• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Real-time Privacy Preserving Framework for Covid-19 Contact Tracing

    2022-11-09 08:15:18AkashdeepBhardwajAhmedMohamedManojKumarMohammedAlshehriandAhedAbugabah
    Computers Materials&Continua 2022年1期

    Akashdeep Bhardwaj,Ahmed A.Mohamed,Manoj Kumar,Mohammed Alshehri and Ahed Abugabah

    1School of Computer Science,University of Petroleum&Energy Studies(UPES),Dehradun,248007,India

    2Department of Computer Science,College of Computer and Information Sciences,Majmaah University,Majmaah,11952,Saudi Arabia

    3Department of Information Technology,Faculty of Computer and Information,Assiut University,Assiut,71515,Egypt

    4Department of Information Technology,College of Computer and Information Sciences,Majmaah University,Majmaah,11952,Saudi Arabia

    5Department of Information System,College of Technological Innovation,Zayed University,Abu Dhabi,United Arab Emirates

    Abstract: The recent unprecedented threat from COVID-19 and past epidemics,such as SARS,AIDS,and Ebola,has affected millions of people in multiple countries.Countries have shut their borders,and their nationals have been advised to self-quarantine.The variety of responses to the pandemic has given rise to data privacy concerns.Infection prevention and control strategies as well as disease control measures,especially real-time contact tracing for COVID-19,require the identification of people exposed to COVID-19.Such tracing frameworks use mobile apps and geolocations to trace individuals.However,while the motive may be well intended,the limitations and security issues associated with using such a technology are a serious cause of concern.There are growing concerns regarding the privacy of an individual’s location and personal identifiable information (PII) being shared with governments and/or health agencies.This study presents a real-time,trust-based contact-tracing framework that operates without the use of an individual’sPII,location sensing,or gathering GPS logs.The focus of the proposed contact tracing framework is to ensure real-time privacy using the Bluetooth range of individuals to determine others within the range.The research validates the trust-based framework using Bluetooth as practical and privacy-aware.Using our proposed methodology,personal information,health logs,and location data will be secure and not abused.This research analyzes 100,000 tracing dataset records from 150 mobile devices to identify infected users and active users.

    Keywords: Privacy;contact tracing;mobile apps;Bluetooth;Covid;epidemic

    1 Introduction

    Epidemics such as H1N1,SARS,Ebola,and the recent coronavirus have impacted millions of people worldwide,resulting in a large death toll.The World Health Organization (WHO) has issued several advisories and courses for action to limit the spread of COVID-19 [1] infection by tracing infected individuals.The tracing process requires infected individuals to share information with governments and local medical agencies,which are tasked with tracking and quarantining individuals who may have been in close contact with infected victims,and the subsequent collection of further information about the infected victims.Tracking involves acquiring the personal information of each infected individual,including their travel history,locations visited,recent contacts,and their health details [2].While most individuals may be comfortable with sharing this information for their own and the nation’s benefit,privacy-aware individuals may not be so willing.This can hinder the contact tracing process,even as the virus continues to spread at alarming rates [3].Secure and privacy-aware contact tracing methods can inspire everyone,infected or not,of all ages to join the contact tracing,with an assurance of the data being processed confidentially and with no malicious intent.Globally,various contact tracing applications,such as mobile apps and global positioning systems (GPS),are being used.The infected individual is expected to selftest and self-report health details using mobile applications and location data [4].However,the sharing of data depends on local infrastructure and networks,which rely on unsecured external technologies such as wireless access points,GPS,data networks,or even those involved in the deployment and maintenance of the application itself.The government of Singapore has launched a contact tracing app called “Trace Together.”The Indian government’s contact tracing app,which is called Aarogya Setu,performs real-time tracking,as illustrated in Fig.1.

    Figure 1:Interface of Aarogya Setu contact tracing app

    This study proposes the use of a mobile application with Bluetooth connectivity to perform real-time contact tracing.The authors propose the use of mobile devices to send anonymous beacons of encrypted random code messages via Bluetooth.This allows for foolproof data privacy,and individuals remain anonymous.No collection of privacy-sensitive data is involved or dependent on external third-party IT infrastructure.The major highlights of this research are privacy-aware contact-tracing mobile applications with the following features.

    · The proposed contact tracing application does not involve any public wireless or network infrastructure.

    · No personally identifiable sensitive information,geolocation,or logs is shared or gathered.

    · Real-time tracking enables the rapid identification of locations corresponding to new infected cases.

    · Focuses on complete privacy and the use of an individual’s Bluetooth connection to determine others within a specific range.

    · Around 100,000 contact tracing datasets were used,which involves 150 individual mobiles.

    This technology process helps to monitor infected individuals as well as reduce the medical costs involved during quarantine measures.The focus is on testing a framework that ensures complete privacy.To evaluate the contact-tracing framework,T-test and regression analysis were used to validate datasets from real scenarios.

    The remainder of this paper is organized as follows: Section 1 describes in detail contact tracing and privacy issues,and Section 2 presents the literature survey regarding the different contact-tracing methods employed by various researchers.The proposed Contact Tracking Framework (CTF) algorithm is illustrated in Section 3.Section 4 discusses the experimental results obtained and presents the T-test validation of the dataset reviewed.

    1.1 Contact Tracing and Privacy Issues

    Contact tracing involves the identification,assessment,and management of persons exposed to diseases to prevent any onward transmission.If scientifically applied,this can help break the transmission chain of infectious diseases and can be an effective health tool for managing outbreaks.With respect to COVID-19,contact tracing requires the identification of individuals who may have been exposed.Steps such as the quarantining of contacts and the isolation of cases need to be performed.The design and development involved in the contact tracing application system needed to consider various threat vectors in terms of privacy,as presented in Tab.1.

    Table 1:Privacy threat vectors and their malicious activities

    Table 1:Continued

    Gathering personal mobility details for health application purposes presents challenges,even if privacy ethics and issues are upheld.The analysis of any individual’s mobility and health data can only be justified if the benefits are related to public health.Most existing contact-tracing solutions rely on wireless infrastructure for contact tracing to preserve privacy.

    2 Literature Survey

    During the 2014 EBOLA outbreak,the WHO expounded on the significance of contact tracing and even proposed protocols for tracing infected individuals.However,no mobile application or data-gathering technologies were deployed.The WHO has proposed recommendations for medical staff and those on the front line to improve the safety of using contact tracing applications.With COVID-19,several countries have mandated the use of mobile-based contact tracing,thus gathering data and making use of data obtained from mobile applications.Monitoring and regulating interactions are vital for preventing the spread of this disease.Internet-and mobilebased technologies have aided in terms of surveillance,modeling of infection,remote sensing,etc.,to predict and control the disease spread [5].This tactic of using new-age technology to deal with global epidemics is classified as digital epidemiology under a new domain,as described by Chancay-García et al.[6].Recently,several researchers have assessed the categorization of mobile call data records.Dede et al.[7] and Christak et al.[8] tracked user mobility patterns to model and evaluate epidemic sickness.Tizooni et al.[9] explored the use of proxy systems for individual users.The authors evaluated the mobility flow to predict the spread of epidemics.The accuracy of the predictive analysis,which was performed using mobility data sources,varied with the epidemic rate of propagation and timing of data results gathered.

    Salathe et al.[10] discussed the use of wireless technologies,such as the ZigBee protocol and Bluetooth,to detect and trace infected people.The authors obtained detailed data on the social contacts of infected persons during the infection period.Then,the authors recreated the social networks of potentially infected users.To evaluate the spread,diffusion,and impact,the authors also proposed the SEIR model based on features such as susceptible,exposed,infectious,and recovered.Mastrandrea et al.[11] presented a prototype of wearable sensors for determining contacts amongst individuals and students.The authors matched the results with contacts from personal records,and associated the spread of an epidemic using sensors and diaries with a notable difference in dynamics.Interest in contact-tracing strategies has increased in recent times,and different methods have been used to estimate the impact and rate of spread before and during the plagues,as well as the efficiency of measures against contiguous epidemics.In many outbreaks,contact tracing is the only feasible option to identify infected individuals,as presented by Lima et al.[12],Rubrichi et al.[13],and Fraser et al.[14],who also tested reasons that aid in controlling an outbreak.

    Contact tracing methods adopt two primary models,namely,population-based and agentbased approaches.Klinkenberget et al.[15] proposed a population-based top-down approach for analyzing system research data from a macroscopic perspective.Then,Kwok et al.[16] and Müller et al.[17] presented an agent-based bottom-up approach,considering every individual as a self-regulating agent entity.Each agent is responsible for its own infection state,movement,and location to estimate unrelated and adaptive activities.The stochastic model introduced by Farrahiet et al.[18] and Keelinget et al.[19] involves grouping the associated measures and fundamental dynamics of epidemics using a deterministic approach.In previous years,contacttracing models have focused on a generic network of contacts.To improve the precision of such network contact models,Huerta et al.[20] presented a similar model as part of the epidemic regulation tactics.This method helped to estimate the impact of contact tracing and the random tracing of complex contact networks.Yang et al.[21] proved that by tracing the contacts at a low additional cost,the spread of an outbreak may be considerably reduced,and even eradicated.The FluPhone project developed at Cambridge University [22] was one of the first attempts to use mobile apps to determine contacts.Using wireless Bluetooth as a proxy,the application was able to estimate physical contacts.The application promoted users to report symptoms to determine the rate and risk of infection.Similar contact tracing schemes focus on privacy issues,such as the pan-European privacy-preserving proximity tracing (PEPP-PT) [23] and the MIT project Safe Paths [24].Corporate enterprises such as Apple,Facebook,and Google teamed up to integrate their web portals with handheld and sensor devices to provide similar solutions for Android and iOS mobiles.Isella et al.[25] claimed that the practice of contact tracing and isolation did not prevent the COVID-19 epidemic.The decreasing infection count is primarily due to asymptomatic infected individuals who are undetected,and who it is believed contribute to the spread of the COVID-19 outbreak.Using mobile apps to find previous contacts,we mathematically proved that such epidemic diseases can be checked even when no one uses the mobile application.

    3 Proposed Framework:CTF

    A real-time contact tracking framework (CTF) was designed and developed as a secure mobile application using the Android platform,SDK tools,and Java.Instead of using a data network or IT infrastructure such as wireless or office networks,the lightweight application uses Bluetooth with the need for limited computing resources of the individual’s mobile.However,there are unauthorized and malicious privacy impacts from threat vectors.The CTF process is trust-based;individuals own the process,and it is his/her prerogative to join or exit,and further perform regular 15 days self-assessment to determine any infection.The generated logs comprise a unique ID (user’s Bluetooth),timestamp (date and time),and health status code (random salted number)for each application user.The contract tracking framework follows five phases,as shown in Tab.2.

    Entities involved in the CTF process require privacy protection.These include individuals(mobile IMEI and number),location (IP address and geolocation),health data,and command server communication.The proposed CTF application ensures that the data collected is never shared with any of these entities,and keeps the individuals anonymous.The proposed workflow is shown in Fig.2.

    Table 2:Phases of contract tracing framework

    Figure 2:Process flow for secure contact tracing framework

    This application was designed for Android mobile devices.The reports are saved locally on the mobile,and are encrypted with a private key in the form of two reports.The first report is a detailed description accessible only to individuals.If the individual is infected,he can share with the medical teams all of the details in full confidence using a private key in order to determine the treatment.The second report is a basic-level code encrypted with a public key and uploaded to the command server.Whenever an individual goes outside,the application scans other mobile devices using Bluetooth.This sends and receives anonymous encrypted beacons to and from other mobile devices.If the application can decrypt the basic report of other individuals,Bluetooth alerts are generated immediately.

    3.1 Bluetooth Beacons

    · Should not reveal any personal information,location,reports,or other individual information.

    · While scanning,any personally identifying information should not be revealed to other users.

    · Should be arranged,encrypted with a symmetric key to prevent any log being revealed to any other user.

    · Should be randomly generated every 24 h to prevent the identification of transmitted information.

    3.2 Uninfected Individuals

    These are individuals who were or are infected,and who are never:

    · Mandated to upload their details on the command server.

    · Notified by the command server to verify potential contact with other non-infected.

    · Receive medical certificate encrypted with medical teams’public key.

    3.3 Infected Individuals

    These are individuals who are infected:

    · Are given the option to opt-in so that others can determine if they are near to any infected user.

    · Can check if they are close to others or those who opted to join.

    · Can stay anonymous even from the admin teams of the command server.

    · Can find an infected user and determine when or where the actual contact happened.

    · Should be assured of their IMEI number or MAC address.

    · Can use the TOR browser to upload or download their logs and reports,thus remaining anonymous.

    These alerts warn about an infected person in an individual’s proximity.This indicates the presence of an infected individual within a range of 8-10 m.The flow of the secure contact tracing process is shown in Fig.3.In this case,the user should then proceed to be tested.This process is anonymous,and no information about the individual is shared with the command server or other individuals.Individuals can opt-in or opt out as the process is trust-based.Only those who shared the reports on the command server and individual infections were verified using Bluetooth.The authors formally prove that the application guaranteed privacy-sensitive features and trust verification for the individuals observed correctly.The following features were considered when designing the framework.

    Figure 3:Bluetooth and command server communication

    3.4 Proposed Algorithm:CTF

    Algorithm 1 presents the proposed secure application workflow and the CTF process.Tab.3 lists the notations used in the proposed algorithm.

    Table 3:Notations in proposed algorithm

    Algorithm 1: Contact Tracing Framework (CTF)1.Start 2.Assuming U(i)=Exposed individual with exposure to corona hotspots,infected victims,or travel history 3.U(i)n=∑nk=0images/BZ_1006_631_2639_649_2685.pngnk)XkTn-k 4.I(App)=Install proposed contact tracing application &S(Mon)=perform self-monitoring for 15 days(Continued)

    images/BZ_1007_566_405_597_451.pngimages/BZ_1007_1196_405_1228_451.pngTrue →X(i)≤15 days False →X(i)<15days 6.L=Application log generated (User ID,Timestamp,Code)7.L(i)=∑{Un+Tn+Cn}8.E=Encrypted Log {L} stored locally on user’s mobile SD Card,encrypted with symmetric private Key 9.if Symptoms Detected=False 10.Confirm no symptoms 11.No follow-up or review required 12.U(i)=User can opt-out &uninstall application 13.Else 14.Consider case=Suspected 15.Isolate and use personal protection equipment 16.Provide user option to open-in or opt-out 17.Endif 18.if U(i)=opt-out 19.Exit 20.Else 21.U(i)=opt-in 22.Receives Private Key from Command Server 23.Encrypts and Upload logs to Command Server 24.Encrypted info available on Server Portal 25.Endif 26.U(i) receives two reports →R1(i) &R2(i)27.U(j) are other individuals reporting infection also receive similar decryption keys &reports 28.App on U(i,j) constantly check for decryption of other’s basic report,duration (15 min/24 h)29.if U(j) →Decrypt R1(i)=Success 30.if U(i) within range 31.U(i) Bluetooth →Generate Proximity Alert 32.U(i) and U(j) →in vicinity of infected user or maybe infected 33.Recommend Lab Testing 34.Access Lab Results 35.Endif 36.Endif 37.if Results R(i)=Negative 38.Download Covid19 free certificate 39.Stop Contact Tracing 40.Exit 41.Else 42.if R(i)=Positive 43.Confirmed Case 44.Isolation for 15 days 45.Recheck Lab Testing 46.Endif 47.Endif 48.if U(I,j)=exit and opt-out 49.U(i)opt-out &Delete L(i) ± Exit_App=Graceful Uninstall 50.Endif 51.End 5.|I(App)|=True,X(i)False,X(i) and |S(Mon)|=

    The proposed contact detection runs as a service utilizing Bluetooth beaconing.This confirms the proximity detection of data exchange with nearby phones,even as the advertisements are nonconnectable and undirected.Fig.4 illustrates the flow of advertisements between the application and remote Bluetooth devices.Contact detection and advertisement services are run on devices with a Bluetooth 16-bit UUID 0 x FA5F to enable proximity sensing between devices.Devices advertise and scan using a 128-bit proximity identifier that is periodically modified.Each advertisement scan is timestamped,and the discoverable bit is initially set to 1 and captured.The scan interval window is 5 min,which is sufficient to provide the discovery of advertisers and coverage.The advertiser address and proximity are changed so that they cannot be linked in any way.The advertising intervals are changed every few hundred milliseconds.The scanning internal window performs periodic sampling for every few minutes.

    Figure 4:Dataflow for advertisement between mobiles

    Fig.5 illustrates the dataflow process and behavior for the device scans,which ensure that privacy is maintained as the most critical specification while designing the application.This is utilized with the Bluetooth protocol,which is location independent,yet it uses the Bluetooth beacon to detect the device proximity.The user proximity ID correlates and obtains IDs of other devices every 15 min.This reset window reduces the loss from privacy advertisements and is processed exclusively on the local device.If any user is detected to have COVID-19 symptoms,the user can consent to the sharing of the diagnosis keys with the main server.Thus,users have control and transparency regarding their participation for contact tracing.These precautions are implemented in the framework design to ensure user privacy.

    4 Experimental Results

    The results varied between randomly selected individuals and those infected.Moreover,this research considered different time slots during which users turn ON their Bluetooth to evaluate the effectiveness of our protocols in different scenarios.The validations were repeated to capture the randomness of the simulations for 150 devices.

    Figure 5:Dataflow and behavior of device scan process

    Initial researchfocused on the infection rate among individuals depending on the initial infection and contagiousness probability.These datasets were obtained from infections reported by individuals who had installed the contact tracing application,and who were using it.

    Subsequent researchfocused on three scenarios (i1-i3) as follows:

    · i1: Individuals who randomly turn ON/OFF their Bluetooth anytime

    · i2: Individuals who turn ON Bluetooth when outside their homes,in a market,or in crowded places

    · i3: Individuals who turn ON their Bluetooth only at specific hours and for set durations.

    The authors conducted a parametric statistical t-test and regression analysis to ensure that the datasets had no violations of the information presented in random samples from 100,000 records.The use of regression validated the prediction of continuous dependent variables from independent variables in the datasets.The deviations from the linear point line are the errors.The distribution of the sample mean is normal,and the variances of the different parameters are similar.The null hypothesis assumes that if the data violate these assumptions,then it can be safely assumed that the results obtained have committed a Type I error,which is more or less than the alpha probability,and the T-Test validation parameters are interpreted as presented in Tab.4.

    Table 4:Test validation parameters

    The requirement for performing the T-Test is the use of two independent samples with normally distributed data and samples with the same variance.The authors take the null hypothesis,H0: H1-H2=0,where H1 and H2 are the means for the two datasets.The null hypothesis is that there is no difference between the means of the two datasets,or more formally,that the difference is zero.Tab.5 presents the T-test validation of the CTF dataset sample.

    Table 5:Infection count (in thousands) for three options

    Considering the datasets for i1 and i2,the authors used a significance level of 0.05 with a two-tailed hypothesis.The difference scores that were calculated are presented in Tabs.6 and 7 below.

    Table 6:Difference scores for i1 dataset

    Table 7:Difference scores for i2 dataset

    T-Test calculations are performed for validation on datasets,and are presented in Tabs.8 and 9.

    Table 8:Test calculation for i1 dataset

    Table 9:Test calculation for i2 dataset

    For T-Value Calculation:

    images/BZ_1011_584_2658_698_2692.pngs2p=((df1/(df1 + df2)) * s21) + ((df2/(df2 + df2)) * s22)=((10/20) * 124.36) + ((10/20) *503.16)=313.76 s2M1= s2p/N1=313.76/11=28.52 s2M2= s2p/N2=313.76/11=28.52 T=(M1- M2)/(s2M1 + s2M2)=-22.36/57.05=-2.96

    T-value is-2.96089 and the P-value is 0.007726→Result is significant at p<0.05.

    Because the P-value is less than the significance level,alpha 0.05 →Null Hypo (H0) is rejected and the Alternative Hypo (Ha) is accepted.

    Further,validating with regression analysis:

    ?Sum of X=262 Sum of Y=508 Mean X=23.8182 Mean Y=46.1818 Sum of squares (SSX)=1243.6364 Sum of products (SP)=2485.3636

    Regression Equation==bX+a

    where b= SP/SSX=2485.36/1243.64=1.99846,and a=MY-bMX=46.18-(2*23.82)=-1.41798=1.99846 X-1.41798

    From the graph shown in Fig.6 below,individuals who randomly turn on their Bluetooth when going out or in crowded places display better performance and contagiousness probability than those who turn on Bluetooth only when outside their homes or only at certain specific hours of for a set duration.

    Figure 6:Infected users vs.contagiousness probability

    5 Conclusion

    The presented research work successfully demonstrates the real-time,trust-based contact tracing framework (CTF) as a feasible privacy-aware solution.Nation-states need not use methods or applications that pose privacy-related risks or face issues when an individual’s personal information or health logs can be misused.This study considers the features and entities that are related to protecting the privacy of an individual.The focus is to build a trust-based framework with a lightweight Bluetooth-based mobile application.Using sample datasets,the authors have shown how contact tracing with three options can mitigate the spread of COVID-19.Existing contact tracing applications do not provide open-source software for research or experimentation purposes.In the future,the authors plan to release this research as an open-source software implementation for both Android and iOS devices.

    Funding Statement: The author would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under Project No.R-2021-131.

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    一个人看视频在线观看www免费| 国模一区二区三区四区视频| 乱系列少妇在线播放| 国产精品久久久久久精品古装| 99久久精品一区二区三区| 亚洲在久久综合| 国产免费一级a男人的天堂| 亚洲熟女精品中文字幕| 丰满迷人的少妇在线观看| 国模一区二区三区四区视频| 国产高清三级在线| h日本视频在线播放| 亚洲天堂av无毛| 中国国产av一级| 午夜91福利影院| 内地一区二区视频在线| 国产精品99久久久久久久久| 成人黄色视频免费在线看| 亚洲欧洲精品一区二区精品久久久 | 国产在线免费精品| 国产欧美日韩综合在线一区二区 | av专区在线播放| 永久网站在线| 十分钟在线观看高清视频www | 国产精品99久久久久久久久| 久久99蜜桃精品久久| 国产亚洲最大av| 水蜜桃什么品种好| 亚洲精华国产精华液的使用体验| 久久99蜜桃精品久久| 亚洲欧洲日产国产| 国产精品久久久久久av不卡| 中文在线观看免费www的网站| 久久久国产精品麻豆| 日本色播在线视频| 一二三四中文在线观看免费高清| 久久久久久久久久久丰满| 大香蕉久久网| 26uuu在线亚洲综合色| 色视频在线一区二区三区| 青春草国产在线视频| 久久毛片免费看一区二区三区| 欧美精品人与动牲交sv欧美| 多毛熟女@视频| 丝袜脚勾引网站| 国产色婷婷99| 汤姆久久久久久久影院中文字幕| 欧美日韩视频高清一区二区三区二| 久久99热6这里只有精品| 国产午夜精品一二区理论片| 欧美日韩在线观看h| 一级二级三级毛片免费看| 国产中年淑女户外野战色| 久久这里有精品视频免费| 午夜福利网站1000一区二区三区| 成人特级av手机在线观看| 国产美女午夜福利| 午夜福利,免费看| 成人毛片a级毛片在线播放| 日韩中字成人| 秋霞在线观看毛片| 狂野欧美白嫩少妇大欣赏| 免费看av在线观看网站| 91精品国产九色| 亚洲av成人精品一区久久| 国产成人午夜福利电影在线观看| 岛国毛片在线播放| 亚洲欧美一区二区三区黑人 | 26uuu在线亚洲综合色| 国国产精品蜜臀av免费| 99热全是精品| 人人妻人人爽人人添夜夜欢视频 | 亚洲欧美一区二区三区国产| 高清视频免费观看一区二区| 国内揄拍国产精品人妻在线| 国产精品熟女久久久久浪| 亚洲av成人精品一区久久| 国产精品一区二区性色av| 国产成人精品婷婷| 五月天丁香电影| 欧美97在线视频| 你懂的网址亚洲精品在线观看| 最近最新中文字幕免费大全7| 日韩免费高清中文字幕av| 国产色爽女视频免费观看| 日本黄大片高清| 国产亚洲欧美精品永久| 青春草国产在线视频| 99re6热这里在线精品视频| 日本色播在线视频| 亚洲国产最新在线播放| 在线观看免费视频网站a站| a级毛片在线看网站| 亚洲欧洲精品一区二区精品久久久 | av国产久精品久网站免费入址| 伊人久久国产一区二区| 亚洲电影在线观看av| 国产亚洲91精品色在线| 曰老女人黄片| 伊人久久精品亚洲午夜| 一级毛片 在线播放| 国内精品宾馆在线| 91精品一卡2卡3卡4卡| 街头女战士在线观看网站| 日本av手机在线免费观看| 亚洲精品456在线播放app| 九草在线视频观看| 黑人高潮一二区| 熟女人妻精品中文字幕| 欧美日本中文国产一区发布| 久久久久视频综合| a级毛色黄片| 精品少妇黑人巨大在线播放| 国产成人免费观看mmmm| 少妇 在线观看| 国产伦在线观看视频一区| 国产一区二区在线观看日韩| av不卡在线播放| 中文字幕久久专区| 国产真实伦视频高清在线观看| 国产免费视频播放在线视频| 欧美97在线视频| 这个男人来自地球电影免费观看 | 国产精品蜜桃在线观看| 欧美日韩一区二区视频在线观看视频在线| 国产精品一区二区在线不卡| 伊人久久国产一区二区| 久久久午夜欧美精品| 少妇裸体淫交视频免费看高清| 国产爽快片一区二区三区| 国产有黄有色有爽视频| 搡老乐熟女国产| 亚洲国产欧美日韩在线播放 | 人妻少妇偷人精品九色| 久久鲁丝午夜福利片| www.色视频.com| 国产片特级美女逼逼视频| 国产精品人妻久久久久久| 亚洲熟女精品中文字幕| 国产老妇伦熟女老妇高清| 国产精品不卡视频一区二区| 亚洲av.av天堂| 乱系列少妇在线播放| 亚洲,欧美,日韩| 亚洲美女视频黄频| 三级国产精品片| 黄色一级大片看看| 有码 亚洲区| 亚洲成人一二三区av| 色94色欧美一区二区| 亚洲自偷自拍三级| 亚洲精品国产av蜜桃| 高清午夜精品一区二区三区| 99九九线精品视频在线观看视频| 日本91视频免费播放| 成人毛片a级毛片在线播放| 99九九线精品视频在线观看视频| 久久久久久久亚洲中文字幕| 男女边摸边吃奶| 久久97久久精品| 亚洲欧美成人综合另类久久久| 国产在视频线精品| 亚洲国产精品999| 亚洲欧洲国产日韩| 在线 av 中文字幕| 久久久久国产网址| 亚洲欧洲日产国产| 极品少妇高潮喷水抽搐| 亚洲欧美精品专区久久| av卡一久久| 久久精品熟女亚洲av麻豆精品| 在线观看免费日韩欧美大片 | 中文字幕人妻熟人妻熟丝袜美| 成人毛片60女人毛片免费| 伦理电影免费视频| 精品亚洲成a人片在线观看| 在线观看av片永久免费下载| 丰满少妇做爰视频| 麻豆成人av视频| 久久久久久久久大av| 国产 精品1| 国产毛片在线视频| 午夜激情久久久久久久| 国产爽快片一区二区三区| 成人毛片60女人毛片免费| 综合色丁香网| 亚洲图色成人| 在线观看免费日韩欧美大片 | 亚洲国产毛片av蜜桃av| 国产真实伦视频高清在线观看| 亚洲va在线va天堂va国产| 中文在线观看免费www的网站| 亚洲第一区二区三区不卡| 国产国拍精品亚洲av在线观看| 国产淫语在线视频| 老女人水多毛片| 日韩熟女老妇一区二区性免费视频| 国产熟女午夜一区二区三区 | 国产精品麻豆人妻色哟哟久久| 22中文网久久字幕| 男女国产视频网站| 久久99精品国语久久久| 两个人免费观看高清视频 | 亚洲av二区三区四区| 又大又黄又爽视频免费| 午夜久久久在线观看| 亚洲av免费高清在线观看| 青春草视频在线免费观看| 免费人妻精品一区二区三区视频| 啦啦啦在线观看免费高清www| 人妻少妇偷人精品九色| 观看免费一级毛片| 亚洲av二区三区四区| 亚洲精品色激情综合| 国产日韩欧美视频二区| 久久久久久久久久久免费av| 亚洲一级一片aⅴ在线观看| 我要看黄色一级片免费的| 91成人精品电影| 永久免费av网站大全| 国产精品免费大片| 99热全是精品| 亚洲性久久影院| 国产极品天堂在线| 国国产精品蜜臀av免费| 欧美 亚洲 国产 日韩一| 少妇精品久久久久久久| 2022亚洲国产成人精品| 日本av手机在线免费观看| 高清在线视频一区二区三区| 国产av精品麻豆| 中国三级夫妇交换| 久久人人爽人人片av| 女人久久www免费人成看片| 亚洲av男天堂| 丰满少妇做爰视频| 黄色欧美视频在线观看| 午夜日本视频在线| 免费观看无遮挡的男女| 国产无遮挡羞羞视频在线观看| 午夜视频国产福利| 3wmmmm亚洲av在线观看| 能在线免费看毛片的网站| 午夜免费观看性视频| 男的添女的下面高潮视频| 亚洲国产精品专区欧美| 一本一本综合久久| 欧美老熟妇乱子伦牲交| 观看av在线不卡| 日本欧美国产在线视频| 中国美白少妇内射xxxbb| 亚洲精品亚洲一区二区| 有码 亚洲区| 99热6这里只有精品| 伦精品一区二区三区| 美女主播在线视频| 久久久久久久精品精品| 9色porny在线观看| 最近手机中文字幕大全| 曰老女人黄片| 中文资源天堂在线| 91aial.com中文字幕在线观看| 少妇裸体淫交视频免费看高清| 自线自在国产av| 免费av不卡在线播放| 一本—道久久a久久精品蜜桃钙片| 2021少妇久久久久久久久久久| 亚洲第一av免费看| 久久免费观看电影| 我要看日韩黄色一级片| 简卡轻食公司| 亚洲欧美成人精品一区二区| 成人黄色视频免费在线看| 黄色怎么调成土黄色| 国产一级毛片在线| 一级,二级,三级黄色视频| 一本大道久久a久久精品| 成年人免费黄色播放视频 | 亚洲国产精品国产精品| 只有这里有精品99| 少妇熟女欧美另类| 日韩人妻高清精品专区| 亚洲精品日本国产第一区| 99精国产麻豆久久婷婷| 午夜福利视频精品| 国产欧美亚洲国产| 午夜免费鲁丝| 尾随美女入室| 亚洲av电影在线观看一区二区三区| tube8黄色片| 成人国产麻豆网| 久久精品久久久久久久性| 美女大奶头黄色视频| 亚洲国产最新在线播放| 夫妻性生交免费视频一级片| 午夜福利视频精品| 国产成人精品福利久久| 日本爱情动作片www.在线观看| 亚洲人成网站在线观看播放| 黑人猛操日本美女一级片| 国产欧美日韩综合在线一区二区 | 久久国产精品大桥未久av | 国产成人精品久久久久久| 卡戴珊不雅视频在线播放| 亚洲欧美成人精品一区二区| 国产亚洲91精品色在线| 国产色婷婷99| 又粗又硬又长又爽又黄的视频| 亚洲av在线观看美女高潮| 国产 一区精品| 韩国av在线不卡| 人妻夜夜爽99麻豆av| 精品久久久精品久久久| 伦理电影大哥的女人| 视频中文字幕在线观看| 蜜桃在线观看..| 欧美国产精品一级二级三级 | 国产综合精华液| 人妻 亚洲 视频| 一本—道久久a久久精品蜜桃钙片| 丝瓜视频免费看黄片| 美女主播在线视频| 三上悠亚av全集在线观看 | 国产一区有黄有色的免费视频| 亚洲怡红院男人天堂| 国产精品久久久久久精品古装| 日日啪夜夜撸| 秋霞在线观看毛片| 国产亚洲5aaaaa淫片| 久久精品夜色国产| 最新的欧美精品一区二区| 色婷婷久久久亚洲欧美| 亚洲国产日韩一区二区| 国产男女内射视频| 欧美高清成人免费视频www| av福利片在线| 久久ye,这里只有精品| 一级黄片播放器| 三级经典国产精品| 91久久精品国产一区二区三区| 亚洲高清免费不卡视频| 久久婷婷青草| 99热国产这里只有精品6| 简卡轻食公司| h日本视频在线播放| 精品午夜福利在线看| 久久6这里有精品| 欧美 日韩 精品 国产| 国产在线免费精品| 少妇猛男粗大的猛烈进出视频| 日韩,欧美,国产一区二区三区| 久久人人爽av亚洲精品天堂| 亚洲,欧美,日韩| 免费大片18禁| 精品少妇黑人巨大在线播放| 高清不卡的av网站| 亚洲成色77777| 热re99久久国产66热| 少妇高潮的动态图| 美女福利国产在线| 女性生殖器流出的白浆| 王馨瑶露胸无遮挡在线观看| 熟女电影av网| 男人和女人高潮做爰伦理| 成年美女黄网站色视频大全免费 | 免费黄色在线免费观看| 亚洲精品,欧美精品| 国产精品国产三级国产专区5o| 2022亚洲国产成人精品| 国产无遮挡羞羞视频在线观看| av播播在线观看一区| 人妻系列 视频| 久久99精品国语久久久| 国产精品久久久久久久久免| 成人国产麻豆网| 久久精品国产亚洲av天美| 亚洲av成人精品一二三区| 欧美成人午夜免费资源| 日韩大片免费观看网站| 免费少妇av软件| 一边亲一边摸免费视频| 久久毛片免费看一区二区三区| 男女国产视频网站| 久久久久久久久久成人| 91久久精品国产一区二区成人| 看免费成人av毛片| av卡一久久| 久久久久久久久久人人人人人人| 国产精品久久久久成人av| 你懂的网址亚洲精品在线观看| 国产精品久久久久成人av| 大话2 男鬼变身卡| 少妇 在线观看| av在线观看视频网站免费| 久久99热6这里只有精品| 91aial.com中文字幕在线观看| 久热久热在线精品观看| 国产精品秋霞免费鲁丝片| 日日啪夜夜爽| 国产成人精品婷婷| 蜜桃在线观看..| 青青草视频在线视频观看| 欧美人与善性xxx| 日本爱情动作片www.在线观看| 大香蕉久久网| 国产在视频线精品| 伊人亚洲综合成人网| 欧美精品亚洲一区二区| av播播在线观看一区| 如何舔出高潮| 少妇人妻久久综合中文| 国产免费又黄又爽又色| 丰满乱子伦码专区| 伊人久久精品亚洲午夜| 午夜91福利影院| 欧美xxⅹ黑人| 亚洲欧美一区二区三区国产| 欧美精品一区二区免费开放| 丝瓜视频免费看黄片| 国产精品国产三级国产av玫瑰| 久久久久久久亚洲中文字幕| 黑人猛操日本美女一级片| 国产伦理片在线播放av一区| 国产免费视频播放在线视频| 免费观看av网站的网址| 少妇 在线观看| 国产精品无大码| 狠狠精品人妻久久久久久综合| 亚洲国产精品专区欧美| 免费人成在线观看视频色| 亚洲精品国产色婷婷电影| 高清视频免费观看一区二区| 嫩草影院入口| 天堂中文最新版在线下载| 欧美日韩av久久| 一区二区三区精品91| 久热久热在线精品观看| 我的女老师完整版在线观看| 久久精品熟女亚洲av麻豆精品| 国产高清国产精品国产三级| 精品酒店卫生间| 插阴视频在线观看视频| 久久久久久久久久久久大奶| 亚洲av综合色区一区| av福利片在线| 一级爰片在线观看| 久久午夜综合久久蜜桃| 日韩熟女老妇一区二区性免费视频| 国语对白做爰xxxⅹ性视频网站| 三级国产精品欧美在线观看| 麻豆精品久久久久久蜜桃| 国产一区二区在线观看日韩| 国产一区有黄有色的免费视频| 多毛熟女@视频| 久久久久久久久久成人| 亚洲国产最新在线播放| 天天躁夜夜躁狠狠久久av| 建设人人有责人人尽责人人享有的| 观看av在线不卡| av在线app专区| 精品久久国产蜜桃| 亚洲欧美日韩东京热| 丰满少妇做爰视频| 日韩一本色道免费dvd| 性色av一级| 日韩不卡一区二区三区视频在线| 国产成人精品一,二区| 亚洲精品国产成人久久av| 久久鲁丝午夜福利片| 人人妻人人澡人人爽人人夜夜| 好男人视频免费观看在线| 我的老师免费观看完整版| 韩国av在线不卡| 国产极品粉嫩免费观看在线 | 国产毛片在线视频| av国产久精品久网站免费入址| 国产女主播在线喷水免费视频网站| 99热这里只有是精品在线观看| 国内揄拍国产精品人妻在线| 精品一区二区三卡| 久久久久久久精品精品| 日本免费在线观看一区| 日韩成人伦理影院| 美女内射精品一级片tv| 欧美精品一区二区大全| 另类精品久久| 97超视频在线观看视频| kizo精华| 99九九在线精品视频 | 国产精品蜜桃在线观看| 国产精品人妻久久久影院| 久久久欧美国产精品| 天堂8中文在线网| 国产精品一区二区在线观看99| 麻豆成人午夜福利视频| 免费观看a级毛片全部| 国产色爽女视频免费观看| av天堂久久9| 国产黄片美女视频| 国产精品久久久久久精品电影小说| 国产一区二区三区av在线| 亚洲精品一区蜜桃| 91久久精品国产一区二区三区| av有码第一页| 乱系列少妇在线播放| 在线观看免费日韩欧美大片 | 女人久久www免费人成看片| 亚洲成人手机| 成人亚洲欧美一区二区av| av有码第一页| 视频中文字幕在线观看| 成年人免费黄色播放视频 | 国产黄色视频一区二区在线观看| 亚洲av成人精品一区久久| 国产精品国产三级专区第一集| 色视频www国产| 欧美日韩精品成人综合77777| 国产深夜福利视频在线观看| 一区二区av电影网| 精品亚洲成国产av| 又粗又硬又长又爽又黄的视频| 日韩一区二区视频免费看| 成人影院久久| 色5月婷婷丁香| 久久 成人 亚洲| 国产av码专区亚洲av| 春色校园在线视频观看| 国产女主播在线喷水免费视频网站| 亚洲欧美日韩另类电影网站| 国产精品国产三级专区第一集| 国产一级毛片在线| 国内少妇人妻偷人精品xxx网站| 日韩 亚洲 欧美在线| 国产黄色免费在线视频| 热re99久久精品国产66热6| 亚洲av国产av综合av卡| 国产精品蜜桃在线观看| 亚洲怡红院男人天堂| 又黄又爽又刺激的免费视频.| 国产精品免费大片| 日日摸夜夜添夜夜添av毛片| 久久午夜综合久久蜜桃| 国产伦在线观看视频一区| 在线观看美女被高潮喷水网站| 精品少妇黑人巨大在线播放| 丰满迷人的少妇在线观看| 国产伦理片在线播放av一区| 在线观看美女被高潮喷水网站| 亚洲欧美日韩东京热| 日日摸夜夜添夜夜爱| 免费av不卡在线播放| 国产成人免费无遮挡视频| 九草在线视频观看| 午夜福利视频精品| 免费av不卡在线播放| 美女内射精品一级片tv| 黄色日韩在线| 夜夜骑夜夜射夜夜干| 国产av精品麻豆| 午夜老司机福利剧场| 亚洲成人av在线免费| 亚洲国产最新在线播放| 国产av精品麻豆| 婷婷色综合www| 欧美日韩综合久久久久久| 久久韩国三级中文字幕| 精品酒店卫生间| 成人无遮挡网站| 久久久久久久久久久免费av| av国产精品久久久久影院| 久久av网站| 免费大片18禁| 青春草视频在线免费观看| 2018国产大陆天天弄谢| 国产一区有黄有色的免费视频| 久久人人爽人人爽人人片va| 精品视频人人做人人爽| 伦理电影免费视频| 亚洲无线观看免费| 亚洲,一卡二卡三卡| 女性生殖器流出的白浆| 国精品久久久久久国模美| 亚洲av二区三区四区| 免费观看性生交大片5| 国产在线免费精品| 在线观看免费高清a一片| 久久女婷五月综合色啪小说| 91久久精品国产一区二区成人| 波野结衣二区三区在线| 久久韩国三级中文字幕| 欧美区成人在线视频| 成年人午夜在线观看视频| 亚洲精品自拍成人| 久久精品久久久久久久性| 观看av在线不卡| 精品亚洲成国产av| 99热网站在线观看| 久久久a久久爽久久v久久| 久久久国产一区二区| 国产毛片在线视频| 久久 成人 亚洲| 国产免费福利视频在线观看| 在线免费观看不下载黄p国产| 欧美日韩视频精品一区| 亚洲精品中文字幕在线视频 | 成年美女黄网站色视频大全免费 | 18禁在线无遮挡免费观看视频| 高清午夜精品一区二区三区| 狂野欧美白嫩少妇大欣赏| av在线观看视频网站免费| 精品亚洲乱码少妇综合久久| 国产男人的电影天堂91| 一级毛片aaaaaa免费看小| 日日爽夜夜爽网站| 寂寞人妻少妇视频99o|