• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Blockchain Technology Based Information Classification Management Service

    2021-12-16 07:49:22GiWanHongJeongWookKimandHangbaeChang
    Computers Materials&Continua 2021年5期

    Gi-Wan Hong,Jeong-Wook Kim and Hangbae Chang

    1Department of Security Convergence,Graduate School,Chung-Ang University,Seoul,06974,Korea

    2Department of Industrial Security,Chung-Ang University,Seoul,06974,Korea

    Abstract:Hyper-connectivity in Industry 4.0 has resulted in not only a rapid increase in the amount of information,but also the expansion of areas and assets to be protected.In terms of information security,it has led to an enormous economic cost due to the various and numerous security solutions used in protecting the increased assets.Also,it has caused difficulties in managing those issues due to reasons such as mutual interference,countless security events and logs’data,etc.Within this security environment,an organization should identify and classify assets based on the value of data and their security perspective,and then apply appropriate protection measures according to the assets’security classification for effective security management.But there are still difficulties stemming from the need to manage numerous security solutions in order to protect the classified assets.In this paper,we propose an information classification management service based on blockchain,which presents and uses a model of the value of data and the security perspective.It records transactions of classifying assets and managing assets by each class in a distributed ledger of blockchain.The proposed service reduces assets to be protected and security solutions to be applied,and provides security measures at the platform level rather than individual security solutions,by using blockchain.In the rapidly changing security environment of Industry 4.0,this proposed service enables economic security,provides a new integrated security platform,and demonstrates service value.

    Keywords:Information classification;data integrity;document security;blockchain;CIA

    1 Introduction

    In Industry 4.0,people and people,people and things,things and things are becoming hyperconnected rapidly and closely,unlike before.The advancement of hardware and the emergence of new Information Technology (IT) technologies such as cloud,5G,blockchain,and artificial intelligence (AI) are creating new values and improving the quality of life based on big data collection in the existing services [1,2].However,these developments are expanding the scope of security for organizations and increasing rapidly the number of assets to be protected.As the number of security solutions implemented by organizations increases due to the assets that need to be protected,the economic cost of information security increases while it is becoming difficult to manage various security solutions.

    Within this security environment,organizations must identify and classify assets by the value of data and the security perspective and apply appropriate security measures upon classification for effective security management.Differentiated security activities that apply strong protection measures to assets with important values and relatively weak protection measures to assets that are less important can enable organizations to perform effective security activities in terms of cost and time.In performing differentiated security activities by identifying and classifying assets,the targets of assets are variously identified,such as organization members,products,and IT devices.

    Since the introduction of the organization’s information system in the 2000’s,most of the important assets possessed by the organization have been generated and distributed in the form of electronic document (files).As a measure to protect documents that contain sensitive information,the solutions of Digital Rights Management (DRM),Data Loss Prevention (DLP),document centralization,etc.exist,and several security solutions are used together heuristically in accordance with organizations.It leads organizations to increase security costs and makes managing security more complicated.

    To cope with these security environments effectively,we need to enable economical security for an increasing number of assets and security solutions,and integrated security management from a platform perspective.In this paper,we propose information classification management service based on blockchain which presents and utilizes a model to classify the assets based on the data and security perspective.It records transactions of classifying assets and managing assets by each class in a distributed ledger of blockchain.The proposed service reduces digital content assets to be protected and security solutions to be applied by classifying based on the given model and using blockchain to provide security measures at the platform level rather than individual security solutions level.

    The major contributions of this paper are listed below:

    ? It enables economical security by classifying assets depending on the presented model and reducing security cost by decreasing the assets to be protected through differentiated security activities by each class.

    ? It provides security of an integrated platform perspective rather than an individual solution perspective by utilizing blockchain technology to provide traceability and accountability of classification management rather than adding a new security solution.

    ? By incorporating blockchain technology into information security,it proves its value as a new service model based on blockchain.

    The rest of this paper is organized as follows:Section 2 reviews the related works.Section 3 discusses in detail the possibility of applying a new information classification model and blockchain technology to the existing security environment and proposes a research model.Section 4 shows performance analysis of the proposed research model.Finally,conclusions and future works of the paper are presented in Section 5.

    2 Related Works

    2.1 Current Document Security Solutions

    Due to political,economic,and social factors,the number of industrial technology leaks is rapidly increasing every year,but measures against countermeasures and recovery are insufficient,and punishment is low.In this situation,an organization is conducting document security activities by treating most documents as 1st class documents for the purpose of strengthening fragmentary document security activities or prevailing in legal disputes due to technology leakage accidents that may occur later.

    In the technical aspect,various security technologies have been commercialized for document security.The document centralization technology is to automatically (or forcibly) move files created on a Personal Computer (PC) to a central server after a certain period.Through these procedures,document centralization has the advantage of systematically classifying and storing files to prevent illegal leakage of files and to increase the utilization of documents [3].However,in order to classify and store files,the inconvenience of having to register the information of the corresponding document also coexists.

    DRM technology is a technology that encrypts files and allows them to be decrypted and used only by authorized persons.It has the advantage that files can be encrypted and protected even when leaked to the outside.However,there is a disadvantage that it is necessary to set the access authority of files by classifying all the various departments and members of the company.If it needs to share a file with a person who does not have permission to use it,the security must be sent to the decrypted file.At this time,it is accompanied by inconvenience such as the need to additionally acquire the approval of the upper-ranking person.

    DLP is a technology that prevents data breaches and detects confidential data transmitted,used,or stored at endpoints based on specific detection techniques such as data matching,rule and regular expression matching,and keywords [4].DLP technology prevents personal identification information such as customer or employee records,corporate information,and confidential information including intellectual property from leaking out of the company through the combination of company members,processes,and technology [5].There are some cases of reluctance to introduce DLP because there is a perception that DLP decreases productivity,has no effect for Small and Medium-sized Enterprises (SMEs),or it is difficult to implement and takes a long time [6].

    2.2 Information Classification of Documents

    For individuals and organizations,information security is a critical issue because it causes financial losses.Therefore,companies must accurately identify and focus on relatively important assets.The purpose of classification information in a company is to perform cost-effective security activities through differential security policies based on importance after evaluation.

    There is confidentiality,integrity and availability (CIA) based classification methods.Confidentiality refers to keeping information confidential,integrity keeping information immutable,and availability refers to using information immediately,regardless of geographic or temporal constraints [7].The security class of the document is evaluated for each area of confidentiality,integrity and availability,and the total impact is calculated to reflect this,and the classes are classified.This approach has limitations that do not reflect the importance of information and various values and business processes [8].

    Based on the understanding of corporate information,the information classification standard enables an evaluation by defining the concept of corporate information,calculating scope,and integrating types [9].This study derived the evaluation factors of information assets such as information development and maintenance cost,information grade,information sharing utilization,internal damage and external risk in case of information leakage.

    2.3 Blockchain Technology and Service

    Blockchain is a technology in which network participants record and share transaction data in a distributed ledger [10].Unlike the existing centralized method,network participants share data in a decentralized method,and data is stored in blocks and connected like a chain through a hash value,making it almost impossible to modify or delete the recorded data.Blockchain technology consists of distributed network communication technology,consensus algorithm,smart contract,digital signature,hash algorithm,and distributed ledger technology.

    Blockchain networks can be classified into public,permissioned (private),and consortium blockchains according to their characteristics,and policies.The public blockchain is a network model in which all participants can trade and share data,such as Bitcoin and Ethereum.Permissioned blockchain is a network model in which only authorized participants can transact and share data.Consortium blockchain is a network model in which public and permissioned types are mixed.

    Blockchain 1.0 appeared as Bitcoin and grew greatly,but it had limitations such as limited application to the financial field,slow transaction speed,high social cost,etc.[11].Blockchain 2.0 has developed a smart contract function and has begun to be applied to other fields as well as finance through Ethereum [12].In transactions or contracts,a smart contract allows transactions to be automatically executed when conditions are met through the smart contract function without intermediary intervention by a central agency or a third party.In Blockchain 3.0,various platforms such as EOS,ADA,Hyperledger,and Quorum have appeared,and various consensus algorithms have been developed to solve the hard fork problem and low Transaction Per Second (TPS) problem that occurred in Blockchain 2.0.

    Blockchain technology is currently in Blockchain 4.0 and is being applied to various industries with new service development.In addition,global IT companies are offering Blockchain as a service (BaaS) that combines a blockchain platform and cloud services [13].BaaS facilitates the development and deployment of decentralized applications (dApps) in a blockchain network configuration,and facilitates network resource management,monitoring and policy management.Blockchain-based services have business characteristics such as decentralization,irreversibility,traceability,accountability,integrity etc.depending on the form of network and platform [14].

    The goal of information security is to ensure the CIA of valuable information assets that can be sensitive information.Blockchain technology is composed of distributed networks,distributed ledgers,consensus algorithms,smart contracts,public key encryption,digital signatures,hash algorithms,etc.,thereby enhancing information security.

    Blockchain is designed to transparently share data between participants through a distributed ledger,but Confidentiality can also be ensured using zero-knowledge proofs and smart contracts [15].In addition,a service can be implemented to maintain confidentiality from a system or protocol point of view [16-18].The principle of information storage of the blockchain is that the data to be recorded on the blockchain is stored in a block,and the block is connected like a chain in the form of a double linked list using the hash value of the block,and the connected chain is shared among participants through a distributed network.Based on this process,the blockchain guarantees a high level of trust in integrity.Blockchain is composed of a distributed network,so even if one node fails,the service can be used through another node,so availability can be guaranteed.Using these technical characteristics of the blockchain,there is a research shows the feasibility of applying public services from the perspective of CIA standards [19].

    3 Proposed Model

    3.1 Consideration about Information Classification and Blockchain Technology

    In the information security environment,security costs and difficulty in managing security solutions are augmented with the rapidly increasing protection assets through hyper-connectivity.We aim to apply differential protection measures by each class for effective classification management with classifying assets in terms of data value and security.Furthermore,we intend to ensure CIA of information security more strongly and traceability for classification management,by utilizing blockchain technology from a platform point of view.

    We use the information classification standard for the classification of a document.The details of the information classification are given in Tab.1.The weights for each item shown in Tab.1 were randomly calculated.The class of information is calculated based on the total score derived from each item.Since this information classification is performed in considerations of each item,the value of the information can be reflected worthily in terms of security.This also enables organizations to classify information security assets in more effective way unlike CIA,and thus can have real value in a business environment.

    Table 1:Information classification model

    In order to use blockchain technology for information classification management services by each class,the CIA triad of information security must be guaranteed.In the perspective of confidentiality,since the blockchain guarantees data transparency by sharing a distributed ledger among network participants,a separate method for maintaining confidentiality must be needed.

    Depending on the type of blockchain network,public blockchain provides data transparency to everyone participating in the transaction,but permissioned and consortium blockchain provides limited data transparency only to trusted participants and ensures confidentiality to nonparticipants.In addition,if the contents of a sensitive asset are not stored in the distributed ledger of the blockchain,it is not necessary to guarantee the confidentiality of the asset.

    Integrity is to keep the data recorded on the blockchain as original and not forged.It is difficult to forge data stored in a distributed ledger due to the irreversibility of the blockchain.It also can be verified that the data has not been changed by comparing the hash value of the block [20].

    Availability means that even if a node participating in the blockchain network fails,the service should be available.As the distributed network of the blockchain operates based on several nodes,even if a failure occurs,it can secure availability by providing services to users through other nodes that are operating [19].

    Blockchain-based information classification management service can establish a permissioned blockchain network to secure confidentiality,and to record only the hash value,not the content of sensitive assets,on the distributed ledger.It can provide traceability for security activities by including only the hash value of assets.Furthermore,for integrity and availability,the service can be implemented in a way to compare the hash value on the distributed ledger and prevent service interruption due to failure by configuring multiple nodes of the blockchain.

    3.2 Designing Blockchain Technology Based Information Classification Service

    In order to grasp the importance of documents when an organization performs business,and apply protection measures accordingly,this paper classifies the documents based on the information classification model presented in Fig.1.First,the assets produced by the business activities of organizations are uploaded to the system and are classified according to the information classification model.Users can classify documents by the classification model.There exist 1st,2nd,and 3rd classes within the information classification model.Second,documents corresponding to 1st class enable classification management traceability by recording the metadata of assets and the class information to the blockchain.Third,document classification management is performed by applying security solutions to 1st and 2nd class documents.3rd class is public and does not carry out any security measures.Fourth,access to classified assets.Fifth,if the accessing asset is 1st class,the integrity of the asset is verified by checking the hash value.

    3.3 Blockchain Technology Based Classification Management Method

    Through the information classification model,if the score is 75 points or higher,it is the 1st class,if it is 50 or higher,the 2nd class,and the rest is the 3rd class.The differential classification management plan by the class is as shown in Tab.2.The documents corresponding to the 1st class confidential information upload the security class and meta information of documents to the blockchain system to enable classification management traceability,and the information recorded on the blockchain guarantees integrity and verifies security activities through a shared distributed ledger.The DRM solution is applied to the 1st and 2nd class documents for document security.2nd class documents are not recorded on the blockchain.3rd class documents are public information and do not carry out security measures.

    Figure 1:Blockchain-based information classification management service flow

    Table 2:Differential classification management method

    3.4 Blockchain Technology Service Structure

    The block diagram of the blockchain service based on the designed service is shown in Fig.2 below.Each organization’s system consists of a document management server,web application,DBMS and DRM solution,and the entire system consists of blockchain network and organization’s system.The system of each organizations implements a security service for each class,providing document upload,download,information classification,DRM encryption,decryption,blockchain record,inquiry,and monitoring functions.Organizations participating in the blockchain network can verify document security activity by sharing the 1st class document traceability as block information recorded in the distributed ledger.Organization,member information,document information,classification,download,DRM transaction,etc.are stored in DBMS.

    Figure 2:Blockchain service structure diagram

    4 Performance Analysis

    We intend to implement the blockchain based information classification management service proposed in this paper and discuss the results and the contributions.

    4.1 Experimental Environment

    As a blockchain platform,the open source based Hyperledger fabric platform developed in the Hyperledger project of the Linux Foundation was used,and features such as distributed ledger,smart contract [21],consensus algorithm [22],blockchain network construction,and encryption were used.Hyperledger Fabric implements the configuration node as a docker image through a container.Smart contracts are developed through chaincode,chaincode can also be managed by version,and work through Docker containers.

    The blockchain network of the security service for each blockchain-based information classification has built an environment on the Ubuntu 18.04 LTS operating system [23],and it is possible to allocate two logical business organizations (Org1,Org2) and two peers,each as a docker container.So that it was implemented.Order of node was set to 1,and CouchDB supported by Hyperledger Fabric was used as the distributed ledger.HFC and chaincode are implemented through node.js and Go programming languages.The client program that provides an interface to upload/download documents and centrally manage documents was implemented as a web application.

    4.2 Results and Discussions

    It is the main screen of the web application of the implemented service in Fig.3 below.The ability to upload your organization’s document assets is implemented on the left side of the screen.On the right,you can see the documents uploaded in the same organization.Document number,document name,author,creation date,document security level,blockchain record status,DRM status can be checked,and document download is available.

    Figure 3:Service main view

    It is an information classification view in Fig.4 below.The evaluation items were implemented based on the information classification model.Each evaluation item can be evaluated as good,average,or bad.The progress of the evaluation is indicated on the horizontal bar below.

    Figure 4:Information classification view

    After completing the evaluation of the classification and the upload to the system,if the document is a 1st class,the meta information of the document and the hash value information of the document are recorded on the blockchain.It shows a block in the distributed ledger shared under the channel of the blockchain implemented using the Hyperledger fabric platform in Fig.5 below.A block is composed of document meta information and hash value.Meta information includes access type,upload date,document description,file name,author,file size,upload result,and class.

    Figure 5:Document class record on blockchain

    In addition,Hyperledger Fabric Explorer,which can monitor the blockchain network,is implemented as shown in Fig.6 below.It shows the number of blocks recorded on the blockchain,the number of transactions issued,the number of nodes participating in the network,the number of chain codes,the peer name,the number of blocks per hour and per minute,the number of transactions per hour and per minute and etc.

    Figure 6:Monitoring blockchain network

    The proposed service provides traceability of classification management by recording the asset’s meta information and class information in the blockchain for assets classified as 1st class in Figs.4 and 5.By providing differentiated security services through classification considering the value and security factors of data in the increasing number of assets,it is possible to reduce the targets to be protected without managing all assets confidentially.In addition,it does not use various individual document security solutions,but provides security from a platform perspective by providing traceability of classification management using blockchain technology.

    We consider that the proposed service needs to observe confidentiality,integrity,and availability (CIA),which can be referred to as the CIA requirement of information security.By implementing the service using the Hyperledger Fabric platform,a permissioned blockchain network,only trusted nodes shown in Fig.6 can access the blockchain network.As distributed ledger data can be read only by trusted targets,it ensures confidentiality of the data.In addition,in the data of the distributed ledger,only the meta-information and the security level of the asset are recorded as shown in Fig.5,so that sensitive contents of assets to be kept confidential are not recorded.We can check the hash values of assets,blocks,and transactions,because data contains the unique hash value of the asset and the block data hash value and transaction hash value are included in the blockchain as shown in Figs.5 and 6.So,the service can prove integrity by verifying data authenticity through hash values for assets,blocks,and transactions.The blockchain network consists of two organizations and four peer nodes as shown in Fig.6,so even if one node fails,the service can be provided through another node,thereby ensuring availability.Therefore,we can confirm that the proposed service is valuable as a security service by satisfying the three factors of confidentiality,integrity and availability of information security.

    5 Conclusions and Future Works

    In order to carry out the economical security activities of an organization,we proposed a service to classify the security class of documents based on the information contained in the documents,perform differential security activities and provide classification management traceability using blockchain technology.It is expected to enable economic security activities through the differential management method,and to provide a classification management platform by using blockchain technology.In addition,we examined the validity of the service from the viewpoint of the CIA element of information security.As a future study,we will research to develop an integrated security technique from a platform perspective by connecting endpoints between security solutions and the proposed system and verify effectiveness of the service.We will also research methods to detect abnormal behavior of classification management using the traceability of the blockchain for enable enterprise-wide classification management.

    Funding Statement:This research was supported by the MSIT (Ministry of Science and ICT),Korea,under the ITRC (Information Technology Research Center) support program (IITP-2020-2018-0-01799) supervised by the IITP (Institute for Information &communications Technology Planning &Evaluation).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    两个人视频免费观看高清| 色视频www国产| 长腿黑丝高跟| 国产成年人精品一区二区| 久久精品久久久久久噜噜老黄 | 国产极品精品免费视频能看的| 亚洲欧美日韩无卡精品| 青春草亚洲视频在线观看| 一区二区三区四区激情视频 | 国产不卡一卡二| 男女边吃奶边做爰视频| 精品人妻熟女av久视频| 精品久久久噜噜| 岛国毛片在线播放| 婷婷色综合大香蕉| 偷拍熟女少妇极品色| 简卡轻食公司| 亚洲在线观看片| 人人妻人人澡人人爽人人夜夜 | 熟妇人妻久久中文字幕3abv| 波多野结衣高清无吗| 亚洲国产欧美在线一区| 欧美色视频一区免费| 校园春色视频在线观看| 九草在线视频观看| 亚洲真实伦在线观看| 在线a可以看的网站| 两个人的视频大全免费| 日韩一本色道免费dvd| 国产黄片美女视频| 久久久色成人| а√天堂www在线а√下载| 亚洲av一区综合| 中国国产av一级| av在线天堂中文字幕| 久久久精品欧美日韩精品| 国产精品女同一区二区软件| 日韩强制内射视频| 少妇裸体淫交视频免费看高清| 国产黄色小视频在线观看| 岛国在线免费视频观看| 免费大片18禁| 在线观看午夜福利视频| 国产日韩欧美在线精品| 日本黄色视频三级网站网址| av免费在线看不卡| 久久午夜亚洲精品久久| 波多野结衣巨乳人妻| 久久久久久九九精品二区国产| 精品午夜福利在线看| 美女cb高潮喷水在线观看| 国产 一区 欧美 日韩| .国产精品久久| 久久亚洲精品不卡| 国产亚洲av嫩草精品影院| 老女人水多毛片| 国产高清不卡午夜福利| 亚洲一级一片aⅴ在线观看| 亚洲婷婷狠狠爱综合网| 天堂网av新在线| 日本黄色视频三级网站网址| 国产精品日韩av在线免费观看| 午夜免费激情av| 最后的刺客免费高清国语| 夫妻性生交免费视频一级片| 成人美女网站在线观看视频| 日韩 亚洲 欧美在线| 麻豆国产av国片精品| 日韩高清综合在线| 床上黄色一级片| av国产免费在线观看| 夜夜看夜夜爽夜夜摸| 成年版毛片免费区| 天堂中文最新版在线下载 | 亚洲在久久综合| 老司机影院成人| 女人十人毛片免费观看3o分钟| 国产精品日韩av在线免费观看| 国产精品av视频在线免费观看| www日本黄色视频网| 亚洲自拍偷在线| 国产一区二区三区av在线 | 人妻少妇偷人精品九色| 国产亚洲精品久久久com| 99久国产av精品国产电影| 午夜激情欧美在线| 欧美丝袜亚洲另类| 男插女下体视频免费在线播放| 深爱激情五月婷婷| 一边亲一边摸免费视频| 国产私拍福利视频在线观看| 色综合亚洲欧美另类图片| 国产v大片淫在线免费观看| 久久精品国产99精品国产亚洲性色| 成人二区视频| 色视频www国产| 欧洲精品卡2卡3卡4卡5卡区| 亚洲天堂国产精品一区在线| 九九在线视频观看精品| 美女国产视频在线观看| 男人的好看免费观看在线视频| 亚洲久久久久久中文字幕| 精品久久久久久久人妻蜜臀av| 美女脱内裤让男人舔精品视频 | 欧美在线一区亚洲| 久久久久久久亚洲中文字幕| 身体一侧抽搐| 哪里可以看免费的av片| 最近的中文字幕免费完整| 免费观看精品视频网站| 一区二区三区高清视频在线| 菩萨蛮人人尽说江南好唐韦庄 | 校园人妻丝袜中文字幕| 少妇人妻精品综合一区二区 | 日产精品乱码卡一卡2卡三| 国产av不卡久久| 一本久久中文字幕| 中文字幕人妻熟人妻熟丝袜美| 亚洲国产高清在线一区二区三| 草草在线视频免费看| 69av精品久久久久久| a级毛色黄片| 特级一级黄色大片| 看非洲黑人一级黄片| 国国产精品蜜臀av免费| 成年免费大片在线观看| 亚洲欧美日韩东京热| 日本成人三级电影网站| 亚洲三级黄色毛片| 美女xxoo啪啪120秒动态图| 日韩制服骚丝袜av| 国产成人91sexporn| 99久久中文字幕三级久久日本| 爱豆传媒免费全集在线观看| 床上黄色一级片| 我要看日韩黄色一级片| 97在线视频观看| 一级毛片久久久久久久久女| 成年版毛片免费区| 全区人妻精品视频| 成人亚洲欧美一区二区av| 全区人妻精品视频| 色吧在线观看| 国产精品久久久久久精品电影小说 | 国产在视频线在精品| av在线老鸭窝| 欧美+亚洲+日韩+国产| 国产黄a三级三级三级人| 老司机影院成人| 18+在线观看网站| 欧美+亚洲+日韩+国产| 国产精品爽爽va在线观看网站| 国产视频内射| 色综合色国产| 成人毛片a级毛片在线播放| 亚洲中文字幕日韩| 12—13女人毛片做爰片一| 亚洲欧美日韩无卡精品| 热99在线观看视频| 我的女老师完整版在线观看| 免费不卡的大黄色大毛片视频在线观看 | 欧美性猛交╳xxx乱大交人| 精品免费久久久久久久清纯| 插阴视频在线观看视频| 国产日本99.免费观看| 国产综合懂色| 国产av一区在线观看免费| 看黄色毛片网站| 岛国毛片在线播放| 变态另类成人亚洲欧美熟女| 日韩欧美 国产精品| 少妇丰满av| 亚洲国产欧美在线一区| 免费看美女性在线毛片视频| 亚洲精品影视一区二区三区av| 99久国产av精品国产电影| 国产视频内射| 成年av动漫网址| 亚洲欧美日韩高清在线视频| 亚洲成av人片在线播放无| 国产午夜福利久久久久久| 男女啪啪激烈高潮av片| 99国产精品一区二区蜜桃av| av在线老鸭窝| 2022亚洲国产成人精品| videossex国产| 午夜久久久久精精品| 日本-黄色视频高清免费观看| 亚洲av免费在线观看| 精品一区二区三区视频在线| 欧美一级a爱片免费观看看| 麻豆久久精品国产亚洲av| 美女xxoo啪啪120秒动态图| 特大巨黑吊av在线直播| 男女啪啪激烈高潮av片| 国产精品久久视频播放| 亚洲成av人片在线播放无| 久久这里只有精品中国| 禁无遮挡网站| 国内精品一区二区在线观看| 欧美三级亚洲精品| 国产黄片视频在线免费观看| 亚洲丝袜综合中文字幕| 久久精品夜夜夜夜夜久久蜜豆| 亚洲高清免费不卡视频| 亚洲成av人片在线播放无| 成人三级黄色视频| 国产亚洲av嫩草精品影院| 日日摸夜夜添夜夜添av毛片| 婷婷六月久久综合丁香| 亚洲国产精品成人久久小说 | 国产一区二区亚洲精品在线观看| 亚洲欧美精品综合久久99| 亚洲国产精品合色在线| 97超视频在线观看视频| 国产精品蜜桃在线观看 | 少妇被粗大猛烈的视频| 国产老妇伦熟女老妇高清| 日韩视频在线欧美| 国产黄片美女视频| 日韩一本色道免费dvd| 精华霜和精华液先用哪个| 久久99热这里只有精品18| 成年女人永久免费观看视频| 两个人视频免费观看高清| 国产中年淑女户外野战色| 久久草成人影院| 欧美激情国产日韩精品一区| 成人综合一区亚洲| 少妇熟女aⅴ在线视频| 99久久久亚洲精品蜜臀av| 久久亚洲精品不卡| 一级毛片电影观看 | 日韩中字成人| 97在线视频观看| 午夜福利在线观看吧| 国产真实乱freesex| 亚洲在线观看片| 波野结衣二区三区在线| 少妇高潮的动态图| 国产精品久久久久久久电影| 日韩欧美 国产精品| 少妇被粗大猛烈的视频| 欧美一区二区国产精品久久精品| 久久午夜福利片| a级毛色黄片| 天堂av国产一区二区熟女人妻| 国内久久婷婷六月综合欲色啪| 亚洲在线自拍视频| av专区在线播放| 国产一级毛片七仙女欲春2| 亚洲自拍偷在线| 亚洲内射少妇av| 亚洲精品国产av成人精品| 亚洲av第一区精品v没综合| 久99久视频精品免费| 一本精品99久久精品77| 免费av不卡在线播放| 国产一区二区三区av在线 | 日韩av在线大香蕉| a级毛色黄片| 免费观看精品视频网站| 99视频精品全部免费 在线| 免费观看a级毛片全部| 99热只有精品国产| 插阴视频在线观看视频| 极品教师在线视频| 成人永久免费在线观看视频| 久久久久久九九精品二区国产| 免费电影在线观看免费观看| 一区二区三区四区激情视频 | 欧美日韩一区二区视频在线观看视频在线 | 久久中文看片网| 午夜激情欧美在线| 人人妻人人澡人人爽人人夜夜 | 99热精品在线国产| 一区福利在线观看| 国产v大片淫在线免费观看| 国产成人精品久久久久久| 久久久精品94久久精品| 成熟少妇高潮喷水视频| 亚洲色图av天堂| 97超视频在线观看视频| 国产视频内射| 不卡一级毛片| 嫩草影院新地址| 午夜激情福利司机影院| 大香蕉久久网| 国产av不卡久久| 给我免费播放毛片高清在线观看| 99视频精品全部免费 在线| 噜噜噜噜噜久久久久久91| 亚洲精品乱码久久久v下载方式| 亚洲乱码一区二区免费版| 一边摸一边抽搐一进一小说| 伦精品一区二区三区| 成年女人永久免费观看视频| 亚洲人成网站在线播| 日本黄大片高清| 校园人妻丝袜中文字幕| 国产激情偷乱视频一区二区| 又粗又硬又长又爽又黄的视频 | 看免费成人av毛片| 国产黄a三级三级三级人| 一本精品99久久精品77| 哪个播放器可以免费观看大片| 99riav亚洲国产免费| 在线国产一区二区在线| 国产精品人妻久久久影院| 国产久久久一区二区三区| 久久久久久九九精品二区国产| 亚洲欧美日韩卡通动漫| 国产免费男女视频| av又黄又爽大尺度在线免费看 | 国产精品嫩草影院av在线观看| 97超碰精品成人国产| 国产乱人视频| 波多野结衣巨乳人妻| 日韩一区二区视频免费看| 国产亚洲精品久久久久久毛片| 久久热精品热| eeuss影院久久| 成人午夜高清在线视频| 夜夜夜夜夜久久久久| 精品人妻一区二区三区麻豆| 国产精品一区二区在线观看99 | 国内少妇人妻偷人精品xxx网站| 99热只有精品国产| 日韩高清综合在线| 国产欧美日韩精品一区二区| 中文字幕av成人在线电影| 一个人观看的视频www高清免费观看| 97超碰精品成人国产| 99热只有精品国产| 成年av动漫网址| av免费观看日本| 熟女人妻精品中文字幕| 欧美区成人在线视频| 一个人观看的视频www高清免费观看| 在线国产一区二区在线| 久久精品影院6| 国产成人a区在线观看| 少妇被粗大猛烈的视频| 久久草成人影院| 国产爱豆传媒在线观看| 美女内射精品一级片tv| 看十八女毛片水多多多| 一个人免费在线观看电影| 日韩欧美在线乱码| 床上黄色一级片| 一卡2卡三卡四卡精品乱码亚洲| 亚洲精品久久久久久婷婷小说 | 在线观看美女被高潮喷水网站| av在线老鸭窝| 久久精品久久久久久噜噜老黄 | 韩国av在线不卡| 全区人妻精品视频| 亚洲精品久久国产高清桃花| 99久久九九国产精品国产免费| 久久久久久大精品| 天堂av国产一区二区熟女人妻| 国产私拍福利视频在线观看| 精品久久久久久成人av| 天堂中文最新版在线下载 | 中文字幕av成人在线电影| 国产蜜桃级精品一区二区三区| 99久久无色码亚洲精品果冻| 女的被弄到高潮叫床怎么办| 一个人看视频在线观看www免费| 又粗又爽又猛毛片免费看| 色综合站精品国产| 国产老妇伦熟女老妇高清| 可以在线观看毛片的网站| 国产熟女欧美一区二区| 成年女人永久免费观看视频| 中文字幕精品亚洲无线码一区| 99久久精品一区二区三区| 男人舔奶头视频| 最近视频中文字幕2019在线8| 在线免费十八禁| 老熟妇乱子伦视频在线观看| 麻豆国产97在线/欧美| 亚洲久久久久久中文字幕| 亚洲成人久久性| 简卡轻食公司| 寂寞人妻少妇视频99o| 91久久精品国产一区二区成人| 看免费成人av毛片| 青青草视频在线视频观看| 免费观看精品视频网站| 久久人人爽人人爽人人片va| 真实男女啪啪啪动态图| 少妇丰满av| 又爽又黄无遮挡网站| 久久热精品热| 午夜激情福利司机影院| 大型黄色视频在线免费观看| 午夜精品在线福利| 国产免费一级a男人的天堂| 中国美女看黄片| 女同久久另类99精品国产91| 91久久精品国产一区二区成人| 亚洲,欧美,日韩| 久久综合国产亚洲精品| 亚洲精华国产精华液的使用体验 | 国产精品日韩av在线免费观看| 精品久久久久久久久久久久久| 亚洲国产精品sss在线观看| 成年免费大片在线观看| 又粗又爽又猛毛片免费看| 午夜老司机福利剧场| 在线观看66精品国产| 国产高清有码在线观看视频| 色综合色国产| av卡一久久| 国产伦一二天堂av在线观看| 欧美一区二区国产精品久久精品| 国产 一区 欧美 日韩| 午夜a级毛片| 亚洲国产精品久久男人天堂| 国产精品久久久久久精品电影| av在线老鸭窝| 国产男人的电影天堂91| 大又大粗又爽又黄少妇毛片口| 99在线人妻在线中文字幕| 精品国内亚洲2022精品成人| 国产国拍精品亚洲av在线观看| 中文字幕久久专区| 免费不卡的大黄色大毛片视频在线观看 | 亚洲av中文av极速乱| 最近2019中文字幕mv第一页| 91久久精品电影网| 人妻少妇偷人精品九色| 不卡一级毛片| 在现免费观看毛片| 久久精品91蜜桃| 亚洲va在线va天堂va国产| 熟女电影av网| 嫩草影院入口| 亚洲av二区三区四区| 能在线免费看毛片的网站| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲精品粉嫩美女一区| 欧美日韩国产亚洲二区| 亚洲无线在线观看| 亚洲欧美成人精品一区二区| 久久久久久久午夜电影| 最近最新中文字幕大全电影3| 成人三级黄色视频| 蜜桃亚洲精品一区二区三区| 91av网一区二区| 亚洲欧美精品综合久久99| 三级经典国产精品| 青青草视频在线视频观看| 欧美变态另类bdsm刘玥| 哪里可以看免费的av片| 成人综合一区亚洲| 久久精品夜夜夜夜夜久久蜜豆| 久久九九热精品免费| 日韩成人伦理影院| 精品久久国产蜜桃| 日韩视频在线欧美| 久久久久久久午夜电影| 日韩一区二区视频免费看| 中国国产av一级| 黄色欧美视频在线观看| 亚洲无线在线观看| a级一级毛片免费在线观看| 天堂√8在线中文| 一级毛片aaaaaa免费看小| 精品久久久久久久久av| av专区在线播放| 国产视频首页在线观看| 91精品一卡2卡3卡4卡| 国产精品日韩av在线免费观看| 欧美一级a爱片免费观看看| 国产成人精品婷婷| 18+在线观看网站| 激情 狠狠 欧美| 欧美激情国产日韩精品一区| 国产精品精品国产色婷婷| 波多野结衣巨乳人妻| 观看美女的网站| 午夜免费男女啪啪视频观看| 亚洲aⅴ乱码一区二区在线播放| 网址你懂的国产日韩在线| 69av精品久久久久久| 少妇熟女aⅴ在线视频| 亚洲aⅴ乱码一区二区在线播放| 内射极品少妇av片p| 一边亲一边摸免费视频| 国产欧美日韩精品一区二区| 亚洲精品国产成人久久av| 99精品在免费线老司机午夜| 乱人视频在线观看| 伦精品一区二区三区| 乱人视频在线观看| 国产白丝娇喘喷水9色精品| 色播亚洲综合网| 永久网站在线| 在线免费观看不下载黄p国产| 美女大奶头视频| 级片在线观看| 国产高清视频在线观看网站| 国产精品永久免费网站| 亚洲欧洲国产日韩| 国产精品蜜桃在线观看 | 日日摸夜夜添夜夜爱| 99久久九九国产精品国产免费| 毛片女人毛片| 99久久久亚洲精品蜜臀av| 国产真实乱freesex| 亚洲成人精品中文字幕电影| 干丝袜人妻中文字幕| 久久中文看片网| 精品久久久噜噜| 国产精品精品国产色婷婷| 内射极品少妇av片p| a级毛片a级免费在线| h日本视频在线播放| 久久午夜福利片| 国产精品综合久久久久久久免费| 麻豆乱淫一区二区| 黄片无遮挡物在线观看| 国产高清三级在线| 又粗又硬又长又爽又黄的视频 | 久久人人精品亚洲av| 久久草成人影院| 97超视频在线观看视频| 国产成人精品一,二区 | 国产伦在线观看视频一区| 国模一区二区三区四区视频| 中文亚洲av片在线观看爽| 亚洲欧美清纯卡通| 亚洲欧美精品自产自拍| 一本一本综合久久| 国产三级在线视频| 91精品国产九色| 长腿黑丝高跟| 欧美高清成人免费视频www| or卡值多少钱| 国产精品99久久久久久久久| 国产高清有码在线观看视频| 精品一区二区三区人妻视频| 久久人人爽人人片av| 久久精品国产亚洲av香蕉五月| 午夜久久久久精精品| 激情 狠狠 欧美| 日韩,欧美,国产一区二区三区 | 亚洲欧美清纯卡通| 国产三级在线视频| 亚洲人成网站在线播| 床上黄色一级片| 国产午夜精品论理片| 久久久久九九精品影院| 精品人妻偷拍中文字幕| 亚洲久久久久久中文字幕| 久久久久久伊人网av| 国产综合懂色| 精品久久国产蜜桃| 久久久久久久久久成人| 日本欧美国产在线视频| 国产乱人视频| 高清毛片免费看| 亚洲熟妇中文字幕五十中出| 国产精品乱码一区二三区的特点| 最后的刺客免费高清国语| 一进一出抽搐gif免费好疼| 日本撒尿小便嘘嘘汇集6| 成人国产麻豆网| 国产欧美日韩精品一区二区| 日本免费a在线| 寂寞人妻少妇视频99o| 久久人人爽人人片av| 国产精品国产三级国产av玫瑰| 一级毛片aaaaaa免费看小| 国产成人a∨麻豆精品| 国产午夜福利久久久久久| 国产成人aa在线观看| 日韩中字成人| 99久久人妻综合| 亚洲无线在线观看| 久久久久国产网址| 99在线视频只有这里精品首页| 只有这里有精品99| 精品人妻一区二区三区麻豆| 精品久久久久久久久av| 国语自产精品视频在线第100页| 欧美xxxx黑人xx丫x性爽| 国产成人精品久久久久久| 亚洲人成网站在线播| 99久久中文字幕三级久久日本| 两性午夜刺激爽爽歪歪视频在线观看| 成人无遮挡网站| 又粗又爽又猛毛片免费看| 国产精品蜜桃在线观看 | 熟女人妻精品中文字幕| 精品人妻视频免费看| 国产欧美日韩精品一区二区| 国产精品女同一区二区软件| 国产女主播在线喷水免费视频网站 | 日本黄大片高清| 午夜精品国产一区二区电影 | 久久鲁丝午夜福利片| 一区二区三区免费毛片| 一级黄色大片毛片| 久久九九热精品免费| 国产精品一区二区性色av| 国产视频内射| 中文欧美无线码| 高清在线视频一区二区三区 | 两性午夜刺激爽爽歪歪视频在线观看| 听说在线观看完整版免费高清| 婷婷亚洲欧美| 日日摸夜夜添夜夜爱|