.2 FV Scheme

    FV scheme [6] is a widely used SHE scheme which can support a finite number of both multiplications and additions on data in the cipher domain.Mathematically, FV scheme depends on a hard computation problem named as Ring Learning with Errors (RLWE) problem.SetRt=Zt[x]/(xn+1), and in the ring structureRt,xnwill be converted to –1.The plain text space in FV scheme isRt, and the cipher text is the polynomial array inRq.Givenwbeing a base,?+1=+1 represents the number of terms when the integer in the baseqis decomposed into the basew.The?+1 polynomials is obtained by decomposing the polynomials inRqinto base-wcomponents coefficient-wise.WithaSwe uniformly sampleafrom the finite setS,and [·]qrepresent reduction moduloqinto the interval(-q/2,q/2].The FV scheme is briefly introduced as follows.

    3 Secure Distance Computation

    In this section, we propose two different methods to compute road distance in ciphertext domain.

    3.1 Approximate Road Distance Computation with PHE

    3.1.1 Road Network Set Embedding

    By using Road Network Set Embedding (RNSE) technique [7], the planar road network can be converted into a high-dimensional space, in which we can convert the complex calculation of the shortest road distance into a simple calculation supported through existing encryption primitives.

    We model the road network as a weighted planar graphG=(V,E,W).DefineVas the set of vertices inG(i.e., road junctions) andEas the set of edges inG(i.e., road sections).Let R be a set of subsets ofVand it describes a high-dimensional embedding space:

    whereαandβare equal toO(log|V|).SubsetVi,jis composed of 2inodes randomly selected fromV.The shortest road distance between nodev∈Vand subsetVi,jcan be calculated by

    Based on the above definition, the coordinate of a nodev, which is a vector with O(log2|V|)dimensions, is defined as the distance from the nodevto each subset:

    Then we can use Ω={cv|v∈V}to represent the embedded road network ofG.

    For the coordinate of a positionlon the road section(vs,vd)∈E, it can be denoted by

    wheredistR(l,Vi,j)=min{distR(l,vs)+distR(vs,Vi,j),distR(l,vd)+distR(vd,Vi,j)}.

    Without losing generality, let the embedded road network haveωdimensions, s.t.ω≤log2|V|By calculating the chessboard distance from csto cd, the shortest distance from locationlstoldcan be approximately represented as

    wheredistC(·,·)denotes the chessboard distance amid two coordinates.

    3.1.2 Encrypted Approximate Road Distance Computation Using Paillier Cryptosystem

    Suppose that the road network is represented byG=(V,E,W)and the dimension of the embedded road network isω, we can use the RNE technique described in Section 3.1.1 to calculate the coordinates of each point inG, where the coordinate is a vector ofωdimension.Then, we will obtain the embedded road network denoted by ΩA={cv|v∈V}.Given a pair of points on the road networks(ls,ld), let cs=(cs[1],...,cs[ω])and cd=(cd[1],...,cd[ω])denote the coordinates oflsandldin the embedded road network ΩA.

    The coordinates clsand cldcan be encrypted element-by-element using the public keypkPHEgenerated by Paillier cryptosystem, respectively.The encrypted coordinates are represented as

    The encrypted approximate road distance betweenlsandldcan be computed as follows:

    1) Compute the ciphertext vector [[dist(ls,ld)]] over [[cs]] and [[cd]] based upon homomorphism operations of the Paillier cryptosystem:

    Note that EncPHE(2?)is used to make sure that every element in [[dist(ls,ld)]] is positive.

    2) Because Paillier cryptosystem has a plaintext space much larger than the upper limit of the road distance, several ciphertexts can be packed into one ciphertext using ciphertext packing technology, which can improve the efficiency.In the Paillier cryptosystem, assuming thatp=N/(?+1)is the number of slots in a single packed ciphertext,pciphertexts can be packed into one ciphertext.The main idea of the ciphertexts packing technique is described as follows.Assuminga1,...,alare integers of?bits (1 ≤l≤p), we use [[a1]],...,[[al]] to express their ciphertexts.The packed ciphertext is constructed by [[[a1]]|···|[[al]]]=2?(l-i).

    After performing a decryption operation, we can get the packed plaintext [a1|···|al] =and then recovera1,...,al.Using the above ciphertext packing technique, every encrypted element in [[dist(ls,ld)]] can be packed into a same packed ciphertext:

    [[dist(ls,ld)]]=[[[dist1(ls,ld)]]|···|[[distω(ls,ld)]]]=[[disti(ls,ld)]]2?(ω-i), s.t.,p≥ω.

    3) The approximate road distance betweenlsandld, i.e.distA(ls,ld), is the maximum element in dist(ls,ld), which is hidden in [[dist(ls,ld)]].Further post-process is required to extract the maximum from dist(ls,ld).In the simplest way, [[dist(ls,ld)]] can be decrypted with the secret keyskPHE, and then unpacked to recover dist(ls,ld).There are, of course, other more complex scenes,where the maximum needs to be selected in an oblivious manner.For these scenes, some wellestablished cryptographic tools can be integrated, such as Yao’s garbled circuit and secret sharing scheme.More details about secure comparison over encrypted integers can be referred to [8–11].

    3.2 Exact Road Distance Computation with SHE

    3.2.1 Road Network Hypercube Embedding

    Them-dimensional hypercubeHm, is a graph whose node setVconsists of 2m m-dimensional boolean vectors, i.e., vectors with binary coordinates 0 or 1, where two nodes are adjacent whenever they are different in exactly one coordinate.Moreover, the size ofHmism2m-1and its older is 2m.Road Network Hypercube Embedding (RNHE) technique [7] is concerned with finding mappings between a road network and a higher-dimensional hypercube that preserve certain topological properties.Let the weighted graphG=(V,E,W)represent the road network.The vertices set isVand the edge set isE.Every edge(vi,vj)inEis related to a weightW(vi,vj), which denotes the road distance of the edge.For a vertexvi∈V, its coordinate can be expressed by a boolean vector viwithmdimensions, and we use ΩH={vi|vi∈V}represents the embedded road network.We can obtain the shortest road distance between arbitrary two vertices by computing Hamming distance between their coordinates.Note that the location in the road network and its position in corresponding planar graph can typically be converted from one to the other, and hereafter they are used interchangeably.

    Related definitions are as follows.

    ? Theinterior face Findicates a cycle ofGsurrounding a connected domain, and theouter faceofGindicates an unbounded face.

    ? Aneven(odd) face means a face witheven(odd) edges.LetdiaFbe the diameter ofF, and ifd(vi,=d(vj,=diaFholds, edgese=(vi,vj)and $e′=in faceFareopposite.For each edgee∈F, it will have a unique opposite edge whenFis an even face and have two opposite edges whenFis an odd face.

    ? A cutLmeans a series of edges {e1,e2,e3,...,ek}satisfying the following three properties:1) Eithere1=ekorekande1are all the edge of a outer face; 2) ?F(ei,ei+1∈F); 3) in faceF, edgeseiandei+1are opposite.If graphGremoves the edges of a cutL, thenGis divided into two subgraphs {G/L}0and {G/L}1.

    ? Analternating cutrefers to a cut which alternates on the odd faces.In other words, if the cut turns left (resp.right) on an odd face, then it turns right (resp.left) on the following odd face.We can view an alternating cut as a line which passes through the graph and intersects only the selected edges.

    The embedded road network ΩHcan be constructed byGas follows.Each alternating cutLcorresponds to two connected components {G/L}0and {G/L}1.The coordinate of every vertex in {G/L}0will be appended with 0 and the coordinate of every vertex in {G/L}1will be appended with 1.We can find all alternating cuts which containeas below.

    ? Starting withe, we move in both directions, take opposite edge on even face and end when we meet the first odd face in both directions.

    ? Next, we turn right on one odd face and left on the other (we can obtain more alternating cuts by changing the selection of odd face).

    ? Proceeding in both directions, we alternate at all odd faces and end up with reaching the outer face.Clearly, the coordinate is anm-dimensional boolean vector, wheremis the total number of alternating cuts.At last,Gcan be embedded into anm-dimensional hypercubeHm.

    The computational complexity of hypercube embedding isIn Fig.1, the road network corresponds to the hypercubeH14, and its embedded road network is shown in Tab.1.Note that above hypercube embedding is not affected by different road network topology.

    Figure 1:An example of alternating cuts of a road network (a) A simple road network.(b)Alternating cuts (e.g., L0 and L12 )

    Table 1:The embedded road network of the road network in Fig.1

    Let ΩHbe the embedded road network of the road networkG.The coordinates of two nodesvs,vd∈Vin ΩHare expressed as vs=(vs[0],...,vs[m-1])and vd=(vd[0],...,vd[m-1]).We can calculate the shortest road distance fromvstovdas below.

    wheredistE(vs,vd)means the exact shortest road distance,distH(·,·)means the Hamming distance.In Fig.1, the shortest road distance fromvatoveis calculated bydistE(va,ve)=va,ve)=6.

    Givenl=(v,Δ)denoting a location in the road networkG,vmeans the nearest node to l and Δ means the shortest road distance between v and l.Let two locations bels=(vs,Δs)andld=(vd,Δd)respectively, and the shortest road distance fromlstoldis computed by

    3.2.2 Encrypted Exact Road Distance Computation Using FV Scheme

    For locationsls=(vs,Δs)andld=(vd,Δd), the road distance between them can be computed in ciphertext domain by using FV Scheme.In a basic way, we can encrypt the respective coordinate vs=〈vs[0],...,vs[m-1]〉and vd=〈vd[0],...,vd[m-1]〉ofvsandvdbit-by-bit with the public keypkSHEto obtain two ciphertext sequences, denoted as:

    Using the homomorphic property of FV Scheme, the encrypteddistE(vs,vd)can be calculated over [[vs]] and [[vd]] by:

    Then, the encrypteddistE(ls,ld)can be computed by [[distE(ls,ld)]]=[[distE(vs,vd)]][[Δd]].

    When the length ofmis long, the computation overhead of above basic distance computation method is heavy, since it is inefficient to encrypt/decrypt coordinate bit-by-bit.To reduce computation overhead, we propose an optimized approach with ciphertext packing to compute the shortest road distance efficiently.We now describe the details of two packed ciphertext constructions for the coordinates vsand vdas follows.

    For the coordinate vs=〈vs[0],...,vs[m-1]〉, letfs(vs)represent the packed plaintext:

    where vscan be converted into the polynomial coefficients offs(vs)by packing.The packed ciphertext of vsis calculated by encryptingfs(vs)as follows:

    Given the coordinate vd=〈vd[0],...,vd[m-1]〉, let vdrepresent the packed plaintext:

    where vdis converted into the polynomial coefficients offd(vd)by packing.The packed ciphertext of vdis calculated by encryptingfd(vd)as follows:

    EncrypteddistE(vs,vd)can be computed by two packed ciphertexts denoted byandUsing multiplicative homomorphism, the ciphertext of Hamming weight of vsis calculated by the plaintext polynomial and the packed ciphertext, denoted as:

    then we have

    wherexn=-1(modxn+1).For plaintext modulustthat is large enough, the constant term in Eq.(19) equals the Hamming weight of vs.Likewise, the ciphertext of Hamming weight of vdis calculated by the plaintext polynomial and the packed ciphertext, denoted as:

    then we have

    The constant term in Eq.(21) equals the Hamming weight of vd.Using multiplicative homomorphism, the ciphertext of the inner product of coordinates vsand vdis calculated by two packed ciphertexts as follows:

    then we have

    The inner product of two coordinates vsand vdis equal to the constant term in Eq.(23).

    Based on Eq.(9), we can use three packed ciphertexts (18), (20) and (22) to calculate the encrypteddistE(ls,ld)as follows:

    Based on Eq.(10) and (24), the ciphertext of the distance between locationls=(vs,Δs)andld=(vd,Δd)as follows:

    It needs only three multiplicative homomorphisms operations and four subtractive/additive homomorphisms operations for the calculation of the shortest road distance over two locations.

    4 Experiment Evaluation

    Our experiments are performed on the real road network of California, which consists of 21048 vertices and 21693 edges (www.cs.utah.edu/~lifeifei/SpatialDataset.htm).Following the assumptions made in [7], we need to delete some trivial edges and insert virtual vertices on edges with fixing the unit distance.For PHE, we use the Paillier cryptosystem library (acsc.cs.utexas.edu/libpaillier).For the modified Paillier cryptosystem, we setNandgto 1024 bits and 160 bits, respectively.For SHE, we use FV scheme built on FV-NFLlib(github.com/CryptoExperts/FV-NFLlib), and the degree of polynomials in FV schemenis set to 2048.All our experiments are conducted and executed on a PC running Ubuntu 18.04 LTS, with an Intel i7 processor at 3.4GHZ and 16GB RAM.

    We evaluate the accuracy and the efficiency of our proposed road distance approaches in a k-Nearest Neighbors (kNN) query application [12,13].We first generate some locations on the edges of the road networks in a random fashion.Then, one location is randomly picked as the starting location, from which all road distances to other locations are computed by using our approaches.Finally, the closest location is selected as the nearest neighbor.Fig.2 depicts the accuracy of kNN query by using Euclidean distance, approximate road distance (dimensionω= 8,16,24,32) and exact road distance under different location scales.Euclidean distance is considered as the lower bound of accuracy, which always stays from 85% to 90%.We can see the accuracy of approximate road distance raises steadily as the dimension of the embedded road network increases.It is roughly 95% when the dimension is higher than 24.That is because higher dimension indicates higher accurate approximation.When we vary the location scale from 1000 to 4000, the accuracy of Euclidean distance gradually increases as the location scale increases,because larger location scale means there may exist closer destination locations located around the starting location.But the accuracy of Euclidean distance is still less than 90%.The accuracy of approximate road distance is always high under any driver scale, which is roughly 95% if the dimension is higher than 24.As expected, the accuracy of exact road distance keeps almost 100% under any location scale.Above experimental results demonstrate that both approximate road distance computation approach and exact road distance computation approach can reach a higher accuracy due to the choice of road distance.We use average online computation cost for per kNN query to evaluate the efficiency.As shown in Fig.3, the computation cost of the approximate road distance computation approach raises with the dimension increases.The reason is that higher dimension requires more encryption operations over a location coordinate.Meanwhile, the computation cost of both the approximate road distance computation approach and the exact road distance computation approach increase almost linearly as the location scale increases.That is because more distance computation is required with larger location scale.From above evaluation, we can see that the two approaches achieve high accuracy and efficiency.

    Figure 2:The accuracy of Euclidean distance, approximate road distance and exact road distance

    Figure 3:The accuracy of Euclidean distance, approximate road distance and exact road distance

    5 Related Works

    Numerous protocols have been proposed for private shortest road distance computation in different applications, such as kNN query and navigation.For (yet related) privacy issues of distance computation, some approaches utilize structural anonymization [14], differential privacy [15–17]or Private Information Retrieval (PIR) [18] to guarantee privacy for the client or the server.However, these approaches suffer from limited privacy, performance or scalability.There is also a vast literature on privacy-preserving shortest distance computation in structured encryption [19]or graph encryption, which focuses on protecting graph data when outsourced to third-party servers or on the cloud [20–22].The most famous class of structured encryption schemes are searchable symmetric encryption (SSE) schemes [23].Generally speaking, SSE schemes usually encrypt indexes or search trees for the purpose of efficiently searching on encrypted data.Another line of work executing graph algorithms over encrypted graphs is to develop data-oblivious algorithms [24] or data structures [25].In these solutions, the graph data is stored in an Oblivious RAM (ORAM) [26] or an oblivious data structure on the server.The client can compute the shortest distances on the server without leaking its access patterns.Also relevant are the works based on SMC, such as Yao’s GCs and ORAM.The generic solution is to construct a GC that contains the entire graph structure for a shortest-path algorithm and apply Yao’s protocol.However, above approaches are often prohibitively expensive and impractical for city-scale road networks [27,28].For instance, the GC-based approach by Carter et al.[29,30] requires several minutes to compute a single shortest path in a road network with just 100 vertices.Another generic approach combining GCs and ORAM requires communication overhead on the order of GB and run-times ranging from tens of minutes to several hours for a single computation on a network with 1024 vertices.Recently, some schemes are proposed to support computation over large-scale encrypted graphs.Shen et al.[1] proposed a graph encryption scheme based on symmetric-key primitives and SHE, which enables approximate constrained shortest distance queries.Meng et al.[2] presented three schemes based on distance oracle and structured encryption for approximate shortest distance queries.Above two schemes provide an estimate on the shortest distance, along with sacrificing accuracy.Wang et al.[3] proposed a secure Graph Data Base (SecGDB) encryption scheme based on PHE and Yao’s GCs, which supports exact shortest distance/path queries.Wu et al.[4] proposed an efficient cryptographic protocol for fully-private navigation based on compressing the next-hop routing matrices, symmetric Private Information Retrieval (PIR) and Yao’s GCs, which requires about 1.5 s and less than 100 KB of bandwidth for each hop in city-scale road network.Compared with existing schemes, our two road distance computation approaches are more efficient to compute large-scale shortest distances in real time.

    6 Conclusions

    In this paper, we proposed two secure road distance computation approaches, which can compute road distance over encrypted data efficiently.An approximate road distance computation approach is designed by using Partially Homomorphic Encryption and road network set embedding.An exact road distance computation is built by using Somewhat Homomorphic Encryption and road network hypercube embedding.According to the evaluation over a real city-scale road network, we have verified that our approaches are accurate and efficient.

    Funding Statement:This work was partially supported by National Natural Science Foundation of China (Grant Nos.61601146, 61732022), National Key R&D Program of China (Grant No.2016QY05X1000).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    最后的刺客免费高清国语| 亚洲伊人久久精品综合| 亚洲欧美一区二区三区黑人 | 九九久久精品国产亚洲av麻豆| 国产精品一国产av| 欧美最新免费一区二区三区| 亚洲精品一二三| 国产色婷婷99| 日韩视频在线欧美| 亚洲图色成人| 欧美亚洲日本最大视频资源| 国产亚洲精品久久久com| 嫩草影院入口| 在线观看免费高清a一片| 人人澡人人妻人| 男女高潮啪啪啪动态图| 男女免费视频国产| 成人免费观看视频高清| 欧美老熟妇乱子伦牲交| 久久久精品免费免费高清| 亚洲精品亚洲一区二区| 亚洲精品美女久久av网站| 欧美老熟妇乱子伦牲交| 国产毛片在线视频| 国产一区二区三区综合在线观看 | 午夜福利,免费看| 亚洲久久久国产精品| 麻豆成人av视频| 午夜免费观看性视频| 久久久精品免费免费高清| 精品视频人人做人人爽| 99久久精品一区二区三区| 考比视频在线观看| 蜜桃在线观看..| 国产不卡av网站在线观看| 人人妻人人爽人人添夜夜欢视频| 十八禁网站网址无遮挡| 国产毛片在线视频| 日韩,欧美,国产一区二区三区| 亚洲国产精品999| 人人妻人人爽人人添夜夜欢视频| 麻豆成人av视频| 国产成人freesex在线| 成年人免费黄色播放视频| 国产一区二区三区综合在线观看 | av免费在线看不卡| 成人黄色视频免费在线看| 久久久久精品久久久久真实原创| 亚洲怡红院男人天堂| 色吧在线观看| 高清av免费在线| 狂野欧美激情性xxxx在线观看| 天堂8中文在线网| 卡戴珊不雅视频在线播放| 少妇猛男粗大的猛烈进出视频| 啦啦啦中文免费视频观看日本| 国产精品久久久久久av不卡| 国产亚洲精品久久久com| 欧美日韩av久久| 韩国av在线不卡| 免费黄网站久久成人精品| 精品亚洲乱码少妇综合久久| 成人综合一区亚洲| 尾随美女入室| .国产精品久久| 天天操日日干夜夜撸| 蜜臀久久99精品久久宅男| 观看av在线不卡| 国产成人91sexporn| 中国三级夫妇交换| 中文精品一卡2卡3卡4更新| 国产视频首页在线观看| 午夜免费鲁丝| 丰满少妇做爰视频| 成年人午夜在线观看视频| 国产日韩欧美视频二区| 亚洲国产欧美日韩在线播放| 涩涩av久久男人的天堂| 久久狼人影院| 80岁老熟妇乱子伦牲交| 久久久精品免费免费高清| 尾随美女入室| 国产成人精品福利久久| 99精国产麻豆久久婷婷| 欧美精品一区二区大全| 超色免费av| 搡女人真爽免费视频火全软件| 亚洲一级一片aⅴ在线观看| 日韩三级伦理在线观看| 有码 亚洲区| 亚洲情色 制服丝袜| 黄色毛片三级朝国网站| 日本欧美国产在线视频| 国产精品一二三区在线看| 精品亚洲乱码少妇综合久久| h视频一区二区三区| 国产毛片在线视频| 99视频精品全部免费 在线| 国产女主播在线喷水免费视频网站| 久久久午夜欧美精品| 国产熟女午夜一区二区三区 | 国产成人精品婷婷| 国产国语露脸激情在线看| 极品人妻少妇av视频| 青青草视频在线视频观看| 国模一区二区三区四区视频| 简卡轻食公司| 亚洲国产成人一精品久久久| 亚洲三级黄色毛片| 亚洲欧美成人精品一区二区| 欧美日韩综合久久久久久| 母亲3免费完整高清在线观看 | 成人无遮挡网站| 亚洲国产色片| 三上悠亚av全集在线观看| 国产一区有黄有色的免费视频| 国产又色又爽无遮挡免| 国产在线免费精品| 在线天堂最新版资源| 免费人妻精品一区二区三区视频| 精品一区二区免费观看| 国产视频首页在线观看| 男男h啪啪无遮挡| 中文字幕精品免费在线观看视频 | a级毛片黄视频| 18禁观看日本| 老熟女久久久| 中文字幕久久专区| 日日摸夜夜添夜夜添av毛片| 成年人免费黄色播放视频| 91久久精品电影网| 男人操女人黄网站| 99久久中文字幕三级久久日本| 欧美另类一区| 亚洲国产最新在线播放| 久久久久国产精品人妻一区二区| 国产一级毛片在线| 国产淫语在线视频| 少妇高潮的动态图| 久久免费观看电影| 观看av在线不卡| 一级a做视频免费观看| 国产av国产精品国产| 下体分泌物呈黄色| 久久久久久人妻| 大又大粗又爽又黄少妇毛片口| 亚洲国产av影院在线观看| 久久久久久久久大av| 日韩中文字幕视频在线看片| av天堂久久9| 国产精品久久久久成人av| 天堂俺去俺来也www色官网| av黄色大香蕉| 亚洲国产精品999| 永久免费av网站大全| 午夜日本视频在线| 美女国产视频在线观看| 夫妻午夜视频| 91久久精品国产一区二区成人| 99热6这里只有精品| 久久久a久久爽久久v久久| 高清视频免费观看一区二区| 国产免费现黄频在线看| 亚洲一区二区三区欧美精品| 纵有疾风起免费观看全集完整版| av在线观看视频网站免费| 18禁裸乳无遮挡动漫免费视频| 视频中文字幕在线观看| 欧美 亚洲 国产 日韩一| 啦啦啦啦在线视频资源| 亚洲国产成人一精品久久久| 亚洲精品久久成人aⅴ小说 | 亚洲精品久久久久久婷婷小说| 成人国产麻豆网| √禁漫天堂资源中文www| 一区二区三区免费毛片| 国产视频内射| 日日啪夜夜爽| 岛国毛片在线播放| 汤姆久久久久久久影院中文字幕| 国产成人免费观看mmmm| 18禁在线播放成人免费| 亚洲国产色片| 久久久久久久久久久丰满| 日韩在线高清观看一区二区三区| 寂寞人妻少妇视频99o| 久久久久精品久久久久真实原创| a级毛片免费高清观看在线播放| 一区二区三区免费毛片| 丝袜在线中文字幕| 久热这里只有精品99| 久久国产精品大桥未久av| 亚洲一区二区三区欧美精品| 国产成人91sexporn| 国产av国产精品国产| 妹子高潮喷水视频| h视频一区二区三区| 国产成人精品久久久久久| 日本wwww免费看| 免费观看性生交大片5| 国产成人aa在线观看| 欧美97在线视频| 一级毛片黄色毛片免费观看视频| 国产精品偷伦视频观看了| 国产片内射在线| 欧美 亚洲 国产 日韩一| 久久久久久久久久久丰满| 成年人免费黄色播放视频| 日本与韩国留学比较| 国产精品免费大片| 两个人免费观看高清视频| 久久精品久久久久久久性| 成年女人在线观看亚洲视频| 欧美日韩综合久久久久久| 成人国产麻豆网| 久久人人爽av亚洲精品天堂| 老司机影院成人| 亚洲少妇的诱惑av| 亚洲经典国产精华液单| 少妇被粗大猛烈的视频| 99九九线精品视频在线观看视频| 中文乱码字字幕精品一区二区三区| 国产亚洲av片在线观看秒播厂| 久久久久久久久久久免费av| 国产熟女午夜一区二区三区 | 国产精品麻豆人妻色哟哟久久| 久久久久久久久久人人人人人人| 午夜av观看不卡| 久久午夜综合久久蜜桃| 精品人妻熟女av久视频| 97精品久久久久久久久久精品| 亚洲人与动物交配视频| 考比视频在线观看| 两个人的视频大全免费| 黑人高潮一二区| 亚洲精品av麻豆狂野| 天堂俺去俺来也www色官网| 少妇的逼水好多| 久久免费观看电影| 精品久久久久久久久av| 2021少妇久久久久久久久久久| 国产日韩欧美在线精品| 国产高清不卡午夜福利| 少妇人妻 视频| 亚洲成人手机| 久久久久久久国产电影| 亚洲中文av在线| 26uuu在线亚洲综合色| 青青草视频在线视频观看| 99热全是精品| 欧美变态另类bdsm刘玥| 在线看a的网站| 成人国语在线视频| 一区二区三区乱码不卡18| av线在线观看网站| 国产免费现黄频在线看| 久久久久精品久久久久真实原创| 精品卡一卡二卡四卡免费| 成年av动漫网址| 久久久久久久久久久免费av| 人人妻人人澡人人看| 亚洲综合色网址| 在现免费观看毛片| 欧美一级a爱片免费观看看| 日本黄大片高清| 免费不卡的大黄色大毛片视频在线观看| 成人无遮挡网站| 久久久久久久亚洲中文字幕| 日本-黄色视频高清免费观看| 成人国产麻豆网| 精品卡一卡二卡四卡免费| 99热这里只有精品一区| www.av在线官网国产| 日本午夜av视频| 精品少妇久久久久久888优播| 久久久精品区二区三区| 亚洲国产日韩一区二区| 国产熟女午夜一区二区三区 | 国产av一区二区精品久久| 国产有黄有色有爽视频| 自拍欧美九色日韩亚洲蝌蚪91| 大香蕉97超碰在线| 夜夜爽夜夜爽视频| 99国产综合亚洲精品| 一本色道久久久久久精品综合| 国产精品久久久久成人av| 欧美一级a爱片免费观看看| 国产女主播在线喷水免费视频网站| 亚洲av福利一区| 亚洲国产精品成人久久小说| 国产色爽女视频免费观看| 亚洲欧美一区二区三区黑人 | 99久久精品一区二区三区| 男女免费视频国产| 国产成人精品婷婷| 三级国产精品片| 成年人免费黄色播放视频| 日韩精品有码人妻一区| 高清不卡的av网站| 伊人久久国产一区二区| 狠狠婷婷综合久久久久久88av| 久久久久久伊人网av| 国产精品久久久久成人av| 黄色欧美视频在线观看| 国产精品 国内视频| 成人漫画全彩无遮挡| 晚上一个人看的免费电影| 久久久久国产网址| 看非洲黑人一级黄片| av一本久久久久| 美女视频免费永久观看网站| 赤兔流量卡办理| 久久久午夜欧美精品| 黑人猛操日本美女一级片| 在线免费观看不下载黄p国产| 久久婷婷青草| 欧美日韩一区二区视频在线观看视频在线| 七月丁香在线播放| 曰老女人黄片| 日韩成人伦理影院| 日本av免费视频播放| 在线观看美女被高潮喷水网站| 国产精品久久久久久精品古装| 女性生殖器流出的白浆| 色婷婷av一区二区三区视频| 免费观看的影片在线观看| 精品一区二区三卡| 精品人妻偷拍中文字幕| 久久人人爽av亚洲精品天堂| 成年av动漫网址| 中文字幕人妻丝袜制服| 黑人猛操日本美女一级片| 韩国高清视频一区二区三区| 亚洲国产日韩一区二区| 美女国产视频在线观看| 精品一区二区三区视频在线| 亚洲精品一二三| 婷婷色综合大香蕉| 亚洲av免费高清在线观看| 亚洲精品一二三| 欧美bdsm另类| 一二三四中文在线观看免费高清| 新久久久久国产一级毛片| 亚洲欧美一区二区三区黑人 | 久久久欧美国产精品| 蜜臀久久99精品久久宅男| 视频中文字幕在线观看| 丝瓜视频免费看黄片| 三级国产精品欧美在线观看| 国产视频首页在线观看| 18禁观看日本| 99国产综合亚洲精品| 午夜久久久在线观看| 国产精品久久久久久久久免| 女性生殖器流出的白浆| 在线观看三级黄色| 欧美xxxx性猛交bbbb| 亚洲国产日韩一区二区| 亚洲一级一片aⅴ在线观看| 成年人午夜在线观看视频| 尾随美女入室| 精品久久久久久电影网| 国产精品久久久久久精品电影小说| 久久久久久久久久成人| 少妇人妻久久综合中文| 亚洲五月色婷婷综合| 欧美老熟妇乱子伦牲交| 亚洲国产av新网站| 女性被躁到高潮视频| 亚洲性久久影院| 日韩精品有码人妻一区| 亚洲精品国产av成人精品| 国产伦理片在线播放av一区| 精品一区二区免费观看| 51国产日韩欧美| www.av在线官网国产| 有码 亚洲区| 香蕉精品网在线| 黑丝袜美女国产一区| 日韩三级伦理在线观看| 久久精品久久久久久久性| 国产有黄有色有爽视频| 日韩强制内射视频| 99热这里只有精品一区| 国产永久视频网站| 久久精品久久精品一区二区三区| 在线观看人妻少妇| 国产精品国产三级专区第一集| 久久 成人 亚洲| 免费少妇av软件| 在线观看免费日韩欧美大片 | 伊人久久精品亚洲午夜| 亚洲av男天堂| 黄色怎么调成土黄色| 亚洲精品乱码久久久v下载方式| 99精国产麻豆久久婷婷| 成人漫画全彩无遮挡| av在线老鸭窝| 日本与韩国留学比较| 一本久久精品| 欧美+日韩+精品| 我的女老师完整版在线观看| 性色av一级| 午夜福利在线观看免费完整高清在| 丰满迷人的少妇在线观看| 十八禁高潮呻吟视频| 日本-黄色视频高清免费观看| 我的女老师完整版在线观看| 丝袜脚勾引网站| 日本黄色日本黄色录像| 精品午夜福利在线看| av不卡在线播放| 国产亚洲av片在线观看秒播厂| 欧美亚洲 丝袜 人妻 在线| 一级毛片电影观看| 少妇 在线观看| 免费av不卡在线播放| 丰满乱子伦码专区| 免费黄网站久久成人精品| 在线看a的网站| 99久久综合免费| a级片在线免费高清观看视频| 国产成人91sexporn| 妹子高潮喷水视频| 精品熟女少妇av免费看| 亚洲色图综合在线观看| 久久国产精品男人的天堂亚洲 | 在线观看免费日韩欧美大片 | 欧美最新免费一区二区三区| 在线观看免费视频网站a站| 欧美成人精品欧美一级黄| 国产精品一区二区在线观看99| 亚洲内射少妇av| 久久精品国产亚洲av天美| 亚洲精品亚洲一区二区| 亚洲四区av| 日本欧美视频一区| 五月伊人婷婷丁香| a级毛片黄视频| 大香蕉久久网| 一级毛片电影观看| 日本91视频免费播放| 如日韩欧美国产精品一区二区三区 | 国产男女超爽视频在线观看| 激情五月婷婷亚洲| 丝袜喷水一区| 看非洲黑人一级黄片| 三级国产精品片| 欧美最新免费一区二区三区| 欧美性感艳星| 青春草视频在线免费观看| 极品人妻少妇av视频| 国产精品久久久久久精品古装| 亚洲精品aⅴ在线观看| 日韩欧美精品免费久久| 精品一区二区三卡| 99热网站在线观看| 欧美 日韩 精品 国产| 91午夜精品亚洲一区二区三区| 亚洲欧美清纯卡通| 在线精品无人区一区二区三| 中文精品一卡2卡3卡4更新| 亚洲不卡免费看| 亚洲熟女精品中文字幕| 精品人妻熟女av久视频| 狠狠婷婷综合久久久久久88av| 人人澡人人妻人| 精品人妻一区二区三区麻豆| 国产精品一国产av| 久久久久国产精品人妻一区二区| 不卡视频在线观看欧美| 成人毛片a级毛片在线播放| 91精品伊人久久大香线蕉| 中国美白少妇内射xxxbb| √禁漫天堂资源中文www| 丝瓜视频免费看黄片| 欧美亚洲 丝袜 人妻 在线| 我要看黄色一级片免费的| 欧美激情极品国产一区二区三区 | 2022亚洲国产成人精品| 久久国内精品自在自线图片| 性高湖久久久久久久久免费观看| 搡老乐熟女国产| 高清在线视频一区二区三区| av播播在线观看一区| 久久久久国产精品人妻一区二区| 午夜福利在线观看免费完整高清在| 毛片一级片免费看久久久久| 亚洲欧美成人精品一区二区| 日本猛色少妇xxxxx猛交久久| 国产亚洲精品第一综合不卡 | 丰满饥渴人妻一区二区三| 日韩一本色道免费dvd| 一边摸一边做爽爽视频免费| 国产精品偷伦视频观看了| a级毛色黄片| 久久久亚洲精品成人影院| 亚洲精品日本国产第一区| 免费av不卡在线播放| 免费黄频网站在线观看国产| 精品国产乱码久久久久久小说| 一边摸一边做爽爽视频免费| 人成视频在线观看免费观看| 国内精品宾馆在线| 国产熟女欧美一区二区| 亚洲欧美日韩卡通动漫| 97超碰精品成人国产| 国产精品人妻久久久影院| 久久久国产欧美日韩av| 亚洲av成人精品一二三区| 国产一级毛片在线| av播播在线观看一区| 久久久久国产精品人妻一区二区| 满18在线观看网站| 国产成人a∨麻豆精品| 亚洲,欧美,日韩| 成人影院久久| 考比视频在线观看| 精品久久久久久久久av| 国产成人精品一,二区| 国产精品国产三级国产av玫瑰| 香蕉精品网在线| 国产黄频视频在线观看| 亚洲国产精品成人久久小说| 你懂的网址亚洲精品在线观看| 精品久久久精品久久久| 老司机影院毛片| 好男人视频免费观看在线| 女人久久www免费人成看片| 欧美日韩视频高清一区二区三区二| 97超碰精品成人国产| 国产精品人妻久久久影院| 又黄又爽又刺激的免费视频.| 日本wwww免费看| 中文字幕制服av| 亚洲av国产av综合av卡| 91在线精品国自产拍蜜月| 狂野欧美白嫩少妇大欣赏| 亚洲av成人精品一区久久| 国产探花极品一区二区| 欧美精品一区二区大全| 人人妻人人澡人人看| 国产综合精华液| 99久国产av精品国产电影| 久久久久久久国产电影| 免费大片黄手机在线观看| 久久久久久久久大av| 久久久久久久大尺度免费视频| 日韩一本色道免费dvd| 丝袜脚勾引网站| 成人毛片a级毛片在线播放| 午夜激情av网站| 日韩人妻高清精品专区| 欧美日韩av久久| 欧美精品一区二区大全| av女优亚洲男人天堂| 母亲3免费完整高清在线观看 | 热99久久久久精品小说推荐| 精品一区在线观看国产| 国产精品人妻久久久久久| 国产精品一区二区在线不卡| 亚洲精华国产精华液的使用体验| 搡老乐熟女国产| 久久久久久久久久成人| 视频中文字幕在线观看| 看免费成人av毛片| 亚洲成人手机| av.在线天堂| 国产精品嫩草影院av在线观看| 国产精品久久久久久久电影| 国内精品宾馆在线| 永久免费av网站大全| 2021少妇久久久久久久久久久| 天堂中文最新版在线下载| av不卡在线播放| av网站免费在线观看视频| 少妇 在线观看| 中文欧美无线码| 婷婷色av中文字幕| 只有这里有精品99| 香蕉精品网在线| www.色视频.com| 91成人精品电影| 国产一区亚洲一区在线观看| 夜夜爽夜夜爽视频| 国产精品免费大片| 热99久久久久精品小说推荐| 丰满迷人的少妇在线观看| 久久久久国产网址| 好男人视频免费观看在线| 插逼视频在线观看| 精品一区二区三区视频在线| 久久热精品热| 日韩一区二区三区影片| 欧美日韩在线观看h| 午夜精品国产一区二区电影| 26uuu在线亚洲综合色| 国产乱人偷精品视频| 亚州av有码| 秋霞伦理黄片| 青春草亚洲视频在线观看| 国产欧美亚洲国产| 午夜91福利影院| 国产成人精品无人区| 少妇 在线观看| av免费观看日本| 亚洲国产精品国产精品| 国产精品国产三级国产av玫瑰| 亚洲丝袜综合中文字幕| 夫妻午夜视频| 高清视频免费观看一区二区| 久久国产亚洲av麻豆专区| 成人亚洲欧美一区二区av| 一本一本综合久久| 亚洲精品日韩在线中文字幕|