• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Building a Trust Model for Secure Data Sharing(TM-SDS)in Edge Computing Using HMAC Techniques

    2022-08-23 02:15:02KarthikeyanandMadhavan
    Computers Materials&Continua 2022年6期

    K.Karthikeyanand P.Madhavan

    School of Computing,SRM Institute of Technology,Kattankulathur,Chennai,603203,India

    Abstract:With the rapid growth of Internet of Things(IoT)based models,and the lack amount of data makes cloud computing resources insufficient.Hence,edge computing-based techniques are becoming more popular in present research domains that makes data storage, and processing effective at the network edges.There are several advanced features like parallel processing and data perception are available in edge computing.Still, there are some challenges in providing privacy and data security over networks.To solve the security issues in Edge Computing,Hash-based Message Authentication Code(HMAC)algorithm is used to provide solutions for preserving data from various attacks that happens with the distributed network nature.This paper proposed a Trust Model for Secure Data Sharing (TM-SDS) with HMAC algorithm.Here,data security is ensured with local and global trust levels with the centralized processing of cloud and by conserving resources effectively.Further,the proposed model achieved 84.25%of packet delivery ratio which is better compared to existing models in the resulting phase.The data packets are securely transmitted between entities in the proposed model and results showed that proposed TM-SDS model outperforms the existing models in an efficient manner.

    Keywords: Secure data sharing; edge computing; global trust levels; parallel processing

    1 Introduction

    Internet of Things(IoT)is the recent advancement in communication,in which data is the valuable resource,providing several intelligent services to the people[1].However,the IoT data contain private data and can disclose the user identities,if it is not efficiently secured[2].For instance,the malicious user can utilize the user’s private data like date of birth,bank details and so on.The authorized person identification is considered that influences the adverse effects, when there are responsible for user actions.So,an effective privacy preserving models and protocols are necessary in edge computing.In recent times, edge computing is a distributed computation model with many trust models in which the coexistence of multiple operational entities,authentication models require the attribute validation for every unit in single trust model [3,4].Hence, the entities are mutually authenticated each other with varied secure models.For some resource-limited entities, it is unfeasible to store or process big data or to run a highly complex trust model.Edge computing model comprises big data processing,parallel computation aspects,distributed data transmission processing,location-aware,mobility and dynamicity,and so on.The conventional privacy and security models in edge computing are ineffective for securing the massive data processing[5].Specifically,secure data processing and privacy preserving problems are effectively important.Major concerns that are faced in edge computing related to data security and privacy-preserving issues are lightweight and fine-grained, distributed access control,limited resources and efficient privacy preservation.

    The above-stated data security and privacy preserving issues of edge computing model are stimulated to develop a security model in edge computing.The edge computing model can solve the problems that are related with the centralized system by approaching data pipeline operations over the edge of models with resource accessibility and application needs[6,7].Moreover,the framework deployment is more advanced in developing model with content providers,network entity,and third party element.Thereby, it is essential to enhance the end-user experience, because of the energy computing strategies[8–10].Nevertheless,edge computing cannot secure the user data privacy,since new set of attacks with multiple attack models are associated with the heterogeneity of element resources, network measurement and user accessibility [11,12].So, a Trust Model for Secure Data Sharing(TM-SDS)with HMAC algorithm is proposed in this research paper.The technology utilizes data blocks that are connected with one another with a cryptographic hash key[13,14].However,the Homomorphic Encryption incorporating in edge computing is a challenging process,because of the resource constraints and the scalability problems.The contributions of the proposed model are listed below,

    · Developing enhanced privacy with efficient HMAC Algorithm.

    · Local and global trust levels are developed with the centralized processing of cloud and conserving resources effectively.

    · For data and communication security,HMAC algorithm is used with hashing concept.

    · Providing compatibility with the efficient trust chain process that makes effective decision making without depending on the central admin of each node.

    · Interoperability between the trust blocks for efficient data security over communication.

    · Evaluation of results based on factors such as processing delay,rate of security,packet delivery ratio,communication overhead and packet drop.

    The structure of this paper is organized as follows: Section 2 provides the concepts of security management in edge computing that are applied for data security so far.Section 3 presents the preliminaries that support the proposed idea.Section 4 discussed the working procedure of the proposed Trust Model.The results and evaluations are presented in Section 5 for evidencing the model efficiency.Finally,Section 6 concludes the paper with some motivations for enhancement.

    2 Related Works

    Each merchant in IoT based communications are used for developing smart entities based on requirements that acts effectively in dynamic platforms [15].In addition, the framed data are to be secured in such a way that no one can access or misuse data.A valuable review work that described the security issues in several computation platforms.Tao et al.[16] developed a new multi-layered cloud architectural framework in which the services are given with the IoT based smart devices.Additionally,an ontology-based knowledge representation model has been presented in this literature.Lee et al.[17]used semantic web rule language for an effective interoperability of heterogeneous devices.

    An Intrusion Detection model(IDM)is developed based on SDN framework by Nobakht et al.[18].The developed model is used to solve the issues of host-based attack.In addition,the communicational,and computational overhead is significantly reduced by designing the traffic flow based on the target nodes.In this literature,IoT-IDM involved in monitoring the attack-based network activities,and tried to derive the attributes based on data flow of networks.The machine learning techniques are used for the classification of malicious traffics accurately.Gheisari et al.[19] and Madhavan et al.[20] implemented Support Vector Machine (SVM) technique with homomorphic encryption and friendly algorithm to detect the normal and abnormal node activities.The classification operations are performed based on the selected features of the attacks.Mohammadi et al.[21]and Mamolar et al.[22]has tried to resolve the attacks with defined traffic protocols with proper switching and hubs.

    Yu et al.[23] has presented a four image encryption algorithm based on chaos and computer generated hologram and quaternion Fresnel transform technique.The developed algorithm improved the security and weaken the correlation, where the extensive experiment showed the effectiveness of four image encryption algorithm.Esposito et al.[24]developed a novel model to authorize and find the policies by leveraging on the block-chain technology for holding a global view of the security policies with-in the system.Further,Li et al.[25]implemented a new algorithm based on synergetic neural networks.Firstly, the developed algorithm embeds the gray watermark signals into discrete cosine transform components.Additionally,the companion algorithm along with co-operative neural network is used for the extraction of watermark.Lastly,the suspected watermark signal is considered as the input,and the output image is considered as the outcome of recognition mechanism.

    Stergiou et al.[26] developed an innovative architecture that operates in a wireless mobile 6G network to manage big data on smart buildings.Al-Qerem et al.[27]developed a new variant optimistic con-currency control protocol that decreases the computation, and communication at the cloud.Hence, the developed protocol supports transactional and scalability of the services.The author analyzed the validation process under three con-currency protocols based on the numerical studies.The validation results represent that the developed protocol is more beneficial for the IoT users.Tewari et al.[28] developed a new ultra-light weighted mutual authentication protocol that utilizes bit-wise operations.This protocol is effective by means of communication cost,and storage.Zheng,et al.[29]implemented a light-weighted authenticated encryption approach on the basis of discrete chaotic s box coupled map lattice that superiorly improves the security in IoT environment.Further,Yu et al.[30]developed a new single bit public key encryption approach on the basis of learning parity with noise for an effective encryption.The extensive experiment showed that the developed approach achieved better plaintext attack security.

    Gupta et al.[31] developed an attribute based searchable encryption algorithm that provides better flexibility and usability by means of effective search.The developed attribute based searchable encryption algorithm delivers better performance in medical field by preserving privacy of the health data by keeping the data in an encryption form.Tewari et al.[32]performed a mutual authentication process between server and the IoT devices on the basis of elliptic curve cryptography that provides better solution by means of attack resistance and communication over-head.Further,Alsmirat et al.[33] determines the optimal ratio of the finger-print image compression to improve the recognition accuracy of finger-print identification system.In this study,the experiment was performed on large in house dataset and the obtained results showed that the developed approach accurately determines the compression ratio.

    The major drawback noticed in the existing works is that the feature selection has been carried out with the static mode.Then,the malicious activities that are not detected in dynamic process,and also the existing models can secure only the target host and not the complete network.To address these issues,a new model is proposed in this research paper.

    3 Preliminaries

    This section describes the background research about the trust model.In this paper,the concepts of Homomorphic Encryption technique are incorporated to resolve the security issues and efficient resource utilization in Edge Computing.The basic edge computing model is depicted in Fig.1.

    Figure 1:General edge computing framework

    The Trust model estimates the security strength and computes the trust esteem value.A trust esteem value comprises of various parameters along with the security of edge computing.The sub parameters and functions also be evaluated in the Trust model[34,35].Fig.2 measure the conceptual view of the trust model with their parameter,sub parameter and functions[36].

    In Fig.2,‘A’addresses the Identity Management(IDM),which is the vital components of security frameworks in the cloud, where the cycle analyzed the sign strength with in it.The authentication process represented as ‘B’that increase the end user security access at the time of the login and verification process.The verified end user is determined by the strength of the authentication, and it is processed by the segments of trust models.The authorization process represented as ‘C’, which is measured by authorization strength.The cloud computing provides the authorization services by the various model using Access Control Strength (ACL) and all the activities need authorization permission in this stage.

    Figure 2:Conceptual view of trust model

    The data protection,confidentiality,communication,isolation and virtualization security process are represented from‘D’to‘I’,where the trust model security covers all aspects of parameters[37].The above boundaries are estimated independently and it is joined to calculate the distributed computing strength and application.

    4 Proposed Model

    In this section,the novel techniques for privacy preserving and utilization of effective computational resources are presented with the proposed model named Trust Model for Secure Data Sharing(TM-SDS) that includes HMAC algorithm for security in edge computing.The proposed model provides enhanced scalability with the secure and distributed storage mechanism, where the high security is achieved with the homomorphic encryption and HMAC algorithm with the trusted model.This process makes the distributed decision making effective without relying on the central admin,who has the control over each node in the network.Furthermore, the interoperability among the multiple blocks is effectively managed.Additionally,the local and the global trust levels are designed for efficient resource usage,which is graphically presented in Fig.3.

    Figure 3:Overall design of the proposed TM-SDS model

    In this research paper, the proposed trust model is implemented with the trust service levels called global and local trust levels.The home or the industrial routers are defined as the trust agent.Based on the demands of security platform,trust services are employed in both the local trust levels.Moreover,in this framework,the homomorphic encryption based trust model technology is enabled for communicating with each other without the requirement of central admin in the pattern of peerto-peer model.Additionally,the distributive characteristic of edge computing makes both parallel and serial levels based on the application requirements.For computing the authority,there are several trust ranges are defined based on entities,data trust,and user privacy related trust.

    Further, the proposed work comprises of three phases such as, (i) initialization phase, (ii) data encryption with homomorphic encryption,and(iii)secure data processing with HMAC.The functions performed in each phase are clearly depicted in Fig.4, which is executed in bottom-up manner,comprises lower,middle and upper layers.

    Figure 4:Layers and function in proposed TM-SDS model

    4.1 Initialization Phase

    In this phase,initial setups are processed by preparing the networks based on security demands.The system comprises of edge devices and aggregation point(Ap)for receiving the collected data from edge devices.The data are secured before sending toApfor data aggregation.Steps involved in the initialization phase are given as,

    · Each host of end device (D) in the edge computing network is provided with an identity asDi∈{1,...,n}.

    · Aggregation points are also provided for some device set,which are also given with identities.

    · The base station broadcasts a distinctive key-pair for all devices with similarApto produce HMAC for data security.

    4.2 Data Encryption with HE

    4.2.1 Process of Data Split

    Let it be in two months, answered Don Giovanni, for the time was nearly up that the devil had fixed13, and he wanted a whole month to himself to wash off the dirt of the past three years

    For enhancing the security process, the data split method is used here and the divided data are switched in pair-wise process.Here, it is taken that theApis connected with multiple devices, which are termed as,Di= {1,...,n}.For specific timestamp, the end devices in edge computing receive dataM={m1,m2,...,mn},respectively.The initial phase,each device‘D’,‘M’splits the acquired data into‘n’number of sections as,Sij(i∈1,2,...,n),(j∈1,2,...,n)considerably,in which‘n’points the number of devices presented in the network.The equation for data split is given as Eq.(1),

    Following the data split operation,the sections are interchanged with themselves.The section,‘S11’is protected by the device‘D1’,where the other devices are in effective distribution.Based on the device,D1is transmitting(n-1)sections of data,whereSij(ji)to others.Next to the process of swapping,the encryption process is performed,where the model HE derives fast encryption and decryption.The algorithm works on the basis of probabilistic asymmetric method for securing the scalar parameter of shared data.The process of key generation is demonstrated below.

    i.Key Generation Process

    1.Two random numbers ‘a(chǎn)’and ‘b’are selected, which are mutually independent and provides that is mathematically indicated in Eq.(2).

    It is assumed that the numbers are with equal length.

    2.Computen-abandβ=1,which is the parameter constant,for(x-1,y-1).

    3.Random integer‘L’is selected,whereL∈

    In which,functionFis given as,F(A)=(a-1)/n

    5.Here,the public key is derived as,(n,L)

    6.And,private key is stated as,(β,?)

    ii.Process of Encryption

    The obtained dataDi, in which 0 ≤Di≤n, a random number ‘v’is selected, that relies in between(0,n).The encrypted text(ET)is derived as Eq.(4),

    iii.Process of Decryption

    The‘ET’is decrypted using Eq.(5).

    4.2.2 HMAC Operations in the Proposed Model

    In this model, HMAC is produced for the ‘ET’, which effectively controls the impacts of node capture attacks and compromised node attacks in edge computing.Here, the HMAC for ET is generated with the identical keys that are used in theAps.The pseudocode for HMAC generation is given below;

    Algorithm 1: Process of HMAC Generation for ET 1.Begin 2.Network Setup Initialization//Key Generation:Select p1 and p2 ∈Z*n2,then P=p1,p2//HMAC Generation,Do Derive U ←F(p1)∈Z*n2 V ←G(p2(ID,i)))∈Z*n2 HMACET ←(U.V)+S)∈Z*n2 Call Data-Aggregation()Call homomorphic security()End

    4.2.3 Operations in Aggregation Point

    The data aggregation process is performed in secure manner and the process is explained below,which is run when the pseudocode calls Data-Aggregation().Moreover,the additive operations are performed as given as follows,

    The final results(FD)are derived using Eq.(7),

    The private keys are used for device-to-device communications that are to be updated frequently.In addition,the hashing operations are performed for one instant pad with the assumption that the initial private-key is taken as,‘q1’and the set ends with‘qn’for‘n’number of devices.

    The resultant data obtained for each device is portrayed in Tab.1 where,di(i∈(1,2,...,n))are the shared data to the edge devicesDi(i∈(1,2,...,n)).The respective encrypted data isdi0(i∈(1,2,...,n)).In this way, the real time data are acquired by end devices from the edge computing, which are by secured data storage and transmission between the servers.The data aggregation converts theHence, the data cannot be disclosed or accessed atApand the real shared data are more secure.

    Table 1: Results of secure data aggregation process

    When the edge devices share the obtained data,the real data is encrypted with the above operations and the Homomorphic_security()is executed at the upper layer for securing the keys from unknown access.The encrypted datadi0(i∈(1,2,...,n))is concealed with the public key of the cloud server before it is shared,which is given as Eq.(9),

    The hash rate is produced by each device with their unique identities(ID),time-stamp and ET.Here,the hash rate is given as,HS(ID‖tp‖ETi),and it helpsApto verify that the shared private data of the users are confidential and not accessed by anywhere between the transmission process.

    5 Results and Discussions

    The proposed model is simulated utilizing Network Simulator NS2 device.The results and discussions are presented in this section.Furthermore,the proposed model is accessed the evaluation metrics such as rate of model security,packet delivery rate,transmission delay,packet drop,communication overhead.For evidencing the model efficiency,the results are compared with Support Vector Machine for attack detection and IoT-Intrusion Detection Model(IDM).The initial parameter setting for the simulation tool is provided in the Tab.2.

    Table 2: Initial simulation settings

    The significant factor for determining the performance of the proposed model is the communication complexity.During the process of data accumulation,there are some possibilities for attackers to access the data, and the communication complexity is measured asO(d*y), where, d represents devices and y indicates number of third-party attackers possibly to attack the communication,which is to be less in an efficient model for communication.The evaluation results based on the factor called communication complexity is given in Fig.5.It is obvious from the results that the proposed model produces minimal complexity than other,since the risks of attacks are minimal in the model with the effectively defined trust model.

    Figure 5:Communication overhead-comparisons

    The Packet Delivery Ratio (PDR) is derived with respect to the simulation time and the results are portrayed in Fig.6.The proposed model achieves 84.25% of PDR in average, which is higher compared to other models such as SVM and IoT-IDM.The data packets are securely transmitted between entities in the proposed model.

    Figure 6:Packet delivery ratio vs.simulation time

    The transmission delay occurs in a communication model for various reasons and the major issue is the troubles caused by the attackers.In the proposed model,the security of data is effectively handled with the trust model and the homomorphic encryption based security implementations, the overall transmission delay is effectively reduced in the proposed model and the evidences are provided in the graph in Fig.7.Another factor,packer drop also should be minimal in efficient edge computing model.The evaluations are carried out against the simulation time and the results are depicted in Fig.8.It is shown that the proposed model achieves minimal packet drop than the comparative models.

    Figure 7:Transmission delay vs.packet size

    Figure 8:Packet drop vs.simulation time

    As mentioned earlier,the main motivation of the proposed model is to be derived an efficient data security mechanism for shared data between entities in edge computing.Hence, the security rate of the proposed model is evaluated against a particular attack called compromised node attack and the results are given in Fig.9.When the compromised attacks are happened in the proposed work, the model effectively detects the attack and showed that there is the attack possibility with minimal rate of security than others.The evaluations are performed against the simulation time.

    Figure 9:Security rate analysis

    6 Conclusion and Future Work

    This paper presented a secure communication model in edge computing called Trust Model for Secure Data Sharing (TM-SDS) with homomorphic encryption based Techniques.The model used Homomorphic Encryption and the cross verification is implemented with trust model.Moreover,the security of the shared data is provided with local and global trust levels to be considered with the centralized processing of cloud and conserving resources in efficient manner.HMAC is also utilized for enhancing the rate of data security at the aggregator point in the process of data transmission.The outcomes are assessed based on significant factors such as packet drop, model efficiency and PDR.The comparative analysis showed that the proposed model obtained better results and outperforms the results of the existing works with the effective integration of cryptography and trust model.In future,the proposed work is enhanced by deriving novel mechanisms for integrity verification and seamless communication between entities.In addition, the proposed work is also improved by implementing and evaluating in a real-time environment.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    性少妇av在线| 精品国产超薄肉色丝袜足j| 国产亚洲精品第一综合不卡| 欧美日韩中文字幕国产精品一区二区三区 | 国产一区二区三区综合在线观看| 午夜福利在线观看吧| 操美女的视频在线观看| 亚洲中文日韩欧美视频| 精品一区二区三区视频在线观看免费 | 亚洲国产欧美在线一区| 一本久久精品| 午夜视频精品福利| 亚洲精品一二三| 在线看a的网站| 操美女的视频在线观看| 亚洲专区字幕在线| 国产在线一区二区三区精| 国产精品二区激情视频| 亚洲天堂av无毛| 正在播放国产对白刺激| 日韩一区二区三区影片| 日韩欧美一区视频在线观看| 一级片免费观看大全| 首页视频小说图片口味搜索| 欧美人与性动交α欧美软件| 巨乳人妻的诱惑在线观看| 亚洲av电影在线进入| 亚洲天堂av无毛| 久久影院123| 成年版毛片免费区| 国产又色又爽无遮挡免费看| 亚洲黑人精品在线| 免费av中文字幕在线| 欧美性长视频在线观看| 国产xxxxx性猛交| 99精国产麻豆久久婷婷| 国产精品秋霞免费鲁丝片| 一级毛片女人18水好多| 日韩免费av在线播放| 99精品欧美一区二区三区四区| 国产精品 国内视频| 欧美一级毛片孕妇| 不卡av一区二区三区| 国产国语露脸激情在线看| 欧美精品av麻豆av| 久久久久久免费高清国产稀缺| 80岁老熟妇乱子伦牲交| 十八禁人妻一区二区| 男女高潮啪啪啪动态图| 国产精品1区2区在线观看. | 性高湖久久久久久久久免费观看| 热99re8久久精品国产| 国产激情久久老熟女| 黑人欧美特级aaaaaa片| 亚洲中文字幕日韩| 国产不卡av网站在线观看| 国产一区二区三区综合在线观看| 1024视频免费在线观看| 国产精品久久电影中文字幕 | 99精品在免费线老司机午夜| 欧美+亚洲+日韩+国产| 老汉色av国产亚洲站长工具| 久久久国产成人免费| 两个人看的免费小视频| 欧美成人午夜精品| 一二三四社区在线视频社区8| 18在线观看网站| 久久ye,这里只有精品| av免费在线观看网站| avwww免费| 纵有疾风起免费观看全集完整版| 久久久精品94久久精品| 妹子高潮喷水视频| 亚洲中文av在线| 午夜精品久久久久久毛片777| 青青草视频在线视频观看| 亚洲欧美激情在线| 黄色视频不卡| 亚洲成a人片在线一区二区| 色综合婷婷激情| 亚洲av成人不卡在线观看播放网| 考比视频在线观看| 国产午夜精品久久久久久| 丝袜美足系列| 成人永久免费在线观看视频 | av网站免费在线观看视频| 热99re8久久精品国产| 人人澡人人妻人| 黄色成人免费大全| 久久狼人影院| 99精国产麻豆久久婷婷| 热99re8久久精品国产| 桃花免费在线播放| 啦啦啦在线免费观看视频4| 精品国产亚洲在线| 国产日韩欧美亚洲二区| 美女高潮喷水抽搐中文字幕| 免费观看人在逋| 亚洲精华国产精华精| 国产成人免费观看mmmm| 制服人妻中文乱码| 757午夜福利合集在线观看| 好男人电影高清在线观看| 国产欧美日韩一区二区三| 欧美激情极品国产一区二区三区| 欧美在线一区亚洲| 精品一区二区三区四区五区乱码| 欧美久久黑人一区二区| 99国产精品99久久久久| 亚洲欧美精品综合一区二区三区| 每晚都被弄得嗷嗷叫到高潮| 波多野结衣av一区二区av| 1024香蕉在线观看| 色94色欧美一区二区| 一级,二级,三级黄色视频| 免费在线观看黄色视频的| 成人国语在线视频| 91大片在线观看| 女人爽到高潮嗷嗷叫在线视频| 黄色视频在线播放观看不卡| 欧美日韩黄片免| 国产午夜精品久久久久久| 国产精品秋霞免费鲁丝片| 午夜福利影视在线免费观看| 国产精品久久久av美女十八| 久久久久国内视频| 国产1区2区3区精品| 欧美日韩亚洲高清精品| 51午夜福利影视在线观看| 国产成人啪精品午夜网站| 一级a爱视频在线免费观看| 蜜桃在线观看..| 国产色视频综合| 亚洲精品久久午夜乱码| 国产深夜福利视频在线观看| cao死你这个sao货| 精品国产乱子伦一区二区三区| 每晚都被弄得嗷嗷叫到高潮| 51午夜福利影视在线观看| 夫妻午夜视频| 在线亚洲精品国产二区图片欧美| 性色av乱码一区二区三区2| 国产男女内射视频| 国产成人欧美| 亚洲av日韩在线播放| 极品少妇高潮喷水抽搐| 国产一卡二卡三卡精品| 国产国语露脸激情在线看| 香蕉久久夜色| 亚洲视频免费观看视频| 亚洲伊人久久精品综合| 国产精品免费视频内射| 人人妻人人澡人人爽人人夜夜| 桃花免费在线播放| 亚洲成人免费电影在线观看| 色94色欧美一区二区| 亚洲第一欧美日韩一区二区三区 | 国产精品九九99| e午夜精品久久久久久久| 欧美日韩国产mv在线观看视频| 国产成人系列免费观看| av超薄肉色丝袜交足视频| 久久午夜综合久久蜜桃| 97在线人人人人妻| 欧美亚洲 丝袜 人妻 在线| 国产精品电影一区二区三区 | 欧美在线一区亚洲| 精品一区二区三区av网在线观看 | 久久精品成人免费网站| 美女福利国产在线| 两个人免费观看高清视频| 在线观看免费日韩欧美大片| 王馨瑶露胸无遮挡在线观看| 搡老岳熟女国产| 国产成人影院久久av| 黄色怎么调成土黄色| av线在线观看网站| 老鸭窝网址在线观看| 国产精品一区二区免费欧美| 亚洲美女黄片视频| 国产精品偷伦视频观看了| 亚洲成人手机| 久久毛片免费看一区二区三区| 美女主播在线视频| 国产精品一区二区精品视频观看| 国产男女超爽视频在线观看| 丰满迷人的少妇在线观看| 亚洲专区中文字幕在线| 国产精品久久久久久人妻精品电影 | 亚洲av成人不卡在线观看播放网| 欧美精品一区二区大全| 99国产精品99久久久久| 久久毛片免费看一区二区三区| av福利片在线| 又紧又爽又黄一区二区| 久久久国产精品麻豆| av又黄又爽大尺度在线免费看| 亚洲三区欧美一区| 天堂中文最新版在线下载| 伦理电影免费视频| 无遮挡黄片免费观看| a在线观看视频网站| 中文字幕高清在线视频| 欧美黄色片欧美黄色片| 欧美一级毛片孕妇| 伊人久久大香线蕉亚洲五| 男女免费视频国产| 一区二区三区国产精品乱码| 欧美午夜高清在线| 精品久久蜜臀av无| 丝瓜视频免费看黄片| 亚洲七黄色美女视频| 最近最新中文字幕大全电影3 | 国产xxxxx性猛交| 久久午夜亚洲精品久久| 美国免费a级毛片| 国产欧美日韩一区二区三| 日本wwww免费看| 欧美日韩精品网址| 黑丝袜美女国产一区| 在线播放国产精品三级| 91成人精品电影| 国产黄色免费在线视频| 丝袜美足系列| 十八禁网站免费在线| 精品欧美一区二区三区在线| 久久人人97超碰香蕉20202| av网站免费在线观看视频| 国产精品电影一区二区三区 | 男女下面插进去视频免费观看| 亚洲欧美日韩高清在线视频 | 成人18禁高潮啪啪吃奶动态图| 大型黄色视频在线免费观看| 最新的欧美精品一区二区| 美女福利国产在线| 天堂动漫精品| 男女高潮啪啪啪动态图| 天天影视国产精品| 午夜老司机福利片| av免费在线观看网站| 一个人免费在线观看的高清视频| 天堂8中文在线网| 在线观看一区二区三区激情| 国产麻豆69| 一边摸一边做爽爽视频免费| 精品免费久久久久久久清纯 | 老汉色∧v一级毛片| 51午夜福利影视在线观看| 亚洲精品久久午夜乱码| 一区二区日韩欧美中文字幕| 日韩大片免费观看网站| 午夜精品国产一区二区电影| 超色免费av| 女人爽到高潮嗷嗷叫在线视频| 国产伦理片在线播放av一区| 美女扒开内裤让男人捅视频| 国产亚洲精品第一综合不卡| 麻豆国产av国片精品| 手机成人av网站| 久久天堂一区二区三区四区| 日本av免费视频播放| 国产精品熟女久久久久浪| 岛国毛片在线播放| 欧美久久黑人一区二区| 他把我摸到了高潮在线观看 | 国产免费av片在线观看野外av| 亚洲人成伊人成综合网2020| 免费在线观看影片大全网站| 国产精品偷伦视频观看了| 免费日韩欧美在线观看| 欧美激情极品国产一区二区三区| 91老司机精品| 国产精品国产av在线观看| 99久久精品国产亚洲精品| 超碰97精品在线观看| 亚洲av日韩在线播放| 午夜福利视频精品| 岛国毛片在线播放| videos熟女内射| 这个男人来自地球电影免费观看| 亚洲va日本ⅴa欧美va伊人久久| 欧美日本中文国产一区发布| 天堂8中文在线网| h视频一区二区三区| 日韩一卡2卡3卡4卡2021年| 丰满人妻熟妇乱又伦精品不卡| 亚洲精品乱久久久久久| 久久久久久久国产电影| 国产av又大| 9热在线视频观看99| 国产av精品麻豆| 国产成人啪精品午夜网站| 精品少妇一区二区三区视频日本电影| 纵有疾风起免费观看全集完整版| 女人爽到高潮嗷嗷叫在线视频| 国产一区二区三区综合在线观看| www.熟女人妻精品国产| 每晚都被弄得嗷嗷叫到高潮| 电影成人av| 丰满少妇做爰视频| 国产欧美日韩一区二区三| 美女主播在线视频| 欧美成人午夜精品| 这个男人来自地球电影免费观看| 黄色成人免费大全| 一级片免费观看大全| 高清欧美精品videossex| 视频区欧美日本亚洲| 久久久久久久久免费视频了| 国产伦理片在线播放av一区| 高清在线国产一区| av欧美777| 18禁裸乳无遮挡动漫免费视频| 亚洲美女黄片视频| 精品免费久久久久久久清纯 | 99精品久久久久人妻精品| 777久久人妻少妇嫩草av网站| 亚洲精品粉嫩美女一区| 50天的宝宝边吃奶边哭怎么回事| 午夜福利乱码中文字幕| 国产激情久久老熟女| 国产成人系列免费观看| 亚洲精品乱久久久久久| 波多野结衣av一区二区av| 国产成人一区二区三区免费视频网站| 男人舔女人的私密视频| 成年人黄色毛片网站| 亚洲五月色婷婷综合| 亚洲七黄色美女视频| 久久精品国产综合久久久| 久久久久精品人妻al黑| 亚洲 欧美一区二区三区| 亚洲精品一二三| 久久久国产一区二区| 极品少妇高潮喷水抽搐| 国产精品秋霞免费鲁丝片| 成人av一区二区三区在线看| 免费观看a级毛片全部| 国产精品亚洲一级av第二区| 交换朋友夫妻互换小说| 欧美日韩av久久| 免费女性裸体啪啪无遮挡网站| 热re99久久国产66热| 成年人免费黄色播放视频| 最近最新中文字幕大全电影3 | 1024香蕉在线观看| 亚洲欧洲精品一区二区精品久久久| 日韩精品免费视频一区二区三区| 人妻久久中文字幕网| 国产亚洲精品第一综合不卡| 首页视频小说图片口味搜索| 亚洲国产毛片av蜜桃av| 久久久久视频综合| 99re在线观看精品视频| 国产男女内射视频| 午夜福利一区二区在线看| www.精华液| 美女午夜性视频免费| 首页视频小说图片口味搜索| 丁香欧美五月| 人妻久久中文字幕网| 丁香欧美五月| 高清av免费在线| 日韩视频在线欧美| 国产成人啪精品午夜网站| 国产不卡一卡二| 欧美成人免费av一区二区三区 | 久久天堂一区二区三区四区| 最新美女视频免费是黄的| 国产av一区二区精品久久| 国产激情久久老熟女| 久久狼人影院| 黑人猛操日本美女一级片| 在线观看免费视频网站a站| 亚洲avbb在线观看| 久久毛片免费看一区二区三区| svipshipincom国产片| 久久狼人影院| 久久久精品94久久精品| 久久久欧美国产精品| 国产精品美女特级片免费视频播放器 | 三上悠亚av全集在线观看| 久久午夜亚洲精品久久| 成人av一区二区三区在线看| 热99re8久久精品国产| 国产欧美日韩一区二区三区在线| 久久这里只有精品19| 亚洲av成人不卡在线观看播放网| 操美女的视频在线观看| 在线观看一区二区三区激情| 国产精品免费大片| 久久天堂一区二区三区四区| 91老司机精品| 亚洲中文av在线| 久久99热这里只频精品6学生| 国产精品二区激情视频| 丁香六月欧美| 久久国产精品大桥未久av| 9191精品国产免费久久| 久久中文字幕一级| 久久久久网色| 一边摸一边抽搐一进一小说 | 日韩精品免费视频一区二区三区| 黄色丝袜av网址大全| kizo精华| 久久青草综合色| 亚洲精品国产精品久久久不卡| 高潮久久久久久久久久久不卡| 日本黄色日本黄色录像| 91精品国产国语对白视频| 人人妻人人澡人人爽人人夜夜| netflix在线观看网站| 国产男女超爽视频在线观看| 欧美性长视频在线观看| 色精品久久人妻99蜜桃| 国产视频一区二区在线看| 91国产中文字幕| 亚洲精品国产区一区二| 三级毛片av免费| 乱人伦中国视频| 日韩一卡2卡3卡4卡2021年| 91成人精品电影| 久久久久国产一级毛片高清牌| 男女无遮挡免费网站观看| 亚洲avbb在线观看| 久久中文看片网| 黄色怎么调成土黄色| 亚洲中文av在线| 欧美日韩国产mv在线观看视频| 国产亚洲精品久久久久5区| 757午夜福利合集在线观看| 老鸭窝网址在线观看| av免费在线观看网站| 免费人妻精品一区二区三区视频| 女人被躁到高潮嗷嗷叫费观| 菩萨蛮人人尽说江南好唐韦庄| 丝袜喷水一区| www.熟女人妻精品国产| 国产欧美日韩精品亚洲av| 亚洲 欧美一区二区三区| 国产成人精品在线电影| 一夜夜www| 精品国产国语对白av| 中文字幕人妻丝袜制服| 成年版毛片免费区| 成人手机av| 狠狠精品人妻久久久久久综合| 老司机午夜十八禁免费视频| 精品亚洲成国产av| 国产男女内射视频| 美女高潮喷水抽搐中文字幕| 少妇猛男粗大的猛烈进出视频| 俄罗斯特黄特色一大片| 老司机在亚洲福利影院| 亚洲五月婷婷丁香| 丝瓜视频免费看黄片| 一本—道久久a久久精品蜜桃钙片| 国产又爽黄色视频| www.精华液| 一本一本久久a久久精品综合妖精| 在线av久久热| 亚洲av成人不卡在线观看播放网| 精品午夜福利视频在线观看一区 | 男人操女人黄网站| 99久久人妻综合| 欧美一级毛片孕妇| 黄片小视频在线播放| 久久 成人 亚洲| 91av网站免费观看| 精品少妇一区二区三区视频日本电影| 中文字幕人妻熟女乱码| 91成人精品电影| 午夜成年电影在线免费观看| 午夜福利,免费看| 黄色毛片三级朝国网站| 黄频高清免费视频| 亚洲中文字幕日韩| 国产麻豆69| 精品国产一区二区三区四区第35| 中文字幕最新亚洲高清| 亚洲中文av在线| 不卡av一区二区三区| 亚洲av国产av综合av卡| 欧美日韩亚洲高清精品| 精品久久蜜臀av无| 欧美黄色片欧美黄色片| 国产成人精品久久二区二区免费| 男女下面插进去视频免费观看| 国产日韩欧美视频二区| 日本wwww免费看| 国产不卡一卡二| 国产在线精品亚洲第一网站| 午夜福利免费观看在线| 亚洲一区中文字幕在线| 中文欧美无线码| www.自偷自拍.com| 午夜激情久久久久久久| www.999成人在线观看| 在线观看舔阴道视频| 大型av网站在线播放| 热re99久久精品国产66热6| 老司机午夜十八禁免费视频| 考比视频在线观看| 久久国产亚洲av麻豆专区| 51午夜福利影视在线观看| 日韩一区二区三区影片| 精品久久久久久电影网| 国产主播在线观看一区二区| 窝窝影院91人妻| 久久人妻熟女aⅴ| 亚洲中文字幕日韩| av片东京热男人的天堂| kizo精华| 欧美日韩国产mv在线观看视频| 老鸭窝网址在线观看| 久久久久久久大尺度免费视频| 在线av久久热| 欧美黄色片欧美黄色片| av电影中文网址| 欧美在线一区亚洲| 成人av一区二区三区在线看| 777米奇影视久久| 美女高潮喷水抽搐中文字幕| 日韩免费高清中文字幕av| 久久精品成人免费网站| 久久精品国产a三级三级三级| 国产成人啪精品午夜网站| 啦啦啦 在线观看视频| 老司机亚洲免费影院| 制服诱惑二区| 亚洲第一av免费看| 看免费av毛片| 亚洲欧美一区二区三区黑人| 国产精品久久久久久精品古装| 国产97色在线日韩免费| 9热在线视频观看99| 国产黄色免费在线视频| 久久久久久久大尺度免费视频| 精品午夜福利视频在线观看一区 | 国产精品秋霞免费鲁丝片| 女人高潮潮喷娇喘18禁视频| 一本色道久久久久久精品综合| 丝袜喷水一区| 国产精品免费大片| 蜜桃在线观看..| 精品一区二区三区av网在线观看 | 午夜老司机福利片| videos熟女内射| 精品午夜福利视频在线观看一区 | 汤姆久久久久久久影院中文字幕| 精品一区二区三区视频在线观看免费 | 欧美日韩亚洲国产一区二区在线观看 | 窝窝影院91人妻| 午夜福利免费观看在线| 成人永久免费在线观看视频 | 色综合婷婷激情| 欧美日韩亚洲综合一区二区三区_| 亚洲自偷自拍图片 自拍| 国产免费福利视频在线观看| 九色亚洲精品在线播放| 一区二区三区精品91| 国产成人欧美| 老司机午夜十八禁免费视频| 巨乳人妻的诱惑在线观看| av一本久久久久| 99re6热这里在线精品视频| 国产1区2区3区精品| 香蕉丝袜av| 777久久人妻少妇嫩草av网站| 免费人妻精品一区二区三区视频| 老熟妇仑乱视频hdxx| 亚洲成a人片在线一区二区| 99re在线观看精品视频| 久久人妻av系列| 亚洲欧美一区二区三区黑人| 三上悠亚av全集在线观看| 多毛熟女@视频| 国产精品自产拍在线观看55亚洲 | 99国产精品免费福利视频| 久久久久网色| 精品国产一区二区久久| 久久天堂一区二区三区四区| 又黄又粗又硬又大视频| 69精品国产乱码久久久| av欧美777| netflix在线观看网站| 中文欧美无线码| 成年动漫av网址| 大片免费播放器 马上看| 久久久久国内视频| 亚洲国产毛片av蜜桃av| 黄色毛片三级朝国网站| 这个男人来自地球电影免费观看| 丝袜喷水一区| 久久 成人 亚洲| 99riav亚洲国产免费| 免费黄频网站在线观看国产| 亚洲色图综合在线观看| 亚洲一区二区三区欧美精品| 免费看a级黄色片| 一级毛片女人18水好多| 亚洲精华国产精华精| 久久久国产欧美日韩av| 国精品久久久久久国模美| 久久精品成人免费网站| 国产成人系列免费观看| 99国产精品99久久久久| 大香蕉久久成人网| 精品一区二区三卡| 亚洲午夜理论影院| 男人操女人黄网站| 国产精品久久久人人做人人爽| 中文字幕精品免费在线观看视频| 欧美日韩福利视频一区二区| kizo精华|