• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Integration of Fog Computing for Health Record Management Using Blockchain Technology

    2022-08-24 03:32:02MesferAIDuhayyimFahdAlWesabiRadwaMarzoukAbdallaIbrahimAbdallaMusaNohaNegmAnwerMustafaHilalManarAhmedHamzaandMohammedRizwanullah
    Computers Materials&Continua 2022年5期

    Mesfer AI Duhayyim,F(xiàn)ahd N.Al-Wesabi,Radwa Marzouk,Abdalla Ibrahim Abdalla Musa,Noha Negm,Anwer Mustafa Hilal,Manar Ahmed Hamza,*and Mohammed Rizwanullah

    1Department of Natural and Applied Sciences,College of Community Aflaj,Prince Sattam Bin Abdulaziz University,Saudi Arabia

    2Department of Computer Science,College of Science&Art at Mahayil,King Khalid University,Saudi Arabia&Faculty of Computer and IT,Sana’a University,Yemen

    3Department of Information Systems,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Saudi Arabia&Department of Mathematics,F(xiàn)aculty of Science,Cairo University,Giza,12613,Egypt

    4Department of Computer Science,College of Computer,Qassim University,Buraydah,Saudi Arabia

    5Department of Computer Science,King Khaled University,KSA&Faculty of Science,Department of Mathematics and Computer Science,Menoufia University,Egypt

    6Department of Computer and Self Development,Preparatory Year Deanship,Prince Sattam Bin Abdulaziz University,AlKharj,Saudi Arabia

    Abstract: Internet of Medical Things (IoMT) is a breakthrough technology in the transfer of medical data via a communication system.Wearable sensor devices collect patient data and transfer them through mobile internet, that is, the IoMT.Recently, the shift in paradigm from manual data storage to electronic health recording on fog,edge,and cloud computing has been noted.These advanced computing technologies have facilitated medical services with minimum cost and available conditions.However, the IoMT raises a high concern on network security and patient data privacy in the health care system.The main issue is the transmission of health data with high security in the fog computing model.In today’s market,the best solution is blockchain technology.This technology provides high-end security and authentication in storing and transferring data.In this research, a blockchain-based fog computing model is proposed for the IoMT.The proposed technique embeds a block chain with the yet another consensus(YAC)protocol building security infrastructure into fog computing for storing and transferring IoMT data in the network.YAC is a consensus protocol that authenticates the input data in the block chain.In this scenario, the patients and their family members are allowed to access the data.The empirical outcome of the proposed technique indicates high reliability and security against dangerous threats.The major advantages of using the blockchain model are high transparency,good traceability, and high processing speed.The technique also exhibits high reliability and efficiency in accessing data with secure transmission.The proposed technique achieves 95%reliability in transferring a large number of files up to 10,000.

    Keywords:Fog computing;IoMT;block chain;YAC;security;IoT;consensus protocol

    1 Introduction

    Internet of Things (IoT) is collection of sensors and smart devices that connect to the internet for smart applications.Each device has its own IP address for communicating in the network.These devices connect to the internet via an application programming interface.At present, many applications, such as healthcare, smart home, vehicle, and educational applications, are embedded in the IoT.Among these, healthcare provides a wide usage of the IoT in connecting patients online immediately.This application is termed as the Internet of Medical Things (IoMT) through which the health data of users are collected via sensors and stored in smart devices (the IoT).The IoMT transfers, stores, and processes patient data for accurate diagnosis.Secure data transmission is the main expectation of all users of the IoMT.Fog computing is a framework that uses edge devices for computing certain tasks in terms of storage, process, and communication.IoMT data are collected from devices and stored in the cloud.The cloud contains data processing algorithms and applies them on data and then sends the result to the users.The storage of data in a nearby location can improve the efficiency of computation algorithms.Furthermore,the result can be fetched quickly.The state of the art proves that the block chain provides high security for all types of applications.A block chain is a collection of blocks that carry data in a linked list model.Every block has a block header,data,and information on the previous block.Hashing creates the reference key for the previous and next headers.Therefore, it ensures high security in the wide variety of applications because of its strong decentralized approach.

    Fog computing is widely used in the IoT for fast data computation.Recently, it has been used in the medical field for processing health care data[1].Wireless sensor networks in the IoMT[2]are used to obtain data quickly and compute anonymously.Blockchain technology is implemented in a distributed network [3–6] for high security and data authentication.Fog computing is utilized to improve the security and efficiency of transmitting data to the cloud.Then,the transmitted data are analyzed and stored safely.Fog computing is used in the development of the health field, acting as a middle layer between the IoMT and the cloud to improve the data security and confidentiality.In cryptographic implementation,fog computing has deployed a unique way of gathering medical data from various sources.Fog computing is based on the service-oriented architecture,evaluating health care data and validating them for further processing in the health field[7–10].

    For high authentication,embedding the IoMT with fog computing(i.e.,F(xiàn)OG-IoMT)is proposed for the early diagnosis of diseases.FOG-IoMT uses block chain technology to carry and process data in the fog environment with high authentication.The block chain is composed of various consensus algorithms.Some of these algorithms include proof of work,proof of stake,proof of activity,Byzantine fault tolerance, and the Yet Another Consensus (YAC) protocol.The Byzantine fault tolerance algorithm exhibits delays in providing strong leaders and bad message passing rules.The YAC protocol overcomes the drawback of the Byzantine fault tolerance algorithm.In this research, a YAC-based blockchain is preferred for efficient data computation.The following are the contributions of this research.

    1.Health care record management is implemented through the fog computing of the IoMT to increase the reliability,accuracy,authenticity,and integrity of data management in blockchain technology.

    2.Real-time medical data are processed using the fog-based architecture of the IoMT-YAC algorithm,which accesses the data of patients effectively depending on their health conditions.

    3.Various challenges in fog-computing-based IoMT with blockchain technology in health care record management were explored.

    The rest of this paper is arranged in five sections.Section 2 discusses recent articles.Section 3 describes the methodology of the proposed work and the algorithm used.Section 4 evaluates the outcome of the study,and Section 5 concludes this paper with the future research scope.

    2 Related Work

    Recently, fog and edge computing have been applied in the examination of medical data in the field of healthcare record management [11].The IoMT is the network through which people and medical devices exchange the healthcare data via wireless communication as proposed in an article [12].In exchanging sensitive medical information through network connection, security and privacy are the main factors that must be considered.Thus,the protection of data from anonymous users to maintain data integrity and quality was proposed.Consequently, data collection follows protocols and is implemented in pervasive social network nodes.Data is managed in the blockchain using smart contracts,which is referred to as MedShare in an article.The blockchain structure adopts distributed ledger technology in which data are distributed and managed by various users.A study proposed the consensus between users to add more blocks into the blockchain.Physicians provide medical care for patients in remote areas through the IoMT and deliver solutions to them in critical situations [13].Fog computing with an open stack platform has been used to improve latency and scalability.In general, the fog computing architecture is a service-oriented structure for telehealth application processing in real time,collecting raw data from wearable sensors and smart devices.To optimize these services,a three-tier architecture was proposed[14,15].

    Deployment of fog computing in the IoMT explains in monitoring the health of the patient at a lower cost.It also improves the security and privacy by block chain which was suggested in the paper[16].Moreover,the Fog-based architecture in the health care management acts as an intermediate layer between cloud and IoMT devices for the enhancement of cryptographic technique.IoMT devices had evaluated and validated the healthcare management via the service-oriented based fog computing which was proposed in the paper[17].Typically,the medical data management in the fog layer is considered as a challenging task.In addition to that, it is observed that the fog layer has a limited storage space when compared to that of the cloud.Thus,the storage capacity is also considered as another challenge which is listed in the paper.Consensus algorithm provides guarantee in terms of storing the data in the ledger in a secured manner, liveness of the model and maintains consistency.In the model of liveness,errors are recovered from the data wherein the security means accepting only the request of an authorized user and consistency refers to maintain the same ordering and state of data in a globalized manner.In the fully asynchronous network,deterministic solution was given by non-distributed consensus algorithm which was proposed in the paper[18,19].

    The decentralized computational problem is difficult to solve the adaptable concept of decentralized consensus algorithm.Similarly, in the decentralized system, sybil attacks are prevented by Proofs-of-Work.Proof-of-Stake and Proof-of-Importance were generated through random numbers for the generation of block hashes and public keys [20–22].For monitoring the health of patients while ensuring privacy, the preserved structure of the blockchain-based IoMT has a patient-centric agent in the form of tailored type of blockchain.This patient-centric agent sorts all stored data in the medical record in term of criticalness,as suggested in a study[23].Data are collected through sensor nodes, and access control is provided,and the medical data are managed using big data application in terms of security,privacy,and integrity,as proposed in previous studies[24–26].In the article[27],the current status of a patient is described using Petri Nets to enhance the dynamism of real-time applications.In the IoMT, the communication between devices and the interface used in the device may be experience cyberattacks.Further,it may increase the attacks on e-health records.In the modern health care environment, exploiting the growth of products and reducing the vulnerable things are suggested in a paper [28].The BeeKeeper-based system in the blockchain and the cloud server on the IoMT were proposed to process the data computations of the user.In the BeeKeeper system,the used Ethereum blockchain technology is proposed in [29] to provide authorization for the medical data stored in the blockchain.Tab.1 shows the summary of related works on blockchain based IoMT technology.

    Table 1:Summary of related works

    Table 1:Continued

    Tab.1 lists the disadvantages of the techniques explained in the literature.The existing blockchain technology is mostly focused on ledger-based design.In this article,the draw backs,such as storage,time, and security, are addressed by using a fog-based IoMT with a blockchain protocol for the improvement of security.

    3 Integration of Fog Computing IoMT in Health Care Using Block Technology

    The medical history of a patient usually contains personal information, and sensitive medical information should be protected and transmitted to the other sectors of maintenance in a secured manner, which is a vital task.Thus, IoMT devices require a secured storage infrastructure for processing real-time medical data.To improve the high dimensionality of security, fog-computingbased blockchain technology is needed in the IoMT.This paper proposes the concept of integrating fog computing with the IoMT-YAC algorithm in blockchain technology for health care record management(i.e.,F(xiàn)C-IoMT-YAC).The proposed technique includes the following(three)functions.

    1.Implementation of the YAC algorithm in blockchain technology.

    2.Management of heath care data in FC-IoMT-YAC using blockchain technology.

    3.Security of healthcare data in FC-IoMT-YAC using blockchain technology.

    Fig.1 presents the FC-IoMT-YAC architecture.The proposed work is a three-tier architecture.

    Figure 1:Three-tier architecure of FIoMT-YAC

    FC-IoMT-YAC Application Layer

    Accessing and manipulating data from patient records are done in this layer.This layer is composed of three modules.In the patient module,patients can view their medical data through the components of the software,allowing them to manage and manipulate their medical data.It acts as a blockchain wallet.Researchers and stake holders can also access medical data through this blockchain wallet when needed.Any of the changes made in this layer are updated in the fog layer.

    FC-IoMT-YAC Device Layer

    This layer consists of two parts,namely,sensor devices and radio frequency ID(RFID).Patient data are monitored using sensor devices.The IoMT-based RFID is used to tag items and track drug availability problems.Additionally,RFID tags are used for sending signals between two entities.The signals generated by the sensors are received through gateways and sent to the FC-IoMT-YAC fog layer.

    FC-IoMT-YAC Fog Layer

    This layer is responsible for monitoring medical records, which are near the applications and stored in the subset of data.This layer also receives medical data from the FC-IoMT-YAC application and device layers.A group of modules called fog nodes forms this layer, which is responsible for providing authorization and validation for the FC-IoMT-YAC application layer to manipulate the medical data from a patient.

    FC-IoMT-YAC Blockchain-YAC Layer

    This layer provides increased security and stores medical records.This layer also provides authorization to a third party to access medical data.

    3.1 Proposed FC-IoMT-YAC Consensus Steps Using Blockchain Technology in Health Record Management

    The proposed technique aims to efficiently manage the health records of patients in highly secured manner.The benefits of blockchain are as follows:

    1.Patients can control their own data,and the members of the family can also view the patients’records.

    2.In the blockchain technology,the distribution of data is secured,consistent,and accurate.

    3.Any system updated in the blockchain can be easily viewed by all users in the network.

    4.Unauthorized users will be prevented from accessing medical data.

    For high security and accuracy,the YAC algorithm of blockchain technology is implemented.

    Preliminaries of YAC consensus processing steps

    Client:The client generates the user request for medical data and sends them to the ordering service(OS).The user who has a public key can associate with the client.

    Peer:The node of the network is responsible for validating and storing medical data into the blocks.

    Ordering Service(OS):The OS is responsible for organizing the medical data transactions into a known order.

    In the YAC algorithm,the client is considered as the peer and can interact with other known peers.Every client has its own private key and a permission to access medical data in the blockchain.The YAC algorithm of blockchain technology can be described by the following steps.

    Procedure for YAC consensus protocol of blockchain technology

    Step 1:A client creates a medical data transaction with a private key.

    Step 2:The client can send the transaction to other known peers.The receiver peer receives the transaction and verifies the validity of the transaction.

    Step 3:The OS creates and shares an unsigned block to peers in the network.The unsigned block is called a proposal.

    Step 4:For the verified proposal,the peers calculate the hash and sign it.The <Hash,Signature>tuple is called a vote.

    Step 6:On the basis of the hash value of the proposed block,the voting peer is created.

    Step 7:Votes from other peers are collected through the leader and peer sending the commit message to the block.

    Step 8:On the basis of the hash value,the leader collects all votes and identifies the supermajority of the votes.Then,a commit message is sent to the committing block,which is called a commit.

    Step 9:The receiver peer, receives the commit and verifies its validity.Then, the block is added into the ledger,completing the consensus.

    Applying the above procedure increases the security,accuracy,and consistency of the medical data stored in the blockchain.After executing Steps 1 to 9,the medical data block is added into the chain using Algorithm 1.

    Algorithm 1:Adding the YAC-algorithm-based block into the chain Input:Patient Name Output:The YAC-algorithm-based clock is added to the block chain Step 1:function add_block(patient p)Step 2:connect →YAC_blockchain Step 3:id ←subscribe(id)Step 4:read ←Get_file(n.db)Step 5:new_YAC_block ←create_YAC_block(read,times tamo,id)Step 6:out ←broadcast(:new_YAC_block)Step 7:if (out are approved)Step 8:if (new_YAC_block belongs to the same chain)Step 9:add new_YAC_block_in_chain()Step 10:print(new block is added successfully)Step 11:else Step 12:add new_YAC_block_in_Fork()Step 13:print(new block is added successfully as a fork in the chain)Step 14:else Step 15:reject new_YAC_block()Step 16:print(New Block is Rejected)Step 17:end function

    Every new block contains detailed information about the patient.The details include the creation time of the block, the block generator name, and the hash value of previous block.The new_YAC_block is broadcasted to all peers in the network.The acceptance rate value of new_YAC_block is greater than the number of peers,which is added into the chain.If new_YAC_block does not match the previous block, new_YAC_block gets forked.Once new_YAC_block s added to the chain,it cannot be changed.

    3.2 Managing the Heath Care Data in FC-IoMT-YAC Using Blockchain

    Medical data are created and stored in blocks in a secure way while maintaining privacy,which is very important.The management of stored data in the block is implemented by the usage of data in the block(authentication details)and the storage of data in the block(data analysis and management).

    The procedure in managing health care data in the block chain is as follows:

    So that evening, when the Princess came once more with her sleeping-drink, he pretended to drink, but threw it away behind him, for he suspected that it was a sleeping-drink

    Step 1.Generate the main source of medical data according to the interaction of patient and doctors.

    Step 2.Produce a health record with prescription and treatment details.

    Step 3.Assign the ownership of the record with sensitive information to the patient.

    Step 4.Assign preliminary rights to the owner.

    The preliminary rights are(Steps 6 to 9).

    Step 5.Request permission to view the record

    Step 6.Forward request to the owner

    Step 7.Request received by the owner

    Step 8.Decide to permit or deny the request

    Step 9.Give authorization to the health care providers

    Step 10.Obtain access to end-users,like hospitals and health care providers.

    In the management layer, the working of the security and integrity preserved storage is recommended.

    3.3 Healthcare Data Security in FC-IoMT-YAC

    To perform the security of health care data between IoMT devices,fog nodes,and end-users are used.It consists of patients,doctors,IoMT devices,and fog nodes,which use a fog-computing-based YAC algorithm in the blockchain system for storing and securing medical data.Users can retrieve data from fog nodes.The algorithm performs the IoMT device request through different distributed fog nodes.Tab.2 defines the symbols used in Algorithm 2.

    Table 2:Symbols and notations

    Table 2:Continued

    Algorithm 2:Security of health care data between IoMT devices to fog nodes and end-users Step 1:While pi in patient do Select pi For each hrdi in IoMT do If di select hrdi then Retrieve PMD(pi, hrdi)Store in FC_YAC(retrieve_PMD)Else Select pi=1 End End End Step 2:Function retrieve PMD(pi, hrdi)p1 = pi from patient While hrdi in IoMT do If hrdi = p1 then Retrieve PMD[] ←p1 .hrdi .retrieve value Return(PMD)Else Assign p1 ←IoMT Call retrieve PMD(pi, hrdi)End if End Step 3:End;

    To arrange the medical data exchanged between the fog nodes and the IoMT devices, an application is proposed for performing the operations and the actions through the YAC algorithm in the blockchain.Each IoMT device is uniquely identified by an“ID,”which is stored in the medical data of the patient.The mapping of IDs with the IoMT devices is performed by fog nodes for the identification of the device using a configured data stored on the YAC blockchain.

    The sequence diagram(Fig.2)shows the collection of medical data.The fog node composes the requests of the IoMT device user and sends the request to the patients and the doctors.

    4 Result Analysis

    The performance of the proposed FC-IoMT-YAC consensus algorithm was analyzed using blockchain technology through the latency,running time,efficiency,reliability,and privacy parameters.Data were collected from the interaction of patients with doctors and stored as health records.The health records include patient,prescription,and treatment details.Fog computing was used to show the high dimensionality of security and the feasibility of the FC-IoMT-YAC algorithm using blockchain technology.The results were compared with those of three other algorithms,namely,the IoMT with cloud computing[6],the IoMT with fog computing[7],and the proposed work fog computing with the YAC algorithm in blockchain technology(i.e.,F(xiàn)C-IoMT-YAC).

    Figure 2:Sequence of steps in the collection of the medical data

    FC-IoMT-YAC was implemented using the Java programming language.Furthermore, the fog node executes the YAC consensus algorithm in the blockchain.The aim of the gateway in the FCIoMT-YAC device layer is to monitor the patient and send the date to the fog node.The fog node is implemented by Raspberry Pi 2 model b.For the blockchain,the YAC algorithm[19]is implemented by the JSON–RPC interface[2].After installing these software components,the overall test was executed using Apache JMeter.Each test was evaluated on 1000 patient data requests.Finally,the average access time was calculated for each test.Tab.3 shows the result obtained by using the IoMT with cloud computing.

    Table 3:Result obtained by IoMT using cloud computing

    Tab.3 shows the results of the create and search data requests performed through the communication between the IoMT and the cloud.Tab.4 shows the results obtained by using the IoMT with fog computing.

    Table 4:Result obtained by IoMT with fog computing

    Tab.4 shows the results of the create and search data requests performed through the communication between the IoMT and the fog.Tab.5 shows the results obtained by using the proposed approach(i.e.,F(xiàn)C-IoMT-YAC)

    Table 5:Result obtained by proposed method(FC-IoMT-YAC)

    Tabs.3 and 4 indicate that the access time(of medical records)of the IoMT with fog computing is optimal.Therefore, the IoMT with fog computing exhibits high performance in terms of several parameters.The average response time increases with the number of requests.The tables also show that the proposed technique produces a good result in terms of the time consumed in accessing medical records.Fig.3 shows the reliability of three different methods with the number of files in the data storage.The reliability of FC-IoMT-YAC increases with the number of files.

    Figure 3:Data volume(number of files)vs.reliability

    Fig.4 shows the efficiency of three different methods with the number of files in the data storage.The efficiency of FC-IoMT-YAC increases with the number of files.

    Figure 4:Data volume(number of files)vs.efficiency%

    Fig.5 shows the running time using three different methods with the number of files in the data storage.The execution of FC-IoMT-YAC is fast.The running time increases with the number of files.

    The proposed work is evaluated based on the latency parameter as shown in Eq.(1).

    Fig.6 shows the latency of three different algorithms,namely,IoMT+Cloud,IoMT+Fog,and FC-IoMT-YAC.Fog computing brings the computation near the database,reducing the network delay.If the database is small,the fog computing process will take a short time.The proposed work decreases the latency by using the YAC algorithm of blockchain technology in the fog computing architecture.

    Figure 5:Data volume(number of files)vs.running time

    Figure 6:Comparison of latency(proposed work)with YAC blockchain technology

    5 Conclusion

    This paper describes the health care data management using fog computing based IoMT in blockchain technology.The proposed technique is based on the performance, privacy, and security parameters through the YAC algorithm in the blockchain.The major issue is the security threat during the access and sharing of data over the network.To address this issue, the YAC blockchain provides high-dimensional security and privacy in the IoMT.The embedding of the YAC blockchain in the IoMT provides a decentralized structure in the management of health records.The proposed FC_IoMT_YAC blockchain architecture mitigates the privacy and security threats.The proposed approach, that is, FC_IoMT_YAC, is efficient in the aspects of latency, running time, efficiency,reliability,and privacy.The computation takes only 1563 ms because fog computing and blockchain technology effectively collect data and implement the patient’s request.In future work,soft computing techniques can be utilized to reduce the network problem and increase the efficiency of health record management.The blockchain concept can be further implemented for resolving data storage problems.

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number (RGP 1/147/42).This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-Track Research Funding Program.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲天堂国产精品一区在线| 丰满人妻熟妇乱又伦精品不卡| 婷婷六月久久综合丁香| 狠狠狠狠99中文字幕| 黑人欧美特级aaaaaa片| 午夜a级毛片| 美女 人体艺术 gogo| 国产精品久久久av美女十八| 日本撒尿小便嘘嘘汇集6| av在线播放免费不卡| 首页视频小说图片口味搜索| 欧美日本亚洲视频在线播放| 免费在线观看亚洲国产| 亚洲第一av免费看| 亚洲国产精品久久男人天堂| 亚洲av成人不卡在线观看播放网| 欧美色欧美亚洲另类二区| 美女午夜性视频免费| 热99re8久久精品国产| 丁香欧美五月| 亚洲人成伊人成综合网2020| 搡老岳熟女国产| 精品日产1卡2卡| 在线观看一区二区三区| 国产激情欧美一区二区| av欧美777| 亚洲成国产人片在线观看| 国产精品影院久久| 国产成人av教育| 黄片小视频在线播放| 久久午夜综合久久蜜桃| 亚洲久久久国产精品| netflix在线观看网站| 国内精品久久久久久久电影| 日韩视频一区二区在线观看| 国产三级在线视频| 黄色丝袜av网址大全| 国内毛片毛片毛片毛片毛片| 韩国av一区二区三区四区| 天天添夜夜摸| 黑人巨大精品欧美一区二区mp4| 色尼玛亚洲综合影院| 丝袜人妻中文字幕| 韩国精品一区二区三区| 亚洲欧洲精品一区二区精品久久久| 宅男免费午夜| 国产亚洲精品久久久久久毛片| 国产精品久久电影中文字幕| 国产精品久久视频播放| 国产不卡一卡二| 久久国产亚洲av麻豆专区| 女警被强在线播放| 99精品欧美一区二区三区四区| 美女国产高潮福利片在线看| 国产麻豆成人av免费视频| 香蕉av资源在线| 侵犯人妻中文字幕一二三四区| 国产成人欧美在线观看| 变态另类丝袜制服| 美女国产高潮福利片在线看| 桃色一区二区三区在线观看| 国产午夜精品久久久久久| 老司机靠b影院| 国产单亲对白刺激| 久久久久久久午夜电影| 亚洲成人免费电影在线观看| 国产精品一区二区免费欧美| 99国产综合亚洲精品| 一区福利在线观看| 一区二区三区激情视频| www.精华液| www.www免费av| 久久久水蜜桃国产精品网| 老司机靠b影院| 男男h啪啪无遮挡| 国产真实乱freesex| 亚洲中文av在线| 亚洲三区欧美一区| 精品久久久久久久久久免费视频| 欧美激情高清一区二区三区| 久久久久久人人人人人| 精品一区二区三区av网在线观看| 国产色视频综合| 国产私拍福利视频在线观看| 国产午夜福利久久久久久| 日韩大尺度精品在线看网址| 国产区一区二久久| 日韩 欧美 亚洲 中文字幕| 亚洲 欧美一区二区三区| 久久精品91无色码中文字幕| 国产野战对白在线观看| 久久久久国产一级毛片高清牌| 国产精品,欧美在线| 免费无遮挡裸体视频| 久久青草综合色| 国产成人影院久久av| 久久久久久久久久黄片| 亚洲 欧美 日韩 在线 免费| 一卡2卡三卡四卡精品乱码亚洲| 满18在线观看网站| 亚洲国产看品久久| 一区二区三区国产精品乱码| 免费看十八禁软件| 国产av在哪里看| 亚洲在线自拍视频| 久久香蕉激情| 成人免费观看视频高清| 亚洲三区欧美一区| 夜夜夜夜夜久久久久| 国产一区二区激情短视频| 女性被躁到高潮视频| 中出人妻视频一区二区| 亚洲性夜色夜夜综合| 国产一级毛片七仙女欲春2 | 色av中文字幕| 母亲3免费完整高清在线观看| 婷婷六月久久综合丁香| 12—13女人毛片做爰片一| 丁香六月欧美| 狂野欧美激情性xxxx| 禁无遮挡网站| 99热只有精品国产| 黑人巨大精品欧美一区二区mp4| 免费一级毛片在线播放高清视频| 精品欧美一区二区三区在线| 日韩av在线大香蕉| 18禁国产床啪视频网站| 亚洲精品在线美女| 亚洲国产日韩欧美精品在线观看 | 久久精品91无色码中文字幕| 国产午夜精品久久久久久| 男人舔奶头视频| www日本在线高清视频| 91老司机精品| 欧美日韩亚洲国产一区二区在线观看| 中文字幕人妻熟女乱码| 国产成人精品无人区| 美女高潮到喷水免费观看| 日韩成人在线观看一区二区三区| 亚洲人成网站在线播放欧美日韩| 欧美大码av| 1024手机看黄色片| 精品国产乱码久久久久久男人| 久久国产精品男人的天堂亚洲| 激情在线观看视频在线高清| 婷婷丁香在线五月| 免费搜索国产男女视频| 亚洲片人在线观看| 色婷婷久久久亚洲欧美| 午夜福利成人在线免费观看| 1024手机看黄色片| 国产熟女午夜一区二区三区| 18美女黄网站色大片免费观看| 亚洲国产欧洲综合997久久, | 国内揄拍国产精品人妻在线 | 亚洲中文字幕日韩| 日本在线视频免费播放| 国产成人影院久久av| 99热只有精品国产| 国产精品国产高清国产av| 日本三级黄在线观看| 日本三级黄在线观看| 国产激情欧美一区二区| 亚洲av成人一区二区三| 国语自产精品视频在线第100页| 中文亚洲av片在线观看爽| 最好的美女福利视频网| 侵犯人妻中文字幕一二三四区| 国产成人一区二区三区免费视频网站| 亚洲av第一区精品v没综合| 午夜久久久久精精品| 久久国产乱子伦精品免费另类| 欧美绝顶高潮抽搐喷水| 国产爱豆传媒在线观看 | 久久久国产成人精品二区| 日日夜夜操网爽| 麻豆av在线久日| 亚洲成av片中文字幕在线观看| 国产精品久久久av美女十八| 欧美亚洲日本最大视频资源| 国产精品一区二区精品视频观看| 搞女人的毛片| 成人精品一区二区免费| 久久久久精品国产欧美久久久| 97超级碰碰碰精品色视频在线观看| 久久香蕉激情| 国产精品 国内视频| 中文字幕另类日韩欧美亚洲嫩草| 色综合站精品国产| 亚洲av美国av| 国产私拍福利视频在线观看| 一a级毛片在线观看| 亚洲成人精品中文字幕电影| 日韩欧美国产一区二区入口| 午夜视频精品福利| 色哟哟哟哟哟哟| 黄色成人免费大全| 日韩国内少妇激情av| 欧美久久黑人一区二区| 国产成人啪精品午夜网站| 久久久久精品国产欧美久久久| 91麻豆av在线| aaaaa片日本免费| 亚洲精华国产精华精| 欧美日韩乱码在线| 国产一卡二卡三卡精品| 一a级毛片在线观看| 成人三级黄色视频| 2021天堂中文幕一二区在线观 | 免费高清视频大片| 国产av一区二区精品久久| 巨乳人妻的诱惑在线观看| 亚洲欧美日韩无卡精品| 亚洲真实伦在线观看| 日韩精品青青久久久久久| 老汉色∧v一级毛片| 一边摸一边做爽爽视频免费| 老司机深夜福利视频在线观看| 免费在线观看日本一区| 亚洲欧美日韩高清在线视频| 免费在线观看日本一区| 男女那种视频在线观看| 久久久久精品国产欧美久久久| 久久久久久亚洲精品国产蜜桃av| 久久久精品国产亚洲av高清涩受| 一进一出抽搐动态| 男人的好看免费观看在线视频 | 久久亚洲精品不卡| 精华霜和精华液先用哪个| 美女午夜性视频免费| 在线视频色国产色| 波多野结衣高清无吗| 成人国产一区最新在线观看| 精品人妻1区二区| 久久国产乱子伦精品免费另类| 老汉色av国产亚洲站长工具| 欧美性猛交黑人性爽| 国产私拍福利视频在线观看| 日韩欧美一区二区三区在线观看| 亚洲成人精品中文字幕电影| 97碰自拍视频| 日韩精品青青久久久久久| 男女午夜视频在线观看| 手机成人av网站| 国产精品免费视频内射| 99国产精品一区二区三区| 又黄又粗又硬又大视频| 香蕉久久夜色| 美国免费a级毛片| 免费在线观看视频国产中文字幕亚洲| 国产成人精品久久二区二区免费| 天天一区二区日本电影三级| 国产精品亚洲美女久久久| 亚洲自偷自拍图片 自拍| 亚洲午夜理论影院| 亚洲av成人一区二区三| 亚洲国产日韩欧美精品在线观看 | 99精品在免费线老司机午夜| 久久久久国产精品人妻aⅴ院| 少妇熟女aⅴ在线视频| 国产成人精品久久二区二区免费| 亚洲国产欧美网| 看黄色毛片网站| 亚洲av成人一区二区三| 欧美一级a爱片免费观看看 | 9191精品国产免费久久| 黄色 视频免费看| 女生性感内裤真人,穿戴方法视频| or卡值多少钱| 91av网站免费观看| 亚洲人成77777在线视频| 亚洲熟妇熟女久久| 美女高潮到喷水免费观看| 少妇裸体淫交视频免费看高清 | 激情在线观看视频在线高清| 国产精品亚洲美女久久久| 久久精品亚洲精品国产色婷小说| 老司机深夜福利视频在线观看| 欧美激情久久久久久爽电影| 变态另类成人亚洲欧美熟女| 婷婷精品国产亚洲av| 男人舔女人的私密视频| 人人妻人人澡欧美一区二区| 巨乳人妻的诱惑在线观看| 色综合亚洲欧美另类图片| 亚洲中文av在线| 国产伦人伦偷精品视频| 日本 欧美在线| 嫁个100分男人电影在线观看| 亚洲人成电影免费在线| 夜夜夜夜夜久久久久| 一本精品99久久精品77| 可以在线观看毛片的网站| 在线十欧美十亚洲十日本专区| 黄网站色视频无遮挡免费观看| 神马国产精品三级电影在线观看 | 成人av一区二区三区在线看| 国产精品久久久久久亚洲av鲁大| 日韩 欧美 亚洲 中文字幕| 精品乱码久久久久久99久播| 嫩草影院精品99| 最近在线观看免费完整版| 狂野欧美激情性xxxx| 亚洲天堂国产精品一区在线| 亚洲午夜理论影院| 亚洲一区中文字幕在线| 大型黄色视频在线免费观看| 亚洲第一av免费看| 国产精品一区二区三区四区久久 | 嫁个100分男人电影在线观看| 午夜老司机福利片| 亚洲欧洲精品一区二区精品久久久| 久久 成人 亚洲| 精品福利观看| 欧美一区二区精品小视频在线| 国产成人系列免费观看| 国产精品,欧美在线| 久久久久久久午夜电影| 国产精品自产拍在线观看55亚洲| 俄罗斯特黄特色一大片| 丝袜人妻中文字幕| 久久久国产成人免费| 婷婷丁香在线五月| 淫妇啪啪啪对白视频| 亚洲国产日韩欧美精品在线观看 | 性欧美人与动物交配| 国产久久久一区二区三区| 欧美大码av| 不卡av一区二区三区| 国产亚洲精品久久久久久毛片| 精品电影一区二区在线| 91成人精品电影| 黄色视频不卡| 色播亚洲综合网| 国产熟女午夜一区二区三区| 成人国语在线视频| 男女那种视频在线观看| 熟妇人妻久久中文字幕3abv| 欧美精品亚洲一区二区| 悠悠久久av| 精华霜和精华液先用哪个| 中文字幕人妻丝袜一区二区| 免费观看人在逋| 可以在线观看的亚洲视频| 欧美成人免费av一区二区三区| 成人一区二区视频在线观看| 国产精品98久久久久久宅男小说| 亚洲精品在线观看二区| 中文字幕人妻丝袜一区二区| 精品久久久久久久末码| 国产国语露脸激情在线看| 级片在线观看| 法律面前人人平等表现在哪些方面| 国产av一区在线观看免费| 国产成+人综合+亚洲专区| 神马国产精品三级电影在线观看 | 精品久久久久久,| 亚洲久久久国产精品| 在线观看舔阴道视频| 精品不卡国产一区二区三区| 国产不卡一卡二| 听说在线观看完整版免费高清| 欧美日韩乱码在线| 无人区码免费观看不卡| 国产成人av激情在线播放| 日本熟妇午夜| 午夜福利18| 黑丝袜美女国产一区| 一级作爱视频免费观看| 中文在线观看免费www的网站 | 免费在线观看日本一区| 婷婷亚洲欧美| 精华霜和精华液先用哪个| 久久人妻福利社区极品人妻图片| 国产亚洲av嫩草精品影院| 中文在线观看免费www的网站 | www国产在线视频色| www.熟女人妻精品国产| 免费在线观看日本一区| 变态另类成人亚洲欧美熟女| 人人妻人人澡欧美一区二区| 99热只有精品国产| 亚洲狠狠婷婷综合久久图片| 在线观看免费午夜福利视频| 一本精品99久久精品77| 精品福利观看| 色在线成人网| 亚洲男人天堂网一区| 俄罗斯特黄特色一大片| 1024手机看黄色片| 中文在线观看免费www的网站 | 啦啦啦韩国在线观看视频| 日本成人三级电影网站| 亚洲片人在线观看| 狠狠狠狠99中文字幕| 三级毛片av免费| 色综合婷婷激情| 黄网站色视频无遮挡免费观看| 少妇被粗大的猛进出69影院| 国产黄色小视频在线观看| 国产欧美日韩一区二区精品| 国产aⅴ精品一区二区三区波| 女人爽到高潮嗷嗷叫在线视频| 亚洲专区国产一区二区| 国产av一区二区精品久久| 亚洲七黄色美女视频| 非洲黑人性xxxx精品又粗又长| 淫妇啪啪啪对白视频| 777久久人妻少妇嫩草av网站| 欧美精品啪啪一区二区三区| 亚洲av电影在线进入| 免费在线观看视频国产中文字幕亚洲| 黄色丝袜av网址大全| 久久精品成人免费网站| www.www免费av| bbb黄色大片| 久久久久久久久中文| 亚洲专区中文字幕在线| 亚洲av电影在线进入| 免费看日本二区| 女性被躁到高潮视频| 久久亚洲精品不卡| 禁无遮挡网站| 国产激情欧美一区二区| 婷婷精品国产亚洲av在线| 亚洲欧美一区二区三区黑人| 午夜成年电影在线免费观看| 精品少妇一区二区三区视频日本电影| 免费av毛片视频| 啪啪无遮挡十八禁网站| 制服人妻中文乱码| 亚洲国产欧美日韩在线播放| 淫秽高清视频在线观看| 首页视频小说图片口味搜索| 国产精品国产高清国产av| 国内揄拍国产精品人妻在线 | 女人被狂操c到高潮| 亚洲一区中文字幕在线| 一进一出好大好爽视频| 看免费av毛片| 亚洲国产精品久久男人天堂| 亚洲精品国产区一区二| 国产一区二区三区在线臀色熟女| 99久久综合精品五月天人人| 日日摸夜夜添夜夜添小说| 亚洲精品中文字幕在线视频| 免费高清视频大片| 69av精品久久久久久| 精品久久久久久久久久免费视频| 波多野结衣高清无吗| 51午夜福利影视在线观看| 在线播放国产精品三级| 午夜福利高清视频| 免费看美女性在线毛片视频| 成人18禁在线播放| 免费在线观看影片大全网站| 久久久精品欧美日韩精品| 熟女少妇亚洲综合色aaa.| 国产成人欧美| 国产精品av久久久久免费| 成人18禁在线播放| 亚洲全国av大片| 一区二区三区激情视频| 天堂动漫精品| 无人区码免费观看不卡| 亚洲最大成人中文| 天堂动漫精品| 久久性视频一级片| 黄色a级毛片大全视频| 免费看十八禁软件| 黄色毛片三级朝国网站| 18禁观看日本| 色综合站精品国产| 俄罗斯特黄特色一大片| 99久久国产精品久久久| 啦啦啦韩国在线观看视频| 每晚都被弄得嗷嗷叫到高潮| 国产亚洲欧美在线一区二区| 国产久久久一区二区三区| 欧美不卡视频在线免费观看 | 国产麻豆成人av免费视频| 亚洲一区二区三区不卡视频| 一级a爱片免费观看的视频| 日日干狠狠操夜夜爽| www.精华液| 亚洲三区欧美一区| 精品国产美女av久久久久小说| 在线观看日韩欧美| 欧美一级a爱片免费观看看 | 欧美日韩一级在线毛片| 人人澡人人妻人| 亚洲精品中文字幕在线视频| 一进一出好大好爽视频| 免费搜索国产男女视频| 亚洲男人的天堂狠狠| 最新美女视频免费是黄的| 一级a爱视频在线免费观看| 两个人免费观看高清视频| 中文字幕人妻熟女乱码| 波多野结衣巨乳人妻| 男女午夜视频在线观看| 久久中文字幕一级| 久99久视频精品免费| 精品国产国语对白av| 亚洲精品久久成人aⅴ小说| 亚洲av熟女| 久久伊人香网站| 在线观看66精品国产| 亚洲久久久国产精品| 欧美日韩福利视频一区二区| 黄色毛片三级朝国网站| 嫩草影视91久久| 麻豆av在线久日| 人妻丰满熟妇av一区二区三区| 人人妻人人澡欧美一区二区| 18禁美女被吸乳视频| 在线观看免费午夜福利视频| 看免费av毛片| 夜夜看夜夜爽夜夜摸| 亚洲激情在线av| 国产色视频综合| 真人做人爱边吃奶动态| 精品国产一区二区三区四区第35| 69av精品久久久久久| 91大片在线观看| 久久久久久免费高清国产稀缺| 在线天堂中文资源库| 午夜老司机福利片| 国产亚洲精品综合一区在线观看 | 在线观看免费午夜福利视频| 波多野结衣巨乳人妻| 色在线成人网| 男女视频在线观看网站免费 | 婷婷六月久久综合丁香| 日韩av在线大香蕉| 人人澡人人妻人| 人人妻人人澡欧美一区二区| 精品免费久久久久久久清纯| 脱女人内裤的视频| 此物有八面人人有两片| 欧美日韩乱码在线| 怎么达到女性高潮| 此物有八面人人有两片| 中国美女看黄片| 日日夜夜操网爽| 在线观看一区二区三区| 亚洲欧美激情综合另类| 少妇熟女aⅴ在线视频| www.999成人在线观看| 在线av久久热| 日韩免费av在线播放| 久久中文字幕人妻熟女| 成人18禁在线播放| 亚洲精品在线美女| 久久亚洲真实| 看片在线看免费视频| www日本黄色视频网| 老鸭窝网址在线观看| 99国产精品一区二区三区| 深夜精品福利| 99久久综合精品五月天人人| 国产成人系列免费观看| 成年人黄色毛片网站| 中文字幕av电影在线播放| 精品久久久久久,| 日韩大码丰满熟妇| 亚洲最大成人中文| 岛国视频午夜一区免费看| 很黄的视频免费| 久久国产精品影院| 久久亚洲真实| 一级毛片高清免费大全| 宅男免费午夜| 久久久久精品国产欧美久久久| 婷婷精品国产亚洲av在线| 大香蕉久久成人网| 激情在线观看视频在线高清| 黄色视频不卡| 欧美另类亚洲清纯唯美| 伊人久久大香线蕉亚洲五| 久9热在线精品视频| 两性午夜刺激爽爽歪歪视频在线观看 | 精品国产亚洲在线| 女性生殖器流出的白浆| √禁漫天堂资源中文www| 精品电影一区二区在线| 一个人观看的视频www高清免费观看 | 夜夜看夜夜爽夜夜摸| 久久亚洲真实| 久久国产亚洲av麻豆专区| 久久精品aⅴ一区二区三区四区| 国产极品粉嫩免费观看在线| 国产精品综合久久久久久久免费| 国产精品二区激情视频| 国内毛片毛片毛片毛片毛片| 久久久久久久久免费视频了| 久久天堂一区二区三区四区| av福利片在线| 亚洲色图av天堂| 亚洲成av片中文字幕在线观看| 日本撒尿小便嘘嘘汇集6| 少妇 在线观看| 91av网站免费观看| 欧美精品啪啪一区二区三区| 成在线人永久免费视频| 精品久久久久久成人av| 男女下面进入的视频免费午夜 | 午夜福利视频1000在线观看| 精品卡一卡二卡四卡免费| 国产精品久久久久久精品电影 | 国内精品久久久久精免费| 搡老岳熟女国产| 老司机午夜十八禁免费视频| 亚洲专区国产一区二区| 色精品久久人妻99蜜桃|