• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Design of an Information Security Service for Medical Artificial Intelligence

    2022-11-09 08:14:38YanghoonKimJawonKimandHangbaeChang
    Computers Materials&Continua 2022年1期

    Yanghoon Kim,Jawon Kim and Hangbae Chang

    1Department of Cyber Drone Bot Military Engineering,Shinhan University,Uijeongbu-si,11644,Gyeonggi-do,Korea

    2Department of Security Convergence,Graduate School,Chung-Ang University,Dongjack-gu,06974,Seoul,Korea

    3Department of Industrial Security,Chung-Ang University,Dongjak-gu,06974,Seoul,Korea

    Abstract: The medical convergence industry has gradually adopted ICT devices,which has led to legacy security problems related to ICT devices.However,it has been difficult to solve these problems due to data resource issues.Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information.Therefore,to provide reliableservices focused on security internalization,it is necessary to establish a medical convergence environment-oriented security management system.This study proposes the use of system identification and countermeasures to secure system reliability when using medical convergence environment informationin medical artificial intelligence.We checked the life cycle of medical information and the flow and location of information,analyzed the security threats that may arise during the life cycle,and proposed technical countermeasures to overcome such threats.We verified the proposed countermeasures through a survey of experts.Security requirements were defined based on the information life cycle in the medical convergence environment.We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes.

    Keywords: Medical artificial intelligence;medical information;security;convergence environment

    1 Introduction

    Nowadays,many industries apply information and communication technologies (ICT).Furthermore,through the fusion of ICT and industry,we have entered the era of the Fourth Industrial Revolution in which all things are connected,enabling us to evolve into a more intelligent society.Radio-frequency identification and ubiquitous sensor network technologies,designed for connection anytime and anywhere,have been made smaller,more active and intelligent by expanding them into the Internet of Things (IoT).The IoT is a system in which automated data can be transmitted without human interference,and which can collect massive amounts of diverse data.Big data collected through the IoT are now being analyzed using advanced technologies such as artificial intelligence (AI).

    The medical convergence industry,which is a convergence of the medical industry and ICT,continuously creates and utilizes a huge corpus of information.The industry is now making the transition from a treatment-oriented environment to a prevention-oriented one,and many hospitals,having traditionally conducted all their treatments offline,now receive much patient health information through smart devices.As such,hospitals can establish an ICT convergence environment and plan future decisions through data analysis.New technologies such as IoT,big data,and AI can service valuable new business areas through data acquired from patients and third parties among others.

    However,the medical convergence industry is distinct from other industries [1] in that it faces severe medical business-oriented security threats.The medical industry is characterized by specialized devices and environments and is focused on the public good and the provision of medical services.Because of these characteristics,hospitals can experience various security threats in the convergence service environment [2]—for example,CDs containing magnetic resonance imaging (MRI) results can contain malware [3],or patient data can be leaked due to a failure of the authority responsible for managing electronic medical records (EMR).Hospitals,as the key players in the medical convergence industry,are divided into large facilities that employ security experts,and small/medium-sized hospitals that do not employ such experts,a failing which inevitably has an impact on a hospital’s system security capabilities.

    Given this complex situation,ISO 27799 [4] was proposed as a standard for the construction of security frames for medical institutions.This standard protects personal medical information in healthcare settings and enables the implementation of information security controls.If medical institutions observe this standard,it will benefit the availability,integrity,and confidentiality of their personal medical information.Nevertheless,ISO 27799 cannot be applied at a hospital if it lacks the human resources and money required to implement it.Therefore,the medical convergence industry should have a systematic and business-oriented security framework based on the convergence environment.

    To determine a reliable medical AI support framework,this study analyzed the medical information life cycle in order to propose an optimization plan for implementing a systematic security environment.The authors conducted a detailed analysis of the flow of external IoT medical devices as they entered the hospital’s medical information to be stored,processed,and utilized.The study also proposes a secure security system encompassing each endpoint of the life cycle,while focusing on the most-utilized technology.Finally,a prototype was developed based on a security system design and feasibility analysis.

    2 Related Works

    2.1 Characteristics and Status of Medical Convergence Security

    The medical convergence industry is a new high-value biomedical service industry created through the convergence of new technologies such as information technology (IT),biotechnology,and nanotechnology [5].The industry is divided into the silver industry,which is associated with the current phenomenon of the aging society;the lifestyle industry,which is oriented toward diseases associated with modern lifestyles;and an industry focused on technology that aims to advance life expectancy and provide the world’s best medical services.The main areas of medical convergence include medical technologies and services used in the process of diagnosis,treatment,and rehabilitation,as well as in disease prevention and health promotion.These can consist of medical devices,medications,and medical organization systems.

    In the medical convergence industry,the industrial boundaries and areas are expanding in line with recent changes in the social environment [6].The medical industry is a public good,and since these services directly deal with human life,their reliability is crucial.With the ongoing changes in society,the economy,and technology,the demand for continuous medical services is increasing due to the introduction of IoT devices and their widespread application to the healthcare industry.

    The medical convergence industry is gradually switching from the provision of treatment services to the delivery of healthcare services for patients [7],accompanied by a paradigm shift toward a continuous health management support system based on collected data.

    In the past,treatment-oriented services encompassing a patient’s hospital visits,repeated treatments,and renewed prescriptions constituted a hospital’s primary services.Today,however,data are collected and utilized through various remote healthcare and medical devices prior to hospital visits.This change in the service minimizes the patient’s life risk by generating healthcare data through long-term data archiving and reducing the risk of inappropriate treatments due to a lack of patient health data.In addition,it makes it possible to provide customized medical services to patients by preemptively solving the problem of excessive treatment.

    2.2 The Status of Medical Convergence Services

    A variety of ICT systems are currently being used to process patient-customized medical services [8] in the medical convergence environment.

    Data for medical services are collected outside hospitals using personal health devices (PHDs),such as blood pressure monitors,weight scales,and blood glucose meters.This type of use particularly targets places where medical access is difficult,such as remote islands and mountainous areas,as well as patients for whom it is necessary to collect a significant amount of health information over a long period of time [9].

    Hospitals that directly collect and utilize data for their medical services are now using health information systems such as EMRs,order communication systems and picture archiving.To secure highly reliable medical services and ensure their quality and appropriateness,the latest medical knowledge and technologies need to be used to the maximum possible extent.

    Hospitals can also overcome the limitations of service distance among regions by establishing a telemedicine system between hospitals [10] and between hospitals and patients.This type of practice can help to secure expertise in medical services,provide preventative medical services,and ensure service provision.In recent years,based on the application of mobile devices such as smartphones,a comprehensive medical service system has been secured by establishing both an effective management system and a system capable of measuring a patient’s health status after treatment.

    2.3 The Security Risk of Medical Convergence Services

    Medical information refers to integrated personal data such as patient (customer) name,gender,age,photo,and medical payment details.Personal medical information collected through the treatment process is used by several hospital departments.It is also transmitted to pharmaceutical companies,medical device manufacturers,and government agencies for external use.As medical information [11] is personally sensitive information related to one’s current health status and treatment process,its exposure could inflict mental,social,and economic damages on an individual.Unfortunately,the security level of hospital data is currently very insufficient.

    Furthermore,medical devices used in hospitals are manufactured through a supply chain spanning multiple countries.The devices installed when a hospital first opens are often used for a long time without being replaced.If a given hospital’s medical service period is ten years,this means that there are devices that may have been used for ten years.Therefore,a standalone medical device has its own security risk.However,if it is connected to a PC and collects information,the problem of compatibility may arise when installing another software program since the PC is optimized for the connected medical device.In addition,when a hospital’s operating system functions in an old legacy format,such as Windows XP,it may encounter other problems such as an inability to operate when it is updating or during the installation of a security solution.In other words,security threats,medical device vulnerabilities,and old operating systems are key problems [12-14].

    Many researchers are trying to overcome security threats in the medical convergence environment.Shin et al.[15] investigated the privacy problem with respect to hospital size and proposed countermeasures.Pirbhulal et al.[16] proposed a security framework for wearable healthcare systems,and also studied security countermeasures for the medical convergence environment.However,these studies had a limitation in that they only considered fragmentary security countermeasures.Therefore,this study considers the information life cycle in order to propose security countermeasures.

    2.4 The Status of AI in the Medical Convergence Environment

    AI technology seeks to realize human perception,reasoning,and learning through computer programs [17].Generally,AI in a medical convergence environment implements medical diagnosis services based on large amounts of diverse types of medical information.For example,a lung diagnosis AI technology recently developed by the medical startup Lunet [18] is being used to read images of suspected COVID-19 patients.With this technology,patients can be classified more than ten times faster than with normal chest X-ray reading,which is a great help in the initial screening process.These medical AI technologies can also be of great help when the number of patients is rapidly increasing and the medical system’s resources are limited.

    However,in order to implement such AI technology in the medical convergence environment,an enormous amount of big data must be learned.This requirement causes security problems because such medical information is sensitive.It is difficult to check how data is collected and stored or where it exists on which server.Furthermore,it is hard to know the details of leakage incidents for secondary and tertiary purposes.Security threats such as hacking or leakages of medical information also arise.Therefore,this paper proposes a security countermeasure for medical information to support the use of AI technology.

    3 Analysis of Security Risks and Requirements Based on the Information Life Cycle of the Medical Convergence Environment

    This study proposes technical security countermeasures to minimize security threats in a medical convergence environment.First,the authors of this study analyzed the characteristics and status of the medical convergence environment on the basis of previous studies;then they checked the status of medical convergence services and analyzed the security risks in those medical convergence services.In addition,the study checked the status of AI technology in the medical convergence environment and the requirements for safe AI technology applications.To propose multidimensional security countermeasures,security risks and security requirements were identified based on the medical information life cycle.Then,security countermeasures based on the life cycle [19] were derived and proposed,and a statistical verification was conducted by hospital size,as shown in Fig.1.

    Figure 1:Medical information life cycle process

    3.1 Analysis of Security Risks based on the Medical Information Life Cycle

    The term “information life cycle” refers to a series of processes ranging from the creation to the destruction of various types of information.This study defines the information life cycle as a personal information life cycle.The information life cycle is composed of a series of cycles and consists of stages of creation/collection,storage/processing,provision/utilization,and destruction/disposal.Fig.2 shows the medical data life cycle process,while Tab.1 defines each step in the information life cycle.

    Figure 2:Medical information life cycle process

    Table 1:Steps in the information life cycle and their meaning

    In the medical convergence industry,various security risks may arise from the standpoint of the medical information life cycle,including medical information integrity problems due to the malfunction of medical devices,the misuse of patient personal information,cyber-attacks on medical devices from outside,and leakages of medical information by internal employees.Moreover,vulnerabilities may appear when sharing medical information because hospital collection methods vary and because there are external distribution channels for medical information.There may also be legalities that run counter to the safe processing of medical information.Also,medical information can be used for diverse purposes such as tracking major disease trends,analyzing the prescription drug market,checking medical locations,and develpoing insurance products based on secondary information processing.Thus,the social costs occasioned by infringements of medical information are very high compared to other industries.Security threats and vulnerabilities are analyzed based on cases according to the life cycle of medical information used by medical institutions,as presented in Tab.2.

    Table 2:Analysis of security requirements in the medical convergence environment

    Table 2:Continued

    3.2 Derivation of Security Requirements Based on the Medical Information Life Cycle

    The main security threats and weaknesses based on the medical information life cycle of medical institutions are as follows.Physical security requirements are excluded from the scope of this study due to the fact that the physical security system is designed to process printed hard copy information.The physical system considerations mainly concern locking devices,CCTV,and access control devices.Legal security requirements are excluded from this study because the system differs markedly in different regions and countries.

    Table 3:Security requirements for the medical information life cycle

    4 Medical Information Security System Design for Reliable AI Support

    4.1 Medical Information Life Cycle Based on Security Technology Derivation

    An analysis specific to the medical industry,the convergence of security vulnerabilities,and medical industry security requirements necessitates the design of an information life cycle that reflects the business interests of the medical industry.Tab.3 shows the core flow and transfer points of information requiring a life cycle-based security system.

    To design the medical information security system,the stages and contents of the life cycle stated within brackets,which are mainly used to locate information movements,were analyzed Tab.4.

    Table 4:Designing the security requirements for the medical information life cycle and storage

    Table 4:Continued

    ①PHD IoT

    The PHD connected to the IoT is a small,low-cost device that measures blood pressure,blood sugar,heart rate,and sleep.The PHD measures an individual’s health condition and remotely sends the collected information to a designated hospital via an outside gateway.This can involve direct transmission from inside the hospital by using designated equipment to access the data stored and processed in personal health records.PHDs should be able to identify users in order to send some information from outside gateways or from designated hospitals.The International Standard for ISO/IEEE 11073 is a PHD communication protocol;it covers the exchange of PHD information,medical information,and IoT device information.

    PHD communication often uses Bluetooth due to its advantages of low cost and usability.The protocol presented in the standards does not need to apply related security content to transfer personal health/medical data.The standard defines a total dependence on the security of the transport layer.This means the security level depends on the transport layer;it has the disadvantage of retaining vulnerability if the transport layer is vulnerable.Therefore,IEEE 11073 has security on the presented protocol and integrity,and the confidentiality of personal physical and health information should be secure in transport layer protocols such as Bluetooth.

    ②(Mobile) Gateway (GW)

    The PHD needs a gateway that plays an interim role in collecting and delivering medical information such as healthcare data.The IoT can use such gateways as a router or a separate server,but it mainly uses mobile gateways,which often involve smartphones.Multi-species,largequantity,and multi-person convergence healthcare data produced by an IoT PHD are collected.The gateway is also a reliable intermediary system that transmits data to hospitals,thus allowing a large amount of data to be collected.Lastly,it must defend itself from external cyber-attacks and establish an environment that can prevent forgery.

    Because the information transfer location used in ③to ⑥is an internal hospital system,the location includes access control and authority management functions based on user authentication and medical personnel classification.In the case of an introduced ‘Timeworn’system,if the purchase and connection of new equipment or the existing system cannot be upgraded,it is necessary to have a function that can prevent malicious codes from entering the system.For example,it may be that the operating system is Windows XP optimized with PACS.In this case,a corresponding window should be established in order to enable the use of an appropriate method of defense against malicious codes on the fetch program and to rectify the situation.

    ③Healthcare Data Server

    A hospital’s healthcare data servers collect,store,and process data from external mobile gateways or from patients who have visited the hospital in person.In some hospitals,they are utilized through a server linked with the hospital’s information system.To secure the healthcare data servers,an encryption function is required for databases and data collections.

    ④HIS (OCS,EMR)

    An order communication system comprising electronic medical records and other elements is a core system that processes and utilizes healthcare and medical information.In addition to basic security functions,a document security function is needed for information processing and storage.

    ⑤PACS

    A picture archiving and communications system obtains and stores image information through an imaging diagnostic device in a digital state.It executes the functions necessary to transmit and retrieve readings and medical records together.A system in which multiple components are combined and operated is used after linking medical equipment (CR,DR,reading monitors,etc.),IT equipment (servers,storage,PCs,monitors,networks,etc.) and applications based on a PACSonly software.If the PACS is an older medical video storage transmission system,a defense against malicious codes suitable for the operating system and the PACS should be implemented.If systems in which personal healthcare and medical information are combined into file format data for the reading of images and video information,information about individuals needs to be processed using anonymous and unidentifiable functions.

    ⑥Main Server

    The database encryption function is essential because the main server is connected to the hospital information system that stores all the information.

    ⑦Patients

    Patients wait in open spaces where various activities are actively carried out,such as registration for blood collection and examinations such as ultrasound,CT,and MRI.When patients visit a hospital for the first time,they need to fill out various documents before their examination.Therefore,it is necessary to provide anonymous or non-identifying information for personal designation so that personal information cannot be specified during this data collection process.

    The eight items specified under Tab.4’s “Information Flow Location” constitute the process of delivering healthcare.As for medical information sent to outside sources upon completion of a patient’s treatment,basic information encryption functions and anonymous/non-identification functions are also required.

    4.2 Security Frame Design According to the Life Cycle of Medical Information

    Healthcare data are collected from patients and stored in a dedicated healthcare data server inside the hospital,and are then processed and used within the hospital information system.The integrated data eventually flow out of the hospital again,where they are used (and finally destroyed) by pharmaceutical companies,disease management government agencies,and pharmacies.Throughout the entire process,individual healthcare data are steadily reused between the individual patient who creates and the medical staff.Such data can support medical AI,and will be discarded upon becoming unusable.The stored data can also be discarded at the patient’s request,but arbitrary discards are excluded from this process.

    The security framework is designed based on the medical information life cycle shown in Fig.3.The security method is structured and designed according to the information movement locations described in Section 4.1.The security framework identifies most people involved in hospitals that use big healthcare data,and can be constructed if the human and physical resources are sufficient.In other words,its design is centered on a large hospital.

    Figure 3:Security frame design according to the medical information life cycle for reliable medical AI support (large hospital)

    Hospitals vary in size by region and country,and their financial circumstances also differ.In general,the security frameworks of small and medium-sized hospitals are integrated and operated on a smaller scale.Thus,analyses of small and medium-sized hospitals based on field surveys and expert interviews have confirmed the following differences.First,external healthcare big data collectors cannot handle every type of IoT PHD data.In addition,IT engineers and security engineers are not directly hired,and many hospitals do not have any PACS equipment.Furthermore,cases have been reported in which nurses directly handle the information system without the involvement of any hospital administrative personnel.The internal system is an integrated server system in which the EMR and OCS operate together.Considering these points,it is necessary to establish the appropriate level of security framework by adjusting for cost and workforce limitations,rather than instituting all security technologies for small and medium-sized hospital security frames,as shown in Fig.4.

    Figure 4:Security frame design according to the medical information life cycle for reliable medical AI support (small and medium-size hospitals)

    4.3 Security Frame-Based Prototype Development and Adequacy Verification

    A questionnaire survey was conducted to examine the acceptability of the technical limitations and the differences between small/medium-sized hospitals and large hospitals.From March-June 2019,132 experts,including medical personnel,IT engineers,security engineers,and consultants,were surveyed on the applicability of the security technologies designed in ① to 11○based on urgency and justification.A 5-point Likert scale was used to assess the responses to the survey See Tab.5.

    Table 5:Acceptability of medical information security technology by hospital size

    A “PHD Security Solution” provides data encryption for personal healthcare devices and uses a security protocol when transmitting data.A “Medical Information Security Gateway” safely stores the healthcare and medical information received from the PHD and transmits it to the hospital’s server.The “PHD Authentication Technology” is a public key-based authentication technology that can identify individual users of individual devices.The “Medical Information System Certification Technology” checks medical personnel (doctors,nurses,administrators,etc.)to identify the medical information systems used in hospitals.“Access Control and Authority Management” is a function that distributes and manages the authority to use medical information to users who are authenticated in the medical information system.The “Medical Environment Disinfecting Technology” designates and protects a specific process so that it is not exposed to cyber-attacks from malicious codes.The “Medical Information Anonymization and De-Identification Technology” uses internal medical information to support AI and prevent leakages of the information of specific individuals.

    Most of the technologies presented were found to be appropriate for use in large hospitals.However,the PHD Security Solution for collecting external healthcare data,the medical information security gateway,the PHD authentication technology,and the anonymization and de-identification technology designed to assist external collection and utilization were found to be inappropriate for use in small and medium-sized hospitals.Hence,the deployment of security systems differs between large hospitals and small and medium-sized hospitals.

    Finally,the following prototype was developed and analyzed based on the proposed security technology to determine its acceptability as a medical information security system supported with reliable medical AI support.In addition,the following solutions were developed: ①PHD security solution;②security gateway;③-⑥authentication,access control,authority management,disinfecting solution;and ⑦-11○anonymization and de-identification solutions (Fig.3).According to the results of this study’s questionnaire,the average level of acceptance of the prototype was 4.59,while the perception of effectiveness was 4.80,as shown in Tab.6 and Fig.5.

    Table 6:Acceptability and effectiveness of medical information security technology by hospital size

    Figure 5:Prototype of a medical information security service with reliable medical AI support

    5 Conclusions

    The leading technologies of the Fourth Industrial Revolution,such as the IoT,cloud,big data,and mobile phones,are permeating diverse industries and creating new business avenues.In particular,the IoT,which can collect big data linked to AI,provides new and innovative services in various ways.Notably,the paradigm of the medical convergence industry is changing from a treatment-oriented one to a prevention-oriented one.The most striking characteristics of this change are the collection,storage,processing,and analysis of healthcare data using the IoT.This study derived security guidelines that can be applied to analyze information movement locations based on the medical information life cycle,and also designed a framework tailored to hospital size and tested its feasibility with a prototype.

    This study makes the following contributions to the body of literature:

    1) An analysis of security threats and weaknesses can raise awareness of the importance of security among hospital stakeholders.

    2) Security management system requirements are presented based on medical information and the information life cycle.

    3) Depending on its size,a hospital can conduct research emphasizing diverse competencies and plan the establishment of a security system.

    4) The results of this study,including the acceptability of the proposed security technology,could encourage the use of medical AI support using reliable medical information.

    In the future,the authors of this paper intend to conduct research on a model design method with security in order to create a new business concept based on medical data.

    Funding Statement: This paper was supported by a Korea Institute for the Advancement of Technology (KIAT) grant funded by the Korean government (MOTIE,No.P0008703) and by a National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT,No.2018R1C1B5046760).

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    岛国毛片在线播放| 最新在线观看一区二区三区| 久久精品国产亚洲av高清一级| 精品人妻在线不人妻| www.自偷自拍.com| 好男人电影高清在线观看| 无限看片的www在线观看| 久久精品国产99精品国产亚洲性色 | 女人精品久久久久毛片| 男女免费视频国产| 久久人妻熟女aⅴ| 国产午夜精品久久久久久| 精品人妻熟女毛片av久久网站| 国产主播在线观看一区二区| 免费在线观看影片大全网站| 亚洲成人免费电影在线观看| 亚洲欧美日韩高清在线视频| 欧美久久黑人一区二区| videos熟女内射| 国产精品成人在线| 国产午夜精品久久久久久| 亚洲国产看品久久| 美女扒开内裤让男人捅视频| 免费看十八禁软件| 亚洲人成77777在线视频| 国产亚洲欧美98| 18禁美女被吸乳视频| 精品久久久久久,| 无限看片的www在线观看| 操美女的视频在线观看| 久久国产精品大桥未久av| 久久久精品免费免费高清| 韩国精品一区二区三区| 亚洲国产精品合色在线| 亚洲色图综合在线观看| aaaaa片日本免费| 亚洲国产欧美一区二区综合| 欧美黑人精品巨大| 亚洲中文字幕日韩| 男女高潮啪啪啪动态图| 制服诱惑二区| 国产精品自产拍在线观看55亚洲 | 国产亚洲精品第一综合不卡| 成人精品一区二区免费| svipshipincom国产片| 成年人黄色毛片网站| 99国产综合亚洲精品| 国产午夜精品久久久久久| videos熟女内射| 国产亚洲一区二区精品| 国产成+人综合+亚洲专区| 少妇的丰满在线观看| 老鸭窝网址在线观看| 亚洲av电影在线进入| 人妻 亚洲 视频| 91字幕亚洲| 欧美日韩精品网址| 黄色毛片三级朝国网站| 人妻久久中文字幕网| 久久人妻福利社区极品人妻图片| 久久亚洲精品不卡| 一本综合久久免费| 国产高清videossex| 美女 人体艺术 gogo| 青草久久国产| 18禁美女被吸乳视频| 国产欧美日韩精品亚洲av| 日韩 欧美 亚洲 中文字幕| 动漫黄色视频在线观看| 欧美国产精品va在线观看不卡| 欧美精品av麻豆av| 国产精品美女特级片免费视频播放器 | 成年女人毛片免费观看观看9 | 日本a在线网址| 欧美+亚洲+日韩+国产| 国产99白浆流出| 中文字幕精品免费在线观看视频| 欧美中文综合在线视频| 国产国语露脸激情在线看| 国内毛片毛片毛片毛片毛片| 免费在线观看完整版高清| avwww免费| 一级a爱片免费观看的视频| 水蜜桃什么品种好| 搡老熟女国产l中国老女人| 国产精品秋霞免费鲁丝片| 午夜福利在线观看吧| 国产av精品麻豆| 成人免费观看视频高清| 少妇被粗大的猛进出69影院| tube8黄色片| 日本五十路高清| 国产男靠女视频免费网站| 女人被躁到高潮嗷嗷叫费观| 日韩免费高清中文字幕av| 最新美女视频免费是黄的| 国产极品粉嫩免费观看在线| 制服诱惑二区| 18在线观看网站| 欧美日韩乱码在线| 亚洲国产看品久久| 天天躁狠狠躁夜夜躁狠狠躁| 久久久久久人人人人人| 久久国产精品影院| 亚洲av成人一区二区三| av国产精品久久久久影院| 亚洲欧美激情综合另类| 一边摸一边抽搐一进一小说 | 天天操日日干夜夜撸| 亚洲九九香蕉| 国产欧美亚洲国产| av天堂在线播放| 激情视频va一区二区三区| 色综合婷婷激情| 99精品在免费线老司机午夜| 黄色a级毛片大全视频| 美女扒开内裤让男人捅视频| 高清毛片免费观看视频网站 | 国产精品一区二区在线不卡| 日韩一卡2卡3卡4卡2021年| 国产国语露脸激情在线看| 麻豆国产av国片精品| 欧美成狂野欧美在线观看| 亚洲一码二码三码区别大吗| 亚洲aⅴ乱码一区二区在线播放 | 国产伦人伦偷精品视频| 啦啦啦 在线观看视频| 人妻 亚洲 视频| 国产又爽黄色视频| 波多野结衣av一区二区av| 涩涩av久久男人的天堂| 日本五十路高清| 999久久久国产精品视频| 亚洲精品在线美女| 妹子高潮喷水视频| 黄色成人免费大全| 亚洲欧美精品综合一区二区三区| 亚洲欧美日韩另类电影网站| 成年版毛片免费区| 精品高清国产在线一区| 中文字幕av电影在线播放| www.精华液| 成年女人毛片免费观看观看9 | 男人操女人黄网站| 久久久久久久精品吃奶| 村上凉子中文字幕在线| 午夜精品国产一区二区电影| 一级a爱视频在线免费观看| 亚洲欧美精品综合一区二区三区| 免费在线观看视频国产中文字幕亚洲| 国产精品久久久久成人av| 啦啦啦视频在线资源免费观看| 黑人欧美特级aaaaaa片| 国产激情久久老熟女| 国产国语露脸激情在线看| 欧美亚洲 丝袜 人妻 在线| 欧美日韩乱码在线| 午夜福利免费观看在线| 乱人伦中国视频| 久久人人97超碰香蕉20202| 午夜激情av网站| 99国产精品一区二区三区| 国产成人免费无遮挡视频| 精品少妇久久久久久888优播| 两个人看的免费小视频| 久久人妻av系列| 正在播放国产对白刺激| 日本vs欧美在线观看视频| 视频区图区小说| 在线观看免费午夜福利视频| 男人的好看免费观看在线视频 | 天天影视国产精品| 国产男靠女视频免费网站| 无遮挡黄片免费观看| 十八禁高潮呻吟视频| www.自偷自拍.com| 三上悠亚av全集在线观看| 亚洲色图av天堂| 久久久久国产精品人妻aⅴ院 | 搡老岳熟女国产| 美女午夜性视频免费| 午夜福利欧美成人| 国产淫语在线视频| 欧美在线黄色| 啦啦啦免费观看视频1| 一级a爱片免费观看的视频| 天天躁狠狠躁夜夜躁狠狠躁| 国产精品综合久久久久久久免费 | 亚洲熟女毛片儿| 美女福利国产在线| 无人区码免费观看不卡| 国产欧美日韩一区二区精品| 老司机午夜十八禁免费视频| 自拍欧美九色日韩亚洲蝌蚪91| 久久久久久亚洲精品国产蜜桃av| 99久久国产精品久久久| 极品人妻少妇av视频| 亚洲成国产人片在线观看| 免费av中文字幕在线| 男女高潮啪啪啪动态图| 国产人伦9x9x在线观看| 老司机福利观看| av网站在线播放免费| 欧美国产精品一级二级三级| 精品一区二区三区av网在线观看| 在线观看舔阴道视频| 国产成+人综合+亚洲专区| 欧美乱色亚洲激情| 无限看片的www在线观看| 国产精品国产高清国产av | 嫩草影视91久久| 老熟女久久久| 成人国产一区最新在线观看| 国产野战对白在线观看| 免费少妇av软件| 国产高清激情床上av| 亚洲,欧美精品.| 男女床上黄色一级片免费看| 亚洲熟妇熟女久久| 久久国产精品大桥未久av| 热re99久久精品国产66热6| 每晚都被弄得嗷嗷叫到高潮| www.自偷自拍.com| 悠悠久久av| 日韩制服丝袜自拍偷拍| 精品人妻1区二区| 搡老岳熟女国产| 亚洲视频免费观看视频| 国产欧美日韩一区二区三| 国产精品二区激情视频| 天堂√8在线中文| 久久中文字幕一级| 日本a在线网址| tocl精华| 亚洲第一欧美日韩一区二区三区| 免费久久久久久久精品成人欧美视频| 正在播放国产对白刺激| 少妇猛男粗大的猛烈进出视频| 精品少妇久久久久久888优播| 91在线观看av| 免费在线观看视频国产中文字幕亚洲| 欧美精品啪啪一区二区三区| 国产亚洲精品久久久久久毛片 | 人人妻人人爽人人添夜夜欢视频| 国产一区二区三区综合在线观看| 日本a在线网址| 久久精品亚洲av国产电影网| e午夜精品久久久久久久| 国产片内射在线| 亚洲情色 制服丝袜| 国产在视频线精品| 亚洲欧美日韩另类电影网站| 黑人巨大精品欧美一区二区mp4| ponron亚洲| 国产精品香港三级国产av潘金莲| 久久久国产精品麻豆| 中文字幕另类日韩欧美亚洲嫩草| 男人的好看免费观看在线视频 | 欧美日韩福利视频一区二区| 国产成人精品在线电影| 性色av乱码一区二区三区2| 国产欧美日韩综合在线一区二区| 国产乱人伦免费视频| 法律面前人人平等表现在哪些方面| 久久精品91无色码中文字幕| 宅男免费午夜| 少妇的丰满在线观看| 一级片免费观看大全| 日韩欧美一区二区三区在线观看 | 90打野战视频偷拍视频| 日韩熟女老妇一区二区性免费视频| 午夜福利,免费看| 亚洲成人国产一区在线观看| 国产主播在线观看一区二区| videos熟女内射| 高潮久久久久久久久久久不卡| 老司机午夜十八禁免费视频| 亚洲精品中文字幕一二三四区| 国产主播在线观看一区二区| 中文字幕高清在线视频| 男人的好看免费观看在线视频 | 美女福利国产在线| 欧美一级毛片孕妇| 午夜亚洲福利在线播放| 精品一区二区三卡| 亚洲精品在线观看二区| 一区二区三区激情视频| 真人做人爱边吃奶动态| 精品久久蜜臀av无| 99香蕉大伊视频| 在线观看免费视频网站a站| 伊人久久大香线蕉亚洲五| 国产精品综合久久久久久久免费 | 黄频高清免费视频| 亚洲 欧美一区二区三区| 最新在线观看一区二区三区| 亚洲aⅴ乱码一区二区在线播放 | 欧美乱码精品一区二区三区| av国产精品久久久久影院| 中出人妻视频一区二区| 波多野结衣一区麻豆| 国内毛片毛片毛片毛片毛片| 免费高清在线观看日韩| 亚洲性夜色夜夜综合| 黄色视频,在线免费观看| 俄罗斯特黄特色一大片| 午夜免费观看网址| 天堂动漫精品| 亚洲视频免费观看视频| 丁香欧美五月| 国产av一区二区精品久久| 久久久水蜜桃国产精品网| 国产一区二区三区综合在线观看| 女人久久www免费人成看片| 精品免费久久久久久久清纯 | 精品熟女少妇八av免费久了| 久久亚洲真实| 99riav亚洲国产免费| 桃红色精品国产亚洲av| 久久久国产成人免费| 老司机午夜十八禁免费视频| 最新在线观看一区二区三区| 久久影院123| av电影中文网址| 在线观看www视频免费| 亚洲一区二区三区不卡视频| 曰老女人黄片| 一区二区三区激情视频| 每晚都被弄得嗷嗷叫到高潮| 好男人电影高清在线观看| 天天影视国产精品| 女人高潮潮喷娇喘18禁视频| 精品视频人人做人人爽| 国产精品久久久人人做人人爽| 亚洲国产精品一区二区三区在线| 国产国语露脸激情在线看| 最新在线观看一区二区三区| 视频区图区小说| 免费观看a级毛片全部| av网站在线播放免费| 免费在线观看日本一区| 两性午夜刺激爽爽歪歪视频在线观看 | 欧美乱色亚洲激情| 身体一侧抽搐| 国产午夜精品久久久久久| 在线观看免费日韩欧美大片| 久久热在线av| 黄网站色视频无遮挡免费观看| 午夜福利欧美成人| 最近最新中文字幕大全免费视频| 国产亚洲欧美98| 日日爽夜夜爽网站| 国产无遮挡羞羞视频在线观看| 久久精品国产清高在天天线| 91av网站免费观看| 热99re8久久精品国产| 极品教师在线免费播放| 国产精华一区二区三区| 成人18禁在线播放| 亚洲午夜精品一区,二区,三区| 国产男靠女视频免费网站| 国产一区二区三区在线臀色熟女 | 性色av乱码一区二区三区2| 99热国产这里只有精品6| 中文字幕av电影在线播放| ponron亚洲| 亚洲精品国产精品久久久不卡| 免费观看a级毛片全部| 在线观看免费高清a一片| 男女午夜视频在线观看| 国产精品二区激情视频| 这个男人来自地球电影免费观看| 操美女的视频在线观看| 人人妻人人添人人爽欧美一区卜| 亚洲精品一卡2卡三卡4卡5卡| 久久国产乱子伦精品免费另类| 91av网站免费观看| 久久久精品国产亚洲av高清涩受| 看片在线看免费视频| 久久人人97超碰香蕉20202| 亚洲熟妇中文字幕五十中出 | 亚洲av日韩精品久久久久久密| 黄色片一级片一级黄色片| 久久国产精品人妻蜜桃| av免费在线观看网站| 国产不卡一卡二| 又大又爽又粗| 久久人人爽av亚洲精品天堂| 亚洲欧美激情在线| 人妻 亚洲 视频| 视频在线观看一区二区三区| 免费av中文字幕在线| 一二三四在线观看免费中文在| 午夜免费观看网址| 69精品国产乱码久久久| 在线十欧美十亚洲十日本专区| 新久久久久国产一级毛片| 精品免费久久久久久久清纯 | 国产视频一区二区在线看| 久热这里只有精品99| 最近最新免费中文字幕在线| 可以免费在线观看a视频的电影网站| 中文亚洲av片在线观看爽 | 9色porny在线观看| 女同久久另类99精品国产91| 人妻 亚洲 视频| 天天操日日干夜夜撸| 国产在线精品亚洲第一网站| 中文字幕制服av| 午夜福利在线免费观看网站| 国产麻豆69| 午夜日韩欧美国产| 午夜免费成人在线视频| 欧美在线一区亚洲| 搡老乐熟女国产| 亚洲精品国产区一区二| 国产一区二区三区在线臀色熟女 | 国产色视频综合| 久久久久久久久免费视频了| 18禁观看日本| 中文字幕人妻丝袜制服| 校园春色视频在线观看| 丰满饥渴人妻一区二区三| 成人免费观看视频高清| 欧美成人免费av一区二区三区 | 18禁观看日本| 少妇被粗大的猛进出69影院| 国产主播在线观看一区二区| 人人妻人人添人人爽欧美一区卜| 人人妻人人澡人人爽人人夜夜| 激情在线观看视频在线高清 | 五月开心婷婷网| 亚洲综合色网址| xxxhd国产人妻xxx| 新久久久久国产一级毛片| a在线观看视频网站| 色综合婷婷激情| 黄色女人牲交| 老司机午夜十八禁免费视频| 麻豆乱淫一区二区| 国产亚洲精品久久久久5区| 久久热在线av| 亚洲国产毛片av蜜桃av| 亚洲五月婷婷丁香| 欧美人与性动交α欧美软件| 黄片小视频在线播放| 久久这里只有精品19| 变态另类成人亚洲欧美熟女 | 精品国产乱子伦一区二区三区| 老熟女久久久| 久久久久国内视频| 欧美最黄视频在线播放免费 | 精品国产超薄肉色丝袜足j| 香蕉丝袜av| 国产精品电影一区二区三区 | 久久精品国产99精品国产亚洲性色 | 亚洲在线自拍视频| 国产精华一区二区三区| 精品第一国产精品| 女人高潮潮喷娇喘18禁视频| 久久九九热精品免费| 免费日韩欧美在线观看| av有码第一页| 欧美国产精品一级二级三级| 国产高清视频在线播放一区| 夜夜爽天天搞| 欧美 亚洲 国产 日韩一| 欧美激情极品国产一区二区三区| 国产精品欧美亚洲77777| 亚洲精品在线观看二区| 夜夜爽天天搞| av电影中文网址| 捣出白浆h1v1| 黑人猛操日本美女一级片| 少妇粗大呻吟视频| 夜夜爽天天搞| 精品久久久精品久久久| 一二三四社区在线视频社区8| 免费av中文字幕在线| 免费黄频网站在线观看国产| 一区在线观看完整版| 欧美成人午夜精品| 狠狠婷婷综合久久久久久88av| 欧美最黄视频在线播放免费 | 精品少妇一区二区三区视频日本电影| 国产男女超爽视频在线观看| 国产日韩一区二区三区精品不卡| 日本欧美视频一区| 国产精品美女特级片免费视频播放器 | 国产单亲对白刺激| 一进一出抽搐gif免费好疼 | 最近最新中文字幕大全免费视频| 真人做人爱边吃奶动态| 深夜精品福利| 操美女的视频在线观看| 亚洲 国产 在线| 国产精华一区二区三区| 九色亚洲精品在线播放| 国产亚洲精品久久久久5区| 亚洲av片天天在线观看| 91精品三级在线观看| 婷婷丁香在线五月| 国产精品久久久久久精品古装| a在线观看视频网站| 一级a爱视频在线免费观看| 久久人妻熟女aⅴ| 精品卡一卡二卡四卡免费| 国产欧美日韩精品亚洲av| 欧美大码av| 国产又爽黄色视频| 国产麻豆69| 亚洲专区中文字幕在线| 国产av又大| 在线观看66精品国产| 欧美在线一区亚洲| www日本在线高清视频| 黄色视频,在线免费观看| av国产精品久久久久影院| 欧美激情 高清一区二区三区| 免费久久久久久久精品成人欧美视频| 久久久国产欧美日韩av| 一级作爱视频免费观看| 国产精品久久久久久精品古装| 如日韩欧美国产精品一区二区三区| 9热在线视频观看99| 大型av网站在线播放| 欧美人与性动交α欧美软件| 99在线人妻在线中文字幕 | 精品人妻在线不人妻| 狂野欧美激情性xxxx| 村上凉子中文字幕在线| 精品久久久久久电影网| 欧美+亚洲+日韩+国产| 在线观看午夜福利视频| 手机成人av网站| 国产成人精品久久二区二区91| av不卡在线播放| 天堂中文最新版在线下载| 久久精品国产综合久久久| 视频区欧美日本亚洲| av一本久久久久| 人妻 亚洲 视频| 午夜成年电影在线免费观看| 一级a爱片免费观看的视频| 女人精品久久久久毛片| 亚洲av成人不卡在线观看播放网| 麻豆国产av国片精品| 999久久久精品免费观看国产| 男人的好看免费观看在线视频 | 成人国语在线视频| 老熟女久久久| 亚洲欧美激情综合另类| 国产欧美日韩一区二区三区在线| 中文字幕人妻熟女乱码| 女人被躁到高潮嗷嗷叫费观| bbb黄色大片| 乱人伦中国视频| 欧美丝袜亚洲另类 | 久久久久国产精品人妻aⅴ院 | 免费日韩欧美在线观看| 精品福利永久在线观看| 一边摸一边抽搐一进一出视频| 免费观看人在逋| av不卡在线播放| 精品福利永久在线观看| 亚洲专区国产一区二区| 亚洲精品自拍成人| 女同久久另类99精品国产91| 国产精品 国内视频| 亚洲五月色婷婷综合| 久久九九热精品免费| 黄色 视频免费看| 一级作爱视频免费观看| 丝瓜视频免费看黄片| 最新在线观看一区二区三区| 天天影视国产精品| 熟女少妇亚洲综合色aaa.| 精品人妻在线不人妻| 久久人妻av系列| 岛国毛片在线播放| 韩国av一区二区三区四区| 中文字幕另类日韩欧美亚洲嫩草| 免费在线观看视频国产中文字幕亚洲| 欧美在线一区亚洲| 在线观看66精品国产| 高清毛片免费观看视频网站 | 中文字幕高清在线视频| 国产免费现黄频在线看| 99国产精品99久久久久| 精品久久久久久久毛片微露脸| 99久久99久久久精品蜜桃| 香蕉丝袜av| 97人妻天天添夜夜摸| 久久天躁狠狠躁夜夜2o2o| 一区二区三区激情视频| 欧美人与性动交α欧美精品济南到| 欧美日韩亚洲高清精品| aaaaa片日本免费| 精品国产一区二区三区四区第35| 多毛熟女@视频| 99精品欧美一区二区三区四区| 亚洲av片天天在线观看| 交换朋友夫妻互换小说| 超碰97精品在线观看| 老司机午夜十八禁免费视频| 亚洲国产毛片av蜜桃av| 美女扒开内裤让男人捅视频| 在线永久观看黄色视频| 亚洲情色 制服丝袜| 国产免费现黄频在线看| 一本大道久久a久久精品| 日韩人妻精品一区2区三区| 妹子高潮喷水视频| 久久久精品国产亚洲av高清涩受| 国产成人系列免费观看|