• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    BUES:A Blockchain-Based Upgraded Email System

    2022-10-27 04:50:12DaweiXuFudongWuLiehuangZhuRuiguangLiJiaqiGaoYijieShe
    China Communications 2022年10期

    Dawei Xu,Fudong Wu,Liehuang Zhu,Ruiguang Li,Jiaqi Gao,Yijie She

    1 School of Cyberspace Science and Technology,Beijing Institute of Technology,Beijing 100081,China

    2 College of Cybersecurity,Changchun University,Changchun 130022,China

    3 National Internet Emergency Center,Beijing 100081,China

    *The corresponding author,email:liehuangz@bit.edu.cn

    Abstract:This paper focuses on the improvement of traditional email system architecture with the help of blockchain technology in the existing network environment.The improved system architecture can better improve the security and stability of the system.The email content is extracted and stored in the blockchain network to achieve regulatory traceability between the email service provider and the higherlevel organization.In turn,A Blockchain-based Upgraded Email System(BUES)is proposed.The defects of the existing traditional email system are addressed.Firstly,the threat model of the traditional email system is analyzed,and solutions are proposed for various threats.Then a system architecture consisting of the blockchain network,email servers,and users are constructed.The implementation of BUES is carried out,and the related experimental process and algorithm steps are given.After the experimental analysis,it is shown that BUES can ensure the security,reliability,efficiency,and traceability of email transmission.

    Keywords:blockchain;email service;chaincode;hyperledger fabric

    I.INTRODUCTION

    Nowadays,with the rapid development of the Internet,email has long become an irreplaceable way of communication on the network.From the early stages of SMTP and POP3 to the current stage of PGP is constantly updated.The importance of email speaks for itself.Most of the current network accounts are directly associated through the email system.A lot of sensitive identity information is bound to each other with personal emails,and even the verification codes are obtained through emails.But the security of email has not been well guaranteed,and it is still a remarkable target for hacker attacks.For individuals and enterprises,the mailbox is the weakest link in the network security link.All kinds of spam emails flood personal mailboxes and directly affect users’experience.

    Although email communication has improved the user experience,there are still problems.For example,email lacks an authentication mechanism.Emails can often receive emails from forged senders.This has led to phishing,a form of hacking that has caused significant damage to users.According to a website survey report,one out of every 99 emails is a phishing email.Moreover,94%of the malware that web users are exposed to originates from the inbox[1].In recent years,due to the epidemic,most of the corporate offices have shifted online.The frequency of email use has also risen dramatically,and the frequency of employees clicking on malicious URLs in emails has tripled[2].Exacerbating the security threats faced by enterprises.In addition,the rapid development of decentralized structures and open-source applications has raised a high priority on privacy information.However,traditional email servers are controlled by major vendors,which is one of the main reasons for the leakage of personal privacy.Most of the account password databases were previously leaked out by email systems.Due to the different strategies of email service providers,there is a problem of email retention timeliness and traceability.It is also a challenge for enterprises to ensure“7×24”service on servers and to prevent data loss[3].In recent years,the term of network security has become very popular,and the security and reliability of email systems should be governed.How to solve the problems of phishing and spam emails has been a hot topic of discussion among researchers and technicians[4,5].

    Since Satoshi Nakamoto’s Bitcoin white paper[6]was published in 2008,the core technology behind Bitcoin,blockchain,has also received a lot of attention.Traditional blockchain technology has been widely used in the digital currency space.Nowadays,the second generation blockchain,Ether[7],is a Turing-complete system,and the smart contract technology supported by it has made blockchain technology more than simply a digital currency.The consortium blockchain is a permission-based blockchain that is distinct from a public blockchain.It is a blockchain that runs among a set of known and identified participants.Fabric is one of the Hyperledger projects under the auspices of the Linux Foundation[8].Fabric is used in over 400 prototypes and uses cases across different industries.These use cases include,but are not limited to,areas such as dispute resolution,trade logistics,foreign exchange settlement,food safety,contract management,diamond sourcing,reward point management,low liquidity securities trading and settlement,identity management,and settlement via digital currencies[9–12].

    The main contributions of this research are as follows:(1)Improved the traditional email architecture by using Hyperledger Fabric as the upper layer supervision.A decentralized authorized email system structure is realized.The problem of email trustworthiness and traceability is solved.(2)The BUES CA model in which Fabric CA is combined with the email system and BUES Channel model in which multiple email service providers participate are proposed in the new architecture.(3)An email server authentication mechanism is proposed.It effectively reduces the impact of malicious servers on the whole system.(4)Implemented new functions on the email server:email digest extraction and blockchain communication interface,and tested their performance.Email messages are collected without affecting the normal operation of the email server.(5)Throughput testing of the blockchain network of BUES,which proves the feasibility and superiority of the overall solution.

    The rest of the paper is structured as follows:Section II presents the technical background.Section III describes the related work.Section IV explains the BUES architecture model in detail.Section V is devoted to experiments and analysis.Section VI summarizes the whole paper.

    II.BACKGROUND

    2.1 Email Transmission Model

    Today’s email systems consist mainly of servers and clients that rely on email protocols to communicate with each other.Email protocols belong to the application layer protocols of the TCP/IP protocol cluster(e.g.SMTP,ESMTP,POP,IMAP)and use voluntary industry standards.Different servers and clients may use different protocols to communicate with each other.The drawbacks of this traditional client/server architecture are prominent,as the data are stored on a central server.Once hacked,it is difficult for the central server to have a way to ensure the integrity and transparency of email data.There are also certain shortcomings in the trustworthiness and traceability services of emails.

    The next step is to help the reader understand the workflow of the email transfer protocol by describing the process of one email transfer.First,a few concepts are introduced.

    MUA(Mail User Agent):Usually the user uses a computer that cannot send emails directly and needs to help the user deliver emails through MUA,which is similar to an interface that provides convenient email functions for local users.It is usually an application,such as Outlook Express for Windows.

    MTA(Mail Transfer Agent):It is responsible for helping users to send mail and is the main email server.

    MDA(Mail Delivery Agent):Delivers emails to the user’s inbox,usually with other advanced features such as filtering.

    Figure 1.Email transmission model.

    As shown in Figure 1,Step1:The sender wants to send an email,first of all,he needs to use MUA to send it.Here MTA is the email service provider used by the user.For example,if the sender is using Google email,MTA is also the email server of Google Inc.If it is the MTA’s email,the MTA will send the email to the MDA for processing.Step3:If Step2 is not satisfied,the MTA will send the email to the next MTA according to the recipient’s address.Step4:Here the MTA will hand over the email to the MDA until the recipient initiates a request to the MTA through the MUA to check if there is an email.The MTA will check through the MDA and if there is an email,it will be sent to the user’s MUA.The protocols used in the email transmission process are POP3,IMAP,etc.The disadvantages of the traditional email model have been mentioned in Part I.In recent years,a number of solutions have emerged to modify the traditional model,and due to the constraints of this C/S architecture,most of the modifications are to provide an endto-end encryption service as a way to improve the security during transmission,such as PGP,PKI/CA,etc.[13].Although email service providers now offer a variety of programs or solutions to address the encryption problem,there is still no industry standard.Moreover,there are many security vulnerabilities in such schemes.The server-side security is not controllable and cannot provide a stable 24h service.In addition,data can be easily and permanently lost.The search for a new solution has been a hot research topic in recent years,and the emergence of blockchain has brought an opportunity to update the technology.Applying blockchain technology to the email transmission system is also a new attempt in the field of blockchain technology application.

    2.2 Blockchain

    Blockchain technology allows the construction of an immutable,distributed,secure,and publicly accessible repository(ledger)of data.It relies on a distributed consensus protocol to manage this repository in a distributed manner[14](e.g.,to decide which valid new data to add).Blockchain technology was first introduced to support cryptocurrency systems[15],when attention was still focused on the concept of”tokens”and the creation of various electronic cash systems became the norm.Later on,the birth of Ethernet introduced smart contracts on top of the original blockchain.It is an open-source,decentralized computing infrastructure with Turing-complete features,so it is often referred to as the”world computer”.Developers can use Ether to develop and build decentralized applications based on blockchain technology[16],which are also known as DAPPs[17].The emergence of Ether has also driven the whole blockchain toward industrialization and has gained significant achievements in the fields of the Internet of Things,finance,and public services[18,19].

    Blockchain can be divided into public,consortium,and private blockchains according to the access mechanism.Among them,the public blockchain is the most decentralized,and anyone can join or exit the network anytime and anywhere without the control of institutions.Moreover,all information is open and transparent,and every transaction can be checked according to the blockchain.Private blockchain is the opposite of public blockchain,where the authority is often in the hands of an organization or an individual,and are often used in more scenarios within enterprises,so they are not introduced here.Consortium blockchain[20]have a degree of openness in between,and can be agreed upon by multiple institutions to maintain a coalition consensus protocol,with information only open to some members;the most famous one is the Hyperledger project initiated by IBM[21].

    III.RELATED WORKS

    This section discusses the existing works on the Email system transmission model and why it is necessary to redefine this classical problem for blockchains with new solutions.

    Currently,the area of email security is a hot issue for research.A new encryption protocol is proposed in paper[22]that enables end-to-end encryption of emails.However,it incurs an additional 5 times of overhead for the email service provider.The paper[23]compares some common email encryption tools and presents their problems.The paper[24]proposes a new way of attacking end-to-end encrypted emails.And the results are verified by email providers after transmission.The widespread use of various cryptographic algorithms[25]has also led to an improvement in the security of email systems.However,it does not address the vulnerability and centralization of the email system itself.Encryption alone also makes it difficult to improve the trustworthiness,scalability,and traceability of the system.

    Previous papers have also researched combining blockchain technology with email technology[26,27].They used blockchain to implement a new email delivery model.This solution subverts the existing traditional email system and is difficult to go for in reality.IPV6 is not popular now,mainly because the architecture of IPV4 has penetrated the whole internet.In the paper[28],the authors use smart contracts to replace existing email protocols and run on Ethereum.However,these studies suffer from the following drawbacks.

    (1)Too much public:All information on the public blockchain is open and transparent.Any user or attacker can join or exit at any time,which can easily cause privacy leakage of users.It raises the risk of being attacked.

    (2)Low data storage:There is a limit to the size of each block in the blockchain,and there would be a serious shortage of storage space if all email content was placed on the blockchain.

    (3)Spending too much:after deploying a smart contract in Ether,the execution process generates a gas cost based on the resources consumed.the price of gas is closely related to the price of Ether,and sending emails as the price of Ether continues to rise generates significant overhead[29].

    (4)Lower throughput:related to the size of the block.If each email has to initiates a transaction,it may cause network traffic congestion.

    (5)Realistic scenario constraints:Today’s email systems are relatively mature.If disruption requires major changes,it is less feasible.

    In this paper,we propose BUES on the existing email system combined with the consortium blockchain Hyperledger Fabric technology to address the problems of the existing email architecture.The premise is to solve all the existing security problems and reduce the resources required as much as possible.There are currently related studies that compare the difference between Ether and Hyperledger Fabric[30].Compared to the work of the above researchers,the advantages of BUES in this study,which uses the consortium blockchain as the underlying architecture,are as follows.

    (1)The members involved in the consortium blockchain can be authorities or major email service providers.This not only weakens the centralization problem of service providers.It can enhance regulation while decentralizing their power.

    (2)Improvements are made to the existing email system by adding a layer of the blockchain model.While ensuring the stable operation of the existing system,it additionally expands new types of functions.

    (3)Consortium blockchain do not perform mining algorithms,and there is no token generation,which reduces the cost.

    (4)The data of the consortium blockchain will not be public by default,unlike the public blockchain,only the alliance organization or members have the authority.It improves the security and confidentiality of the system.

    (5)The higher performance of the consortium blockchain has a better chance of carrying the volume of requests for email services.

    (6)Multiple authentication mechanisms to improve the security of the system.

    IV.BUES ARCHITECTURE

    This chapter will focus on the overall design model of BUES and some of its features.Section 4.1 provides an overview of the various parts of BUES and its operation process through the perspective of email.Section 4.2 introduces BUES starting from the overall architecture and describes the functions of its components in detail.Section 4.3 designs the email server authentication scheme for BUES.

    4.1 BUES Email Transmission Process

    In this paper,blockchain technology is introduced in the traditional email service system,and the whole transmission process is shown in Figure 2.The figure includes the following five roles,namely.

    (1)Sender:The person who sends emails needs to register an account with the service provider and obtain a virtual identity(mailbox)and CA certificate.When there is a need to send emails,the main content of emails can be sent through the client software provided by the service provider.Or the email transmission can be done directly through the HTTPS service provided by the Web browser.

    (2)Receiver:Email recipient,same as sender.Need to obtain an identity for receiving email content.

    (3)Email Server:An email server deployed by an email service provider to provide services to both senders and receivers.It manages and maintains the incoming email messages and connects to the blockchain network.

    (4)Blockchain Network:A decentralized network in which nodes provided by service providers are deployed.Nodes are the basic components of the network.Due to the different functions,they hold different jobs.Nodes maintain ledgers and smart contracts on them.And the data is exchanged with the outside of the network or between the nodes through smart contracts.Only connection communication is done with email servers.

    (5)Supervisor:The supervisor acts as a service provider or a higher authority.It can supervise the blockchain network and provide a guarantee for the stability of the network.It can also avoid attacks from malicious nodes or users.It is possible to conditionally trace the emails when there is a need.The trustworthiness of the email system is ensured.

    The above provides a general introduction to the roles in the overall system,and here the system execution process will be analyzed specifically from the email transmission flow,as seen in Figure 2,with the following steps.

    Figure 2.Email transfer flow.

    Step 1:The sender registers through the email server.It is necessary to submit relevant personal information,including user name,identity information,etc.After obtaining an account,you can send emails through the services provided by email service providers.

    Step 2:When the email server receives the registration message or email from the sender,it will perform email digest extraction.After that,it will be submitted through the interface provided by the blockchain node.The blockchain node will perform the bookkeeping operation on the data submitted by the email server.

    Step 3:After the email server submits the email digest message to the blockchain node.The email will be forwarded according to the destination address of the email.It may pass through one or more email servers in the middle of the process.

    Step 4:After the above process,the emails will be delivered to the recipient’s mailbox.Here,the traditional email transfer protocol is used,and the recipient can get the email on the email server through the email transfer protocol.

    Step 5:After receiving the email,the user can verify the authenticity of the email.After sending the”verify”action to the email server,the email server will send a request to the blockchain system to get the verification result.

    Step 6:The regulator can conditionally call part of the book data in the node through the interface provided by the smart contract.Thus,the regulation of the email system is achieved.At the same time,the email service provider also ensures the privacy of the business data.This ledger data will not be made public as in the case of public blockchains.Blockchain network nodes are not in direct contact with the user layer and are hidden in the network avoiding a large number of cyberattacks.

    4.2 BUES Framework

    As shown in Figure 3,the BUES proposed in this paper can be divided into multiple layers.First,the client layer consists of registered users and unregistered users.Users can access the server layer through a browser or a client program.Secondly,the server layer consists of a set of email servers that provide services normally.The email servers mainly provide email transmission services for the user layer.The servers that join BUES can expand their functions to provide authentication services for users while providing email transmission services.And use the email digest extraction function to generate email digests.Communicate with the interface provided by the blockchain network for submitting email digests with the authentication service.Newly registered users can register their accounts and obtain the corresponding CA certificates and keys through the authentication service provided by the email server.The authentication services of the email server are mainly provided by the CA authorities of the corresponding email service providers in the blockchain network[31].Finally,the blockchain network layer uses the consortium blockchain Hyperledger Fabric.The blockchain network includes multiple email service providers or regulators.They are free to form federations and interact with the ledger data via Channel.Each organization is required to maintain one or more Peer nodes.In a Hyperledger Fabric network,nodes maintain ledgers and Chaincode(smart contract).The nodes provide interfaces through the Chaincode to open up server-level access to the blockchain network.The entire BUES architecture split is described in detail below in conjunction with the corresponding service sections.

    4.2.1 BUES CA Authentication System

    In BUES,a multi-level CA authentication system is used to ensure the reliability of the client-server identity and to enable encrypted transmission of messages.To make the identity verifiable,it is necessary to go through a trusted authority CA.As shown in Figure 4,an email server needs to register with the Fabric CA of its organization to become a valid member of the system,as this ensures that the server is reliable.The application certificate information includes the organization where it is located,the server’s information,and related attributes.Once the verification is successful,the CA of the organization where the server is located(that is,the ROOT CA in the CA chain)will sign the server certificate.At the same time,a message is returned from the Fabric CA to the Server,including a signed certificate and a public-private key pair.The key is used to encrypt the message content and the digital signature.In addition,the Fabric CA records all registered server names.This design avoids multiple duplicate applications and provides a basis for certificate revocation.

    Figure 3.BUES architecture.

    Figure 4.BUES CA authentication diagram.

    Once the email server is registered as a valid member of Fabric CA,it can provide registration-related services to clients.When a user sends a registration message,the server will query the local database to determine whether it has been registered.If it is not registered,the client’s certificate will be signed according to the above operation,and then the server will act as Fabric CA in relation to the client.After signing the client’s certificate,the server will write the relevant information of the user into the database.At this point,the client obtains the certificate and considers the counterpart providing services for itself to be trustworthy.This constitutes a certificate”chain of trust”,and Fabric CA acts as ROOT CA in the whole chain to guarantee the identity of the server in the organization,and Server CA acts as Intermediate CA to guarantee the identity of the client.This structure not only enables CAs to ensure security but also expands their functions,limiting the exposure of ROOT CAs without affecting the trust system.If the ROOT CA is compromised,the entire trust chain will be compromised.And it is the Intermediate CA that is compromised,and the ROOT CA can also take relevant measures to revoke the Intermediate CA certificate.

    The traditional encryption and authentication problems are solved when the Client obtains the certificate and key.The sender needs to use the private key for signing and the public key for encryption when sending emails.When the receiver receives the email,it needs to use the sender’s public key to verify the identity.The uniqueness of the private key leads to an identity that cannot be forged and improves the trustworthiness of the email system.The authenticity of the information is also ensured when the information is stored in the blockchain.It is more valuable in the future for traceability,verification,and data analysis.

    4.2.2 BUES Interaction Flow

    In the Fabric network,each organization has independent nodes with CA authorities,maintains the same ledger,and communicates with other organizations through demand.The CA authority of each organization manages the identity information of organization members,issues CA certificates,and other functions.Nodes,as the main components of the blockchain network,can be classified into two categories based on their functions as follows.

    Peer nodes:usually store key data in the network and execute specific programs.The stored data includes ledger and Chaincode(smart contract),and the executed procedures include endorsement as well as Chaincode.A Peer node can store multiple books and Chaincodes,and can also execute different endorsement strategies.

    Order node:Sort node management is responsible for channel creation,channel configuration update,and other operations.Processes transaction message requests submitted by clients.Order the transactions and pack them into new blocks according to the rules.Submits the ledger and maintains the channel ledger data.Provide Broadcast transaction broadcast service,Order consensus sorting service,Deliver block distribution service,etc.For nodes across the network.Usually,Hyperledger Fabric starts up with the Order sorting node first.After creating the system channel to provide normal services,then start the Peer node to enter a normal working state.

    The Chaincode is the core that enables the communication between the email server and the blockchain nodes.It is a lightweight piece of executable code that can be deployed in advance in the nodes for transaction processing.

    The BUES proposed in this paper,the flow of interaction between the server and the blockchain network is shown in Figure 5.

    First,when the server receives an incoming email from the client,it verifies the identity of the sender.After the authentication is passed,the email is processed and an email digest is generated.The email digest includes sender,recipient,server information,timestamp,and email type.Once the email digest is generated,it is submitted to the Peer node connected to it via Application.When the Peer node receives the electronic digest,it performs an endorsement policy to endorse the email digest[32].The endorsement policy is used in how the Fabric network decides whether the email digest can be properly endorsed.When a Peer node receives an email digest,it invokes the associated Chaincode for the email digest to verify the validity of the email.The endorsement policy of this system is as follows.

    Endorsement policy:

    i.The current endorsement node and the node of the organization that the Email Server belongs to must sign.

    ii.Nodes of the recipient’s organization do not participate in the policy.

    With the above endorsement policy,the endorsement node will package the passed email digest and return it to the Email Server.Email Server will then submit the received response to the Order node.

    Figure 5.BUES interaction flow.

    The Order provides sorting services for Fabric.It is responsible for ordering the email digests sent by the servers of different email service providers.In the current version,Order is mainly implemented by Raft[33].Raft is a new consensus mechanism that is different from Pow,Pos with high power consumption[34].Raft is a consensus protocol that does not require a mining mechanism to achieve low power consumption.It also has linear complexity and is highly efficient.This system also uses Raft as a consensus algorithm for the sorting operation of email digests.

    Order node packages the sorted email digests into blocks and distributes them to Peer nodes in the network through Gossip protocol[35].Gossip protocol is now widely used in P2P technology and blockchain technology.The process in BUES is initiated by Order nodes.When an Order node has an email digest that needs to be updated into the network,it randomly selects surrounding neighboring nodes to broadcast the message.The nodes that receive the message also repeat the process until eventually,all the nodes in the network receive the message.The process is shown in Figure 5.This process may take some time.Since there is no guarantee that all nodes will receive the message at some point,but theoretically all nodes will eventually receive the message,it is a final consistency protocol.Peer nodes,upon receiving the packaged block,verify the block and write it to the ledger,and update the world state.At this point,the email digest is permanently stored in the blockchain network,and it is easy to query,analyze,and supervise these email transmission processes.

    4.2.3 BUES Channel

    The introduction of Channel in BUES is mainly based on two reasons:(i)Due to the different organizational structures nowadays have different business scenario constraints[36].Such as several intra-enterprise email communications,email communications between schools,email communications between higher management and lower-level departments,etc.This scenario does not want to have a third party involved in the situation.(ii)A Channel is a private communication”subnet”established between two or more email service providers.Each transaction on the network is executed on the established Channel and is not visible to the other organizations.Third parties are also unaware that other organizations have joined certain Channels,thus ensuring that the entire ledger is private.It also ensures the privacy of several organizations sending emails to each other to avoid damage caused by competitors getting access to critical information.

    BUES Channel(BC)can be created at any time in the network and each BC contains Email Service Provider(ESP),Peer Node of ESP,Shared Ledger,Order Node & Contract Program.The email digest of each of these ESPs is propagated in the designated BC,and the propagated transactions must be authenticated with the authorization of each part.Among them,ESP and Peer nodes can belong to multiple BCs at the same time.BCs can separate different ledgers through consensus codes,ESP identifiers,and Gossip propagation protocols.The BC mechanism also represents the potential for future development of BUES.

    4.3 Email Server Authentication Scheme

    Email server access to the blockchain network is equivalent to an untrustworthy unit,so a consensus mechanism needs to be designed to unify the authentication of email servers in the blockchain network.This solution can effectively prevent the damage of malicious email servers and reduce the risk of email servers being attacked.And the digital certificate can also be withdrawn by stopping the service to that server after being attacked.The scheme mainly includes email server(ES),service provider(SP),and consensus node(CN).SP is mainly responsible for initialization of system parameters and registration of ES.ES submits its information to SP,SP verifies its authenticity,and completes registration.CN uses blockchain technology to authenticate the identity information of the server.Finally,CN broadcasts the result to complete the verification of ES by the blockchain network.

    The main elements of the scheme are explained below.The scheme consists of three parts:ES initialization phase,ES registration phase,and ES authentication phase.First,the system needs to be initialized.The basic profile in the network is obtained,and the corresponding algorithm and key are selected.Before generating a message interaction with the ES,it is necessary to ensure that the ES is registered.Both tasks are done by the SP.The CN will decide whether to add the ES to the trusted server of the blockchain-based on the consensus result.As shown in Algorithm 1.

    After completing the steps of Algorithm 1,the SP acts as a client of the CN.The CN verifies that consensus can be reached by using the consensus algorithm in the blockchain.If the CN believes that the ES is trustworthy,the ES will be granted a digital signature.Otherwise,they will refuse to provide service for that ES.Since traditional consensus algorithms have problems such as low consensus efficiency and wasted arithmetic power.Therefore,we choose to use the PBFT consensus algorithm[37,38]here to improve the authentication efficiency.

    V.EXPERIMENTAL

    In this chapter,we will focus on showing the process and results of BUES implementation.Section 5.1 deploys the email server manually and implements the related functions on the email server.The focus was added on the email digest extraction method.The performance of the email digest extraction algorithm is tested and the analysis of the results is completed.Deployment design of nodes,code in Fabric network in section 5.2.Stress testing of the whole blockchain network is performed.In section 5.3,the overall feasibility of BUES is explained in detail and the comparison results are given.Section 5.4 presents the flaws and shortcomings of BUES.

    5.1 Email Digest Extraction

    To simulate a traditional email server,we developed a set of simple models using JAVA.First,the email server code is deployed in the cloud.The local machine uses an email generator to send emails to the server built in the cloud.Thus,the real network environment is simulated as much as possible,which is affected by network latency,transmission delay,etc.It makes the experimental data more reliable.

    In the model of BUES,the email server extracts a digest of the email when it receives an email from a user.Algorithm 2 shows the process of implementing this algorithm.It divides the set E of emails,by whether it has the identifierFiinto setEdand setEf.So that it performs different operations onEdandEfrespectively.

    For Algorithm 2 we are implementing it by using an additional interface on the email server.The functionality can be turned off or on at any time.When the function is turned on,only additional operations such as judgment and key information extraction are needed.Algorithm 2 works in synchronous mode.While the email server is processing the data in setEf,it can also perform normal forwarding operations on the data in setEf.The email digestDerecords the sender,receiver,timestamp,email server,and email type information.Sender and receiver are the basic attributes of an email,which are indispensable for the BUES system.A mapping relationship can be constructed using these two fields to provide a basis for traceability work.Meanwhile,the email address of the malicious email user can be obtained through further analysis possibly.The signature of the email server can clarify the generation of eachDereflecting those email servers doing more work in the whole system.Email type information is used as a reserved field.

    Figure 6.Email forwarding experimental.

    In the 200 rounds of email forwarding experiments,we will use a control variable approach.Group experiments will be conducted using the same emails,the same email server with or without the email digest extraction feature enabled.The horizontal axis of the graph indicates the number of incoming and processing forwarded emails,and the vertical axis indicates the time spent.To improve accuracy,the data for each of these experiments is plotted by taking the mean value from 10 experiments.

    From Figure 6,we can see that the performance of BUES Email Server and Email Server is similar when the number of emails is low.The latency of the BUES Email Server increases slowly at a higher number of emails.As the email forwarding latency generated by this experiment has three components:propagation latency,transmission latency,and processing latency.We process the data in the experiment by using Equation(1):

    The processing delay was extracted separately.Then the two sets of data are weighted and averaged.The processing latency in the two data sets is compared separately for the same number of routinely forwarded emails and the email forwarding latency values.As shown in Table 1.

    Under conventional conditions,the additional delay of the BUES system occupies about 1% compared tothe delay of the whole network.This is shown in Figure 7.Although it may cost higher latency during peak times when the number of emails is higher.But the functionality and security provided by BUES are more meaningful.The small amount of resource consumption is also justified.The improvement in machine performance also reduces the processing time of the email digest extraction algorithm.

    Table 1.Latency data of different systems.

    Figure 7.Channel created.

    5.2 Fabric Network Testing

    BUES using Fabric version 1.4,is running on an Ubuntu 20.04 system.The network environment is deployed in container Docker version 20.10.2.Here we will build a Fabric network with four Order nodes and three email service providers,where each email service provider has two Peer nodes.After defining the organizational structure of the network,we design the execution process of the nodes in the network.Algorithm 3 gives the process of processing Email digest by Fabric.It involves an endorsement phase and a submission phase.Before the commit phase,some email digests are packaged by Order nodes to form new blocks.Each block is broadcast to the corresponding node.Finally,the generated blocks are stored in a nonmodifiable ledger with the received blocks and hence are non-repudiation.

    Figure 8.BUES blockchain throughput.

    With the environment built and the code written above.The email server extracts and sends the content of the email digest by calling the algorithm,and finally stores it in the shared ledger of the blockchain.By querying the shared ledger,operations such as trustworthiness verification and traceability of emails can be realized.After completing the design of the blockchain system,we conducted a stress test on its performance.The number of responses of the blockchain system was tested using different numbers of requests in the same time.The results are shown in Figure 8.

    As can be seen from Figure 8,the throughput of the blockchain network system reaches a maximum value of about 180/s when the number of requests is about 280/s.The efficiency of the system is affected when the number of requests is too large exceeding the threshold value of the system.So that the throughput decreases.The results show that the network initially built using Fabric already has a certain performance to serve the email server to serve.Compared to the throughput of Bitcoin and Ethereum systems(Bitcoin 6tx/s,Ethereum limited by gas),BUES has a greater advantage.

    5.3 System Analysis

    In today’s email system architecture,different email service providers are responsible for the security and reliability of their email servers and email users.In case of an attack,a large amount of private user data can be leaked and email data can be corrupted or lost.In this regard,blockchain can hide the core data of major vendors in the blockchain network behind the email servers.The consortium blockchain has a welldefined access mechanism by the participants,so it is less likely to be subject to cyber-attacks.The CA mechanism in Fabric also provides a trust model between users,servers,and blockchain nodes.It circumvents the attack method of identity forgery.For email tampering,since the email server will query and verify the altered emails before the recipient receives them,emails that do not pass the verification will be processed by the email server.This approach greatly improves the trustworthiness of emails.In contrast,in today’s email systems,it is often difficult for users to distinguish the true trustworthiness of emails.The email server authentication scheme proposed in this system also circumvents the damage caused by malicious servers.The harm of phishing emails is avoided from both the server-side and the client-side.

    The system proposed in this paper is designed with minimal impact on the current email system.The blockchain network is combined with real email service scenarios through Chaincode.It improves the extensibility of the traditional email system and can add some advanced functions or perform data analysis in the blockchain network.The BUES Channel feature also enables private email communication between multiple organizations.It is also possible to expand the business and improve the functions in the blockchain network.Compared with the public blockchain,its scalability decreases as the number of nodes increases.In contrast,the consortium blockchain in BUES contains only the members of the federations.Network participants can be decided by the members of the coalition.

    Compared with public blockchains,consortium blockchains are characterized by low cost and high efficiency[39].In terms of efficiency,consortium blockchains can provide low latency and high throughput[40,41].There are now some studies on the performance of consortium blockchains based on the performance of Fabric networks up to 20,000 transactions per second[42].In terms of consensus,an email server authentication scheme is used in this paper.It is higher than the public blockchain in terms of scalability and efficiency.But it is inferior to the public blockchain in terms of fault tolerance.However,the entities in the consortium blockchain are all internal members of the federations and have a high degree of trustworthiness.Public blockchains have nodes that access the network and exit unconditionally anytime and anywhere.In this respect,the consortium blockchain makes up for the deficiency in fault tolerance.As shown in Table 2,the proposed BUES is compared with the traditional email service system and public blockchain in all aspects.

    5.4 Limitations and Prospects

    In BUES,there are some shortcomings as follows.

    (1)The fields in the email digest need to be improved.For example,the email type,a field in the email digest,may be given more meaning at a later stage.By identifying the specific feature values of emails,deep learning is applied to classify them.This paper is about classifying spam emails by deep learning[43].Later,more advanced Ordering algorithms can be applied to email digests in this field.

    (2)The reward and punishment mechanism in the system is yet to be designed[44,45].When the blockchain identifies a malicious email or even a malicious user,the relevant treatment should be dealt with.There should be a synchronized notification mechanism based on the existing email system so that the email server can avoid serving malicious users or imposing penalties.Warnings for users who send malicious emails.

    (3)Not considering more business expansion.For many email service providers,the email system may be only one of the businesses.As the business expands new business scenarios may also emerge.In this case,further improvements are needed according to differ-ent practical situations.

    Table 2.System comparison analysis.

    VI.CONCLUSION

    In this paper,blockchain technology is introduced on top of the traditional email service system.A blockchain-based upgraded email system(BUES)is proposed.The design of BUES not only considers the security of each entity in the system but also considers the realistic business scenarios of email services.The blockchain operation is performed for the transmission of emails while the system is guaranteed to be reliable.A new model of traceable emails is demonstrated for regulators and email service providers.At the same time,the authorized access feature of the consortium blockchain is utilized:on the one hand,the privacy of user data is protected.On the other hand,the degree of email service centering is reduced due to multiple trusted organizations or email service providers inside the network.A consensus mechanism for email server identity authentication is also implemented on this basis based on this application scenario.In future work,we will study more data storage on the blockchain and analyze the data.Improve the identification of emails and further improve the efficiency of the system.Based on this,further attempts will be made to study the use of blockchain for covert email communication between multiple organizations.To provide a more secure and efficient service for enterprise email communication systems.

    ACKNOWLEDGEMENT

    This research was supported by the China Mobile Research Foundation of the Ministry of Education(No.MCM20180401).State Administration of Science,Technology and Industry for National Defence,PRC(NO.JCKY2020602B008).

    久久国产精品人妻蜜桃| 久久精品成人免费网站| 一级黄色大片毛片| 精品熟女少妇八av免费久了| 精品亚洲成a人片在线观看| 高清在线国产一区| 亚洲人成77777在线视频| 国产高清视频在线播放一区 | 纯流量卡能插随身wifi吗| 啦啦啦中文免费视频观看日本| 亚洲美女黄色视频免费看| 精品一品国产午夜福利视频| 亚洲 欧美一区二区三区| 免费人妻精品一区二区三区视频| 啦啦啦免费观看视频1| 中文字幕精品免费在线观看视频| 日韩一卡2卡3卡4卡2021年| 久久精品国产亚洲av香蕉五月 | 精品国产一区二区三区四区第35| 日日摸夜夜添夜夜添小说| 最近中文字幕2019免费版| 国产精品影院久久| 啦啦啦在线免费观看视频4| 欧美人与性动交α欧美精品济南到| 搡老岳熟女国产| av又黄又爽大尺度在线免费看| 久久免费观看电影| 两性夫妻黄色片| 黑人欧美特级aaaaaa片| 久久99一区二区三区| 蜜桃在线观看..| 建设人人有责人人尽责人人享有的| 久久热在线av| 一区在线观看完整版| 欧美激情高清一区二区三区| 波多野结衣av一区二区av| 在线十欧美十亚洲十日本专区| 精品第一国产精品| 99热国产这里只有精品6| 亚洲性夜色夜夜综合| 亚洲,欧美精品.| 黑人巨大精品欧美一区二区蜜桃| 不卡av一区二区三区| 午夜激情久久久久久久| 久久人妻熟女aⅴ| h视频一区二区三区| 婷婷成人精品国产| 国产亚洲精品一区二区www | 男男h啪啪无遮挡| 日本一区二区免费在线视频| 成人免费观看视频高清| 在线观看一区二区三区激情| 日本91视频免费播放| 免费黄频网站在线观看国产| 欧美97在线视频| 日韩视频在线欧美| 国产成人系列免费观看| 在线观看一区二区三区激情| 精品国产超薄肉色丝袜足j| 国产精品亚洲av一区麻豆| 在线看a的网站| 免费在线观看视频国产中文字幕亚洲 | 国产麻豆69| 十八禁网站网址无遮挡| 日本五十路高清| 久久久久久免费高清国产稀缺| 淫妇啪啪啪对白视频 | 免费av中文字幕在线| 午夜福利,免费看| 少妇精品久久久久久久| 国产精品久久久久成人av| 日本猛色少妇xxxxx猛交久久| 亚洲五月婷婷丁香| 男女之事视频高清在线观看| 久久精品aⅴ一区二区三区四区| 飞空精品影院首页| 精品福利观看| 欧美久久黑人一区二区| 精品久久蜜臀av无| 日本av免费视频播放| 亚洲中文av在线| 精品人妻在线不人妻| 午夜视频精品福利| 亚洲国产精品成人久久小说| 啦啦啦在线免费观看视频4| www.熟女人妻精品国产| 欧美成狂野欧美在线观看| 欧美激情极品国产一区二区三区| 国产又爽黄色视频| 韩国精品一区二区三区| 亚洲午夜精品一区,二区,三区| 91老司机精品| 中文欧美无线码| 丝袜喷水一区| 另类精品久久| 国产成+人综合+亚洲专区| 中文字幕最新亚洲高清| 亚洲一卡2卡3卡4卡5卡精品中文| 电影成人av| 日韩欧美一区视频在线观看| 9热在线视频观看99| 成人18禁高潮啪啪吃奶动态图| 久久久水蜜桃国产精品网| 国产主播在线观看一区二区| 亚洲 国产 在线| 热re99久久精品国产66热6| 99九九在线精品视频| 欧美久久黑人一区二区| 国产精品 欧美亚洲| 桃花免费在线播放| 99热国产这里只有精品6| 久9热在线精品视频| 亚洲av欧美aⅴ国产| 久久中文字幕一级| av有码第一页| 91成年电影在线观看| 国产一区二区三区在线臀色熟女 | 一二三四在线观看免费中文在| 97人妻天天添夜夜摸| 久久久久久久久免费视频了| 高潮久久久久久久久久久不卡| 一边摸一边抽搐一进一出视频| 国产深夜福利视频在线观看| 人妻一区二区av| 亚洲国产欧美一区二区综合| 视频区图区小说| 久久人人爽av亚洲精品天堂| 天堂8中文在线网| 欧美人与性动交α欧美软件| 99久久人妻综合| 高清视频免费观看一区二区| cao死你这个sao货| 亚洲精品乱久久久久久| 中文字幕av电影在线播放| 在线观看免费高清a一片| 韩国高清视频一区二区三区| 婷婷成人精品国产| 另类亚洲欧美激情| 亚洲一码二码三码区别大吗| 首页视频小说图片口味搜索| 9色porny在线观看| 亚洲精品av麻豆狂野| 黄色视频在线播放观看不卡| 天天影视国产精品| 国产亚洲精品久久久久5区| 18禁黄网站禁片午夜丰满| 国产精品一区二区免费欧美 | 婷婷色av中文字幕| 亚洲av美国av| 免费高清在线观看视频在线观看| 婷婷丁香在线五月| 不卡av一区二区三区| 999精品在线视频| 欧美精品高潮呻吟av久久| 国产欧美日韩精品亚洲av| 久久精品久久久久久噜噜老黄| 欧美97在线视频| 久久天堂一区二区三区四区| 电影成人av| 久久99热这里只频精品6学生| 老熟女久久久| 在线看a的网站| 久久综合国产亚洲精品| 久久精品国产a三级三级三级| 人成视频在线观看免费观看| 我的亚洲天堂| 搡老岳熟女国产| 最近最新免费中文字幕在线| 中文字幕高清在线视频| 一本大道久久a久久精品| 久久久久久久国产电影| 久久99一区二区三区| 9色porny在线观看| 老司机影院成人| 久久久欧美国产精品| 69精品国产乱码久久久| 美国免费a级毛片| 午夜免费观看性视频| 欧美精品一区二区免费开放| 搡老熟女国产l中国老女人| 久久狼人影院| 亚洲色图 男人天堂 中文字幕| 王馨瑶露胸无遮挡在线观看| 精品人妻在线不人妻| 最黄视频免费看| 老司机亚洲免费影院| 黄片小视频在线播放| 色婷婷av一区二区三区视频| 亚洲熟女毛片儿| 成人免费观看视频高清| 黑人猛操日本美女一级片| 三上悠亚av全集在线观看| 国产伦人伦偷精品视频| 久久热在线av| 午夜影院在线不卡| 美女主播在线视频| 黄色视频在线播放观看不卡| 人人妻人人澡人人爽人人夜夜| 高清av免费在线| 久久久久久免费高清国产稀缺| 久久中文字幕一级| 久久热在线av| 久久国产精品男人的天堂亚洲| 欧美日韩视频精品一区| 亚洲专区字幕在线| 日本精品一区二区三区蜜桃| 777米奇影视久久| 在线观看www视频免费| 久久国产精品大桥未久av| 国产精品欧美亚洲77777| 老司机福利观看| 欧美日韩精品网址| 国产精品.久久久| 国产成人啪精品午夜网站| 热re99久久精品国产66热6| 肉色欧美久久久久久久蜜桃| 免费在线观看日本一区| 日韩精品免费视频一区二区三区| 国产成人一区二区三区免费视频网站| 国产精品免费视频内射| 大陆偷拍与自拍| 高清在线国产一区| 在线观看人妻少妇| 欧美日韩视频精品一区| 777久久人妻少妇嫩草av网站| www.av在线官网国产| 日本猛色少妇xxxxx猛交久久| 亚洲全国av大片| 欧美在线一区亚洲| 99九九在线精品视频| 欧美老熟妇乱子伦牲交| 爱豆传媒免费全集在线观看| 婷婷色av中文字幕| 母亲3免费完整高清在线观看| 看免费av毛片| h视频一区二区三区| 国产成人av教育| 九色亚洲精品在线播放| 国内毛片毛片毛片毛片毛片| 久久久久久久精品精品| 久久毛片免费看一区二区三区| 热99re8久久精品国产| 一二三四在线观看免费中文在| 黑丝袜美女国产一区| 免费av中文字幕在线| 新久久久久国产一级毛片| 久久九九热精品免费| 老司机亚洲免费影院| 国产在线免费精品| 男女国产视频网站| 老司机靠b影院| 亚洲av欧美aⅴ国产| 亚洲av片天天在线观看| 精品人妻熟女毛片av久久网站| 中文精品一卡2卡3卡4更新| 一二三四在线观看免费中文在| 美女脱内裤让男人舔精品视频| 成人影院久久| 成人av一区二区三区在线看 | 搡老乐熟女国产| 亚洲精品国产区一区二| 亚洲精品美女久久av网站| 午夜老司机福利片| 不卡av一区二区三区| 亚洲第一青青草原| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲五月色婷婷综合| 中文字幕人妻丝袜制服| 欧美日韩亚洲国产一区二区在线观看 | 亚洲欧美一区二区三区黑人| 在线观看免费高清a一片| 18禁国产床啪视频网站| 一本—道久久a久久精品蜜桃钙片| 精品国产超薄肉色丝袜足j| 国产成人精品久久二区二区91| 人人澡人人妻人| 青春草视频在线免费观看| 免费不卡黄色视频| 久久久久久久大尺度免费视频| 久久免费观看电影| 久久久久网色| 男女之事视频高清在线观看| 精品少妇内射三级| 一二三四社区在线视频社区8| 免费久久久久久久精品成人欧美视频| 天天躁狠狠躁夜夜躁狠狠躁| 国产精品秋霞免费鲁丝片| 国产无遮挡羞羞视频在线观看| 一级片免费观看大全| 亚洲欧美一区二区三区久久| 19禁男女啪啪无遮挡网站| 青春草亚洲视频在线观看| 日韩电影二区| 国产成人欧美在线观看 | 欧美成人午夜精品| cao死你这个sao货| 五月天丁香电影| 一个人免费在线观看的高清视频 | 久久精品熟女亚洲av麻豆精品| 日本一区二区免费在线视频| 亚洲精品在线美女| 汤姆久久久久久久影院中文字幕| 精品福利观看| 啪啪无遮挡十八禁网站| 女性被躁到高潮视频| 免费高清在线观看日韩| 热re99久久国产66热| 黄片小视频在线播放| 精品国产乱码久久久久久小说| 欧美日韩国产mv在线观看视频| 美女午夜性视频免费| 三级毛片av免费| 亚洲三区欧美一区| av网站免费在线观看视频| 久久热在线av| 亚洲少妇的诱惑av| 亚洲av日韩在线播放| 脱女人内裤的视频| 久久久欧美国产精品| 免费在线观看黄色视频的| 99国产精品一区二区三区| 欧美日韩中文字幕国产精品一区二区三区 | 免费观看av网站的网址| 久久精品国产综合久久久| 亚洲国产日韩一区二区| 国产成人av激情在线播放| 日本欧美视频一区| 波多野结衣一区麻豆| 亚洲五月色婷婷综合| 啪啪无遮挡十八禁网站| 黄色视频在线播放观看不卡| cao死你这个sao货| 亚洲 欧美一区二区三区| 午夜免费观看性视频| 成人三级做爰电影| 日韩电影二区| 午夜福利视频在线观看免费| 一区二区三区精品91| 亚洲欧美精品综合一区二区三区| 一级,二级,三级黄色视频| 老司机影院成人| 免费女性裸体啪啪无遮挡网站| 脱女人内裤的视频| 国产主播在线观看一区二区| 欧美国产精品一级二级三级| 久久精品aⅴ一区二区三区四区| 久久久国产一区二区| 国产亚洲av片在线观看秒播厂| 中文欧美无线码| 天天添夜夜摸| 亚洲色图综合在线观看| 十八禁网站网址无遮挡| 国精品久久久久久国模美| 国产精品国产av在线观看| 最新在线观看一区二区三区| 国产一区有黄有色的免费视频| 国产97色在线日韩免费| 国产精品久久久av美女十八| 一级片'在线观看视频| 国产一区有黄有色的免费视频| 在线av久久热| 精品国产超薄肉色丝袜足j| 一本一本久久a久久精品综合妖精| 丝袜在线中文字幕| 亚洲av日韩精品久久久久久密| 国产精品亚洲av一区麻豆| 午夜激情av网站| 爱豆传媒免费全集在线观看| 亚洲五月色婷婷综合| 国产三级黄色录像| 婷婷丁香在线五月| 热re99久久精品国产66热6| 欧美日韩亚洲综合一区二区三区_| 一级毛片电影观看| 韩国精品一区二区三区| 欧美精品一区二区大全| 啦啦啦视频在线资源免费观看| 午夜免费观看性视频| 久久香蕉激情| av免费在线观看网站| 亚洲中文av在线| 亚洲精品国产色婷婷电影| 午夜免费成人在线视频| av超薄肉色丝袜交足视频| 日日爽夜夜爽网站| 欧美在线黄色| 精品熟女少妇八av免费久了| 九色亚洲精品在线播放| 亚洲av日韩在线播放| a级毛片黄视频| 永久免费av网站大全| 丝袜脚勾引网站| 啪啪无遮挡十八禁网站| 亚洲成人免费电影在线观看| 久久久国产成人免费| 中文字幕制服av| 在线观看免费午夜福利视频| 涩涩av久久男人的天堂| 久久久久国产一级毛片高清牌| 在线观看一区二区三区激情| 国产亚洲午夜精品一区二区久久| 国产不卡av网站在线观看| 91大片在线观看| 亚洲,欧美精品.| 高潮久久久久久久久久久不卡| 啦啦啦 在线观看视频| 男男h啪啪无遮挡| 色94色欧美一区二区| 欧美乱码精品一区二区三区| 纵有疾风起免费观看全集完整版| 久久久久国产精品人妻一区二区| 国产黄色免费在线视频| 亚洲精品国产区一区二| 十八禁人妻一区二区| 999精品在线视频| bbb黄色大片| 丰满饥渴人妻一区二区三| 日韩大码丰满熟妇| 欧美亚洲日本最大视频资源| 免费人妻精品一区二区三区视频| 丰满饥渴人妻一区二区三| 免费观看a级毛片全部| 亚洲国产成人一精品久久久| 国产区一区二久久| 亚洲国产看品久久| 丰满迷人的少妇在线观看| 日本黄色日本黄色录像| 亚洲国产欧美网| 国内毛片毛片毛片毛片毛片| 水蜜桃什么品种好| 在线观看免费日韩欧美大片| 女人被躁到高潮嗷嗷叫费观| 成人国产av品久久久| 精品久久久精品久久久| 亚洲精品中文字幕一二三四区 | 在线观看免费视频网站a站| 欧美精品av麻豆av| 亚洲精品国产精品久久久不卡| 美女福利国产在线| 国产亚洲精品久久久久5区| a 毛片基地| 在线观看免费日韩欧美大片| 老熟女久久久| 亚洲avbb在线观看| 国产91精品成人一区二区三区 | av视频免费观看在线观看| 多毛熟女@视频| 午夜福利,免费看| 久久国产亚洲av麻豆专区| 久久中文字幕一级| av免费在线观看网站| 欧美成狂野欧美在线观看| www.自偷自拍.com| 成年女人毛片免费观看观看9 | 亚洲欧美激情在线| 人人妻人人澡人人看| 亚洲国产毛片av蜜桃av| 中文字幕最新亚洲高清| 五月开心婷婷网| 人妻人人澡人人爽人人| 亚洲激情五月婷婷啪啪| 婷婷成人精品国产| 最新在线观看一区二区三区| 国产精品久久久人人做人人爽| 久久人人爽av亚洲精品天堂| 日韩视频一区二区在线观看| 欧美精品啪啪一区二区三区 | 亚洲va日本ⅴa欧美va伊人久久 | 97人妻天天添夜夜摸| 国产一区二区三区av在线| 国产精品影院久久| 国产精品 欧美亚洲| 十八禁网站网址无遮挡| 亚洲专区字幕在线| 这个男人来自地球电影免费观看| 久久久久久久大尺度免费视频| 成人国产av品久久久| 91成人精品电影| 亚洲精品国产一区二区精华液| 两个人免费观看高清视频| 熟女少妇亚洲综合色aaa.| 美女午夜性视频免费| 国产一区二区 视频在线| videosex国产| 女性被躁到高潮视频| 亚洲精品久久久久久婷婷小说| 飞空精品影院首页| 欧美一级毛片孕妇| 国产伦理片在线播放av一区| 大片免费播放器 马上看| 欧美在线一区亚洲| 每晚都被弄得嗷嗷叫到高潮| 老司机午夜福利在线观看视频 | 91成年电影在线观看| 美女国产高潮福利片在线看| 国产欧美日韩一区二区精品| 男女午夜视频在线观看| 丰满人妻熟妇乱又伦精品不卡| 99国产精品免费福利视频| av电影中文网址| 又大又爽又粗| 日本五十路高清| 丰满人妻熟妇乱又伦精品不卡| 亚洲精品国产精品久久久不卡| 欧美精品啪啪一区二区三区 | 亚洲欧美日韩另类电影网站| 欧美日韩福利视频一区二区| 美女中出高潮动态图| 亚洲情色 制服丝袜| 亚洲性夜色夜夜综合| 97精品久久久久久久久久精品| 99热国产这里只有精品6| 精品一区二区三卡| 人人妻人人添人人爽欧美一区卜| 丝袜美腿诱惑在线| 亚洲精品成人av观看孕妇| 在线观看免费午夜福利视频| av欧美777| 日日爽夜夜爽网站| 伊人亚洲综合成人网| 纯流量卡能插随身wifi吗| 大片电影免费在线观看免费| 一二三四社区在线视频社区8| 高清欧美精品videossex| 最新的欧美精品一区二区| 亚洲国产成人一精品久久久| 国产激情久久老熟女| 黄色视频不卡| 欧美激情久久久久久爽电影 | 国产亚洲午夜精品一区二区久久| 日韩三级视频一区二区三区| 热99国产精品久久久久久7| 一区二区三区精品91| 国产野战对白在线观看| www.熟女人妻精品国产| 久久精品aⅴ一区二区三区四区| av片东京热男人的天堂| 97在线人人人人妻| 国产欧美日韩综合在线一区二区| 中文字幕制服av| 午夜福利免费观看在线| 在线观看免费午夜福利视频| 亚洲 国产 在线| 精品久久久精品久久久| av网站免费在线观看视频| 亚洲专区中文字幕在线| 多毛熟女@视频| 亚洲成av片中文字幕在线观看| 亚洲自偷自拍图片 自拍| 制服诱惑二区| 在线观看一区二区三区激情| av在线播放精品| 亚洲av欧美aⅴ国产| 亚洲专区中文字幕在线| 欧美另类一区| 国产av精品麻豆| 在线观看www视频免费| 成人国语在线视频| 亚洲精品久久成人aⅴ小说| av一本久久久久| 久久久欧美国产精品| 黑人欧美特级aaaaaa片| 精品人妻在线不人妻| 50天的宝宝边吃奶边哭怎么回事| 90打野战视频偷拍视频| 搡老乐熟女国产| 久久天堂一区二区三区四区| 国产av国产精品国产| 日韩欧美免费精品| 一本大道久久a久久精品| 天天添夜夜摸| a 毛片基地| 嫁个100分男人电影在线观看| 12—13女人毛片做爰片一| 欧美日韩一级在线毛片| 国产深夜福利视频在线观看| 国产成人免费观看mmmm| 久久久国产欧美日韩av| 久久久久国产一级毛片高清牌| 国产一卡二卡三卡精品| 人人妻人人添人人爽欧美一区卜| 啦啦啦 在线观看视频| 人人妻人人添人人爽欧美一区卜| 黑丝袜美女国产一区| 老司机亚洲免费影院| 免费高清在线观看视频在线观看| 悠悠久久av| 麻豆国产av国片精品| 老熟女久久久| 成人三级做爰电影| 99国产精品免费福利视频| 免费日韩欧美在线观看| 欧美日韩福利视频一区二区| 国产又色又爽无遮挡免| av不卡在线播放| 视频区图区小说| 欧美激情 高清一区二区三区| 亚洲自偷自拍图片 自拍| 免费在线观看黄色视频的| 91麻豆精品激情在线观看国产 | 90打野战视频偷拍视频| 欧美成人午夜精品| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲精品粉嫩美女一区| 久久人人爽人人片av| 爱豆传媒免费全集在线观看| 五月开心婷婷网| 天堂俺去俺来也www色官网| 成人三级做爰电影| 国产一区二区三区在线臀色熟女 | 中文字幕色久视频| 国产精品.久久久| 激情视频va一区二区三区| 免费久久久久久久精品成人欧美视频| 成在线人永久免费视频|