• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Building a Trust Model for Secure Data Sharing(TM-SDS)in Edge Computing Using HMAC Techniques

    2022-08-23 02:15:02KarthikeyanandMadhavan
    Computers Materials&Continua 2022年6期

    K.Karthikeyanand P.Madhavan

    School of Computing,SRM Institute of Technology,Kattankulathur,Chennai,603203,India

    Abstract:With the rapid growth of Internet of Things(IoT)based models,and the lack amount of data makes cloud computing resources insufficient.Hence,edge computing-based techniques are becoming more popular in present research domains that makes data storage, and processing effective at the network edges.There are several advanced features like parallel processing and data perception are available in edge computing.Still, there are some challenges in providing privacy and data security over networks.To solve the security issues in Edge Computing,Hash-based Message Authentication Code(HMAC)algorithm is used to provide solutions for preserving data from various attacks that happens with the distributed network nature.This paper proposed a Trust Model for Secure Data Sharing (TM-SDS) with HMAC algorithm.Here,data security is ensured with local and global trust levels with the centralized processing of cloud and by conserving resources effectively.Further,the proposed model achieved 84.25%of packet delivery ratio which is better compared to existing models in the resulting phase.The data packets are securely transmitted between entities in the proposed model and results showed that proposed TM-SDS model outperforms the existing models in an efficient manner.

    Keywords: Secure data sharing; edge computing; global trust levels; parallel processing

    1 Introduction

    Internet of Things(IoT)is the recent advancement in communication,in which data is the valuable resource,providing several intelligent services to the people[1].However,the IoT data contain private data and can disclose the user identities,if it is not efficiently secured[2].For instance,the malicious user can utilize the user’s private data like date of birth,bank details and so on.The authorized person identification is considered that influences the adverse effects, when there are responsible for user actions.So,an effective privacy preserving models and protocols are necessary in edge computing.In recent times, edge computing is a distributed computation model with many trust models in which the coexistence of multiple operational entities,authentication models require the attribute validation for every unit in single trust model [3,4].Hence, the entities are mutually authenticated each other with varied secure models.For some resource-limited entities, it is unfeasible to store or process big data or to run a highly complex trust model.Edge computing model comprises big data processing,parallel computation aspects,distributed data transmission processing,location-aware,mobility and dynamicity,and so on.The conventional privacy and security models in edge computing are ineffective for securing the massive data processing[5].Specifically,secure data processing and privacy preserving problems are effectively important.Major concerns that are faced in edge computing related to data security and privacy-preserving issues are lightweight and fine-grained, distributed access control,limited resources and efficient privacy preservation.

    The above-stated data security and privacy preserving issues of edge computing model are stimulated to develop a security model in edge computing.The edge computing model can solve the problems that are related with the centralized system by approaching data pipeline operations over the edge of models with resource accessibility and application needs[6,7].Moreover,the framework deployment is more advanced in developing model with content providers,network entity,and third party element.Thereby, it is essential to enhance the end-user experience, because of the energy computing strategies[8–10].Nevertheless,edge computing cannot secure the user data privacy,since new set of attacks with multiple attack models are associated with the heterogeneity of element resources, network measurement and user accessibility [11,12].So, a Trust Model for Secure Data Sharing(TM-SDS)with HMAC algorithm is proposed in this research paper.The technology utilizes data blocks that are connected with one another with a cryptographic hash key[13,14].However,the Homomorphic Encryption incorporating in edge computing is a challenging process,because of the resource constraints and the scalability problems.The contributions of the proposed model are listed below,

    · Developing enhanced privacy with efficient HMAC Algorithm.

    · Local and global trust levels are developed with the centralized processing of cloud and conserving resources effectively.

    · For data and communication security,HMAC algorithm is used with hashing concept.

    · Providing compatibility with the efficient trust chain process that makes effective decision making without depending on the central admin of each node.

    · Interoperability between the trust blocks for efficient data security over communication.

    · Evaluation of results based on factors such as processing delay,rate of security,packet delivery ratio,communication overhead and packet drop.

    The structure of this paper is organized as follows: Section 2 provides the concepts of security management in edge computing that are applied for data security so far.Section 3 presents the preliminaries that support the proposed idea.Section 4 discussed the working procedure of the proposed Trust Model.The results and evaluations are presented in Section 5 for evidencing the model efficiency.Finally,Section 6 concludes the paper with some motivations for enhancement.

    2 Related Works

    Each merchant in IoT based communications are used for developing smart entities based on requirements that acts effectively in dynamic platforms [15].In addition, the framed data are to be secured in such a way that no one can access or misuse data.A valuable review work that described the security issues in several computation platforms.Tao et al.[16] developed a new multi-layered cloud architectural framework in which the services are given with the IoT based smart devices.Additionally,an ontology-based knowledge representation model has been presented in this literature.Lee et al.[17]used semantic web rule language for an effective interoperability of heterogeneous devices.

    An Intrusion Detection model(IDM)is developed based on SDN framework by Nobakht et al.[18].The developed model is used to solve the issues of host-based attack.In addition,the communicational,and computational overhead is significantly reduced by designing the traffic flow based on the target nodes.In this literature,IoT-IDM involved in monitoring the attack-based network activities,and tried to derive the attributes based on data flow of networks.The machine learning techniques are used for the classification of malicious traffics accurately.Gheisari et al.[19] and Madhavan et al.[20] implemented Support Vector Machine (SVM) technique with homomorphic encryption and friendly algorithm to detect the normal and abnormal node activities.The classification operations are performed based on the selected features of the attacks.Mohammadi et al.[21]and Mamolar et al.[22]has tried to resolve the attacks with defined traffic protocols with proper switching and hubs.

    Yu et al.[23] has presented a four image encryption algorithm based on chaos and computer generated hologram and quaternion Fresnel transform technique.The developed algorithm improved the security and weaken the correlation, where the extensive experiment showed the effectiveness of four image encryption algorithm.Esposito et al.[24]developed a novel model to authorize and find the policies by leveraging on the block-chain technology for holding a global view of the security policies with-in the system.Further,Li et al.[25]implemented a new algorithm based on synergetic neural networks.Firstly, the developed algorithm embeds the gray watermark signals into discrete cosine transform components.Additionally,the companion algorithm along with co-operative neural network is used for the extraction of watermark.Lastly,the suspected watermark signal is considered as the input,and the output image is considered as the outcome of recognition mechanism.

    Stergiou et al.[26] developed an innovative architecture that operates in a wireless mobile 6G network to manage big data on smart buildings.Al-Qerem et al.[27]developed a new variant optimistic con-currency control protocol that decreases the computation, and communication at the cloud.Hence, the developed protocol supports transactional and scalability of the services.The author analyzed the validation process under three con-currency protocols based on the numerical studies.The validation results represent that the developed protocol is more beneficial for the IoT users.Tewari et al.[28] developed a new ultra-light weighted mutual authentication protocol that utilizes bit-wise operations.This protocol is effective by means of communication cost,and storage.Zheng,et al.[29]implemented a light-weighted authenticated encryption approach on the basis of discrete chaotic s box coupled map lattice that superiorly improves the security in IoT environment.Further,Yu et al.[30]developed a new single bit public key encryption approach on the basis of learning parity with noise for an effective encryption.The extensive experiment showed that the developed approach achieved better plaintext attack security.

    Gupta et al.[31] developed an attribute based searchable encryption algorithm that provides better flexibility and usability by means of effective search.The developed attribute based searchable encryption algorithm delivers better performance in medical field by preserving privacy of the health data by keeping the data in an encryption form.Tewari et al.[32]performed a mutual authentication process between server and the IoT devices on the basis of elliptic curve cryptography that provides better solution by means of attack resistance and communication over-head.Further,Alsmirat et al.[33] determines the optimal ratio of the finger-print image compression to improve the recognition accuracy of finger-print identification system.In this study,the experiment was performed on large in house dataset and the obtained results showed that the developed approach accurately determines the compression ratio.

    The major drawback noticed in the existing works is that the feature selection has been carried out with the static mode.Then,the malicious activities that are not detected in dynamic process,and also the existing models can secure only the target host and not the complete network.To address these issues,a new model is proposed in this research paper.

    3 Preliminaries

    This section describes the background research about the trust model.In this paper,the concepts of Homomorphic Encryption technique are incorporated to resolve the security issues and efficient resource utilization in Edge Computing.The basic edge computing model is depicted in Fig.1.

    Figure 1:General edge computing framework

    The Trust model estimates the security strength and computes the trust esteem value.A trust esteem value comprises of various parameters along with the security of edge computing.The sub parameters and functions also be evaluated in the Trust model[34,35].Fig.2 measure the conceptual view of the trust model with their parameter,sub parameter and functions[36].

    In Fig.2,‘A’addresses the Identity Management(IDM),which is the vital components of security frameworks in the cloud, where the cycle analyzed the sign strength with in it.The authentication process represented as ‘B’that increase the end user security access at the time of the login and verification process.The verified end user is determined by the strength of the authentication, and it is processed by the segments of trust models.The authorization process represented as ‘C’, which is measured by authorization strength.The cloud computing provides the authorization services by the various model using Access Control Strength (ACL) and all the activities need authorization permission in this stage.

    Figure 2:Conceptual view of trust model

    The data protection,confidentiality,communication,isolation and virtualization security process are represented from‘D’to‘I’,where the trust model security covers all aspects of parameters[37].The above boundaries are estimated independently and it is joined to calculate the distributed computing strength and application.

    4 Proposed Model

    In this section,the novel techniques for privacy preserving and utilization of effective computational resources are presented with the proposed model named Trust Model for Secure Data Sharing(TM-SDS) that includes HMAC algorithm for security in edge computing.The proposed model provides enhanced scalability with the secure and distributed storage mechanism, where the high security is achieved with the homomorphic encryption and HMAC algorithm with the trusted model.This process makes the distributed decision making effective without relying on the central admin,who has the control over each node in the network.Furthermore, the interoperability among the multiple blocks is effectively managed.Additionally,the local and the global trust levels are designed for efficient resource usage,which is graphically presented in Fig.3.

    Figure 3:Overall design of the proposed TM-SDS model

    In this research paper, the proposed trust model is implemented with the trust service levels called global and local trust levels.The home or the industrial routers are defined as the trust agent.Based on the demands of security platform,trust services are employed in both the local trust levels.Moreover,in this framework,the homomorphic encryption based trust model technology is enabled for communicating with each other without the requirement of central admin in the pattern of peerto-peer model.Additionally,the distributive characteristic of edge computing makes both parallel and serial levels based on the application requirements.For computing the authority,there are several trust ranges are defined based on entities,data trust,and user privacy related trust.

    Further, the proposed work comprises of three phases such as, (i) initialization phase, (ii) data encryption with homomorphic encryption,and(iii)secure data processing with HMAC.The functions performed in each phase are clearly depicted in Fig.4, which is executed in bottom-up manner,comprises lower,middle and upper layers.

    Figure 4:Layers and function in proposed TM-SDS model

    4.1 Initialization Phase

    In this phase,initial setups are processed by preparing the networks based on security demands.The system comprises of edge devices and aggregation point(Ap)for receiving the collected data from edge devices.The data are secured before sending toApfor data aggregation.Steps involved in the initialization phase are given as,

    · Each host of end device (D) in the edge computing network is provided with an identity asDi∈{1,...,n}.

    · Aggregation points are also provided for some device set,which are also given with identities.

    · The base station broadcasts a distinctive key-pair for all devices with similarApto produce HMAC for data security.

    4.2 Data Encryption with HE

    4.2.1 Process of Data Split

    Let it be in two months, answered Don Giovanni, for the time was nearly up that the devil had fixed13, and he wanted a whole month to himself to wash off the dirt of the past three years

    For enhancing the security process, the data split method is used here and the divided data are switched in pair-wise process.Here, it is taken that theApis connected with multiple devices, which are termed as,Di= {1,...,n}.For specific timestamp, the end devices in edge computing receive dataM={m1,m2,...,mn},respectively.The initial phase,each device‘D’,‘M’splits the acquired data into‘n’number of sections as,Sij(i∈1,2,...,n),(j∈1,2,...,n)considerably,in which‘n’points the number of devices presented in the network.The equation for data split is given as Eq.(1),

    Following the data split operation,the sections are interchanged with themselves.The section,‘S11’is protected by the device‘D1’,where the other devices are in effective distribution.Based on the device,D1is transmitting(n-1)sections of data,whereSij(ji)to others.Next to the process of swapping,the encryption process is performed,where the model HE derives fast encryption and decryption.The algorithm works on the basis of probabilistic asymmetric method for securing the scalar parameter of shared data.The process of key generation is demonstrated below.

    i.Key Generation Process

    1.Two random numbers ‘a(chǎn)’and ‘b’are selected, which are mutually independent and provides that is mathematically indicated in Eq.(2).

    It is assumed that the numbers are with equal length.

    2.Computen-abandβ=1,which is the parameter constant,for(x-1,y-1).

    3.Random integer‘L’is selected,whereL∈

    In which,functionFis given as,F(A)=(a-1)/n

    5.Here,the public key is derived as,(n,L)

    6.And,private key is stated as,(β,?)

    ii.Process of Encryption

    The obtained dataDi, in which 0 ≤Di≤n, a random number ‘v’is selected, that relies in between(0,n).The encrypted text(ET)is derived as Eq.(4),

    iii.Process of Decryption

    The‘ET’is decrypted using Eq.(5).

    4.2.2 HMAC Operations in the Proposed Model

    In this model, HMAC is produced for the ‘ET’, which effectively controls the impacts of node capture attacks and compromised node attacks in edge computing.Here, the HMAC for ET is generated with the identical keys that are used in theAps.The pseudocode for HMAC generation is given below;

    Algorithm 1: Process of HMAC Generation for ET 1.Begin 2.Network Setup Initialization//Key Generation:Select p1 and p2 ∈Z*n2,then P=p1,p2//HMAC Generation,Do Derive U ←F(p1)∈Z*n2 V ←G(p2(ID,i)))∈Z*n2 HMACET ←(U.V)+S)∈Z*n2 Call Data-Aggregation()Call homomorphic security()End

    4.2.3 Operations in Aggregation Point

    The data aggregation process is performed in secure manner and the process is explained below,which is run when the pseudocode calls Data-Aggregation().Moreover,the additive operations are performed as given as follows,

    The final results(FD)are derived using Eq.(7),

    The private keys are used for device-to-device communications that are to be updated frequently.In addition,the hashing operations are performed for one instant pad with the assumption that the initial private-key is taken as,‘q1’and the set ends with‘qn’for‘n’number of devices.

    The resultant data obtained for each device is portrayed in Tab.1 where,di(i∈(1,2,...,n))are the shared data to the edge devicesDi(i∈(1,2,...,n)).The respective encrypted data isdi0(i∈(1,2,...,n)).In this way, the real time data are acquired by end devices from the edge computing, which are by secured data storage and transmission between the servers.The data aggregation converts theHence, the data cannot be disclosed or accessed atApand the real shared data are more secure.

    Table 1: Results of secure data aggregation process

    When the edge devices share the obtained data,the real data is encrypted with the above operations and the Homomorphic_security()is executed at the upper layer for securing the keys from unknown access.The encrypted datadi0(i∈(1,2,...,n))is concealed with the public key of the cloud server before it is shared,which is given as Eq.(9),

    The hash rate is produced by each device with their unique identities(ID),time-stamp and ET.Here,the hash rate is given as,HS(ID‖tp‖ETi),and it helpsApto verify that the shared private data of the users are confidential and not accessed by anywhere between the transmission process.

    5 Results and Discussions

    The proposed model is simulated utilizing Network Simulator NS2 device.The results and discussions are presented in this section.Furthermore,the proposed model is accessed the evaluation metrics such as rate of model security,packet delivery rate,transmission delay,packet drop,communication overhead.For evidencing the model efficiency,the results are compared with Support Vector Machine for attack detection and IoT-Intrusion Detection Model(IDM).The initial parameter setting for the simulation tool is provided in the Tab.2.

    Table 2: Initial simulation settings

    The significant factor for determining the performance of the proposed model is the communication complexity.During the process of data accumulation,there are some possibilities for attackers to access the data, and the communication complexity is measured asO(d*y), where, d represents devices and y indicates number of third-party attackers possibly to attack the communication,which is to be less in an efficient model for communication.The evaluation results based on the factor called communication complexity is given in Fig.5.It is obvious from the results that the proposed model produces minimal complexity than other,since the risks of attacks are minimal in the model with the effectively defined trust model.

    Figure 5:Communication overhead-comparisons

    The Packet Delivery Ratio (PDR) is derived with respect to the simulation time and the results are portrayed in Fig.6.The proposed model achieves 84.25% of PDR in average, which is higher compared to other models such as SVM and IoT-IDM.The data packets are securely transmitted between entities in the proposed model.

    Figure 6:Packet delivery ratio vs.simulation time

    The transmission delay occurs in a communication model for various reasons and the major issue is the troubles caused by the attackers.In the proposed model,the security of data is effectively handled with the trust model and the homomorphic encryption based security implementations, the overall transmission delay is effectively reduced in the proposed model and the evidences are provided in the graph in Fig.7.Another factor,packer drop also should be minimal in efficient edge computing model.The evaluations are carried out against the simulation time and the results are depicted in Fig.8.It is shown that the proposed model achieves minimal packet drop than the comparative models.

    Figure 7:Transmission delay vs.packet size

    Figure 8:Packet drop vs.simulation time

    As mentioned earlier,the main motivation of the proposed model is to be derived an efficient data security mechanism for shared data between entities in edge computing.Hence, the security rate of the proposed model is evaluated against a particular attack called compromised node attack and the results are given in Fig.9.When the compromised attacks are happened in the proposed work, the model effectively detects the attack and showed that there is the attack possibility with minimal rate of security than others.The evaluations are performed against the simulation time.

    Figure 9:Security rate analysis

    6 Conclusion and Future Work

    This paper presented a secure communication model in edge computing called Trust Model for Secure Data Sharing (TM-SDS) with homomorphic encryption based Techniques.The model used Homomorphic Encryption and the cross verification is implemented with trust model.Moreover,the security of the shared data is provided with local and global trust levels to be considered with the centralized processing of cloud and conserving resources in efficient manner.HMAC is also utilized for enhancing the rate of data security at the aggregator point in the process of data transmission.The outcomes are assessed based on significant factors such as packet drop, model efficiency and PDR.The comparative analysis showed that the proposed model obtained better results and outperforms the results of the existing works with the effective integration of cryptography and trust model.In future,the proposed work is enhanced by deriving novel mechanisms for integrity verification and seamless communication between entities.In addition, the proposed work is also improved by implementing and evaluating in a real-time environment.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    黄色视频不卡| 成人特级黄色片久久久久久久| 欧美在线一区亚洲| 国产男靠女视频免费网站| 成熟少妇高潮喷水视频| 久久久久久久精品吃奶| 亚洲av熟女| 久久人妻福利社区极品人妻图片| 免费在线观看完整版高清| 国产主播在线观看一区二区| 亚洲熟女毛片儿| 国产成人av激情在线播放| 老司机午夜十八禁免费视频| 亚洲精品美女久久久久99蜜臀| 精品一区二区三区视频在线观看免费 | e午夜精品久久久久久久| 精品无人区乱码1区二区| 日本vs欧美在线观看视频| 在线播放国产精品三级| 色婷婷久久久亚洲欧美| 怎么达到女性高潮| 中文字幕人妻丝袜一区二区| 亚洲国产欧美日韩在线播放| 久久国产精品人妻蜜桃| 国产男女内射视频| av网站在线播放免费| 777米奇影视久久| 久久精品国产99精品国产亚洲性色 | 欧美最黄视频在线播放免费 | 亚洲色图av天堂| 亚洲 国产 在线| 午夜福利一区二区在线看| 国产av精品麻豆| 超色免费av| 久久精品国产99精品国产亚洲性色 | 国产三级黄色录像| 99在线人妻在线中文字幕 | 美女视频免费永久观看网站| 宅男免费午夜| 又大又爽又粗| 色尼玛亚洲综合影院| 亚洲自偷自拍图片 自拍| 999久久久国产精品视频| 宅男免费午夜| 人成视频在线观看免费观看| 777米奇影视久久| 好看av亚洲va欧美ⅴa在| 18禁观看日本| 久久香蕉国产精品| 国产色视频综合| 国产精品欧美亚洲77777| 香蕉久久夜色| 精品久久久久久,| 国产一区二区三区综合在线观看| 精品熟女少妇八av免费久了| 美女福利国产在线| 国产深夜福利视频在线观看| 国产精品av久久久久免费| 亚洲人成电影免费在线| 亚洲精品av麻豆狂野| 亚洲色图av天堂| tube8黄色片| 久久精品人人爽人人爽视色| 99热网站在线观看| 欧美日韩国产mv在线观看视频| 成人国产一区最新在线观看| 日韩熟女老妇一区二区性免费视频| 国产熟女午夜一区二区三区| 久久午夜综合久久蜜桃| 侵犯人妻中文字幕一二三四区| tube8黄色片| 欧美日韩中文字幕国产精品一区二区三区 | 亚洲精品一卡2卡三卡4卡5卡| av天堂在线播放| 久久久水蜜桃国产精品网| 国产成人影院久久av| 国产亚洲欧美98| 午夜成年电影在线免费观看| 69精品国产乱码久久久| 女人高潮潮喷娇喘18禁视频| 男女午夜视频在线观看| 国产日韩欧美亚洲二区| 色在线成人网| 欧美精品高潮呻吟av久久| 他把我摸到了高潮在线观看| 国产不卡一卡二| 久久ye,这里只有精品| 久久久国产一区二区| 校园春色视频在线观看| 怎么达到女性高潮| 91九色精品人成在线观看| 亚洲五月色婷婷综合| 天堂俺去俺来也www色官网| 国产视频一区二区在线看| 妹子高潮喷水视频| 嫩草影视91久久| 老汉色∧v一级毛片| 国产一区二区三区视频了| 亚洲伊人色综图| 日韩 欧美 亚洲 中文字幕| 国产真人三级小视频在线观看| 无遮挡黄片免费观看| 搡老岳熟女国产| 男女床上黄色一级片免费看| 99热只有精品国产| 午夜福利乱码中文字幕| av免费在线观看网站| 岛国毛片在线播放| 国产一区在线观看成人免费| 国产精品国产av在线观看| 亚洲第一青青草原| videosex国产| 高清黄色对白视频在线免费看| tocl精华| 久久久国产成人精品二区 | av不卡在线播放| 精品人妻1区二区| 人人妻人人澡人人爽人人夜夜| 99久久国产精品久久久| 亚洲va日本ⅴa欧美va伊人久久| 亚洲成人免费av在线播放| 欧美日韩亚洲综合一区二区三区_| aaaaa片日本免费| 亚洲午夜理论影院| 国产一区在线观看成人免费| 成年人黄色毛片网站| 欧美最黄视频在线播放免费 | 国产日韩欧美亚洲二区| 亚洲精品中文字幕一二三四区| e午夜精品久久久久久久| 久久国产精品人妻蜜桃| 亚洲色图综合在线观看| 黄色毛片三级朝国网站| 在线观看舔阴道视频| 热99国产精品久久久久久7| 婷婷成人精品国产| 午夜福利欧美成人| 视频区欧美日本亚洲| 一边摸一边抽搐一进一小说 | 一二三四社区在线视频社区8| 操出白浆在线播放| 久久久久国产精品人妻aⅴ院 | 我的亚洲天堂| videos熟女内射| 日本a在线网址| 国产精品久久电影中文字幕 | 国产成人精品久久二区二区91| svipshipincom国产片| 国产亚洲一区二区精品| 香蕉丝袜av| 大片电影免费在线观看免费| 欧美精品亚洲一区二区| 久久久久精品人妻al黑| 色综合欧美亚洲国产小说| 一级黄色大片毛片| 视频区欧美日本亚洲| 久久久国产成人精品二区 | 久久亚洲精品不卡| 男人的好看免费观看在线视频 | 久久香蕉精品热| 亚洲熟妇中文字幕五十中出 | 日日爽夜夜爽网站| 巨乳人妻的诱惑在线观看| av超薄肉色丝袜交足视频| 久久人妻av系列| 国产视频一区二区在线看| 亚洲精品美女久久av网站| 三级毛片av免费| 国产在视频线精品| 天堂动漫精品| 亚洲一区高清亚洲精品| 久久香蕉精品热| 欧美激情极品国产一区二区三区| 亚洲精品乱久久久久久| 丰满饥渴人妻一区二区三| 高清视频免费观看一区二区| 最新在线观看一区二区三区| 一区二区三区激情视频| 一夜夜www| 成熟少妇高潮喷水视频| 午夜精品国产一区二区电影| 国产有黄有色有爽视频| 久久热在线av| 亚洲专区中文字幕在线| 亚洲av第一区精品v没综合| 在线播放国产精品三级| 老熟女久久久| 日韩三级视频一区二区三区| 午夜精品在线福利| 757午夜福利合集在线观看| a级片在线免费高清观看视频| 久久久久久久午夜电影 | 国产野战对白在线观看| 好男人电影高清在线观看| 国产精品国产av在线观看| 国产一区二区激情短视频| 夜夜爽天天搞| 日本撒尿小便嘘嘘汇集6| 亚洲欧美日韩高清在线视频| 黄色成人免费大全| 午夜影院日韩av| 久久精品人人爽人人爽视色| 久久九九热精品免费| 法律面前人人平等表现在哪些方面| 亚洲午夜理论影院| ponron亚洲| 亚洲成人国产一区在线观看| 久久久久久久久久久久大奶| 国产单亲对白刺激| 欧美不卡视频在线免费观看 | 少妇的丰满在线观看| 高清av免费在线| 亚洲中文日韩欧美视频| 午夜精品国产一区二区电影| 亚洲av成人av| 丝袜美腿诱惑在线| 99国产综合亚洲精品| 嫁个100分男人电影在线观看| 国产单亲对白刺激| 美国免费a级毛片| 久久国产精品影院| 三上悠亚av全集在线观看| 精品国产一区二区三区四区第35| 少妇被粗大的猛进出69影院| 国产精品av久久久久免费| 亚洲一区二区三区欧美精品| 亚洲精品乱久久久久久| 美女福利国产在线| 大型黄色视频在线免费观看| 欧美黑人精品巨大| 国内毛片毛片毛片毛片毛片| 色精品久久人妻99蜜桃| 国产国语露脸激情在线看| 亚洲精品av麻豆狂野| 亚洲精品国产区一区二| 少妇被粗大的猛进出69影院| 午夜福利免费观看在线| 男女之事视频高清在线观看| 一区在线观看完整版| 伦理电影免费视频| 欧美日韩瑟瑟在线播放| 十八禁高潮呻吟视频| 午夜福利免费观看在线| 在线观看日韩欧美| 欧美国产精品va在线观看不卡| 人妻一区二区av| 女人精品久久久久毛片| 午夜视频精品福利| 99热只有精品国产| 国产成人精品久久二区二区91| 中文字幕人妻丝袜制服| 老汉色∧v一级毛片| 国产深夜福利视频在线观看| 亚洲国产精品sss在线观看 | 老司机在亚洲福利影院| 天天躁狠狠躁夜夜躁狠狠躁| 天堂动漫精品| 日本a在线网址| bbb黄色大片| 精品一区二区三区av网在线观看| 国产精品一区二区精品视频观看| 一级a爱片免费观看的视频| 久久中文字幕一级| 大片电影免费在线观看免费| 一级a爱视频在线免费观看| 久热这里只有精品99| 99精品久久久久人妻精品| 久久久久国产精品人妻aⅴ院 | 午夜日韩欧美国产| 欧美黑人欧美精品刺激| 高清在线国产一区| 美女午夜性视频免费| 久99久视频精品免费| 老司机在亚洲福利影院| 欧美日韩乱码在线| 真人做人爱边吃奶动态| 日韩欧美三级三区| 成人三级做爰电影| 飞空精品影院首页| 男女免费视频国产| 亚洲av成人一区二区三| 亚洲精品国产精品久久久不卡| svipshipincom国产片| 十八禁高潮呻吟视频| 青草久久国产| 成年版毛片免费区| 精品免费久久久久久久清纯 | 丝袜美腿诱惑在线| 一级毛片高清免费大全| 美女高潮喷水抽搐中文字幕| av网站在线播放免费| 欧美激情高清一区二区三区| 99精品在免费线老司机午夜| 人妻 亚洲 视频| 国产成人免费观看mmmm| 韩国精品一区二区三区| 免费观看a级毛片全部| 老司机在亚洲福利影院| 91成年电影在线观看| 最新美女视频免费是黄的| 丁香欧美五月| 极品人妻少妇av视频| 精品国产超薄肉色丝袜足j| а√天堂www在线а√下载 | 亚洲国产欧美一区二区综合| 在线十欧美十亚洲十日本专区| 天堂动漫精品| 丰满人妻熟妇乱又伦精品不卡| 精品人妻1区二区| 国产色视频综合| 欧美日韩av久久| 99国产综合亚洲精品| 国产99久久九九免费精品| 日韩欧美一区视频在线观看| 久久久久国产一级毛片高清牌| 久久人人97超碰香蕉20202| 大香蕉久久成人网| 国产精品免费视频内射| 亚洲黑人精品在线| 99国产精品一区二区三区| 一二三四社区在线视频社区8| svipshipincom国产片| tube8黄色片| 国产成人av教育| 九色亚洲精品在线播放| 啪啪无遮挡十八禁网站| 欧美激情久久久久久爽电影 | 久久中文看片网| 成熟少妇高潮喷水视频| 一级a爱片免费观看的视频| 无人区码免费观看不卡| 12—13女人毛片做爰片一| 中亚洲国语对白在线视频| 又黄又粗又硬又大视频| 久久国产精品大桥未久av| 黑人欧美特级aaaaaa片| 久热这里只有精品99| 中文字幕色久视频| 在线视频色国产色| 国产国语露脸激情在线看| 亚洲精品在线美女| 嫁个100分男人电影在线观看| 女性被躁到高潮视频| 精品久久久久久久毛片微露脸| 精品少妇久久久久久888优播| av视频免费观看在线观看| 精品久久蜜臀av无| 无遮挡黄片免费观看| 国产成人av教育| 婷婷成人精品国产| 成人黄色视频免费在线看| 国产精品98久久久久久宅男小说| cao死你这个sao货| 一本综合久久免费| 90打野战视频偷拍视频| 亚洲成人手机| av有码第一页| 人妻丰满熟妇av一区二区三区 | 最新在线观看一区二区三区| av天堂在线播放| 日本一区二区免费在线视频| 999久久久国产精品视频| 国产精品偷伦视频观看了| 777久久人妻少妇嫩草av网站| 一夜夜www| 欧美乱码精品一区二区三区| 大陆偷拍与自拍| xxxhd国产人妻xxx| avwww免费| 久久久国产成人免费| 丰满饥渴人妻一区二区三| a级毛片在线看网站| 热99国产精品久久久久久7| 精品国产一区二区三区久久久樱花| 脱女人内裤的视频| 亚洲精品国产精品久久久不卡| 亚洲精品久久午夜乱码| 另类亚洲欧美激情| av天堂久久9| 久久天堂一区二区三区四区| 制服人妻中文乱码| 一进一出好大好爽视频| 最近最新中文字幕大全电影3 | 国产区一区二久久| 老熟妇仑乱视频hdxx| 亚洲黑人精品在线| 久久久国产一区二区| 国产成人欧美在线观看 | 新久久久久国产一级毛片| 久久人妻福利社区极品人妻图片| 欧美成人免费av一区二区三区 | 99re在线观看精品视频| 这个男人来自地球电影免费观看| 伦理电影免费视频| 亚洲专区国产一区二区| 在线视频色国产色| 飞空精品影院首页| 久久人妻福利社区极品人妻图片| 久久热在线av| 国产成人系列免费观看| 麻豆国产av国片精品| 亚洲专区字幕在线| 国产淫语在线视频| 91国产中文字幕| 真人做人爱边吃奶动态| 一区二区日韩欧美中文字幕| 制服诱惑二区| 高清欧美精品videossex| 99热只有精品国产| e午夜精品久久久久久久| 久久国产精品影院| 国产男女超爽视频在线观看| 成年女人毛片免费观看观看9 | 国产高清视频在线播放一区| 男女免费视频国产| 99精品在免费线老司机午夜| 精品一品国产午夜福利视频| 国产成人av教育| 变态另类成人亚洲欧美熟女 | 曰老女人黄片| 国产一区二区激情短视频| 亚洲国产中文字幕在线视频| 男人舔女人的私密视频| 国产精品 国内视频| 精品卡一卡二卡四卡免费| 国产一区二区激情短视频| 热re99久久国产66热| 99精国产麻豆久久婷婷| 国产免费男女视频| 国产成人精品久久二区二区91| 国产乱人伦免费视频| 免费看十八禁软件| 悠悠久久av| 69精品国产乱码久久久| 午夜免费成人在线视频| 人妻久久中文字幕网| 国产精品香港三级国产av潘金莲| 国产人伦9x9x在线观看| 亚洲熟妇熟女久久| 王馨瑶露胸无遮挡在线观看| 最近最新中文字幕大全免费视频| 精品少妇一区二区三区视频日本电影| 男人操女人黄网站| 日本五十路高清| 国产97色在线日韩免费| 亚洲精品久久成人aⅴ小说| 久久ye,这里只有精品| 99精品欧美一区二区三区四区| 50天的宝宝边吃奶边哭怎么回事| 成人免费观看视频高清| 国产免费男女视频| 国产精品久久视频播放| 久久婷婷成人综合色麻豆| 国产成人av教育| 在线观看免费高清a一片| 亚洲av日韩精品久久久久久密| 午夜91福利影院| 狠狠狠狠99中文字幕| 亚洲欧美精品综合一区二区三区| 在线观看免费日韩欧美大片| 大型黄色视频在线免费观看| 久久草成人影院| 80岁老熟妇乱子伦牲交| 两个人看的免费小视频| 久久久久久久午夜电影 | 久久国产精品大桥未久av| 精品国产乱子伦一区二区三区| 亚洲av日韩精品久久久久久密| 无限看片的www在线观看| 亚洲av欧美aⅴ国产| 天堂俺去俺来也www色官网| 欧美色视频一区免费| 欧美+亚洲+日韩+国产| 久久久国产成人精品二区 | 一区福利在线观看| 日本一区二区免费在线视频| 777久久人妻少妇嫩草av网站| 成在线人永久免费视频| 黄色怎么调成土黄色| 精品亚洲成a人片在线观看| 一级作爱视频免费观看| 一级a爱视频在线免费观看| 少妇裸体淫交视频免费看高清 | 日韩欧美三级三区| 熟女少妇亚洲综合色aaa.| 韩国精品一区二区三区| 免费看十八禁软件| a级毛片黄视频| 久久久久精品人妻al黑| 99久久综合精品五月天人人| 精品一区二区三区视频在线观看免费 | 亚洲欧美一区二区三区久久| 99re6热这里在线精品视频| 国产日韩一区二区三区精品不卡| 国产主播在线观看一区二区| 成年女人毛片免费观看观看9 | 亚洲九九香蕉| 91精品国产国语对白视频| 老汉色av国产亚洲站长工具| svipshipincom国产片| av欧美777| 久久久久视频综合| 久久久国产欧美日韩av| 两人在一起打扑克的视频| 韩国精品一区二区三区| 99热国产这里只有精品6| av天堂在线播放| 国产精品免费大片| 国产一区二区三区综合在线观看| 亚洲专区字幕在线| 男人的好看免费观看在线视频 | 国产午夜精品久久久久久| 一本大道久久a久久精品| 国产精品 国内视频| 每晚都被弄得嗷嗷叫到高潮| 中文字幕色久视频| 人人妻人人爽人人添夜夜欢视频| 欧美乱码精品一区二区三区| 免费在线观看视频国产中文字幕亚洲| 人成视频在线观看免费观看| 老汉色∧v一级毛片| 成人国语在线视频| 国产精品免费一区二区三区在线 | 久久中文看片网| 色播在线永久视频| 亚洲国产欧美一区二区综合| 精品电影一区二区在线| 亚洲精品乱久久久久久| 欧美黄色片欧美黄色片| av电影中文网址| 18在线观看网站| 老熟女久久久| 国产片内射在线| 午夜福利免费观看在线| 国产精品1区2区在线观看. | 麻豆乱淫一区二区| 精品无人区乱码1区二区| 国产高清激情床上av| 国产激情欧美一区二区| 男女之事视频高清在线观看| 超碰97精品在线观看| 十分钟在线观看高清视频www| 1024香蕉在线观看| 女人爽到高潮嗷嗷叫在线视频| 免费看十八禁软件| 日本五十路高清| 国产人伦9x9x在线观看| 国产精品自产拍在线观看55亚洲 | 国产欧美日韩一区二区精品| 天天影视国产精品| 黄色怎么调成土黄色| 精品免费久久久久久久清纯 | 色婷婷av一区二区三区视频| 91麻豆精品激情在线观看国产 | 成人国产一区最新在线观看| 国产精品欧美亚洲77777| 女性生殖器流出的白浆| 国产精品1区2区在线观看. | 精品一区二区三区视频在线观看免费 | 在线观看午夜福利视频| 国产精品影院久久| 成人影院久久| 国内毛片毛片毛片毛片毛片| 精品国产超薄肉色丝袜足j| 国产单亲对白刺激| 国产欧美日韩精品亚洲av| 欧美日韩瑟瑟在线播放| 精品熟女少妇八av免费久了| 亚洲午夜理论影院| 在线观看午夜福利视频| 午夜影院日韩av| 精品久久久久久久久久免费视频 | 这个男人来自地球电影免费观看| 亚洲少妇的诱惑av| 国产高清国产精品国产三级| 免费高清在线观看日韩| 欧美成人午夜精品| e午夜精品久久久久久久| 精品乱码久久久久久99久播| 国产成+人综合+亚洲专区| 午夜精品在线福利| 国产又色又爽无遮挡免费看| 免费一级毛片在线播放高清视频 | 叶爱在线成人免费视频播放| 亚洲精品在线美女| 成熟少妇高潮喷水视频| 欧美日韩中文字幕国产精品一区二区三区 | 久久天躁狠狠躁夜夜2o2o| 乱人伦中国视频| 9色porny在线观看| 亚洲av日韩在线播放| 18禁观看日本| 国产高清videossex| 欧美日韩亚洲综合一区二区三区_| 999久久久精品免费观看国产| 久久草成人影院| 国产精品九九99| 亚洲五月色婷婷综合| 亚洲成国产人片在线观看| 亚洲熟妇熟女久久| 黄色成人免费大全| 女人精品久久久久毛片| 久久久久精品人妻al黑| 欧美精品亚洲一区二区| 两人在一起打扑克的视频| 天堂动漫精品| 欧美日韩精品网址| 久久这里只有精品19| 99热只有精品国产| 色老头精品视频在线观看| 热99re8久久精品国产| 亚洲成人国产一区在线观看| 国产精品乱码一区二三区的特点 | 在线观看午夜福利视频| 欧美av亚洲av综合av国产av|