• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Sensitive Information Protection Model Based on Bayesian Game

    2022-11-10 02:30:08YuzhenLiuZheLiuXiaoliangWangQingYangGuocaiZuoandFrankJiang
    Computers Materials&Continua 2022年10期

    Yuzhen Liu,Zhe Liu,Xiaoliang Wang,*,Qing Yang,Guocai Zuo and Frank Jiang

    1School of Computer Science and Engineering,Hunan University of Science and Technology,Xiangtan,411201,China

    2Hunan Key Laboratory for Service computing and Novel Software Technology,Xiangtan,411201,China

    3College of computer and information engineering,Hunan University of Technology and Business,Changsha,China

    4School of Computer Science and Information Engineering,Guangzhou Maritime University,Guangzhou,China

    5Hunan Software Vocational and Technical University,Xiangtan,China

    6School of Engineering and IT,University of New South Wales,NSW,Australia

    Abstract:A game measurement model considering the attacker’s knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of service.We quantified the sensitive level of information according to the user’s personalized sensitive information protection needs.Based on the probability distribution of sensitive level and attacker’s knowledge background type,the strategy combination of service provider and attacker was analyzed,and a game-based sensitive information protection model was constructed.Through the combination of strategies under Bayesian equilibrium,the information entropy was used to measure the leakage of sensitive information.Furthermore,in the paper the influence of the sensitive level of information and the attacker’s knowledge background on the strategy of both sides of the game was considered comprehensively.Further on,the leakage of the user’s sensitive information was measured.Finally,the feasibility of the model was described by experiments.

    Keywords:Sensitive information;game theory;Bayesian equilibrium;sensitive level;information entropy

    1 Introduction

    The importance of information network security has become increasingly prominent with the continuous development of computer technology and information construction.With the rapid development of cloud computing,Internet of Things,big data technology,artificial intelligence and wide spread of cloud services,the communication networks have played a fundamental role in business,entertainment,health care and education.Nevertheless,in these processes of information storage,transmission and processing,there is abundant sensitive information,including even state secrets.Therefore,it is extremely vulnerable to various kinds of hacker attacks from all over the world.While informationization brings about great improvement in the efficiency of production and life,it is accompanied by increasingly serious security threats.However,due to the traditional common network information security technology,the defense strategies are relatively passive,and usually applicable to specific attack scenarios and means.Moreover,the specific quantitative analysis and decision-making framework of the solution is not clear enough.Then game theory can be a feasible mathematical tool in network information security.

    2 Preliminary Knowledge

    In 1928,Hartley[1]first proposed the initial idea of measuring information.He took the number of symbolsm=lognas the amount of information.Shannon put forward the theory of information entropy in 1948[2],which became the basic theory of information theory and digital communication.In addition,Seys,et al.[3]is the first one to employ the information entropy to measure information leakage in privacy protection in 2002.However,in the paper they don’t propose how to improve the degree of anonymity.Nicol et al.[4]investigated the existing model-based system reliability assessment technology and summarized their effectiveness in system security assessment.Besides,Lye et al.[5]defined the game model with the recovery time needed after the network was attacked as a source of revenue and proposed a game theory method to analyze the security of computer network.And in 2007,Cao et al.[6]put forward a model of using static Bayesian game to predict attacks and the probability was obtained with the simulation of the choice of attack and defense sides choosing various strategies to maximize their own interests in the model.Meanwhile,Ma et al.[7]proposed the application of information entropy as a measure of privacy in Vehicle to Everything (V2X)vehicle network system and took into account the impact of aggregator’s accumulated information on system privacy.However,the authors only measure privacy of individual users which is too simple.Furthermore,in 2010,Yi and Xiao proposed a privacy publishing method based on game theory,which guaranteed not only the protection of privacy,but also the availability of privacy[8].Moreover,in 2011,Ge and Zhu proposed a scheme to construct the distributed data mining under complete information static game and seek Nash equilibrium solution for analysis[9].In 2014,Feng et al.[10]analyzed the key technologies related to big data security and privacy protection and their latest progress.What’s more in 2016,a Location Based Service (LBS) privacy measurement framework,a gamebased privacy protection model and a more basic information entropy model are proposed[11-13].Furthermore,in 2018,some new game models of privacy protection based on different technologies[14-17].Wang et al.[18]aimed at distributed attacks in computer networks,on the basis of cooperation and incomplete information game theory,a quantitative method of existing strategic benefits was proposed,and Bayesian equilibrium was calculated and analyzed comprehensively.Furthermore,in 2019,using incentive motivation for privacy concessions or guiding active attacks,Riahi et al.[19]proposed a privacy protection solution based on a game theory model between two participants(data holders and data requesters).Nevertheless,the authors were concern of only two actors.Meanwhile,Cui et al.[20]proposed a personalized differentiated privacy method based on social distance.They formalized all the payoff functions in the differential privacy sense followed by the establishment of a static Bayesian game and derived the Bayesian Nash equilibrium with a modified reinforcement learning algorithm.Besides,Shi et al.[21]proposed a comprehensive evaluation model of privacy protection based on probability statistics and Del entropy method,which realizes the evaluation of data privacy protection level under block confusion.Moreover in 2019,He et al.[22]introduced a general condition called“coarser inter-player information”which proved to be necessary and sufficient for the validity of several fundamental properties on pure-strategy equilibria in Bayesian games,such as existence,purification from behavioral strategies,and convergence for a sequence of games.But the authors didn’t tell us how to deal with asymmetric information.And then,Zhang et al.[23]proposed an anti-fraud scheme based on improved Bayesian game model.In 2021,Dahiya et al.[24]proposed a reputation score policy and Bayesian game theory based incentivizied mechanism for Distributed Denial of Service(DDos)attacks mitigation and cyber defense.Specially,Zarreh et al.in 2020 design a cyber-physical security evaluation in manufacturing systems with a Bayesian game model[25].

    Nowadays,because of the importance of information safety,in[26-35],the authors research sensitive information protection for information security.And then they obtain many important conclusions.Some of the authors,going a step further,propose novel anonymous authentication scheme based on edge computing in internet of vehicles.

    3 Basic Knowledge

    3.1 Concepts Related to Game the Theory[36]

    3.2 Principles of Statistical Grouping

    Definition 4:The principles of statistical groupings are as follows.[37]

    The principle of consistency.In a grouping,once the grouping criteria are selected,the meaning cannot be changed.However,in a composite grouping,the grouping criteria at different levels should be different.But in the same level of grouping,the grouping criteria should be consistent.Therefore,the consistency principle of grouping should be called the consistency principle of grouping standard.

    The principle of proportionality.After grouping,the total number of elements contained in each group,in this sense,should be exactly equal to the sum of its groups,also known as completeness.

    The principle of mutual exclusion.This principle is also called the principle of incompatibility or the principle of difference.In general,the relationship between groups at the same level should be a mutually exclusive relationship between two groups,that is to say,there should be no general public unit in any two groups.

    The principle of hierarchy.It means that the statistical grouping should be hierarchical,and the phenomenon of over-grading should not be allowed.Therefore,the hierarchical principle of grouping can also be called the hierarchical principle or the orderly principle.

    4 Analysis of Sensitive Information Protection Model Based on Bayesian Game

    In this paper,a privacy protection model is proposed based on Bayesian game theory.Through the influence of attacker’s knowledge background and user’s demand for sensitivity level of information on game strategy selection in game model,a new game model is constructed based on static Bayesian game to provide users with personalized sensitive information protection.

    Sensitivity level of information is a key factor to decide whether the services of service providers will be provided or not,but it can be set by users according to their own needs for information protection intensity or service quality.The range of values is generally[0,1].This sensitivity level of information reflects the tolerance of users for sensitive information leakage and the requirement of service quality under the condition of observing the principle of statistical grouping.Then users can dynamically classify the level of information sensitivity in real-time according to the dynamic state of the network environment,the tolerance of sensitive information leakage and the requirement of quality of service.Tab.1 is a correspondence between the sensitivity level and the sensitivity level parameter SSI.SSI is calculated by formula(2)which is shown Section 4.2.

    Table 1:Correspondence between sensitive level and sensitive level parameter SSI

    4.1 Privacy Protection Model Flow Chart Based on Bayesian Game

    The algorithm of sensitive information protection model based on Bayesian game is given in Fig.1.And the Fig.2 shows framework of sensitive information protection model.

    4.2 Grading of Individualized Sensitivity

    Aiming at keeping the balance between information protection and quality of service in sensitive information protection,this paper explores the user’s information protection intensity and data accuracy requirements,and quantifies the user’s needs,by which the sensitive level of information is determined.

    (1)Protection strength of user input and query accuracy.

    Suppose N is the highest level of protection strength and data accuracy.PSi(PSi∈[1,N],and PSi∈Z)is the protection strength required by the user,and DAi(DAi∈[1,N],and DAi∈Z)is the data accuracy required by the user,the weight coefficient of data accuracy is k (k∈[0,1]),and the user's sensitive information is i(i∈[1,n],and i∈Z).

    (2) According to the basic principles of consistency,proportionality,mutual exclusion and hierarchy of statistical grouping,the judgment rules are obtained by using the protection intensity and data accuracy[10].

    (1)The two parameters are negatively correlated,which means that the accuracy decreases while the protection intensity increases.

    (2)When the requirements of protection intensity and the data accuracy intensity are low,reducing protection intensity and sensitivity level,and improving data accuracy should be given priority in order to achieve Pareto optimum as far as possible.

    Figure 1:Flow chart of sensitive information protection model based on Bayesian game

    (3)When there is a contradiction between the requirements of protection intensity and accurate data intensity,it is necessary to integrate the two requirements to meet the higher requirement of the preference.

    Figure 2:Framework of Sensitive Information Protection Model

    (3)The protection strength and the accurate data strength are fused into sensitive level parametersSIi(PSi,DAi),and the sensitive level parameters are obtained.

    The data ofSIi(PSi,DAi) will be scaled up and standardized to the range of[0,1]by deviation standardization method to facilitate the division of sensitive levels and obtain standard sensitive levels.

    4.3 Establishment of Game Model

    In this paper,we provide users with personalized sensitive information protection based on static Bayesian game according to the user’s demand for sensitive level of data,which affects the choice of game strategy in game model.

    Definition 5:The game model of sensitive information protection is a quintuple:[I,TA,P,U,S].

    (1) I is a set of players participating in the game.Whatever the strategic choices made by any player,other players will choose a certain strategy.Each player’s equilibrium strategy is to achieve the maximum expected return,and the combination constitutes their own dominant strategy.In order to simplify the calculation,the players are sensitive information protection service provider P and attacker A,i.e.,I={SP,A}.

    (2) TAis a type space consisting of the combination of efficient(E)attackers and inefficient(UE)attackers in decision-making under the influence of the knowledge background of service providers,namely TA={tUE,tE}.

    (3) P is the conditional probability that the service provider is an efficient service provider or an inefficient attacker and combination of service provider policy.P={pUE,pE}.

    (4) S is the policy space of service providers and attackers,namely S={SSP,SA}.SSPis the policy space of sensitive information protection service provider P.If the standard sensitivity level is higher,the service level is also higher.In order to simplify the representation,four service levels are assumed to be weak(I)when SSI∈[0,0.25],general(II)when SSI∈(0.25,0.5],strong(III)when SSI∈(0.5,0.75],and very strong(IV)when SSI∈(0.75,1].Considering that service providers do not provide services,SSP={sI,sII,sIII,sIV,sOFF}is obtained.SA is the strategy space of attacker A.In this paper,attacker’s strategy is divided into malicious attack strategy(H)and general goodwill attack strategy(N).Combining the two types of attackers,we get the strategy space SA,namely SA={sH(θE),sN(θE),sH(θUE),sN(θUE)}.

    (5) U is the revenue function of service providers and attackers,i.e.U = {USP,UA}.USPis the revenue function of sensitive information protection service provider P,which is determined by the choice of different combinations of sensitive information protection service providers P.UAis a revenue function of attacker A determined by different combinations of attacker A’s actions.

    4.4 Analysis of Game Model

    The static Bayesian game is constructed according to the user’s sensitive level requirement,the attacker’s type space TAand the attacker’s type probability distribution P.The game tree is given by Harsanyi transformation,and the utility functions of both sides of the game are analyzed.Fig.3 shows game tree between service providers and attackers after Harsanyi Conversion.Tab.2 shows income matrix of Service Provide(SP)and Attacker(A).

    Figure 3:Game Tree between service providers and attackers after Harsanyi Conversion

    Table 2:Income matrix of SP and A

    ai,ci,ei,gi(i∈{1,2,3,4}) are the profit functions of the attackers in the corresponding game situation.

    bi,di,fi,hi,wi(i∈{1,2,3,4}) are the revenue functions of service providers in the corresponding game situations.

    (1) {(ONj,(E,H)),(ONj,(E,N))} (j∈{I,II,III,IV})represents the benefits of both sides of the game when an efficient attacker chooses either malicious attack or general goodwill access while the service provider chooses to provide the service.However,when the attacker chooses a lower attack strategy than a higher one under the same service level strategy,the loss of profit is lower.Therefore,the attacker chooses a lower attack strategy than a higher one,and it can be obtained:b1≧b2≧b3≧b4,d1≧d2≧d3≧d4.

    (2){(ONj,(UE,H)),(ONj,(UE,N))}(j∈{I,II,III,IV})represents the benefits of both sides of the game when the service provider chooses to provide the service,while the inefficient attacker chooses either malicious attack or general goodwill access.The same as(1)can be obtained:f1≧f2≧f3≧f4,h1≧h2≧h3≧h4.

    (3){(OFF,(E,H)),(OFF,(E,N))}denotes the benefits of both sides of the game when an efficient attacker chooses either malicious attack or general goodwill access,while the service provider chooses not to provide the service.

    (4) {(OFF,(UE,H)),(OFF,(UE,N))} denotes the benefits of both sides of the game when the service provider chooses not to provide the service,while the inefficient attacker chooses either malicious attacks or a group of good-faith visits.

    4.5 Proof of Existence of Hybrid Bayesian Equilibrium

    The existence theorem of mixed strategy Bayesian Nash equilibrium is a direct extension of the existence theorem of Nash equilibrium.In the paper the game scenario of sensitive information protection model can be judged as a limited game based on Bayesian game because the attacker type set TA,conditional probability p,action set SSP and SA,revenue function USP and UA are all limited in this model.At the same time,according to Nash’s relevant proof,there is a Bayesian Nash equilibrium of pure strategy or mixed strategy in all finite games,and the Bayesian Nash equilibrium of pure strategy is a special case of Bayesian Nash equilibrium of mixed strategy.Thus,there is a Bayesian Nash equilibrium of mixed strategy in this game model.

    4.6 Computation of Mixed Bayesian Equilibrium

    According to the benefit matrix of the game,the mixed Bayesian equilibrium of the participants is calculated.

    Assuming in the game,the attacker is the corresponding probability distribution(p,1-p)of highefficiency and low-efficiency.Moreover,the common knowledge of the participants in the Bayesian game,i.e.,p,(1 - p) is a parameter known to both sides of the game.The probability distribution of the two strategies of service providers in the game is (q,1 - q),indicating the service providers’preference to use and withdraw.The probability of providing corresponding sensitive level services is q,while the probability of using closed corresponding sensitive level services is 1-q.The probability distribution of attackers choosing malicious attack and general goodwill access strategies is(r,1-r).That is,the probability of attackers preferring malicious attack(H)is r,while the probability of using general access(N)is 1-r.

    (1)The expected return of the attacker

    When an attacker chooses a malicious attack,the expected benefits of the attacker are as follows.

    When an attacker chooses a general goodwill visit,the expected benefits of the attacker are as follows.

    If the policy combination is the best choice for service providers,then EA(H)=ESP(N),that is as follows.

    Calculations are available as follows.

    (2)Expected revenue of service providers

    When choosing to provide services,the expected benefits of service providers are as follows.

    When choosing not to provide services,the expected benefits of service providers are as follows.

    If the policy combination is the best choice for service providers,ESP(ONi)=ESP(OFF),that is as follows.

    Calculations are available as follows.

    In summary,when service providers provide level-i standard-sensitive services,the mixed Bayesian equilibrium results between service providers and attackers are as follows.

    4.7 Measurement of Sensitive Information Leakage

    In a sense,Nash equilibrium is a fixed point.In the process of service providers providing services based on users’needs for information protection and data accuracy,and playing games with attackers,both sides are striving for maximum benefits for their own sake.After calculating the Bayesian equilibrium by utilizing the utility matrix of both sides,the distribution probability of two kinds of service providers,high-efficiency and low-efficiency,can be obtained in the game.Based on the calculation of game theory and the monotonicity of information entropy,this paper introduces information entropy into game theory to solve the measurement problem of sensitive information leakage in the process of service providers’service measurement[13].

    Formulas for calculating information entropy are follows.

    Among them,C is a constant and normalized to 1.

    In this paper,i is the information sensitive level,q is the probability of providing services for service providers,and 1 - q is the probability of not providing services for service providers to express the sensitive information disclosure entropy.

    And in(13)we set H=0 whenqi=0.

    5 Relevant Work Comparison

    The results in Tab.3 are obtained in terms of the types of information needs,the number of attackers,and the number of service providers by comparing with literature[8],literature[12],literature[14],literature[15].There is information leakage no matter whether the confidentiality and integrity of information are taken into account.

    Table 3:Comparisons with related work

    (1) In this paper,we consider that participants do not fully know the return function of other participants and assume that attackers can be divided into efficient and inefficient types.

    (2) In order to consider the confidentiality and integrity of information,this paper considers the user’s information protection intensity and data accuracy requirements that are integrated into sensitive level parametersSIi(PSi,DAi),and the sensitive level parameters are obtained.It quantifies the user requirements and determines the information sensitivity level.

    (3)By using the monotonicity of information entropy,this paper introduces information entropy to measure information leakage.

    6 Experimental Analyses

    The GAMBIT[38]is a software package designed to help analysts and designers build and grid up Computational Fluid Mechanics (CFD) models and other scientific applications game analysis tool.GAMBIT is used to test the sensitive information protection model.And then the experimental results are analyzed.The relationship between the parameters is plotted by Matlab.In the experiment,this model is applied to the protection of sensitive information in medical treatment.In the context of attacker’s knowledge,it tests the impact of attacker’s high-efficiency probability P on service provider’s service probability,and it also tests attacker’s choice of malicious attack probability in sensitive information protection model given the initial parameters of the revenue function.The following Tab.4 is as follows.

    Table 4:Profit Matrix of Attackers and Service Providers

    The experimental results are shown in Figs.4-7.

    In Fig.4,Abscissa shows probability of efficient attackers and ordinate shows probability of providing corresponding sensitive level services.

    In Fig.5,Abscissa shows probability of efficient attackers and ordinate shows probability of attackers chooses to malicious attack.

    In Fig.6,Abscissa shows ratio of efficient attackers and ordinate shows radio of information entropy.

    Fig.4 shows that the probability of service providers choosing to provide services increases with the increasing of ratio of efficient attackers.Fig.5 shows that the probability of attackers who chooses malicious attack increases with the increasing of ratio of efficient attackers.Fig.6 shows that with the increasing of ratio of efficient attackers,the disclosure entropy of sensitive information decreases.Fig.7 shows Bayesian equilibrium changes with the probability of efficient attacker.To sum up,in the process of protecting sensitive information related to sensitive information,we should consider and attach importance to the impact of attacker’s knowledge and technology background on the actual protection effect and service quality.

    Figure 4:Impact of p on Service Provider’s Choice of Service Provision

    Figure 5:Impact of p on attacker’s choice of attack

    Figure 6:The influence of p on the leakage entropy of sensitive information

    Figure 7:Bayesian equilibrium

    7 Conclusion

    The author innovatively proposes a sensitive information protection model in order to balance the protection of information and the quality of service in the process of sensitive information protection.Furthermore,the author advances the model based on Bayesian game with information sensitive level,considering the decision-making of attackers and service providers and the impact of attacker’s knowledge background and service provider’s defense level in the process of sensitive information protection.

    This model divides the attackers and defenders into many types.Then the model analyses and proves the equilibrium of the game.Compared with the relevant research,more factors are considered influencing service providers and decision maker’s decision-making,more practically and comprehensively.The experiment proves the availability of the model by analyzing the impact of the attacker’s high efficiency probability P on the result of the game.According to their own knowledge background and sensitivity of sensitive information,service providers can take the presented results of sensitive information protection model as a reference to better carry out targeted technical updates and strengthen protection,so as to protect sensitive information and reduce the amount of information leakage.

    Funding Statement:This work was supported by Key project of Hunan Provincial Education Department(20A191),Hunan teaching research and reform project(2019-134),Cooperative Education Fund of China Ministry of Education(201702113002,201801193119),Hunan Natural Science Foundation(2018JJ2138),Hunan teaching research and reform project (2019),Natural Science Foundation of Hunan Province(2020JJ7007).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲av成人精品一二三区| av在线app专区| 少妇人妻一区二区三区视频| eeuss影院久久| 国产精品一区二区三区四区免费观看| 日韩,欧美,国产一区二区三区| 亚洲国产高清在线一区二区三| 国产熟女欧美一区二区| freevideosex欧美| 国产成人91sexporn| 中文精品一卡2卡3卡4更新| 免费不卡的大黄色大毛片视频在线观看| 免费不卡的大黄色大毛片视频在线观看| 国产高清国产精品国产三级 | 高清午夜精品一区二区三区| 日韩欧美 国产精品| 亚洲av欧美aⅴ国产| 精品少妇黑人巨大在线播放| 白带黄色成豆腐渣| 在线看a的网站| 欧美xxⅹ黑人| 欧美最新免费一区二区三区| 伦精品一区二区三区| 久久久久久久久久成人| 五月开心婷婷网| av在线蜜桃| 国产极品天堂在线| 日本午夜av视频| eeuss影院久久| 国产成人精品久久久久久| 国产高潮美女av| 国内精品美女久久久久久| 汤姆久久久久久久影院中文字幕| 街头女战士在线观看网站| 中文欧美无线码| 精品一区二区免费观看| 五月玫瑰六月丁香| 男女国产视频网站| 18禁裸乳无遮挡免费网站照片| 精品人妻熟女av久视频| 欧美zozozo另类| 丝袜脚勾引网站| 成人亚洲精品av一区二区| 尤物成人国产欧美一区二区三区| 亚洲欧美成人精品一区二区| 99re6热这里在线精品视频| 永久网站在线| 97人妻精品一区二区三区麻豆| 亚洲欧美精品专区久久| 欧美bdsm另类| 亚洲精品国产成人久久av| 国产精品精品国产色婷婷| 综合色av麻豆| 日本爱情动作片www.在线观看| 热99国产精品久久久久久7| 99热这里只有是精品在线观看| 国产亚洲精品久久久com| 亚洲精品成人av观看孕妇| 亚洲av不卡在线观看| 中文在线观看免费www的网站| 一级爰片在线观看| 国产精品99久久久久久久久| 一级毛片黄色毛片免费观看视频| 亚洲精品自拍成人| 少妇人妻久久综合中文| 男女国产视频网站| 一区二区三区四区激情视频| 人妻少妇偷人精品九色| 国产日韩欧美亚洲二区| 亚洲国产日韩一区二区| 国模一区二区三区四区视频| 中文乱码字字幕精品一区二区三区| 国产爽快片一区二区三区| 成年女人在线观看亚洲视频 | 久久久成人免费电影| 久久人人爽人人爽人人片va| 国产av国产精品国产| 成年人午夜在线观看视频| 91精品国产九色| av专区在线播放| 91狼人影院| 精品国产一区二区三区久久久樱花 | 亚洲经典国产精华液单| 日本免费在线观看一区| 久久国产乱子免费精品| 午夜激情久久久久久久| 久久韩国三级中文字幕| 亚洲精品久久午夜乱码| 欧美日本视频| 亚洲精品日韩在线中文字幕| 亚洲av电影在线观看一区二区三区 | 国产日韩欧美在线精品| av.在线天堂| 亚洲自偷自拍三级| 国产视频内射| 一个人看的www免费观看视频| 国产一区二区在线观看日韩| 2021少妇久久久久久久久久久| 国产免费又黄又爽又色| av播播在线观看一区| 少妇裸体淫交视频免费看高清| 啦啦啦啦在线视频资源| 黄色配什么色好看| 国产精品久久久久久精品电影| 日本一二三区视频观看| 亚洲无线观看免费| 亚洲美女视频黄频| 久久国内精品自在自线图片| 天堂网av新在线| 精品熟女少妇av免费看| 国产亚洲午夜精品一区二区久久 | 日韩不卡一区二区三区视频在线| 禁无遮挡网站| 国产伦在线观看视频一区| 少妇丰满av| 一本久久精品| 亚洲精华国产精华液的使用体验| 国产成人91sexporn| 国产精品嫩草影院av在线观看| 秋霞伦理黄片| 少妇人妻 视频| 国产精品一区二区三区四区免费观看| 精品国产乱码久久久久久小说| 免费观看性生交大片5| 日本三级黄在线观看| 国产av码专区亚洲av| 在线观看三级黄色| 久热久热在线精品观看| av福利片在线观看| 嫩草影院精品99| 欧美成人精品欧美一级黄| 黄色日韩在线| 99久久中文字幕三级久久日本| 午夜福利视频1000在线观看| 久久久久久久久久成人| 爱豆传媒免费全集在线观看| 青春草国产在线视频| 日韩,欧美,国产一区二区三区| 少妇人妻 视频| 国内精品宾馆在线| 小蜜桃在线观看免费完整版高清| 亚洲美女视频黄频| 男人和女人高潮做爰伦理| 国产精品国产av在线观看| 国产 一区精品| 欧美xxxx黑人xx丫x性爽| 成人综合一区亚洲| 亚洲精品乱码久久久久久按摩| 免费大片18禁| 中文字幕久久专区| 少妇被粗大猛烈的视频| 亚洲av免费高清在线观看| 国产又色又爽无遮挡免| 亚洲伊人久久精品综合| 韩国av在线不卡| 国产毛片a区久久久久| 日韩伦理黄色片| 免费观看性生交大片5| 成人鲁丝片一二三区免费| 日韩电影二区| 男的添女的下面高潮视频| 国产精品人妻久久久影院| 国产亚洲av嫩草精品影院| 香蕉精品网在线| 岛国毛片在线播放| 亚洲国产av新网站| 精品久久久久久久末码| 韩国av在线不卡| 人妻 亚洲 视频| 色网站视频免费| 欧美日韩一区二区视频在线观看视频在线 | 国产欧美亚洲国产| 欧美精品人与动牲交sv欧美| 各种免费的搞黄视频| 丰满少妇做爰视频| 久久精品久久久久久久性| 99热这里只有是精品50| 成人亚洲欧美一区二区av| 日本与韩国留学比较| 噜噜噜噜噜久久久久久91| 五月天丁香电影| 老师上课跳d突然被开到最大视频| 黄色配什么色好看| 国产精品偷伦视频观看了| 一级a做视频免费观看| 美女内射精品一级片tv| 亚洲美女搞黄在线观看| 九草在线视频观看| 麻豆国产97在线/欧美| 免费看日本二区| 天堂中文最新版在线下载 | 精品一区二区三卡| 菩萨蛮人人尽说江南好唐韦庄| 国产老妇伦熟女老妇高清| 欧美高清成人免费视频www| 日韩制服骚丝袜av| 又爽又黄无遮挡网站| 免费观看av网站的网址| 少妇猛男粗大的猛烈进出视频 | 亚洲精品久久午夜乱码| a级一级毛片免费在线观看| 精品国产乱码久久久久久小说| 成年人午夜在线观看视频| 伊人久久精品亚洲午夜| 亚洲精品国产成人久久av| 九九爱精品视频在线观看| 在线观看av片永久免费下载| 亚洲国产最新在线播放| 免费看光身美女| 精品午夜福利在线看| 麻豆精品久久久久久蜜桃| 人人妻人人澡人人爽人人夜夜| 国产黄a三级三级三级人| 亚洲人成网站在线播| 永久免费av网站大全| 久久97久久精品| 夜夜爽夜夜爽视频| 九九久久精品国产亚洲av麻豆| 国产成人aa在线观看| 99久久九九国产精品国产免费| 九色成人免费人妻av| 特大巨黑吊av在线直播| 欧美亚洲 丝袜 人妻 在线| 亚洲综合精品二区| 欧美激情久久久久久爽电影| 听说在线观看完整版免费高清| 日日啪夜夜爽| 自拍偷自拍亚洲精品老妇| 亚洲最大成人手机在线| 精品酒店卫生间| 成人特级av手机在线观看| 别揉我奶头 嗯啊视频| 亚洲精品乱码久久久久久按摩| 欧美xxxx黑人xx丫x性爽| 91精品一卡2卡3卡4卡| 国产精品一及| 欧美极品一区二区三区四区| 日韩人妻高清精品专区| 老司机影院成人| 亚洲欧美日韩东京热| 一级a做视频免费观看| 直男gayav资源| 日产精品乱码卡一卡2卡三| 一级毛片我不卡| 中国美白少妇内射xxxbb| 亚洲精品乱久久久久久| 久久精品国产鲁丝片午夜精品| 神马国产精品三级电影在线观看| 五月天丁香电影| 白带黄色成豆腐渣| 国产黄片视频在线免费观看| 成人欧美大片| 国产欧美另类精品又又久久亚洲欧美| 直男gayav资源| 国产黄频视频在线观看| 在现免费观看毛片| 插逼视频在线观看| 欧美成人a在线观看| 亚洲精品一二三| 大码成人一级视频| 国产综合懂色| 久久久久久伊人网av| 美女高潮的动态| 人妻夜夜爽99麻豆av| 久久韩国三级中文字幕| 成人高潮视频无遮挡免费网站| 国产国拍精品亚洲av在线观看| 在线亚洲精品国产二区图片欧美 | 日韩 亚洲 欧美在线| 欧美区成人在线视频| 午夜亚洲福利在线播放| 午夜免费男女啪啪视频观看| 一级片'在线观看视频| 别揉我奶头 嗯啊视频| 深夜a级毛片| 51国产日韩欧美| 精品国产露脸久久av麻豆| 久久精品久久精品一区二区三区| 人妻一区二区av| 精品午夜福利在线看| 午夜精品国产一区二区电影 | 欧美日韩国产mv在线观看视频 | 婷婷色综合大香蕉| 日韩一区二区三区影片| 天天躁夜夜躁狠狠久久av| 亚洲综合精品二区| 波野结衣二区三区在线| 69av精品久久久久久| 尾随美女入室| 国产高清国产精品国产三级 | 亚洲欧美一区二区三区黑人 | 日日摸夜夜添夜夜添av毛片| 少妇人妻 视频| 乱系列少妇在线播放| 亚洲,欧美,日韩| 亚洲欧洲国产日韩| 成人亚洲精品av一区二区| 免费av不卡在线播放| 亚洲国产av新网站| 国产黄色视频一区二区在线观看| 一个人看视频在线观看www免费| 久久久久久久久大av| 日韩 亚洲 欧美在线| 亚洲性久久影院| 亚洲欧美成人综合另类久久久| 欧美激情在线99| 天堂网av新在线| 在现免费观看毛片| 人人妻人人看人人澡| 1000部很黄的大片| 777米奇影视久久| 建设人人有责人人尽责人人享有的 | 日本一本二区三区精品| 夜夜看夜夜爽夜夜摸| a级毛片免费高清观看在线播放| 亚洲精品中文字幕在线视频 | 久久亚洲国产成人精品v| 深夜a级毛片| 午夜亚洲福利在线播放| 直男gayav资源| 国产免费一级a男人的天堂| 九色成人免费人妻av| 久久人人爽人人片av| 内射极品少妇av片p| 亚洲综合色惰| 日本欧美国产在线视频| 免费看不卡的av| 国产精品无大码| 成人无遮挡网站| 精品久久久久久久人妻蜜臀av| 在线观看一区二区三区| 99视频精品全部免费 在线| 中国国产av一级| 亚洲人成网站在线播| 1000部很黄的大片| 2018国产大陆天天弄谢| 少妇人妻精品综合一区二区| h日本视频在线播放| 国产成人91sexporn| 最近的中文字幕免费完整| 特级一级黄色大片| 国产一区二区三区av在线| 王馨瑶露胸无遮挡在线观看| 国产一区有黄有色的免费视频| 国产极品天堂在线| 亚洲成人久久爱视频| 大话2 男鬼变身卡| 人妻少妇偷人精品九色| 亚洲精品乱码久久久久久按摩| 人妻少妇偷人精品九色| 亚洲精品亚洲一区二区| 国产人妻一区二区三区在| 日本免费在线观看一区| 亚洲精品日本国产第一区| 身体一侧抽搐| 亚洲四区av| 亚洲欧美一区二区三区黑人 | 精品久久久久久电影网| 亚洲精品国产av蜜桃| 亚洲精品成人久久久久久| 亚洲精品456在线播放app| 日本与韩国留学比较| 建设人人有责人人尽责人人享有的 | 夜夜爽夜夜爽视频| 少妇人妻 视频| 欧美丝袜亚洲另类| 久久鲁丝午夜福利片| 国产成人福利小说| 最近的中文字幕免费完整| 欧美日本视频| 日日撸夜夜添| 久热久热在线精品观看| 纵有疾风起免费观看全集完整版| videossex国产| 亚洲av中文字字幕乱码综合| 蜜臀久久99精品久久宅男| 99久国产av精品国产电影| 网址你懂的国产日韩在线| 校园人妻丝袜中文字幕| 午夜精品一区二区三区免费看| 又大又黄又爽视频免费| 水蜜桃什么品种好| 免费av不卡在线播放| 免费不卡的大黄色大毛片视频在线观看| 午夜免费男女啪啪视频观看| 97超视频在线观看视频| 亚洲av不卡在线观看| 人妻夜夜爽99麻豆av| 久久久久久伊人网av| 建设人人有责人人尽责人人享有的 | 久久人人爽人人片av| 天堂中文最新版在线下载 | 天堂网av新在线| 日韩大片免费观看网站| 国产中年淑女户外野战色| 熟女电影av网| 看非洲黑人一级黄片| 自拍欧美九色日韩亚洲蝌蚪91 | 少妇被粗大猛烈的视频| 久久久久国产精品人妻一区二区| av福利片在线观看| 黄色怎么调成土黄色| 亚洲三级黄色毛片| 美女主播在线视频| 日本黄色片子视频| 国产黄色免费在线视频| 国产精品熟女久久久久浪| 日韩国内少妇激情av| 久久影院123| 联通29元200g的流量卡| 久久久久精品久久久久真实原创| 啦啦啦啦在线视频资源| 欧美精品一区二区大全| 亚洲色图综合在线观看| 观看免费一级毛片| 国产精品久久久久久精品电影| 中文字幕免费在线视频6| 午夜福利在线在线| 国产亚洲精品久久久com| 欧美区成人在线视频| 亚洲色图综合在线观看| 特级一级黄色大片| 综合色av麻豆| 可以在线观看毛片的网站| 亚州av有码| videos熟女内射| 亚洲真实伦在线观看| 日本色播在线视频| 久久国产乱子免费精品| 一级毛片 在线播放| 久久人人爽人人爽人人片va| 熟妇人妻不卡中文字幕| 少妇丰满av| 王馨瑶露胸无遮挡在线观看| 亚洲人成网站在线观看播放| 色吧在线观看| 丝瓜视频免费看黄片| 国产真实伦视频高清在线观看| 久久久久九九精品影院| 免费av不卡在线播放| 青青草视频在线视频观看| 赤兔流量卡办理| 中国国产av一级| 一级毛片aaaaaa免费看小| xxx大片免费视频| 天堂网av新在线| 午夜激情久久久久久久| 国产又色又爽无遮挡免| 久久人人爽av亚洲精品天堂 | 久久久a久久爽久久v久久| 99久久中文字幕三级久久日本| 老师上课跳d突然被开到最大视频| 亚洲av男天堂| 国产大屁股一区二区在线视频| 一级毛片 在线播放| 观看免费一级毛片| 色哟哟·www| 欧美变态另类bdsm刘玥| 视频中文字幕在线观看| h日本视频在线播放| 性色avwww在线观看| 日本黄大片高清| 国产美女午夜福利| 深夜a级毛片| 熟妇人妻不卡中文字幕| 中文精品一卡2卡3卡4更新| 男女那种视频在线观看| 丰满乱子伦码专区| 内射极品少妇av片p| 中文精品一卡2卡3卡4更新| av专区在线播放| 久久影院123| 在线精品无人区一区二区三 | 国产爽快片一区二区三区| 亚洲国产av新网站| 日韩视频在线欧美| 又粗又硬又长又爽又黄的视频| 国产午夜精品一二区理论片| 精品少妇久久久久久888优播| 女人久久www免费人成看片| 国产黄片视频在线免费观看| 三级经典国产精品| 亚洲四区av| 91午夜精品亚洲一区二区三区| 最近的中文字幕免费完整| 亚洲av国产av综合av卡| 中文字幕亚洲精品专区| 各种免费的搞黄视频| 午夜免费观看性视频| 超碰av人人做人人爽久久| h日本视频在线播放| 国产老妇伦熟女老妇高清| 只有这里有精品99| 中文字幕亚洲精品专区| 自拍欧美九色日韩亚洲蝌蚪91 | 老女人水多毛片| 亚洲天堂av无毛| 亚洲美女搞黄在线观看| 国产欧美另类精品又又久久亚洲欧美| 赤兔流量卡办理| 最新中文字幕久久久久| 亚洲四区av| 91精品一卡2卡3卡4卡| 日韩一本色道免费dvd| 欧美激情在线99| 国产欧美日韩精品一区二区| 国产精品国产三级专区第一集| 青春草亚洲视频在线观看| 亚洲av不卡在线观看| 免费观看av网站的网址| 国产精品女同一区二区软件| 可以在线观看毛片的网站| 少妇丰满av| 好男人在线观看高清免费视频| 日韩国内少妇激情av| 亚洲欧洲国产日韩| 丰满少妇做爰视频| 尤物成人国产欧美一区二区三区| 国产精品偷伦视频观看了| 国产黄色视频一区二区在线观看| 夜夜看夜夜爽夜夜摸| 免费观看性生交大片5| 国产精品一二三区在线看| 99久久九九国产精品国产免费| 九九久久精品国产亚洲av麻豆| 91精品国产九色| 国产 一区精品| 国产一级毛片在线| 亚洲天堂av无毛| 嘟嘟电影网在线观看| 亚洲第一区二区三区不卡| 国产在视频线精品| 人体艺术视频欧美日本| 毛片一级片免费看久久久久| 国产精品99久久久久久久久| 18禁在线播放成人免费| 80岁老熟妇乱子伦牲交| 男女边吃奶边做爰视频| 国产淫语在线视频| 日韩av免费高清视频| 真实男女啪啪啪动态图| 99久久中文字幕三级久久日本| 日本一本二区三区精品| 欧美精品国产亚洲| 热re99久久精品国产66热6| 亚洲精品乱码久久久久久按摩| 亚洲精品成人av观看孕妇| 蜜臀久久99精品久久宅男| 99热这里只有是精品在线观看| 久久99蜜桃精品久久| 99热这里只有精品一区| 久久久久久伊人网av| 男人添女人高潮全过程视频| 国产一区二区亚洲精品在线观看| 色5月婷婷丁香| 国产av国产精品国产| 成年版毛片免费区| 精品久久久精品久久久| 欧美区成人在线视频| 99久久精品国产国产毛片| 在线观看av片永久免费下载| 青春草国产在线视频| 精华霜和精华液先用哪个| av黄色大香蕉| 蜜臀久久99精品久久宅男| 水蜜桃什么品种好| 免费看a级黄色片| 免费看日本二区| 精品人妻视频免费看| 中文字幕亚洲精品专区| av在线观看视频网站免费| 韩国av在线不卡| 2021天堂中文幕一二区在线观| 国产精品嫩草影院av在线观看| 国产欧美亚洲国产| 综合色av麻豆| 国产成人freesex在线| 久久久久久久精品精品| 国产综合懂色| 黄片无遮挡物在线观看| 久久国内精品自在自线图片| 亚洲国产精品999| 国产伦精品一区二区三区视频9| 又爽又黄无遮挡网站| 国产黄频视频在线观看| 熟女人妻精品中文字幕| 日韩欧美 国产精品| 国产亚洲av嫩草精品影院| 三级经典国产精品| 国产av国产精品国产| 国产黄片美女视频| 亚洲,一卡二卡三卡| 内射极品少妇av片p| 综合色丁香网| 伦理电影大哥的女人| 亚洲综合精品二区| 日本黄大片高清| 韩国av在线不卡| 久久久久精品久久久久真实原创| 涩涩av久久男人的天堂| 亚洲自偷自拍三级| 成人美女网站在线观看视频| 午夜激情久久久久久久| 国产精品人妻久久久久久| 久久99热这里只频精品6学生| 成年版毛片免费区| 久久国内精品自在自线图片| 亚洲av国产av综合av卡| 成人二区视频| 日日撸夜夜添| 80岁老熟妇乱子伦牲交| 亚洲色图综合在线观看| 精品国产一区二区三区久久久樱花 | 亚洲欧美清纯卡通| 亚洲精品自拍成人|