• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Blockchain for Transparent Data Management Toward 6G

    2022-04-24 03:22:58XueminShermnShenDongxioLiuChengHungLingXueHnYinWeihuZhungRoSunBidiYing
    Engineering 2022年1期

    Xuemin (Shermn) Shen, Dongxio Liu,*, Cheng Hung, Ling Xue, Hn Yin,Weihu Zhung, Ro Sun, Bidi Ying

    a Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON N2L 3G1, Canada

    b Huawei Technologies Canada, Kanata, ON K2K 3J1, Canada

    Keywords:Blockchain Data management Decentralization Transparency Privacy

    ABSTRACT The wealth of user data acts as a fuel for network intelligence toward the sixth generation wireless networks (6G). Due to data heterogeneity and dynamics, decentralized data management (DM) is desirable for achieving transparent data operations across network domains, and blockchain can be a promising solution. However, the increasing data volume and stringent data privacy-preservation requirements in 6G bring significantly technical challenge to balance transparency, efficiency, and privacy requirements in decentralized blockchain-based DM. In this paper, we investigate blockchain solutions to address the challenge. First, we explore the consensus protocols and scalability mechanisms in blockchains and discuss the roles of DM stakeholders in blockchain architectures. Second, we investigate the authentication and authorization requirements for DM stakeholders.Third,we categorize DM privacy requirements and study blockchain-based mechanisms for collaborative data processing. Subsequently,we present research issues and potential solutions for blockchain-based DM toward 6G from these three perspectives. Finally, we conclude this paper and discuss future research directions.

    1. Introduction

    The proliferation of wireless networks has greatly impacted our ways of living and working by providing ubiquitous coverage and seamless connectivity. As the wireless networks continue to evolve, the sixth generation wireless networks (6G) will further integrate heterogeneous access technologies and network slicing[1,2] to support diversified services with dynamic quality-ofservice requirements. More importantly, network intelligence plays an essential role not only in improving network resource utilization, but also in enhancing user experience with customized service provisioning [3].

    1.1. Data management (DM) toward 6G

    The wealth of user data and recent developments in artificial intelligence (AI) technologies lie at the heart of network intelligence toward 6G. With numerous end devices being deployed and connected, wireless big data are generated at a remarkable rate and scale [4]. Through AI-based data processing, wireless big data have great value for efficient network management toward 6G.For example,user trajectory and association history at different access points can be utilized to conduct AI-based network traffic prediction and content catching on the edge for dynamic network resource allocation [1,5]. Thus, how to effectively and efficiently manage user data—that is, DM, which includes multiple data operations in the life-cycle of user data, from data creation to deletion [6,7]—has become a key enabler of future network intelligence. However, the highly dynamic and heterogeneous nature of 6G imposes four major requirements on DM:

    (1) Decentralization: DM requires collaborations among multiple data stakeholders, including users or machines for data generation, mobile operators for data collection and transmission,and technology vendors (e.g., edge/cloud providers) for data storage and processing. Stakeholders usually come from different network domains that cannot simply agree on a single DM authority.Thus,it is necessary to have a decentralized architecture for data stakeholders to collaboratively manage data life-cycle events [8].

    (2)Transparency:Due to the lack of mutual trust,the DM process should be transparent and verifiable to data stakeholders.Data owners should be aware of any operation performed over their data[9].For regulation purposes,‘‘respective responsibilities”should be determined transparently for stakeholders who process data collaboratively [10].

    (3) Efficiency: The heterogeneity of DM stakeholders, increasing volume of user data, and complexity of data life-cycle events will lead to major concern on assuring efficiency in terms of distributed architecture design, authentication and authorization(AA) management for DM stakeholders, and data-processing mechanisms.

    (4)Privacy:Privacy preservation in DM refers to both the identity privacy of data stakeholders and the content confidentiality of personal data. Although specific privacy requirements can change with different data operations, general principles are enforced in recent privacy regulations, such as European General Data Protection Regulation (GDPR) [10]. For example, users are granted full control of any operation over their data with identifiable information [11]. A data usage agreement that defines stakeholder obligation should be pre-determined and strictly followed.

    It remains an ambitious task to develop a decentralized and transparent DM that satisfies the efficiency and privacy requirements.

    1.2. Blockchain-based DM

    A blockchain consists of a ledger of blocks of peer-to-peer(P2P)transactions [12]. The blockchain is maintained by distributed nodes in the network, where each (full) node maintains a copy of the ledger. From the perspective of functionality, the blockchain shares some features with a traditional distributed database [13],but utilizes secure consensus protocols to maintain consistency of the ledger among mutually distrusted nodes.Moreover,a blockchain can provide programmability to control the ledger updates with smart contract technology [14].

    Blockchain is a promising technology for DM toward 6G, as it naturally addresses the decentralization and transparency requirements.First,DM stakeholders can use the blockchain as the trusted shared storage to record critical DM events[8,15].Each DM stakeholder can maintain a copy of the shared ledger without relying on a centralized entity. Second, the shared ledger is transparent, and the ledger updates are verifiable to related blockchain nodes. DM stakeholders can design smart contracts in order to conduct various data operations collaboratively.These benefits have motivated many recent discussions on blockchain-based DM schemes[16,17]in future intelligent networks[3,18]and other applications,such as information-centric networks [7], supply-chain management [19],the Internet of Things (IoT) [20–22], and e-healthcare [23].

    Given its decentralized and transparent nature, a blockchainbased solution may aggravate the complexity of DM in achieving the requirements of efficiency and privacy [24]. First, distributing data storage to blockchain nodes increases the overall storage overhead. At the same time, to maintain the consistent view of the shared ledger, DM stakeholders run consensus protocols to endorse transactions and verify blocks,which may limit the transaction throughput and increase the data processing burden. Second, due to the storage transparency of the blockchain, onchain data are visible to related blockchain nodes, which contradicts the privacy requirements of user data. Thus, more research efforts should be directed to new designs and practical implementations of blockchain-based DM in order to resolve the efficiency and privacy challenges.

    1.3. Organization of this paper

    In this paper, we discuss blockchain-based DM for 6G. To address the challenges of efficiency and privacy, we summarize state-of-the-art research progress with potential solutions. The organization of this paper is as follows:

    Section 2 presents the blockchain architecture design for DM.We summarize the existing blockchain mechanisms, such as efficient consensus protocols and hybrid chain designs. Moreover, by comparing recent blockchain-based DM schemes, we discuss how DM stakeholders can serve as blockchain components.In Section 3,we explore blockchain-based AA mechanisms for the efficient and privacy-preserving identity management of DM stakeholders. In Section 4, we investigate blockchain-based data-processing mechanisms. After specifying the privacy requirements for blockchain-based data processing, we discuss an on-/off-chain computation model. We also summarize research outcomes on specific privacy-preserving data operations,including data sharing and data analytics. In Section 5, we discuss research issues and potential solutions in detail, in terms of architecture design, AA,and data processing in blockchain-based DM.Finally,we conclude this study and discuss further research directions in Section 6.

    2. Architecture design in blockchain-based DM

    A blockchain can serve as a decentralized and transparent architecture for DM toward 6G. However, it is not trivial to build DM with black-box use of the blockchain.First,a blockchain essentially deals with maintaining consistent storage and state updates in distributed nodes.As the degree of trust among the nodes can change dramatically in real-world applications, a blockchain can have different architecture designs, with trade-offs between ledger scalability and security. When applying a blockchain to DM, it is also necessary to distinguish among the requirements of different DM use cases. Second, stakeholders can have different capabilities and motivations to participate in DM. Furthermore, there are various roles in a blockchain-based architecture, such as miners and clients. However, it remains unclear how to manage the roles of DM stakeholders in a blockchain.

    To address this issue, we explore two essential questions:①What should the blockchain architecture be for DM,and ②what roles do DM stakeholders play in this architecture?We first review existing blockchain architectures with advantages and limitations for DM, and then discuss two typical use cases for blockchainbased DM: vehicle-to-everything (V2X) [25] and cloud/edge computing.

    2.1. Blockchain architectures

    Blockchain architectures can be roughly classified into two categories: permissionless blockchains [14] and permissioned blockchains [26]. A permissionless blockchain mainly consists of two kinds of entities:miners and clients[12].It uses cryptographic currencies to motivate entities to self-organize themselves in public networks.In contrast,a permissioned blockchain is a top–down architecture with three main entities: authorities, miners, and clients. In general, industrial organizations can form a consortium to serve as the supervising authorities of the blockchain.The miners and clients must obtain permission from the authorities before participating in the blockchain. In both architectures, the consensus mechanism is an essential component for maintaining consistency on the ledger.

    In terms of consensus protocols, a permissionless blockchain must resist more malicious participants than the permissioned blockchain. A bitcoin blockchain is proven to be secure if the miners possessing the majority of the computational power are honestly following the proof-of-work (PoW) consensus protocol [27].However, when the number of miners is large, the architecture can suffer from low transaction throughput and high transaction confirmation latency. A permissioned blockchain, such as Hyperledger Fabric [26], relies on the consortium committee to provide membership management and ordering services. Such top–down architecture incurs fewer restrictions on the consensus protocol,where practical Byzantine fault tolerance (PBFT) and Raft can be implemented. To further improve blockchain scalability, new blockchain architectures have been proposed recently.For permissionless blockchains,Prism[28]and OHIE[29]are two new blockchain architectures to support parallel transaction processing.They separate the single chain into multiple chains and divide the roles of miners into several roles for different tasks.

    Although permissionless and permissioned blockchains have different characteristics, most support two attractive functionalities: distributed storage and smart contracts. That is, computer programs can be executed on the distributed environment (the blockchain), which makes blockchains suitable to construct DM platforms toward 6G [30,31].

    2.2. Use cases of blockchain-based DM

    In the following, we present two exemplary use cases of blockchain-based DM: V2X and cloud/edge computing. Our focus is to summarize how DM stakeholders can participate in the blockchain architecture.

    2.2.1. Blockchain-based DM for V2X

    V2X communications enable many vehicular applications, such as on-road infotainment and location-dependent services[25,32,33]. To provide more efficient and effective services for pedestrians and drivers in a V2X communication network,V2X service providers must cooperatively communicate with each other and exchange some users’ private information. However, this requirement cannot be easily satisfied in the current V2X system,since the vehicle-related data are managed independently by V2X service providers, and inappropriate data sharing may lead to serious privacy information leakage [34] and break the privacy regulations. To bridge the gap between existing V2X services and 6G,blockchains have been introduced into the V2X system,where a large number of V2X service providers can build decentralized trusts. In particular, vehicular information exchange can be recorded onto the blockchain, which allows third-party auditors to trace the information flow and prevent potential privacy leakage.Furthermore,depending on various V2X services,the information written into the blockchain differs; it may consist of vehicle insurance information,driver license information,vehicle velocity,location, and so forth.

    A basic blockchain-based V2X communication network includes the following stakeholders: vehicles, roadside units(RSUs),base stations,service providers,edge nodes,and cloud servers.The main difference between DM architectures atop a permissionless blockchain and those atop a permissioned blockchain for V2X services[34]lies in the stakeholders who construct the blockchain. Some existing schemes [30,31] rely on public blockchain platforms as third parties for V2X services.For example,in a public key infrastructure(PKI)-based solution for securing V2X communications that is based on a public blockchain platform[30],vehicles and other stakeholders are conventional clients of Ethereum,which can read/write information on the public ledger and trigger deployed smart contracts.In this setting,the original V2X network architecture and the roles of these stakeholders do not need to be significantly changed, but the stakeholders need to have extra communications with the external public blockchain platform.Although a permissionless blockchain-based DM architecture is considered to be simple and effective, it does not fit well for all V2X services,due to the lack of system scalability and data privacy.A permissionless blockchain platform is public and can be accessed by any party.As a result,some data,such as public certificates and the certificate revocation list(CRL),can be published on the blockchain,while other data, such as personal riding records, should be protected.Moreover,the data-processing delay is high in a permissionless blockchain platform,which makes a permissionless blockchain architecture unsuitable for V2X services with strict latency requirements.

    To overcome these issues, many studies incorporate a permissioned blockchain in V2X services [35–42]. In such solutions, the blockchain is maintained by V2X stakeholders themselves, who can be vehicles, RSUs, edge nodes, and cloud servers, depending on V2X application scenarios. For example, mobile edge nodes or RSUs can serve as full nodes for maintaining a permissioned blockchain, since they are sufficiently powerful in terms of computational and storage capabilities. Vehicles usually serve as light nodes, since they have limited resources and high mobility. Compared with the architecture atop a permissionless blockchain, this architecture is more scalable by controlling the number of miners in the blockchain and adopting hybrid consensus protocols at the cost of complicated architecture designs and security models.More specifically, most state-of-the-art architectures have a premise that root trusted authorities exist in V2X services to bootstrap the system.

    2.2.2. Blockchain-based DM for cloud/edge computing

    Cloud/edge-based DM architecture is established on a centralized model, where a back-end cloud service provider is integrated with front-end interfaces, such as mobile phones, to make data processing and sharing simple and effective. However, the architecture can be vulnerable to internal attacks, due to the lack of procedure transparency at the third-party service provider.Therefore,a more transparent DM framework is essential,in which all data-processing operations can be audited, and even malicious internal attackers can be detected.As a result,a blockchain can be introduced to the cloud/edge-based DM architecture, in order to obtain a transparent DM model with monitoring and auditing capability.

    A blockchain is promising for managing multidomain collaborations in a layered edge-computing or joint-cloud architecture[43,44]. Many related solutions have been proposed recently for blockchain-based DM in cloud computing from either permissionless or permissioned blockchains.A basic blockchain-based DM for cloud computing has the following main stakeholders:users,cloud servers, and application service providers, with DM operations including data auditing, data sharing, data integrity checking, and data searching.

    Most cloud DM architectures adopt an external permissionless blockchain platform [45–51], without high demands for throughput and latency in data processing. The blockchain is mainly viewed as an honest ledger for storing extra information, while large data are stored in cloud servers with or without privacy protection,according to the privacy requirements.Due to the high cost of processing data on permissionless blockchains, heavy data operations cannot be performed on the chain,although lightweight operations, such as data timestamping and operation record tracking, can be performed. Therefore, off-chain DM operations should only be recorded on the chain after being performed. At the same time, data encryption is a general solution to protect privacy for the data stored on the cloud or the blockchain.

    For cloud DM architectures atop a permissioned blockchain,the blockchain is managed by authorized stakeholders, such as cloud servers, edge nodes, and even users [52–56]. The permissioned blockchain can be applied to boost cross-domain trust among different stakeholders.As there are lower on-chain operation costs in a permissioned blockchain, more complex data operations can be done on the chain.In addition,the data privacy protection mechanism is not limited to data encryption.As authorized stakeholders control the on-chain data, they can define access policies for the data on the blockchain. Although this architecture has many advantages, it relies on the trustworthiness of the authorized stakeholders who serve as blockchain managers. If these stakeholders are compromised,the security and privacy of the architecture cannot be ensured.

    A blockchain architecture for DM is shown in Fig. 1. Based on different consensus protocols, distributed ledger storage, and smart contracts, blockchain-based DM can support various V2X and cloud/edge applications. Table 1 provides a summary of the blockchain architectures for DM in two use cases.

    3. AA in blockchain-based DM

    3.1. AA requirements for DM stakeholders

    AA is an indispensable component of blockchain-based DM[57]. In particular, AA addresses two essential questions in DM:Who you are and what you can do.First,there can be multiple participants in DM, such as users, storage nodes, and computing nodes.Authentication helps the DM system to determine unforgeable identities and the exact roles of DM stakeholders. Second,based on their roles, DM stakeholders are authorized to conduct a wide range of operations, such as reading data and modifying the data status.With the above basic functionalities,AA can further help DM stakeholders establish secure and confidential communication channels,which is essential in a distributed blockchain environment. Moreover, the non-repudiability from AA is the key in determining the accountability of DM stakeholders in case of any dispute.

    Blockchain-based DM toward 6G has new requirements for AA mechanisms:

    (1)Distributed management:Without a traditional centralized authority, AA management in DM should be conducted by a set of authorities in a transparent manner.

    (2)Efficiency and privacy:As the roles of DM stakeholders can change dynamically,blockchain-based AA should support efficient credential update and revocation. Also, the real identities of DM stakeholders should be kept private for certain use cases in order to achieve conditional privacy preservation if necessary. Below,we discuss existing works on achieving transparent, efficient, and privacy-preserving blockchain-based AA for DM.

    3.2. Blockchain-based AA

    In a complex DM environment,there may exist multiple stakeholders with the right to generate identities for their users and make authorizations for data operations, such as the independent identity management in Fig. 2 [50]. In such a model, crossdomain AA is required due to frequent information exchange between stakeholders. Certificate management can become a hurdle, as each stakeholder has its own certificate authority (CA) for management. Some stakeholders may be compromised and may publish or utilize fake certificates for data operations. To reduce the management costs and the security risks of cross-domain AA,a manager can be introduced to play the role of the centralized identity management shown in Fig. 2 [50], such as a single-signon service provider. However, this model requires the DM stakeholders to agree on a single manager, which may not always be practical toward 6G. As shown in Fig. 3, blockchain-based decentralized identity management [50–52] can enable stakeholders to collaboratively manage user identities, authenticate users, and update authorization policies in a distributed and transparent manner. More specifically, the blockchain is managed by a consortium committee and can provide AA services for external service providers. Even if some stakeholders are compromised, all membership updates and revocation operations on the blockchain are still traceable and accountable.

    Fig. 1. A blockchain-based DM. PoS: proof of stake; PoA: proof of authority; PoET: proof of elapsed time.

    Table 1 Blockchain-based DM architecture: use case.

    Fig. 2. The evolution of identity management: from independence to decentralization. (a) Independent management in DM; (b) centralized identity management in DM;(c) decentralized identity management in DM.

    Fig. 3. General procedures of blockchain-based authentication and authorization in DM.

    Extensive research efforts have been made to utilize blockchains to enhance AA systems [58]. For traditional certificatebased AA, blockchain-based mechanisms have been proposed to guarantee certificate transparency and revocation transparency for blockchain-based DM [59,60]. More specifically, CAs publish certificates for stakeholders and users,while a group of stakeholders update their certificates on a public blockchain.The validity of the certificates on the blockchain relies not only on the security of the CAs, but also on the group of data stakeholders, as it is necessary for the majority to be honest.Instead of focusing on certificate transparency, other works define authority transparency frameworks to address the issue of auditing AA management among stakeholders [61,62] by viewing the blockchain as public and immutable logs of certificate generation,updating,and revocation.

    In contrast to certificate-based AA systems,self-sovereign identity is a blockchain-based identity management mechanism [63].More specifically, instead of relying on a CA to manage user identities,users themselves can create,store,transfer,and revoke their identity credentials through a blockchain. In this way, the risk of the single-point failure of a centralized CA is much reduced.To achieve fine-grained data access control, attribute-based AA mechanisms such as attribute-based encryption (ABE) can be combined with the blockchain, with user attributes being embedded in the ledgers and smart contracts. Users can access data and retrieve decryption keys based on their attributes [64].Combined with the blockchain and chameleon hash functions,dynamic attribute updates can be achieved in the blockchain[65].

    A blockchain brings many advantages in managing users’ identities to satisfy different security properties in the DM.However,it also raises privacy concerns,as all information stored in the blockchain is transparent. Therefore, privacy-preserving mechanisms can be integrated with blockchain-based AA schemes to provide privacy protection.One basic mechanism is based on pseudonyms.Each user can hold a large number of pseudonyms for AA, and the pseudonyms are always denoted by public keys in the blockchain.For example,a blockchain data-sharing system,Ghostor,hides user identities but allows users to detect integrity violations of remotely stored data [66]. Anonymity is achieved by using a technique named ‘‘a(chǎn)nonymously distributed shared capabilities.” Since the pseudonyms are locally stored by users and are difficult to manage if the number of pseudonyms is larger,other mechanisms,such as group signatures and ring signatures,can help to protect user identity privacy in a blockchain-based DM. A user’s anonymous identity generated from group/ring signature schemes can be stored at the user side for multiple uses across different applications.This identity privacy protection mechanism has been adopted by some blockchain platforms, such as Moreno [67].

    Group/ring signature schemes are built upon Fiat–Shamir signature schemes, which can be utilized for self-sovereign identity management in blockchains [68]. Anonymous credentials can also be delegated at different levels to inspire more DM applications[69]. Under these circumstances, identity privacy is protected and accountability is guaranteed for tracing malicious users. For example, there are blockchain-based AA schemes in which user identities can be traced under certain stringent conditions[70,71]. One or multiple stakeholders can collaboratively generate anonymous credentials for their users based on the zeroknowledge proof technique. When a user behaves maliciously and needs to be traced,these stakeholders can reveal user identity accordingly. In this way, privacy and accountability can be simultaneously satisfied.For attribute-based access control on the blockchain, a general privacy-preserving approach is to hide the access policies by designing an attribute-hiding ABE [72]. This method is different from previous mechanisms by protecting data attributes and policies rather than user identities.

    4. Data processing in blockchain-based DM

    Data processing can refer to a wide range of operations in the life-cycle of data items [7,8]. For a blockchain-based DM, we mainly focus on data operations that require interactions between multiple DM stakeholders,including data sharing and collaborative data analytics. In this section, we first discuss privacy and efficiency requirements with general privacy and computation models. Based on these requirements, we summarize the existing literature on blockchain-based data sharing and analytics.

    4.1. Privacy requirements and model

    For data processing in blockchain-based DM, a general privacy requirement is to restrict data exposure. More specifically, data exposure can be characterized by the following questions:

    (1) What is the sensitivity of the data? First, data sensitivity can vary dramatically depending on the application. For example,user identity data in financial applications are highly confidential,and can lead to economic loss in case of any exposure.Second,data sensitivity can change with the amount of data.For example,a single exposure of a user location may incur limited damage, while the exposure of consecutive user locations may reveal users’ daily routines [73]. Third, data sensitivity can change with time. Many types of data, such as legal files [74], have a ‘‘sealing” period,within which the data should not be exposed. After the ‘‘sealing”period,the data can be accessed by the public or by certain entities.

    (2) To whom are the data exposed? Data processing can involve various entities, which can be roughly categorized into internal/external participants and the blockchains. The term‘‘internal participants” refers to the DM stakeholders involved in the data processing. In contrast, the term ‘‘external participants”refers to entities that are not involved in the data processing,such as an external attacker. In blockchain-based DM, there is a shared view among blockchain participants. In this case, the blockchain can be modeled as a special entity for data exposure.

    From these two questions,privacy requirements in blockchainbased DM can be categorized into four levels:

    (1) Privacy from user anonymity: This requires user identity information to be separated from the dataset before being processed. However, for a data processor(i.e., an entity that conducts data processing) with strong background knowledge, it is highly possible for the processor to recover user identity information from the dataset.

    (2) Confidentiality for external participants: Data of less sensitivity can be processed by data processors in plaintext, but cannot be exposed to external participants. This requirement relies on the trustworthiness of the data processor.

    (3) Confidentiality for internal participants: For data with high sensitivity, data processing should expose as little information as possible to the data processors,including data content,user identity, and data access patterns.

    (4) Confidentiality for blockchains: Sensitive data should not be directly stored on the blockchain. Similarly, sensitive data operations should not be conducted by smart contracts.

    In blockchain-based DM,privacy requirements for different DM applications can change dramatically with the data sensitivity and the roles of data stakeholders. Therefore, GDPR [10] does not provide specific privacy requirements, but rather defines general principles.More specifically,it requires that users have full control over the DM operations on their data.

    Internal participants, such as data controllers and data processors, must agree on data usage terms with users and must strictly follow this agreement in the data processing.At the same time,any unauthorized data sharing with external participants is forbidden.

    Since privacy requirements can sometimes be vague or ambiguous,it is essential to design privacy models that help users,DM system designers,and regulators to better understand privacy regulations in an executable and implementable manner. A data flow diagram(DFD)is a good way of modeling DM.DFDs are similar to process diagrams in software engineering, and can integrate GDPR elements and data life-cycle events[75].Unlike models based on data life-cycle events, resource or capability requirements for data stakeholders can be utilized to implement DM with GDPR compliance [76]. Moreover, for blockchain-based DM, executable privacy models can be implemented to automatically regulate the cloud data operations involved in smart contracts[77,78].

    4.2. Efficiency requirements and computation model

    For data sharing and analytics in blockchain-based DM, a straightforward solution is everything-on-chain, which involves storing the entire dataset on the blockchain and conducting data processing via smart contracts. However, this can require prohibitive storage and place a heavy computational burden on the blockchain participants. To address this issue, it is possible to introduce off-chain storage or computation nodes that can store data or perform data processing more efficiently, and only upload pivotal information onto the blockchain.This paradigm is regarded as an on-/off-chain model [79].

    In a general on-/off-chain model,an external data storage provider can store the hash values of the data items onto the blockchain[80]. In this way, the integrity of the off-chain data storage can be ensured, since on-chain hashes cannot be modified. This model can also eliminate the direct exposure of private data to the blockchain.The hash-based approach relies on the trustworthiness of an external data storage provider to perform data operations. In blockchain-based DM, it is desirable to allow weaker security assumptions for the storage provider and to design more expressive on-chain authenticators for verifying the correctness of off-chain data operations. For example, an aggregation of multiple data records can be computed by an off-chain cloud server, which only sends verifiable computation results to the blockchain. Below, we discuss research works on constructing on-/off-chain models. The main requirement of such a model is to have verifiable off-chain executions, including zero-knowledge succinct non-interactive argument(SNARG)and a trusted execution environment(TEE).

    SNARG is a system in which a prover can convince a verifier of the existence of a secret for a public relation. The relation can be represented by an arithmetic circuit for generally verifiable computations [81].

    Verification of SNARG is efficient and can be privacy-preserving without directly exposing the inputs and outputs of the computation. As a result, SNARG is widely used to construct an on-/offchain computation model[24]for blockchain-based DM.However,the verification efficiency of SNARG comes at the cost of a trusted setup of relation-dependent public parameters and expensive prover computation overhead. Therefore, it is critical to properly set universal or updatable public parameters [82] or to use a secure multiparty computation protocol to generate public parameters for SNARG systems. Moreover, SNARG does not naturally provide privacy against internal participants. Data processors must have access to the original data, which is not always desirable for DM applications.

    TEE,such as the Intel Software Guard Extension(SGX)[83],provides another way to verify computations.Before execution in TEE,codes are loaded into a secure enclave, which is secure hardware with protected memories. To ensure the loaded codes and data are trusted, SGX provides a remote attestation service: TEE generates an attestation request to a remote attestation service to ensure the integrity and correctness of code executions. Unlike SNARG,TEE does not require a trusted setup of public parameters and is more efficient in generating proof of computations. Therefore,TEE can facilitate the design of on-/off-chain computation models[84,85]by serving as a reliable and authenticated off-chain computation unit. Moreover, with the integration of a key manager, TEEbased solutions can achieve authenticated and encrypted communications between the enclave and external environments to achieve privacy protection against malicious data processors.However,there are some challenges in the practical implementation of TEE.First,a comprehensive and formal security analysis[86]of TEE has recently been discussed. Second, remote attestation strongly relies on the service provider, which can be a single trust point in a blockchain environment.

    Besides certifying the computation results with the aid of either SNARG or TEE, another potential path is to adopt game theory to create a competitive relationship between multiple off-chain resource providers in order to eliminate cheating [87]. For example,two cloud servers can be assigned the same computation tasks.By setting proper financial gains and losses, the two cloud servers can be motivated to correctly complete the computing tasks.

    4.3. Blockchain-based data-processing mechanisms

    An on-/off-chain model based on SNARG,TEE,or the two-server model provides general solutions to data processing tasks. However,for specific tasks,specialized design strategies(e.g.,new data structures) are required to fulfill the privacy and efficiency requirements.

    4.3.1. Data sharing

    When data are collected and stored in a blockchain-based DM,it is important to share or trade the data to enable multiple dataintensive applications [18,88].

    Various privacy requirements can be achieved for data sharing using different techniques. Identity privacy for both data owners and receivers can be achieved by pseudonyms [89] or group signature-based anonymous credentials. Data encryption mechanisms with key management techniques can be enforced to achieve on-chain data confidentiality. For fine-grained access control in data sharing, attribute-based or functional encryption can also be used[90,91],in which a data encryption key or a ciphertext can determine access policies. Unlike methods that are based on encryption key management, reputation management [92] can also be integrated into data sharing. In reputation management,data senders and receivers can be enabled to leave reviews for the data-sharing process [93]. The accumulated review score can serve as the criteria for access assessment. For example, a proofof-collaboration consensus protocol is designed for data sharing at the edge[94],where reputation based on collaboration is quantified. Recently, researchers have also considered GDPR requirements in data sharing [95,96]. More specifically, a blockchainbased solution can enable users to fully control their personal data,which meets the GDPR requirements of consent-based DM.

    Data owners often outsource their data to a third-party storage provider,such as a cloud server,and rely on the storage provider to manage their data. In this model, the blockchain can serve as a trusted auditor for the data-sharing process [97]. To relieve data owners of heavy key management overheads,it is desirable to have a reliable key manager for data encryption and decryption.Threshold cryptography, such as (t,n) Paillier crypto (where t is a threshold number and n is the number of secret shares),can be utilized to protect data that are stored on the cloud and shared on the blockchain[98].At the same time,it is essential to securely choose a set of committee members to manage the keys. The blockchain can also be utilized to manage data modification on the cloud storage[46], where a trusted authority (TA) is integrated with the smart contract to complete the modification process.

    Aside from data sharing, data trading can further explore the data value. A blockchain-based digital identity exchange scheme for financial institutions has been proposed [99], in which SNARG is utilized to prove the authenticity of identities in a privacypreserving manner.TEE can be utilized to build a data-trading platform [100,101] that preserves fairness for both buyers and sellers,and ensures on-chain privacy for data processing [102].

    4.3.2. Data analytics

    A blockchain can support various data-analysis tasks [103] for intelligent 6G. A blockchain-based learning framework is proposed in Ref. [104] to securely compute model parameter updates with a threshold Paillier algorithm. Another important data analysis mechanism is to enable flexible and expressive queries. For data stored on the blockchain, a query should be efficient, and the correctness proof should be verified at a low cost[13], where authenticated data structures can be tailored for both inter-block and cross-block query processing. To maintain data privacy on the blockchain, it is possible to encrypt the data on the chain with a searchable index [105]. Then, a smart contract can be constructed for querying over the searchable indexes,which naturally ensures the verifiability of the search result. For searching over the location-based data, it is desirable to established range-based searchable indexes [106]. When data are stored off the blockchain, data owners can build an on-chain authenticator of the data index from SNARG or cryptographic accumulators. In this way, query operations can be conducted off-chain and the query result can be verified on-chain. More expressive verifiable queries can be supported by integrating database query techniques [107].

    A blockchain can naturally serve as a log system [108,109] due to its transparency and immutability. That is, data stored on the blockchain can be utilized to conduct event-driven system debugs and analysis. To support fine-grained data provenance operations,expressive data indexes can be built atop the original blockchain data [13,110]. At the same time, the blockchain can be utilized to construct log systems for DM applications. A lightweight blockchain logging mechanism is proposed in Ref. [111] with a new log storage structure for data-intensive applications. To achieve communication between different systems, multichain interoperability is considered in Ref. [112]. Compared with direct use of the blockchain for log storage, storing sensitive log data off the blockchain can reduce the on-chain overheads and privacy leakage.In particular, an IoT data provenance scheme is proposed in Ref.[113]. SNARG is adopted to succinctly store provenance data at each network administrator with succinct authenticators on the blockchain for cross-domain network provenance queries. Cryptographic accumulators can be utilized for a single log server to generate proofs of correct log updates, as discussed in Ref. [114] for certificate transparency services. A summary of blockchain-based privacy-preserving data processing is shown in Table 2[24,84,87,89–91,96,100,104,105,108,115].

    5. Research issues and potential solutions

    While blockchain-based solutions have great potential for DM toward 6G, many unresolved research challenges still remain. In this section, we discuss research issues and potential solutions indetail, in terms of architecture design, AA, and data processing in blockchain-based DM.

    Table 2 Summary of privacy-preserving data processing in blockchains.

    5.1. Architecture design in blockchain-based DM

    Although there are many blockchain architectures for DM,most are designed for applications, and various challenging issues related to DM architecture designs still exist, as follows:

    (1) Incentive and regulation mechanism design: A permissionless blockchain utilizes financial incentives for its participants,while a permissioned blockchain relies on a consortium committee to regulate its procedures.In practice,DM stakeholders toward 6G are highly heterogeneous,and can have different capabilities,profit considerations,and management frameworks.Therefore,the question of how to design incentive mechanisms for permissionless blockchain-based DM and regulation rules for permissioned blockchain-based DM remains a challenging issue. Multiple technologies, such as game theory and threshold cryptography, can be integrated to offer effective group and organization behavior management.

    (2) Blockchain architecture with network slicing: Network function virtualization(NFV)enables flexible resource sharing over the same physical infrastructures of a communication network and is envisioned to play an important role in future wireless networks[1]. In NFV, a network slice can contain a set of virtualized functions from multiple physical resource providers and can be managed by local or centralized software defined networks (SDNs)controllers, making DM more complicated. To manage data flows among virtualized functions, the DM architecture design should take into account the roles of new 6G stakeholders, such as a third-party resource provider and a cloud-based slice orchestrator.As the business model and implementation details of NFV-enabled 6G become clearer in the future, their impact on DM architecture design can be studied further.

    (3) Hybrid blockchain architecture design: Blockchain architectures for DM are designed based on either a permissioned blockchain or a permissionless blockchain.Both architectures have their own advantages and disadvantages; the core component of these architectures is the consensus protocol,which affects the system’s scalability and security. To further improve system scalability while simultaneously satisfying the security requirements,a flexible and hybrid blockchain architecture should be utilized, which can support the switching of consensus protocols according to different application requirements in DM. Moreover, as the blockchain plays a critical role in the new information infrastructure for DM toward 6G,blockchain-as-a-service can be a potential solution to provide plug-in DM architecture design[26]that integrates new technologies, such as lightweight clients [116] and stateless blockchains [117].

    (4)Efficient cross-chain interoperability with privacy preservation: Current DM architectures are designed based solely on a single ledger, without fully considering cross-chain interoperability. With a heterogeneous blockchain architecture for DM [118]that accommodates multiple applications, each application may establish its own sub-chain to manage its own data with privacy preservation. This approach is similar to the concept of private channels in a permissioned blockchain, but does not support cross-chain interoperability, due to privacy concerns. Therefore, a new blockchain architecture for DM with efficient cross-chain interoperability requires further study, especially from the perspective of privacy preservation. Hierarchical blockchain architectures can be designed to manage cross-chain communications at the consensus level. Moreover, it is possible to set broker nodes that operate over multiple chains. With identity management for the broker nodes, cross-chain communications can be securely facilitated.

    5.2. AA in blockchain-based DM

    Although blockchain-based AA mechanisms have many advantages, they also raise some efficiency and privacy concerns that should be carefully addressed.

    (1) Lightweight AA: One main difference between blockchainbased AA schemes and conventional AA schemes is that users can self-maintain their identities,with only necessary information being uploaded to the blockchain. With a complicated DM architecture in which multiple stakeholders coexist,a user with limited computing and storage capabilities may have different identity credentials for various use cases. At the same time, blockchain storage and computing resources are expensive in terms of throughput and latency restrictions. As a result, how to achieve blockchain-based lightweight identity management becomes an important issue for DM toward 6G. A potential solution is to integrate with an external credential server for credential management. To enable users to fully control their credentials, additional security guarantees should be achieved, such as verifiable credential updates based on cryptographic accumulators[9]or TEE-based processing.

    (2)Distributed AA with dynamic updates:To further eliminate trust requirements for any single entity, critical AA operations should be conducted by a set of key managers,such as distributed credential issuance and revocation [70]. Such a model can involve many communications between the key managers,and an effective incentive and regulation mechanism is required to manage their behavior.

    Threshold cryptography can be utilized to reduce the computational burdens on the key managers. At the same time, the membership of key managers can change over time and needs to be updated frequently. When the set of key managers changes, the forward and backward security of the identity credentials should also be ensured. That is, the question of how to achieve secure and efficient committee updates becomes a challenging issue.One potential solution is proactive secret sharing [119], in which shared secrets among key managers can be updated frequently.Critical management operations can also be conducted in a secure hardware execution environment.

    (3) Balancing AA privacy and accountability: Identity privacy can have fine-grained levels in DM by only revealing necessary identity information under privacy regulations, such as an organization membership and stakeholder attributes. For different DM use cases, flexible privacy modeling and execution can be integrated with a smart contract to enforce AA privacy management[77]. However, identity privacy should not be uncompromisable for DM toward 6G. In case of strong dispute, blockchain-based AA should recover the real identities of stakeholders in order to conduct investigations and enforce accountability, which can be achieved using threshold encryption techniques. In this case, it is important to have a clear criterion to decide when and how to recover stakeholder identity. A hierarchical identity management committee can be designed with specialized regulatory frameworks.

    5.3. Data processing in blockchain-based DM

    There have been extensive studies on blockchain-based DM,from SNARG/TEE-based solutions for general computations to specialized designs for data sharing and data analytics. However, for blockchain-based DM toward 6G, the question of how to balance functionality, efficiency, and privacy continues to pose the following technical challenges.

    (1)On-chain process design:Blockchain provides a trusted and reliable shared view of certain DM processes among DM stakeholders.As the on-chain storage and computation resources are limited and may cause privacy concerns, DM stakeholders must carefully decide what information to share.There may be very subtle differences between information that should and should not be shared,which may include hash values of original data for integrity checking, DM life-cycle event logs, or just proof of the existence of DM operations. For privacy and efficiency, only pivotal information should be shared, with selective disclosure only to necessary participants [69]. At the same time, there may be cases when onchain data need to be removed, with redactable blockchain techniques as a potential solution.

    (2)Privacy model design:Blockchain-based DM is complicated by its dynamic and heterogeneous participants in various applications, which can lead to rapid changes in privacy requirements[74]. As a result, privacy modeling and evaluations under privacy regulations should be considered to enable flexible privacy management on the blockchain[77],where a natural language processing technique can be a potential solution to help smart contracts better understand privacy requirements.

    (3)Modular design for data processing:Many existing designs can achieve privacy preservation for different DM operations. For example, SNARG can support general arithmetic computations with succinct on-chain verification, TEE is efficient for verifiable hash computations, and searchable encryption can have specialized designs for different query operations. In practice, a DM instance may incur multiple data operations, where a solution based on a single technique cannot meet both the efficiency and privacy requirements.Modular design strategy[120]is a potential solution that decouples DM operation,such as keyword query and identity management [121], with efficient instantiations from different techniques. This strategy requires an overall understanding of different verifiable computation systems in terms of their advantages and limitations. A universal compatible model [122]can be utilized to analyze the systematic security.

    (4) Automation versus transparency and accountability: In Article 22 of GDPR,users have the right to object to automatic decisions regarding their data, which may contradict the automation property of blockchain [11] and AI-based decision-making. However, it is often difficult to guarantee transparency and accountability during an AI-assisted decision-making process in blockchain-based DM[9].A potential solution is to design efficient algorithms to directly evaluate outputs from automatic processes.At the same time, users should be given clear explanations of the impacts of the automatic process on their data and granted the right to object in case of any privacy concerns. For collaborative data processing, it is important to enforce the joint accountability of involved DM stakeholders by establishing DM operation provenance and forensic mechanisms.

    6. Conclusions

    In this paper, we investigated blockchain-based DM for 6G and highlighted its benefits of decentralization and transparency. By identifying efficiency and privacy challenges, we focused on DM architecture design, the AA of DM stakeholders, and blockchainbased data processing.

    To explore potential solutions that balance transparency, efficiency,and privacy in decentralized blockchain-based DM, further research can be directed to the following open issues. First, the impact of network virtualization on DM architecture design should be discussed.Blockchain-based DM requires a flexible and versatile architecture with efficient consensus protocols, inter-chain operability, and fast service-oriented configurations. Second, lightweight and distributed AA with dynamic updates should be designed in order to strike a balance between AA privacy and accountability for blockchain-based DM. Third, an executable privacy model that can accommodate a wide range of privacy requirements in different DM operations should be achieved.Modular integration of privacy-preserving data-processing techniques should be explored under the privacy models.

    Acknowledgments

    This work was supported by research grants from Huawei Technologies Canada and from the Natural Sciences and Engineering Research Council (NSERC) of Canada.

    Compliance with ethics guidelines

    Xuemin (Sherman) Shen, Dongxiao Liu, Cheng Huang, Liang Xue, Han Yin,Weihua Zhuang, Rob Sun, and Bidi Ying declare that they have no conflict of interest or financial conflicts to disclose.

    国产亚洲欧美98| 欧美黄色片欧美黄色片| 成人三级做爰电影| 在线观看日韩欧美| 久久午夜亚洲精品久久| 精品日产1卡2卡| 黄色女人牲交| 午夜a级毛片| 99精品欧美一区二区三区四区| 亚洲国产看品久久| 国产又黄又爽又无遮挡在线| 高潮久久久久久久久久久不卡| 久久精品亚洲精品国产色婷小说| 欧美激情久久久久久爽电影| 亚洲人成网站在线播放欧美日韩| 亚洲国产高清在线一区二区三| 精品电影一区二区在线| 天天躁狠狠躁夜夜躁狠狠躁| 国产免费av片在线观看野外av| 88av欧美| 成在线人永久免费视频| 久久亚洲真实| 精品熟女少妇八av免费久了| 欧美丝袜亚洲另类 | 一级毛片精品| 不卡av一区二区三区| 女同久久另类99精品国产91| 亚洲国产精品合色在线| 色老头精品视频在线观看| 日本黄色视频三级网站网址| 国产精品久久久久久亚洲av鲁大| 日本五十路高清| 国内揄拍国产精品人妻在线| 国产欧美日韩精品亚洲av| 极品教师在线免费播放| 午夜福利在线观看吧| 可以在线观看的亚洲视频| 99久久综合精品五月天人人| 国产人伦9x9x在线观看| 色综合婷婷激情| 黄色成人免费大全| 日本黄色视频三级网站网址| 欧美+亚洲+日韩+国产| 国产一区二区在线观看日韩 | 免费看a级黄色片| 丰满的人妻完整版| 欧美性猛交黑人性爽| cao死你这个sao货| 午夜精品久久久久久毛片777| 亚洲精品456在线播放app | 国产一级毛片七仙女欲春2| 亚洲乱码一区二区免费版| 久久99热这里只有精品18| 亚洲中文av在线| 国产成人精品无人区| 欧美日韩福利视频一区二区| 国产 一区 欧美 日韩| 国产成+人综合+亚洲专区| 老熟妇乱子伦视频在线观看| 色哟哟哟哟哟哟| 麻豆一二三区av精品| 国产1区2区3区精品| 成人高潮视频无遮挡免费网站| 国产精品久久久久久久电影 | 天天躁狠狠躁夜夜躁狠狠躁| 国产高清激情床上av| 丰满的人妻完整版| 一二三四社区在线视频社区8| 久久久成人免费电影| 美女黄网站色视频| 噜噜噜噜噜久久久久久91| 一本久久中文字幕| 亚洲人成网站高清观看| 亚洲一区二区三区色噜噜| 欧美黑人欧美精品刺激| 禁无遮挡网站| 99热这里只有精品一区 | 亚洲av免费在线观看| 国产成人精品久久二区二区91| 亚洲五月婷婷丁香| 禁无遮挡网站| 国内久久婷婷六月综合欲色啪| 男女床上黄色一级片免费看| 男女午夜视频在线观看| 欧美日韩精品网址| 亚洲精品在线美女| 国产三级在线视频| 九九久久精品国产亚洲av麻豆 | 好男人在线观看高清免费视频| 午夜成年电影在线免费观看| 欧美乱色亚洲激情| 国内少妇人妻偷人精品xxx网站 | 久久久精品大字幕| 亚洲一区二区三区不卡视频| av在线蜜桃| 久久久国产欧美日韩av| 床上黄色一级片| 欧美乱妇无乱码| 欧美国产日韩亚洲一区| www日本在线高清视频| 国产三级中文精品| 国产一区二区在线观看日韩 | 亚洲精品美女久久久久99蜜臀| 亚洲国产精品成人综合色| 午夜激情福利司机影院| 久久热在线av| 一区二区三区激情视频| 国产免费av片在线观看野外av| 国产成人精品久久二区二区91| 国产日本99.免费观看| 日韩欧美在线二视频| 亚洲av片天天在线观看| 日韩欧美 国产精品| 国内揄拍国产精品人妻在线| 在线观看美女被高潮喷水网站 | 老司机深夜福利视频在线观看| 一区二区三区国产精品乱码| 国内精品美女久久久久久| 少妇人妻一区二区三区视频| 国产一区二区在线av高清观看| 日韩av在线大香蕉| 久久性视频一级片| 欧美丝袜亚洲另类 | 亚洲一区二区三区不卡视频| 亚洲国产欧美人成| 免费观看的影片在线观看| 亚洲成a人片在线一区二区| 成人欧美大片| 国产高潮美女av| 长腿黑丝高跟| 国产成人精品久久二区二区91| 亚洲欧美精品综合久久99| 国产精品野战在线观看| 老汉色∧v一级毛片| 日本免费一区二区三区高清不卡| 18禁黄网站禁片免费观看直播| 精品乱码久久久久久99久播| 国产成年人精品一区二区| 欧美zozozo另类| x7x7x7水蜜桃| 国产激情欧美一区二区| 日本黄色视频三级网站网址| 久久国产乱子伦精品免费另类| 亚洲av免费在线观看| 久久亚洲真实| 狂野欧美白嫩少妇大欣赏| 欧美另类亚洲清纯唯美| 小蜜桃在线观看免费完整版高清| 国产精品98久久久久久宅男小说| 国产99白浆流出| 一区福利在线观看| 观看美女的网站| 国产成人aa在线观看| 成人午夜高清在线视频| 亚洲国产欧美一区二区综合| xxxwww97欧美| 亚洲人与动物交配视频| av视频在线观看入口| 久久久久国产一级毛片高清牌| 午夜日韩欧美国产| 男女午夜视频在线观看| 一夜夜www| 国产成人欧美在线观看| 日日夜夜操网爽| 国内精品一区二区在线观看| 一区二区三区激情视频| 在线观看一区二区三区| 国产精品自产拍在线观看55亚洲| 亚洲欧美日韩高清专用| www.精华液| 亚洲中文日韩欧美视频| 国产精品香港三级国产av潘金莲| 国模一区二区三区四区视频 | 九九久久精品国产亚洲av麻豆 | 国产精品1区2区在线观看.| 欧美黑人欧美精品刺激| 女人被狂操c到高潮| 日本成人三级电影网站| 久久久水蜜桃国产精品网| e午夜精品久久久久久久| h日本视频在线播放| 亚洲国产欧洲综合997久久,| www国产在线视频色| 中文亚洲av片在线观看爽| 久久久久久大精品| 欧美中文综合在线视频| 国内少妇人妻偷人精品xxx网站 | 免费在线观看影片大全网站| 18禁美女被吸乳视频| 制服人妻中文乱码| 此物有八面人人有两片| 亚洲五月天丁香| 天堂av国产一区二区熟女人妻| 99re在线观看精品视频| 一级作爱视频免费观看| 国产精品国产高清国产av| 中文字幕人妻丝袜一区二区| 久久精品国产99精品国产亚洲性色| 成人高潮视频无遮挡免费网站| 精品久久久久久,| 脱女人内裤的视频| 国产精品乱码一区二三区的特点| 最好的美女福利视频网| or卡值多少钱| 国产成人一区二区三区免费视频网站| 夜夜躁狠狠躁天天躁| 老司机深夜福利视频在线观看| 1000部很黄的大片| 黄片小视频在线播放| 啪啪无遮挡十八禁网站| 成熟少妇高潮喷水视频| 人人妻人人看人人澡| 国产爱豆传媒在线观看| 哪里可以看免费的av片| 桃红色精品国产亚洲av| 午夜精品一区二区三区免费看| 欧美日韩黄片免| 男女床上黄色一级片免费看| 听说在线观看完整版免费高清| 一个人观看的视频www高清免费观看 | 欧美日本视频| 麻豆久久精品国产亚洲av| 91麻豆精品激情在线观看国产| 精品一区二区三区四区五区乱码| 国产精品99久久99久久久不卡| 在线国产一区二区在线| 国产免费av片在线观看野外av| 美女 人体艺术 gogo| 成年版毛片免费区| 一个人免费在线观看的高清视频| 级片在线观看| 欧美av亚洲av综合av国产av| 亚洲欧美日韩卡通动漫| aaaaa片日本免费| 岛国在线免费视频观看| 亚洲人成电影免费在线| 久久久久免费精品人妻一区二区| 亚洲国产精品sss在线观看| 国产一区二区在线av高清观看| 久久这里只有精品19| 欧美日韩国产亚洲二区| 久久精品人妻少妇| 午夜亚洲福利在线播放| 国产久久久一区二区三区| 九色成人免费人妻av| 美女cb高潮喷水在线观看 | 村上凉子中文字幕在线| 亚洲性夜色夜夜综合| 三级毛片av免费| 国产伦在线观看视频一区| 两个人的视频大全免费| 美女免费视频网站| 舔av片在线| av片东京热男人的天堂| 国产av麻豆久久久久久久| 日本黄大片高清| 亚洲精品美女久久av网站| 久久久国产成人免费| 免费一级毛片在线播放高清视频| 两个人的视频大全免费| 亚洲熟妇熟女久久| 久久久国产成人免费| 波多野结衣巨乳人妻| 亚洲 欧美 日韩 在线 免费| 国产精品九九99| av片东京热男人的天堂| 国产精品99久久久久久久久| 午夜福利18| 国产私拍福利视频在线观看| 亚洲七黄色美女视频| 99久久综合精品五月天人人| 色老头精品视频在线观看| 久久久国产欧美日韩av| 偷拍熟女少妇极品色| 亚洲国产中文字幕在线视频| 亚洲熟女毛片儿| 国产三级中文精品| 久久精品国产清高在天天线| 嫁个100分男人电影在线观看| 两个人看的免费小视频| 日日摸夜夜添夜夜添小说| 成人av一区二区三区在线看| 精品国产美女av久久久久小说| 色精品久久人妻99蜜桃| 丝袜人妻中文字幕| 中文字幕最新亚洲高清| 美女被艹到高潮喷水动态| 国产乱人伦免费视频| 亚洲中文字幕一区二区三区有码在线看 | 热99在线观看视频| 久久中文看片网| 亚洲欧美日韩卡通动漫| 一级作爱视频免费观看| 国产av一区在线观看免费| 国产亚洲精品久久久久久毛片| 久久精品人妻少妇| 亚洲av成人av| 亚洲五月天丁香| 成熟少妇高潮喷水视频| 久久精品国产综合久久久| 在线观看66精品国产| 在线永久观看黄色视频| 18禁美女被吸乳视频| 桃红色精品国产亚洲av| 两人在一起打扑克的视频| 欧美不卡视频在线免费观看| 亚洲无线在线观看| 国产又黄又爽又无遮挡在线| 国产真人三级小视频在线观看| 性色avwww在线观看| 一区二区三区国产精品乱码| 国产又色又爽无遮挡免费看| 女警被强在线播放| 国产亚洲av高清不卡| 俄罗斯特黄特色一大片| 久久国产精品人妻蜜桃| 亚洲乱码一区二区免费版| 国产精品久久视频播放| 国产激情欧美一区二区| 亚洲精品一卡2卡三卡4卡5卡| 12—13女人毛片做爰片一| 99精品欧美一区二区三区四区| 精品久久久久久久末码| 亚洲av成人精品一区久久| 人人妻,人人澡人人爽秒播| a在线观看视频网站| 亚洲av成人一区二区三| 精品久久久久久成人av| 熟女电影av网| 国产精品一及| 香蕉丝袜av| 成人18禁在线播放| 午夜福利在线观看免费完整高清在 | 日本与韩国留学比较| 欧美黑人巨大hd| 亚洲在线观看片| 最新中文字幕久久久久 | 亚洲午夜理论影院| 日韩欧美三级三区| 欧美丝袜亚洲另类 | 日韩有码中文字幕| 国产久久久一区二区三区| 国产精品久久久久久久电影 | 长腿黑丝高跟| 国产亚洲欧美98| 曰老女人黄片| 88av欧美| 美女 人体艺术 gogo| 色老头精品视频在线观看| 啦啦啦免费观看视频1| 嫩草影院入口| xxx96com| 国产三级中文精品| 亚洲aⅴ乱码一区二区在线播放| 淫妇啪啪啪对白视频| 国产午夜福利久久久久久| 757午夜福利合集在线观看| 91麻豆精品激情在线观看国产| 黄色片一级片一级黄色片| 黄色成人免费大全| 女生性感内裤真人,穿戴方法视频| 在线观看免费午夜福利视频| 亚洲成av人片免费观看| 欧美色欧美亚洲另类二区| 久9热在线精品视频| 日韩欧美在线乱码| 国产一区在线观看成人免费| 麻豆av在线久日| 精品久久久久久久人妻蜜臀av| 免费看a级黄色片| 99久久无色码亚洲精品果冻| 99热这里只有是精品50| 神马国产精品三级电影在线观看| 国产成人精品久久二区二区91| 99精品在免费线老司机午夜| 巨乳人妻的诱惑在线观看| 午夜精品在线福利| 亚洲va日本ⅴa欧美va伊人久久| www.999成人在线观看| 亚洲人成伊人成综合网2020| 不卡av一区二区三区| 美女高潮喷水抽搐中文字幕| 亚洲成人久久爱视频| 两性午夜刺激爽爽歪歪视频在线观看| 美女黄网站色视频| 美女高潮的动态| 国产一区二区三区视频了| 午夜福利欧美成人| АⅤ资源中文在线天堂| 特大巨黑吊av在线直播| 欧美三级亚洲精品| 色综合站精品国产| 国产激情久久老熟女| 三级国产精品欧美在线观看 | 老司机午夜福利在线观看视频| 黑人巨大精品欧美一区二区mp4| 久久久国产精品麻豆| 亚洲欧美精品综合久久99| 一区二区三区高清视频在线| 欧美在线一区亚洲| 国产伦精品一区二区三区四那| 丰满的人妻完整版| 精品一区二区三区av网在线观看| 亚洲精品美女久久av网站| 美女被艹到高潮喷水动态| 成年女人永久免费观看视频| 9191精品国产免费久久| 亚洲欧美一区二区三区黑人| 黄色成人免费大全| 免费观看的影片在线观看| 国产极品精品免费视频能看的| 后天国语完整版免费观看| 欧美日韩黄片免| 成人av在线播放网站| ponron亚洲| 美女 人体艺术 gogo| 婷婷精品国产亚洲av在线| 成年免费大片在线观看| 男人舔女人下体高潮全视频| 久久午夜综合久久蜜桃| 亚洲熟妇熟女久久| 精品久久久久久久久久免费视频| 欧美+亚洲+日韩+国产| 午夜福利高清视频| 少妇裸体淫交视频免费看高清| 人妻久久中文字幕网| 久久人妻av系列| 国产一区在线观看成人免费| 免费在线观看亚洲国产| 老熟妇仑乱视频hdxx| 偷拍熟女少妇极品色| 99久久99久久久精品蜜桃| 欧美性猛交黑人性爽| 天堂av国产一区二区熟女人妻| 亚洲精品色激情综合| 中文字幕最新亚洲高清| 最新中文字幕久久久久 | 免费观看精品视频网站| 久久这里只有精品中国| 久久久久国产一级毛片高清牌| 97碰自拍视频| 免费观看的影片在线观看| 中文亚洲av片在线观看爽| 日韩高清综合在线| 女同久久另类99精品国产91| 一个人观看的视频www高清免费观看 | 看片在线看免费视频| 国产欧美日韩精品亚洲av| 五月玫瑰六月丁香| 国产aⅴ精品一区二区三区波| 国产欧美日韩一区二区三| 国产久久久一区二区三区| 美女午夜性视频免费| 国产成人一区二区三区免费视频网站| 国内精品美女久久久久久| 十八禁人妻一区二区| 手机成人av网站| 舔av片在线| 一区二区三区国产精品乱码| 亚洲av日韩精品久久久久久密| 99精品在免费线老司机午夜| 亚洲精品美女久久av网站| www.熟女人妻精品国产| 亚洲自拍偷在线| 中文字幕精品亚洲无线码一区| 亚洲午夜精品一区,二区,三区| 女生性感内裤真人,穿戴方法视频| 久久人妻av系列| 91麻豆精品激情在线观看国产| 国产高清videossex| 黄色女人牲交| 美女扒开内裤让男人捅视频| 婷婷精品国产亚洲av在线| 三级毛片av免费| 男人舔奶头视频| 国产成人aa在线观看| 三级国产精品欧美在线观看 | 老司机深夜福利视频在线观看| 欧美性猛交╳xxx乱大交人| 波多野结衣巨乳人妻| 国产亚洲欧美在线一区二区| 波多野结衣巨乳人妻| 国产一区二区在线av高清观看| 两个人看的免费小视频| 他把我摸到了高潮在线观看| 一卡2卡三卡四卡精品乱码亚洲| 最好的美女福利视频网| 99久久国产精品久久久| 免费在线观看影片大全网站| 久久久色成人| 国产一级毛片七仙女欲春2| 免费看十八禁软件| 成人高潮视频无遮挡免费网站| 中文字幕熟女人妻在线| 国产av麻豆久久久久久久| 88av欧美| 丰满人妻熟妇乱又伦精品不卡| 丁香欧美五月| xxxwww97欧美| 成人国产一区最新在线观看| av女优亚洲男人天堂 | 天天躁日日操中文字幕| 免费在线观看视频国产中文字幕亚洲| 九色成人免费人妻av| 中文在线观看免费www的网站| 日本 av在线| 老司机午夜福利在线观看视频| 国产爱豆传媒在线观看| 男插女下体视频免费在线播放| 又紧又爽又黄一区二区| 免费搜索国产男女视频| 一个人看视频在线观看www免费 | 亚洲中文av在线| 久久久久国产一级毛片高清牌| 亚洲国产高清在线一区二区三| 一个人观看的视频www高清免费观看 | 久久久精品大字幕| 国产精品免费一区二区三区在线| 精品久久久久久成人av| 成人三级黄色视频| 亚洲成a人片在线一区二区| 日韩精品青青久久久久久| 久久午夜亚洲精品久久| 一个人看的www免费观看视频| 狠狠狠狠99中文字幕| 欧美日韩国产亚洲二区| 中文字幕熟女人妻在线| 一区二区三区国产精品乱码| 久久久精品欧美日韩精品| 中文字幕av在线有码专区| 99热只有精品国产| 日韩大尺度精品在线看网址| 久久久久久久午夜电影| 好看av亚洲va欧美ⅴa在| 男女之事视频高清在线观看| 搞女人的毛片| 日本a在线网址| 亚洲午夜精品一区,二区,三区| 国产精品 国内视频| 国产亚洲精品久久久久久毛片| 一本一本综合久久| 悠悠久久av| 黄色片一级片一级黄色片| 色在线成人网| 成人亚洲精品av一区二区| 久久精品国产亚洲av香蕉五月| www.精华液| 一进一出好大好爽视频| 欧美大码av| 日本精品一区二区三区蜜桃| 91老司机精品| 亚洲国产欧美人成| 久久精品国产综合久久久| 精品国产乱码久久久久久男人| 亚洲专区字幕在线| 成人午夜高清在线视频| 国产乱人伦免费视频| 日韩高清综合在线| 999久久久精品免费观看国产| 最近在线观看免费完整版| 成人av一区二区三区在线看| 18禁黄网站禁片午夜丰满| 国产视频一区二区在线看| 亚洲狠狠婷婷综合久久图片| 亚洲中文日韩欧美视频| 十八禁网站免费在线| 成人一区二区视频在线观看| 国产成年人精品一区二区| 蜜桃久久精品国产亚洲av| 日本五十路高清| 久9热在线精品视频| 国产一级毛片七仙女欲春2| 亚洲精品中文字幕一二三四区| 国产激情欧美一区二区| 国产精品爽爽va在线观看网站| 老司机深夜福利视频在线观看| 亚洲aⅴ乱码一区二区在线播放| 亚洲色图av天堂| 国产精品久久视频播放| 在线a可以看的网站| 久久久久国内视频| 亚洲熟女毛片儿| 精品欧美国产一区二区三| 欧美+亚洲+日韩+国产| 日本黄色片子视频| 亚洲成人中文字幕在线播放| 熟女少妇亚洲综合色aaa.| 国产精品久久久人人做人人爽| 中文在线观看免费www的网站| 色吧在线观看| 国产精品一区二区免费欧美| 一二三四社区在线视频社区8| 精品国内亚洲2022精品成人| 亚洲av日韩精品久久久久久密| netflix在线观看网站| 日韩欧美免费精品| 少妇熟女aⅴ在线视频| 欧美zozozo另类| 欧美日韩瑟瑟在线播放| 嫩草影院入口| 成人特级黄色片久久久久久久| 香蕉国产在线看| 日韩免费av在线播放| 无人区码免费观看不卡| 人人妻人人看人人澡| 12—13女人毛片做爰片一| 首页视频小说图片口味搜索| avwww免费| 黑人欧美特级aaaaaa片| 国产精品九九99| 韩国av一区二区三区四区| 日本a在线网址| 亚洲精品在线美女| 国产成人av教育| 巨乳人妻的诱惑在线观看|