• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Blockchain-Based Framework for Secure Storage and Sharing of Resumes

    2022-11-11 10:47:42HuanrongTangChanglinHuTianmingLiuandJianquanOuyang
    Computers Materials&Continua 2022年9期

    Huanrong Tang,Changlin Hu,Tianming Liu and Jianquan Ouyang,*

    1Key Laboratory of Intelligent Computing and Information Processing,Ministry of Education,Computer Science College of Xiangtan University,Xiangtan,Hunan Province,China

    2Department of Computer Science,The University of Georgia,Athens,Georgia,USA

    Abstract: In response to problems in the centralized storage of personal resumes on third-party recruitment platforms, such as inadequate privacy protection, inability of individuals to accurately authorize downloads, and inability to determine who downloaded the resume and when, this study proposes a blockchain-based framework for secure storage and sharing of resumes.Users can employ an authorized access mechanism to protect their privacy rights.The proposed framework uses smart contracts, interplanetary file system, symmetric encryption, and digital signatures to protect,verify, and share resumes.Encryption keys are split and stored in multiple depositories through secret-sharing technology to improve the security of these keys.Corresponding key escrow incentives are implemented using smart contracts to automatically verify the correctness of keys and encourage the active participation of honest key escrow parties.This framework combines blockchain and searchable symmetric encryption technology to realize multikeyword search using inverted indexing and Bloom filters and verify search results on the chain.Escrow search service fees are charged through contracts.Only after the search results are verified can the search service provider obtain the search fee,thus ensuring fair and efficient search for encrypted resumes.The framework is decentralized, secure, and tamper-evident, and achieves controlled sharing while protecting personal privacy and information security.

    Keywords: Resume; blockchain; interplanetary file system; secret sharing;searchable encryption

    1 Introduction

    In the recruitment market, a personal resume is an essential document that highlights the qualifications of an individual for a job.The resume states the person’s educational background and work experience,as well as contact information and even identification numbers.

    Resumes are generally publicly stored on a third-party recruitment cloud server, exposing the owner’s private information.Even if some third-party recruitment platforms also provide an encryption function, the keys for encrypting and decrypting resumes are stored centrally on a third-party server.When a third party maliciously views or leaks keys,the encryption security is put at risk.Also,the resume owner on the existing recruitment platform cannot control the authorization or know when the document has been downloaded.

    Many recruitment platforms have leaked user resumes.An example in the United States is Ladders,one of the most popular recruitment websites specializing in high-paying job recruitment.In 2019,this company mistakenly made its database public without a password such that anyone could access the data,resulting in the disclosure of user information belonging to more than 13.7 million individuals.

    According to the published judgment files on China Judgments Online,from 2017 to 2020,a total of 48 cases involving resume trading were convicted of infringing on citizens’ private information.These cases involved websites such as 58.com, Ganji.com, and Zhilian.com.Criminal cases for the sale of resumes on third-party recruitment platforms are rampant,and the security of personal privacy information contained in resumes cannot be guaranteed.

    On Zhilian.com, as long as a corporate account pays for membership, it has unlimited ability to download resumes containing personal information.Similar problems occur on 51job.com and Liepin.com.Corporate accounts only need to pay a fee to download the complete resumes of job applicants.Thus,the privacy of applicants is compromised without their knowledge.

    With the current centralized storage and management of resumes on third-party recruitment platforms, resumes’security, authenticity, and controllability are seriously challenged.For example,when a resume is shared,there is no guarantee that the owner has control over the resume,and there is no real way to know when the resume is shared with whom.This research proposes a blockchain-based framework for securely storing and sharing resumes to address these issues.

    The main contributions of this study are the following:

    1)A blockchain-based resume-sharing framework is proposed,which leverages interplanetary file system (IPFS), smart contracts, and digital signature technology to store and share resumes securely.Only authorized recruiters have access to plaintext resumes.Authorization and other access services are done by blockchain accounts to ensure identity privacy protection.

    2)Secret sharing is used to implement secure key escrow and design incentives for it.A fair and verifiable multiple-keyword searchable encryption algorithm is proposed to achieve fair and efficient search of encrypted resumes.

    3)We implemented our scheme and performed security and performance analysis.The time for index generation, trapdoor generation, search, and verification, as well as the economic consumption of the contract function,have been experimentally simulated.Results show that the proposed scheme is feasible.

    The rest of this paper is organized as follows.Section 2 describes the research background and related work.Section 3 outlines the system model and definition of each stage.Section 4 summarizes the detailed design of the framework.Section 5 introduces the design of smart contracts.Section 6 discusses security and performance.Section 7 provides the research conclusions and future development directions.

    2 Background and Related Work

    2.1 Blockchain

    Blockchain is a concept proposed by Satoshi Nakamoto in the “Bitcoin White Paper” [1].Ethereum, a representative of Blockchain 2.0, provides smart contracts that can be automatically executed on the blockchain and has the characteristics of strong tamper-proof modification and a high degree of decentralization[2,3].

    2.2 IPFS

    The IPFS is a distributed storage system that uses distributed hash tables to solve the problem of data transmission and positioning,and changes the single point of transmission through a peer-to-peer(P2P)network.The IPFS makes data storage safer and more efficient for a longer period compared with the traditional system[4].

    2.3 Secret Sharing

    Secret sharing is a technology for sharing secrets among a group of participants.It is mainly used to protect critical information and prevent information from loss,damage,or tampering.Shamir[5]and Blakley[6]first proposed it in 1979.Asmuth et al.[7]proposed a(t,n)threshold scheme based on the Chinese remainder theorem in 1983.Using secret sharing technology to keep the keys can prevent confidential information from risk exposure and being extremely concentrated in authoritative third parties,thereby improving the stability and robustness of the keys.

    2.4 Symmetric Searchable Encryption

    Searchable encryption technology can efficiently retrieve ciphertext data without leaking private information.As symmetric searchable encryption only requires one symmetric key, the scheme has a simple structure, the encryption and decryption processes are fast, and the method is suitable for data encryption and retrieval.Construction methods of symmetric searchable encryption include SWP scheme proposed by Xiaoding et al.[8] and SSE-1 scheme proposed by Curtmola et al.[9].Cash et al.[10]proposed symmetric searchable encryption that can be extended to massive databases.Existing symmetric searchable encryption schemes are expanded from multiple perspectives,including security[11,12],dynamic[13,14],and expandability[15-18].

    2.5 Bloom Filter

    The Bloom filter [19] is a long binary vector and a series of random mapping functions that can quickly determine whether an element belongs to a certain set or not.Its advantage is that the space efficiency and query time are much better than the general algorithm.Its disadvantage is its misidentification rate and deletion difficulty.

    2.6 Related Work

    In recent years, many researchers have explored the application of blockchain technology in data sharing.For example, Fan et al.[20] proposed an information management system called MedBlock using blockchain, access control protocols, and symmetric cryptography.This system enables authorized users to share sensitive medical information.

    However,a centralized database management system controls a large amount of data and involves many hidden dangers,such as denial of service attacks and single points of failure.Tan et al.[21]used the IPFS to store archive data and realized the management,verification,and sharing of such data on the chain through a combination of public and alliance chains.Nizamuddin et al.[22]used the smart contract of the Ethereum blockchain to manage the sales of e-books and realized the transaction sharing of e-books but not the access control of e-book owners and other users who obtained ebooks.Alzubi et al.[23], based on AG codes over Hermitian curve, design a new crypto system for IoT devices to protect data security, and in [24] propose an IoT network combining blockchain and artificial intelligence-driven secure medical data transfer(BAISMDT)for data transfer security and privacy in IoT networks.Uddin et al.[25] proposed an electronic health record (EHR)system incorporating the Hyperledger Fabric blockchain for storing,sharing,and exchanging EHRs in a P2P network of healthcare stakeholders.Alnssayan et al.[26]proposed a VacChain system in conjunction with blockchain to track children’s vaccination records, creating a convenient information-sharing solution without loss of integrity and privacy, as well as alleviating the current problems of human error,intentional tampering,and untraceable vaccination records for vaccination certificates.

    The aforementioned data-sharing schemes for file encryption can ensure data confidentiality,but they do not consider the safe custody of content-encryption keys.Naz et al.[27]used secret sharing to split and encrypt the hash address of the file stored in the IPFS and store it in other nodes.However,once the hash address of the file is leaked,anyone can directly access the plaintext data through the address.Sohrabi et al.[28] improved the security of encrypted file keys for cloud data by using the Shamir secret sharing algorithm, which enables the owner to split the decryption key into n parts distributed to miner nodes on the blockchain for storage through a secure channel.However, this algorithm does not verify the correctness of the miner nodes’keys,nor does it provide escrow rewards.

    Searchable encryption can effectively retrieve ciphertext data,so some scholars have incorporated this technology into effective search when sharing encrypted data in their proposed schemes.Nevertheless, the traditional searchable encryption technology cannot guarantee the fairness of retrieval.Zhang et al.[29]used a method that involved submitting a deposit in the blockchain to achieve fair payment of the handling fee,ensuring that participants can obtain correct search results and service fees when they execute honestly.However, numerous signature verifications are required during the verification process,and the overhead is large.Li et al.[30]proposed a searchable symmetric encryption scheme using the Bitcoin blockchain system to solve the problem of data search and the unfairness of traditional symmetric searchable encryption schemes.However,the scheme requires six transactions to obtain search results.The correctness of the search results verified through the Bitcoin script makes the transaction cycle long and inefficient.Chen et al.[31] proposed a searchable encryption scheme for EHRs based on blockchain,supporting logical expression queries and fair payment.This scheme uses smart contracts to replace cloud servers.However, its ciphertext database and security index are stored in smart contracts, which requires a large amount of gas.Feng et al.[32] used attribute encryption and searchable encryption methods to control private data on the blockchain and fast ciphertext search, which solved the privacy leakage problem.However, this scheme cannot achieve efficient multi-keyword search or fair payment.

    Blockchain-based technology research has made great progress in digital rights,finance,and electronic medical record sharing.However,relatively little research has been done related to resumes.The above studies still have the problems of inability to securely escrow keys and inefficiency of searchable encryption schemes.This paper uses secret sharing and blockchain technology to enhance the security of keys.A fair searchable encryption scheme supporting multi-keyword search is implemented using Bloom filters to improve the searching efficiency of encrypted resumes.

    3 System Framework/Stage Definition

    3.1 System Framework

    In this section,the overall design of our framework is presented.Tab.1 summarizes the symbols and corresponding descriptions used.

    Table 1: Symbols and descriptions

    The framework consists of the following four entities:

    Applicant (Ap):Ap is the resume owner who has the absolute right to hold the document.Ap encrypts the resume and,at the same time,uploads the search index corresponding to the encrypted resume to the cloud server.No one can view Ap’s resume unless authorized by him/her.

    Recruiter (Rt):Users request to download complete resume information.After the request is authorized, the full key is synthesized through a smart contract.After Rt enters the address of the encrypted resume on the client and calls the contract to receive the decryption key, the complete plaintext resume can be obtained.At the same time, Rt can use the contract to generate a search token to search for resumes containing keywords.

    Key keeper(Kk):Kk receives Ap’s subkey through a secure channel and can receive the custodian fee from Ap.Kk can obtain a portion of the money from Rt for downloading the resume by providing the subkey correctly through a smart contract and assisting in recovering the symmetric key.

    Third-party recruitment platform (TRP):TRP and Kk operate the IPFS.TRP operates the blockchain platform,keeping the encrypted index uploaded by Ap and providing the search function.If TRP returns correct search results,then TRP receives a service fee,but a penalty is applied if TRP returns incorrect results.Fig.1 shows the framework diagram of the safe storage and sharing system.

    Figure 1:System framework

    Each step in the figure is described as follows:

    1)Ap enters his/her information, generates an encryption key in the local client, encrypts the complete resume containing personal private information, and then uploads the encrypted data to the IPFS.

    2)The IPFS returns the hash address of the file.

    3)Ap stores the hash address and the resume information on the blockchain.

    4)Ap divides the encryption key into n subkeys via(t, n)secret sharing scheme and sends them to different Kk via secure channels.

    5)Ap creates and uploads the search index related to the resume to TRP.

    6)Rt selects the keywords,uploads to the blockchain to get the search token,and sends it to TRP.

    7)TRP sends the search results to Rt.

    8)Rt uploads the search results to the blockchain and obtains the verified search results.

    9)Rt initiates the request and stores the request information on the blockchain.

    10)Ap authorizes Rt after receiving the request and notifies Kk.

    11)Kk enters the subkey into the key recovery function in the smart contract,and Kk is rewarded for correct subkey verification.

    12)The contract recovers the original key and notifies Rt after receiving the correct subkey that meets the threshold.Rt empties the subkey stored on the contract after calling the contract method to obtain the original key.

    Finally,Rt accesses the encrypted resume according to the hash address set of the searched resume and uses the recovered key for decryption to obtain a complete plaintext document.

    3.2 Stage Definition

    Based on the secret-sharing scheme by Asmuth [7] and the SSE scheme by Curtmola [9], a blockchain-based secure storage and sharing framework for personal resumes is constructed through seven stages,which can be defined as VSSE =(Gen, Enc, IndexGen, TokenGen, Search, Verify, Dec).Each stage is described in the following:

    1)Key generation stage:Gen(1λ)→(K)

    Security parameterλis entered and a set of keys K =(K1, K2, K3)is output.K1 is used as the key for encrypted files,K2 is used as the document verification set encryption key,and K3 is used as the key to generating the index.

    2)Encryption stage:This stage is run by Ap and consists of the following two substages:

    File encryption stage: FileEncrpyt(file, K1, K2) →(IpfsHash, kw, MACkw), where file and encryption key are input,and hash address set IpfsHash,keyword set kw,and verification set MACkware output.

    Key distribution stage:Keydistrput(k)→(k1, k2, ···, kn, MACss, r, p),where the encryption key is input,andnsubkeys,verification set MACss,and random numbersrandpare output.

    3)Index generation stage:IndexGen(kw, K3) →γw,, where the index generation stage takes a keyword set kw and encryption key as input.The encrypted keyword-file hash address as the key-value pair index tableγwand the file hash address-Bloom filter as the key-value pair index tableare output.

    4)Search token generation stage:TokenGen(K3, w)→τw,where the search key and keywords are entered,and the token is output.

    5)Search stage:Search(τw,γw,) → Iw.The search tokenτwand search indexγw,are input.A set of files containing keywords Iwis output.

    6)Verification stage:Verify(IpfsHash, K2, MACkw)→ IpfsHashtrue/false.The search result hash address set IpfsHash is returned by the server,and the key K2 and verification set MACkware used as input.The correct output ipfshashtrueis verified;otherwise,the output is false.

    7)Decryption stage:This stage consists of the following two sub-stages:

    Key recovery stage: KeyRecover(addr, u1, u2,..., ut, MACss, r, p) → k/false, where the account address on the chain, t subkeys, and subkey verification set cooperation MACssare taken as input.The correct output file decryption key is verified;otherwise,the output is false.

    Resume recovery stage: FileDecrypt(k, IpfsHash) → file, where the decryption key and hash address of the file stored on the IPFS are taken as input, and the output is a complete decrypted resume.

    4 Specific Program

    1)System initialization stage

    Gen(1λ) →(K): Random keys K1, K2, and K3 are generated using pseudo-random function(PRF), where K1 is used as the key for encrypting the file, K2 is used as the encryption key for the verification set,and K3 is used as the key for generating the index.

    2)Encryption phase

    Based on the assumption that Ap has several plaintext resume files CV = {CV1, CV2,···, CVn},the following steps are performed for these files.

    Step 1:File encryption,FileEncrpyt(file, K1, K2)→(IpfsHash, kw, MACkw).Ap encrypts CVi(i∈[1,n])and randomly generates the initial vector iv of corresponding bits.The encryption key is K1,and obtains Ei= enck1(iv||CVi)|i ∈[1, n]and uploads Eito IPFS,which returns the specific hash address of the file IpfsHashi={Upload(iv||Ei)|i ∈[1,n]}.

    Ap calls the Evidence()in the smart contract to record the hash address of the uploaded encrypted file and other related information.The verification key K2 is used to generate the verification set MACkwi= {PRF(K2,IpfsHashi)|i ∈ [1,n]}.Then, the verification key is recorded along with a set of message verifications on the chain using addmac()in the verification contract.

    Step 2:Key splitting, Keydistrput(k) →(k1, k2, ···, kn, MACss, r, p).Ap uses an Asmuth-Bloom secret-sharing scheme to split the file encryption key K1 intoncopies and sends them to Kk through a secure channel.The key-splitting algorithm is shown in algorithm 1.Meanwhile, for each subkey, MACssi= {H(i||xi||mi) |i ∈ [1,n]} is computed, and Ap uploads the subkey verification set and r,p to the data-sharing contract storage.

    Algorithm 1:Key Distribution Input:K,t,n Output:k1, k2, ···, kn, r, p 01:U ←[]02:random choose prime number p,p >K 03:m1, m2,···, mn ←getm()04:N ←m1m2···mt 05:randomly choose r,0 ≤r ≤N/p-1 06:k′ ←K+r·p 07:for i ←1 ··· n do 08:xi ←k′mod mi 09:end 10:for i ←1 ··· n do 11:U[i] ← (i, xi, mi),k[i]←U[i]12:end 13:return k1, k2, ···, kn, r, p

    3)Index generation stage

    IndexGen(kw, K3)→γw,,Ap extracts keywords from the CV set CV={CV1, CV2,···, CVn}to form a combination kw.For each keyword w ∈kw, K3 is used to generate encrypted keywordsτw= PRF(K3,1||w),τwis used as key, file hash address is used as value to build index tableγw,γw[τwi] =file hash address is used as key, the keywordcontained in each file is added to the Bloom filter to obtain the binary vector { ···,101, ···},Then,γwandare sent to the server.

    4)Search token generation stage

    TokenGen(K3, w) →τw, where the search token is generated in the smart contract by TokenGen().In TRP,qualified recruiters have the right to store the relevant service fees through the TokenGen()function after inputting keywords to calculate the search tokenτw= PRF(K3,1||w).

    5)Search stage

    Search(τw,γw,)→Iw,where the server uses the search token provided by Rt to search its saved index tableγwand.Onlyγwis searched when searching with a single keyword.When searching with multiple keywords {τw1, ···,τwk}, for the first keywordτw1,γwis searched to confirm exactly which files contain the keyword.Then, for all files that contain the first keyword,is searched to confirm whether {τw2, ···,τwk} are in the file.The set of hash addresses matching the keywordsare output,and Iwis sent to Rt.

    6)Verification stage

    Verify(IpfsHash, K2, MACkw) → IpfsHashtrue/false.After Rt receives the IpfsHash set from the server in the client backend,IpfsHash is sent to the verification contract.The verify()function is called in the verification contract and incoming the parameter MACkwiand K2.MACkwiand K2 are stored as private variables on the verification contract,which can only be used within a contract and not viewed from an external call.If there is MACkwi= PRF(K2, IpfsHashi)for all search results of IpfsHashi,then the search results returned by the server are correct,and the smart contract returns the search results to the user and transfers the service fee temporarily stored in the search token generation stage to the account of TRP.If it is not equal,i.e.,then the search result returned by TRP is wrong.The smart contract will deduct a small portion of the deposit of TRP and return it to Rt’s account together with the service fee.

    Algorithm 2:Key Recover Input:addr, u1, u2, ···, uv, MACss, r, p Output:K Require:addr Authorized Contract storage subkey execution:01:TemoMap ←[]02:count ←0 03:for i ←1 ··· n do 04:i,xi, mi ←parse(ui)05:if H(i||xi||mi)== MACssi 06:reward()07:TempMap.add(xi, mi)08:count ←count+1 09:end 10:else 11:punishment()12:end 13:end When equal count t,stop receiving subkeys and call the correct subkey to recover:14:(x1, m1), (x2, m2), ···,(xt, mt)←get xi, mi from TempMap 15:M ←m1m2 ··· mt 16:for i ←1 ··· t do 17:yi ←invMmi,mi 18:end 19:k1 ←0 20:for i ←1 ··· t do 21:k1 ←k1 +Mmi xiyi 22:end 23:k1←k1 mod M 24:Empty the TemoMap 25:return k1-rp

    7)Decryption phase

    Key recovery phase: KeyRecover(addr, u1, u2,..., ut, MACss, r, p) →k/false.After confirming that Rt is successfully authorized,Kk enters subkeys into the key recovery contract,notifies Rt when there are enough correct subkeys,and recovers the key.The recovery algorithm is in algorithm 2.The input addr is Rt’s account to confirm that it is authorized,and MACssis used to verify that the subkeys provided by Kk are correct.If the validation is correct, then the reward()function is called to reward.If the validation is incorrect,then the punishment()function penalizes Kk by deducting a portion of its deposit in the data-sharing contract.

    Decryption stage:FileDecrypt(k, IpfsHash) → file,where Rt uses the symmetric key returned from the key recovery smart contract and the hash address of the resume stored on IPFS as the input.The encryption key is K1, by accessing the IPFS address of the resume to obtain Ei=enck1(iv||CVi)|i ∈[1, n].The iv is parsed out, and Di= {Deck1(CVi)|i ∈ [1,n]} can be obtained.which automatically converts into a complete decrypted resume.

    5 Smart Contract Design

    This section describes the interface and algorithm logic of the smart contract used in this study.The smart contract is programmed using Solidity and mainly includes a data-sharing contract and verification contract.

    1)Data-sharing contract.The main functions used in the data-sharing contract and resumesharing interaction are shown in Fig.2.The implementation of the AddShareAccess()function is mainly used for authorization.

    2)Verified contract.The main verification operation is implemented in the contract,as shown in algorithm 3,the add()function is used to add the processed search results,and loop is used to compare whether elements in R are equal to those in Mackw.If the elements are equal,then 1 is added to the counter,and if the counter is equal to the size of R,then the results are verified correctly,the reward()TRPfunction is called to transfer the service fee temporarily stored by Rt to the server account,and the correct result is returned.Otherwise,punishment()TRPis called to deduct part of the guaranteed amount stored by the server in the contract to Rt to returnfalse.(The function complete description is shown in Tab.2).

    Algorithm 3:Verify Input:returnIpfshash,Mackw,K Output: returnIpfshash/false 01:count ←0 02:R ←[]03:R.add(PRFK, returnIpfshash[i]04:for i ←0 ··· length of returnipfshash do 05:for j ←0 ··· length of Mackw do 06:if R[i]== Mackw[j]07:count ←count+1 08:break 09:end 10:end 11:end 12:if count == length of R 13:reward()TRP 14:return returnipfshash 15:end 16:else 17: punishment()TRP 18: return false 19:end

    Figure 2:Complete resume sharing interaction

    Table 2: Contract functions and descriptions

    6 Analysis

    This section evaluates the proposed framework from three aspects: security, function, and performance.

    6.1 Security Analysis

    The proposed framework combines Ethereum blockchain,IPFS,secret-sharing technology,and searchable encryption technology,which have more advantages than the traditional TRP for storing and sharing resume files.This section discusses the benefits of the framework in the following four aspects:

    1)Controlled sharing and recording

    Only authorized recruiters can recover the key for decrypting resumes in the proposed framework.Rt is entitled to the key only when the candidate adds Rt to the authorized list of the data-sharing contract.Meanwhile,the resume information,Rt’s request,and other operation records related to the resume are stored in the blockchain and cannot be tampered with,making it easy to track and confirm the right resume with high traceability.

    2)Resume security and privacy

    Instead of traditional cloud servers,the IPFS is used to store files.Even if a node is breached,the stored data are fragments instead of complete files,and outsiders can only view messy code.Thus,the proposed framework guarantees secure storage and privacy protection of resumes.

    3)Key management

    The file encryption key is divided intonparts by a secret-sharing scheme,and they are assigned to different custodians.Therefore, at leastttrustees need to collude maliciously to recover the key and decrypt the resume.Smart contracts provide automatic reward and penalty mechanisms for Kk.Those who send correct subkeys honestly can obtain certain rewards.By contrast,after sending wrong subkeys,malicious Kk incurs a deduction on deposit to achieve incentives and fairness.

    4)Retrievability and retrieval fairness

    The traditional scheme does not support the retrieval of encrypted files, which causes great inconvenience.This condition requires the use of searchable encryption technology to ensure the efficient retrieval of encrypted files.Still,most traditional searchable encryption solutions only support single keyword searches and require semi-honest cloud servers.The cloud server may maliciously return the wrong results while obtaining service fees.This framework constructs two index tables for multi-keyword search through inverted indexes and Bloom filters.It generates a search token using a smart contract by temporarily storing the service fee at the contract address.After performing the retrieval task,the server returns the result to the validating smart contract,and the validating contract verifies whether the result is correct.If the result is correct, then the corresponding service fee is transferred to the server account; if it is incorrect, then the server loses the service fee and receives a penalty.Therefore,to obtain the service fee and avoid penalties,the server returns the correct search results to ensure a fair search.

    6.2 Performance Analysis

    1)Functional comparison

    On the one hand, the functional features of the proposed framework are compared with the schemes presented by [25-32], as shown in Tab.3.Y indicates that this feature is implemented, and N indicates that it is not.

    Table 3: Function comparison

    As can be seen from Tab.3,in terms of data sharing,the advantages of the scheme in this paper are the design of a secret sharing scheme with an incentive mechanism to improve the security of the key.And the support of multiple keywords for encrypted data retrieval.In terms of resume application scenarios,this paper uses IPFS and blockchain to replace the centralized storage and management of resumes in current recruitment platforms to avoid the problems of resume forgery,loss,and leakage.Further,the existing recruitment platform only has public and confidential options.Once a resume is confidential,it cannot be searched.Applicants are faced with the dilemma of protecting their privacy and not being retrieved by recruiters.This paper combines searchable encryption to ensure that the recruiter can search the resume by keywords.The disadvantage of the solution is that the construction and maintenance of IPFS and the Ethereum platform will increase the cost.

    2)Performance comparison

    The computational cost of the blockchain-based framework for secure storage and sharing resumes(BBFSSR)in the present study is compared with the schemes TKSE[29]in index generation,token generation, search phase, and verification phase, as shown in Tab.4.H denotes hashing operation, PRF denotes pseudo-random function, CP denotes string comparison operation, |N|denotes the number of keywords extracted by Ap in the index generation phase,|F|denotes the number of files containing keyword w, |R|denotes the number of returned ciphertext files, |C|denotes the number of files, |W| denotes the number of keywords in a multi-keyword query, and |BF| denotes the time required to determine whether a keyword is in Bloom’s filter.Furthermore, S denotes the signature algorithm, which contains two processes: signature and verification.SE denotes the symmetric encryption algorithm,which contains two processes:encryption and decryption.

    Table 4: Performance comparison

    In the index generation phase, TKSE needs to execute 1 S, 1 PRF, and 1 H for each keyword.BBFSSR needs to perform 1 PRF to build the first inverted indexγwand then build a Bloom filter on|C|files to build the second index.In the token generation phase,TKSE and BBFSSR both use PRF to generate tokens, TKSE as the number of files increases, the number of PRF performed increases, and BBFSSR only performs one PRF.In the search phase, when searching with a single keyword,BBFSSR uses the keyword-file set approach to build the index,so enter the search token will get the results immediately,and the search efficiency is O(1).When searching with multiple keywords,the user has to determine for each file whether|W|keywords are in corresponding Bloom filters,and the search efficiency is |W||C||BF|.In the validation phase, TKSE requires the user to perform |C|times H and S locally,and BBFSSR performs|R|times H and|R||C|times CP in the smart contract.

    3)Experimental analysis

    To more accurately evaluate the actual performance of the framework, this paper conducts simulation tests in terms of index generation time, search token generation time, search time, and verification time.The experiments use English word dataset, and hashing algorithm H is SHA-256,pseudo-random function PRF is HMAC-SHA256,symmetric encryption algorithm SE is AES-256 CBC mode, signature algorithm is ECDSA, the smart contract is solidity language, Ethereum blockchain is built locally, embark framework is used to compile, deploy and run.The hardware environment for this experiment is Intel Core?i5-10400 CPU (2.9 GHz)with 32 GB RAM.The experimental results are shown below.

    As shown in Fig.3,suppose each file contains 200 keywords in the index generation phase.TKSE and BBFSSR increase index generation time as the files increase and the corresponding keywords increase; TKSE involves the signature operation; the index takes a long time to generate, 10,000 keywords to build the index, TKSE takes 4889.95 ms, BBFSSR takes only 324.26 ms.As shown in Fig.4, in the token generation phase, BBFSSR executes 1 PRF algorithm.TKSE runs more PRF depending on the number of files.In Fig.4, assuming that the total number of files |C|is 5, TKSE performs 5 PRFs.

    Figure 3:Index generation time

    Figure 4:Token generation time

    As shown in Fig.5, a single keyword search in BBFSSR is O(1)operation, and the search time in the index table is established by 2000 to 10000 keywords is maintained at 0.1 ms.TKSE increases the search time due to increasing the number of files,and when the number of files is 100,the search time is 47.65 ms.TKSE does not support multi-keyword search;to search for multiple keywords,not only to conduct multiple single-keyword searches also need to constantly filter out the files containing all the keywords,very time-consuming,as shown in the figure,the search in 100 files to meet the files containing 10 keywords took 950.12 ms.In contrast, BBFSSR supports multi-keyword search only takes 85.72 ms.In the validation phase,the number of files returned by the search|R|is the same as the total number of files|C|,and the validation times of the two schemes are shown in Fig.6.

    Figure 5:Search time

    We simulated the cost of the smart contract,where the price of ETH is 1 ether=1,906 USD,the price of gas is 1 Gwei (1 Gwei=10-9and Wei=10-9ether).Figs.7 and 8 show the cost of contract deployment and several functions used.The contract deployment consumes a large amount of gas,but the deployment of the functions in the contract consumes a small amount of gas,which is within the acceptable range.

    Figure 6:Verification time

    Figure 7:Smart Contracts Cost(Gas)

    Figure 8:Smart Contracts Cost(USD)

    This paper tested the time to perform 1000 secret distributions and reconstructions for 256-bit integers using the Asmuth-Bloom algorithm with different thresholds.as shown in Appendix A, in Fig.9 1000 times (10, 11)threshold secret distribution takes 51.34 s, and secret reconstruction takes only 0.62 s.Therefore,the contract can reconstruct the key quickly when it receives enough subkeys.

    7 Conclusion

    This paper has presented a new solution based on blockchain, secret sharing, and searchable encryption technology to address the problems of centralized data management, resume leakage,falsification,and the inability to pursue responsibilities in traditional recruitment platforms accurately.The solution uses blockchain to replace traditional third-party agencies.It combines on-chain and off-chain distributed storage mechanisms and secret sharing technology to ensure the security and authenticity of resumes.It also realizes fair and efficient resume search based on searchable encryption technology.The analysis and experiments on the security and performance of the scheme show that the scheme can support resume sharing and meet the requirements of privacy protection and sufficient system performance.However, further refinement is needed in consensus mechanism selection and framework deployment cost optimization.

    A Appendix Secret sharing time consumption

    Figure 9:Secret sharing time consumption

    Funding Statement:The authors gratefully acknowledge the financial supports by Key Projects of the Ministry of Science and Technology of the People’s Republic of China(2018AAA0102301).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产在线男女| 成人午夜高清在线视频| 欧美xxxx性猛交bbbb| 久久久a久久爽久久v久久| 又黄又爽又免费观看的视频| 日本黄色视频三级网站网址| 日日撸夜夜添| 男人的好看免费观看在线视频| 成熟少妇高潮喷水视频| 日韩国内少妇激情av| 中文字幕av成人在线电影| 国产伦精品一区二区三区视频9| 天美传媒精品一区二区| 欧美xxxx性猛交bbbb| 中文字幕久久专区| 亚洲国产高清在线一区二区三| 黄片wwwwww| 99九九线精品视频在线观看视频| 欧美三级亚洲精品| 99久久久亚洲精品蜜臀av| 色噜噜av男人的天堂激情| 哪里可以看免费的av片| 午夜爱爱视频在线播放| 啦啦啦观看免费观看视频高清| 亚洲中文字幕日韩| 久久精品国产亚洲av香蕉五月| 搡老妇女老女人老熟妇| 女人被狂操c到高潮| 亚洲精华国产精华液的使用体验 | 人人妻,人人澡人人爽秒播| 黑人高潮一二区| 99久久无色码亚洲精品果冻| 级片在线观看| 九九在线视频观看精品| www.色视频.com| 国产男人的电影天堂91| 日本免费a在线| 91在线精品国自产拍蜜月| 亚洲av第一区精品v没综合| 成人午夜高清在线视频| 别揉我奶头~嗯~啊~动态视频| 国产人妻一区二区三区在| 国产精品美女特级片免费视频播放器| 成年女人毛片免费观看观看9| 国产视频内射| 国产精品久久电影中文字幕| 亚洲av成人精品一区久久| 欧美一级a爱片免费观看看| 成人综合一区亚洲| 国产免费男女视频| 欧美日韩综合久久久久久| 亚洲国产高清在线一区二区三| 国产午夜福利久久久久久| 成人av一区二区三区在线看| 在线观看av片永久免费下载| 亚洲自拍偷在线| 午夜影院日韩av| 3wmmmm亚洲av在线观看| 少妇的逼好多水| 国产精品爽爽va在线观看网站| 亚洲性夜色夜夜综合| 天美传媒精品一区二区| 亚洲成人久久爱视频| 免费观看精品视频网站| av天堂在线播放| 欧美性猛交黑人性爽| 成人av在线播放网站| 欧美最黄视频在线播放免费| 天天躁夜夜躁狠狠久久av| 长腿黑丝高跟| 三级毛片av免费| 国产伦精品一区二区三区四那| 91久久精品电影网| or卡值多少钱| 干丝袜人妻中文字幕| 久久久久免费精品人妻一区二区| 精华霜和精华液先用哪个| 欧美一区二区亚洲| 欧美极品一区二区三区四区| 国产白丝娇喘喷水9色精品| 欧美bdsm另类| 欧美xxxx黑人xx丫x性爽| 亚洲美女搞黄在线观看 | 毛片女人毛片| 少妇的逼水好多| 亚洲精品亚洲一区二区| 观看美女的网站| 男人狂女人下面高潮的视频| 三级经典国产精品| 亚洲18禁久久av| 午夜精品在线福利| 亚洲丝袜综合中文字幕| 亚洲欧美日韩无卡精品| 精品久久久久久久末码| 99久久成人亚洲精品观看| 在线观看66精品国产| 国产精品久久久久久精品电影| 亚洲精品影视一区二区三区av| 亚洲欧美精品综合久久99| 国内精品一区二区在线观看| 国产精品久久久久久精品电影| 99riav亚洲国产免费| 尤物成人国产欧美一区二区三区| 黄色日韩在线| 国产私拍福利视频在线观看| 人妻少妇偷人精品九色| 中文字幕久久专区| 亚洲精品一区av在线观看| av在线天堂中文字幕| 麻豆乱淫一区二区| 亚洲av二区三区四区| 国产精品av视频在线免费观看| 亚洲精品影视一区二区三区av| 精品久久久久久久久久久久久| 国产精品1区2区在线观看.| 男女下面进入的视频免费午夜| 91在线精品国自产拍蜜月| 女的被弄到高潮叫床怎么办| 亚洲人成网站在线播放欧美日韩| 亚洲精品粉嫩美女一区| 欧美丝袜亚洲另类| 亚洲色图av天堂| 国产成人91sexporn| 亚洲va在线va天堂va国产| 十八禁国产超污无遮挡网站| 日产精品乱码卡一卡2卡三| 日本免费a在线| 精品久久久久久成人av| 亚洲成人av在线免费| 免费不卡的大黄色大毛片视频在线观看 | 亚洲人与动物交配视频| 天天一区二区日本电影三级| 日韩三级伦理在线观看| 久久久久性生活片| .国产精品久久| av免费在线看不卡| 秋霞在线观看毛片| av在线亚洲专区| 国产不卡一卡二| 欧美在线一区亚洲| 观看免费一级毛片| 日产精品乱码卡一卡2卡三| 91在线精品国自产拍蜜月| 日本三级黄在线观看| 成年免费大片在线观看| 少妇高潮的动态图| 男女做爰动态图高潮gif福利片| 亚洲va在线va天堂va国产| 99精品在免费线老司机午夜| 亚洲成人中文字幕在线播放| 精品欧美国产一区二区三| 波多野结衣巨乳人妻| av在线观看视频网站免费| 国产精品女同一区二区软件| 国产aⅴ精品一区二区三区波| 国产女主播在线喷水免费视频网站 | 免费看日本二区| .国产精品久久| 国产高清视频在线观看网站| 国产精品伦人一区二区| 国产极品精品免费视频能看的| 亚洲国产精品sss在线观看| 日本五十路高清| 国产精品久久电影中文字幕| 亚洲精品乱码久久久v下载方式| 一个人看视频在线观看www免费| 一级a爱片免费观看的视频| 久久久久久大精品| 成人av在线播放网站| 亚洲天堂国产精品一区在线| 亚洲色图av天堂| 婷婷色综合大香蕉| 免费看美女性在线毛片视频| 少妇人妻精品综合一区二区 | 十八禁网站免费在线| 久99久视频精品免费| 亚洲图色成人| 国产精品国产高清国产av| 国产精品无大码| 国产 一区精品| 日日摸夜夜添夜夜爱| 成熟少妇高潮喷水视频| 久久鲁丝午夜福利片| 97人妻精品一区二区三区麻豆| 日本免费a在线| 欧美成人精品欧美一级黄| 久久久久国产网址| 人人妻人人澡欧美一区二区| 九色成人免费人妻av| 最后的刺客免费高清国语| 最近的中文字幕免费完整| 久久久久久久久久久丰满| 在线观看免费视频日本深夜| 最新中文字幕久久久久| 精品久久久久久久末码| 少妇熟女欧美另类| 级片在线观看| 成人特级黄色片久久久久久久| 久久久久久久久大av| 日韩高清综合在线| 真实男女啪啪啪动态图| av在线蜜桃| 国产蜜桃级精品一区二区三区| 色哟哟·www| 乱系列少妇在线播放| 国产aⅴ精品一区二区三区波| 亚洲av五月六月丁香网| 22中文网久久字幕| 久久久成人免费电影| 亚洲精品久久国产高清桃花| 国产精品久久久久久久久免| 亚洲在线观看片| 日日摸夜夜添夜夜添小说| 日韩成人伦理影院| 欧美日韩综合久久久久久| 国产av在哪里看| 国产极品精品免费视频能看的| 日韩,欧美,国产一区二区三区 | 亚洲自拍偷在线| 国产男靠女视频免费网站| 亚洲真实伦在线观看| 久久婷婷人人爽人人干人人爱| 亚洲乱码一区二区免费版| 九九久久精品国产亚洲av麻豆| 国产一区二区激情短视频| 一级毛片电影观看 | 黄片wwwwww| 哪里可以看免费的av片| 毛片女人毛片| 欧美最黄视频在线播放免费| 此物有八面人人有两片| 欧美性猛交╳xxx乱大交人| 久久精品国产亚洲网站| 啦啦啦韩国在线观看视频| 国产午夜福利久久久久久| 国产高清视频在线观看网站| 精品人妻熟女av久视频| 亚洲欧美成人精品一区二区| 人人妻人人澡欧美一区二区| 国产成人福利小说| 好男人在线观看高清免费视频| 国产高清三级在线| 精品人妻偷拍中文字幕| 在线观看美女被高潮喷水网站| 亚洲不卡免费看| 黄色配什么色好看| 精品国产三级普通话版| 观看美女的网站| 又黄又爽又刺激的免费视频.| 国产高清视频在线播放一区| 国国产精品蜜臀av免费| 国产精品久久久久久av不卡| 蜜桃亚洲精品一区二区三区| 中文资源天堂在线| 午夜a级毛片| 久久国内精品自在自线图片| 天堂网av新在线| 国产亚洲精品久久久久久毛片| 久久久久久久久大av| 国产精华一区二区三区| 亚洲av中文字字幕乱码综合| 自拍偷自拍亚洲精品老妇| 岛国在线免费视频观看| 99热只有精品国产| АⅤ资源中文在线天堂| 日韩 亚洲 欧美在线| 国产午夜精品论理片| 国产蜜桃级精品一区二区三区| 夜夜爽天天搞| 日本三级黄在线观看| 亚洲中文字幕日韩| 天堂√8在线中文| 久久草成人影院| 欧美绝顶高潮抽搐喷水| 精品熟女少妇av免费看| 日日啪夜夜撸| 我的女老师完整版在线观看| 亚洲欧美日韩卡通动漫| 美女 人体艺术 gogo| 成熟少妇高潮喷水视频| 日韩欧美国产在线观看| 日韩一区二区视频免费看| 国内精品一区二区在线观看| 国产精品综合久久久久久久免费| 最好的美女福利视频网| 男女做爰动态图高潮gif福利片| 狂野欧美激情性xxxx在线观看| 日韩欧美精品免费久久| 精品午夜福利视频在线观看一区| 男女那种视频在线观看| 成人美女网站在线观看视频| 中国美白少妇内射xxxbb| 91久久精品电影网| 黄片wwwwww| 男女边吃奶边做爰视频| 久久综合国产亚洲精品| 男插女下体视频免费在线播放| 精品日产1卡2卡| 啦啦啦韩国在线观看视频| 国产av麻豆久久久久久久| 亚洲,欧美,日韩| 日本黄大片高清| 一进一出好大好爽视频| 99久久无色码亚洲精品果冻| 国产aⅴ精品一区二区三区波| 我的老师免费观看完整版| 欧美性猛交黑人性爽| 久久久久精品国产欧美久久久| 天天躁夜夜躁狠狠久久av| 毛片一级片免费看久久久久| 又黄又爽又刺激的免费视频.| 亚洲一区二区三区色噜噜| 亚洲内射少妇av| 久久精品国产亚洲网站| 少妇高潮的动态图| 97超视频在线观看视频| 少妇人妻精品综合一区二区 | 在线观看午夜福利视频| 青春草视频在线免费观看| 亚洲乱码一区二区免费版| 一个人免费在线观看电影| 欧美中文日本在线观看视频| 日韩精品中文字幕看吧| 免费高清视频大片| 99热6这里只有精品| 亚洲最大成人中文| 婷婷六月久久综合丁香| 99久国产av精品国产电影| 搡老熟女国产l中国老女人| 九九久久精品国产亚洲av麻豆| 99在线视频只有这里精品首页| 淫妇啪啪啪对白视频| 亚洲电影在线观看av| 五月玫瑰六月丁香| 精品一区二区三区视频在线| 国产综合懂色| 免费在线观看影片大全网站| 免费高清视频大片| 夜夜夜夜夜久久久久| av在线蜜桃| 久久韩国三级中文字幕| 欧美高清成人免费视频www| 国产私拍福利视频在线观看| 国产日本99.免费观看| 精品熟女少妇av免费看| 欧美激情在线99| 国产亚洲精品综合一区在线观看| 97超视频在线观看视频| 免费在线观看成人毛片| 黄色日韩在线| 天堂动漫精品| 别揉我奶头 嗯啊视频| 国产女主播在线喷水免费视频网站 | 精品国产三级普通话版| 亚洲av免费高清在线观看| 赤兔流量卡办理| 日韩中字成人| 久久天躁狠狠躁夜夜2o2o| 中文资源天堂在线| 五月玫瑰六月丁香| 久久精品国产99精品国产亚洲性色| 在线天堂最新版资源| 国产精品爽爽va在线观看网站| 亚洲av不卡在线观看| 身体一侧抽搐| 超碰av人人做人人爽久久| 99热这里只有是精品50| 色在线成人网| 久久久久国内视频| 日日摸夜夜添夜夜添av毛片| 99热网站在线观看| 午夜爱爱视频在线播放| 18+在线观看网站| 精品午夜福利在线看| 亚洲国产精品久久男人天堂| 嫩草影视91久久| 一本久久中文字幕| 尾随美女入室| 日日啪夜夜撸| 精品欧美国产一区二区三| 一个人看的www免费观看视频| 国产一区二区亚洲精品在线观看| 亚洲国产精品久久男人天堂| 欧美+亚洲+日韩+国产| 一夜夜www| 欧美极品一区二区三区四区| 熟妇人妻久久中文字幕3abv| 日韩中字成人| 69av精品久久久久久| 国产在视频线在精品| 国产精品一区二区三区四区免费观看 | 天天躁夜夜躁狠狠久久av| 国产欧美日韩精品亚洲av| 能在线免费观看的黄片| 女的被弄到高潮叫床怎么办| 中文资源天堂在线| 国产av在哪里看| 亚洲五月天丁香| 国产乱人偷精品视频| 人人妻人人澡人人爽人人夜夜 | 国产精品人妻久久久久久| 国产精品一区二区三区四区久久| 晚上一个人看的免费电影| av在线蜜桃| 色播亚洲综合网| 久久亚洲国产成人精品v| 国产成人福利小说| 色尼玛亚洲综合影院| 男女啪啪激烈高潮av片| 亚洲四区av| 高清午夜精品一区二区三区 | 给我免费播放毛片高清在线观看| 国产激情偷乱视频一区二区| 国产精品av视频在线免费观看| 午夜精品国产一区二区电影 | 国产精品久久久久久久久免| 午夜影院日韩av| 一进一出抽搐动态| 精品一区二区三区人妻视频| 欧美激情在线99| 两性午夜刺激爽爽歪歪视频在线观看| 国产一区二区在线av高清观看| 日本在线视频免费播放| av国产免费在线观看| 亚洲人与动物交配视频| 欧美一区二区精品小视频在线| 18禁在线无遮挡免费观看视频 | av视频在线观看入口| 91狼人影院| 国产一区二区亚洲精品在线观看| 晚上一个人看的免费电影| 亚洲激情五月婷婷啪啪| 老司机影院成人| 亚洲成人av在线免费| 日本爱情动作片www.在线观看 | 波多野结衣高清作品| 亚洲天堂国产精品一区在线| avwww免费| 亚洲av不卡在线观看| 国内少妇人妻偷人精品xxx网站| 男人和女人高潮做爰伦理| 欧美区成人在线视频| 一边摸一边抽搐一进一小说| 国产午夜精品久久久久久一区二区三区 | 99久久中文字幕三级久久日本| 国产av一区在线观看免费| 久久精品久久久久久噜噜老黄 | 亚洲无线在线观看| 免费人成在线观看视频色| АⅤ资源中文在线天堂| 99热这里只有是精品50| 最新中文字幕久久久久| 麻豆精品久久久久久蜜桃| 男女啪啪激烈高潮av片| 国产人妻一区二区三区在| 99视频精品全部免费 在线| 免费人成视频x8x8入口观看| 日日摸夜夜添夜夜添av毛片| 国产精品三级大全| 久久人妻av系列| 一区福利在线观看| 男人狂女人下面高潮的视频| 人人妻,人人澡人人爽秒播| 久久人人爽人人片av| 全区人妻精品视频| 男人和女人高潮做爰伦理| 欧美区成人在线视频| 亚洲va在线va天堂va国产| 女同久久另类99精品国产91| 成人午夜高清在线视频| 日本熟妇午夜| 国产高清有码在线观看视频| 亚洲国产日韩欧美精品在线观看| 淫秽高清视频在线观看| 国产精品不卡视频一区二区| 露出奶头的视频| 日韩一区二区视频免费看| 色哟哟·www| 亚洲中文日韩欧美视频| 国产一区二区激情短视频| av在线老鸭窝| av免费观看日本| 高清欧美精品videossex| 人体艺术视频欧美日本| 美女内射精品一级片tv| 看十八女毛片水多多多| 精品久久久精品久久久| 成年人免费黄色播放视频 | 99热全是精品| 在线观看av片永久免费下载| 亚洲精品成人av观看孕妇| 亚洲精品乱码久久久久久按摩| 国产精品熟女久久久久浪| 亚洲成人av在线免费| 人人澡人人妻人| 黄色一级大片看看| 亚洲国产最新在线播放| 色网站视频免费| 国产成人a∨麻豆精品| 十八禁网站网址无遮挡 | 久久女婷五月综合色啪小说| 能在线免费看毛片的网站| 肉色欧美久久久久久久蜜桃| 美女cb高潮喷水在线观看| 在线天堂最新版资源| 老司机影院成人| 亚洲av欧美aⅴ国产| 一级毛片我不卡| 肉色欧美久久久久久久蜜桃| 简卡轻食公司| 日产精品乱码卡一卡2卡三| 欧美丝袜亚洲另类| 观看av在线不卡| 丝袜在线中文字幕| 精品国产一区二区久久| 国产高清三级在线| 自拍欧美九色日韩亚洲蝌蚪91 | 亚洲内射少妇av| 久久这里有精品视频免费| 国国产精品蜜臀av免费| 国产成人午夜福利电影在线观看| 亚洲欧洲精品一区二区精品久久久 | 色网站视频免费| 国产成人a∨麻豆精品| 亚洲欧美成人精品一区二区| 又粗又硬又长又爽又黄的视频| 美女主播在线视频| 麻豆精品久久久久久蜜桃| 国产精品成人在线| 亚洲国产成人一精品久久久| 亚洲怡红院男人天堂| 极品少妇高潮喷水抽搐| 女人精品久久久久毛片| 丝袜喷水一区| 久久人人爽人人爽人人片va| 日韩欧美一区视频在线观看 | 欧美老熟妇乱子伦牲交| 日韩强制内射视频| 国产成人freesex在线| 一区二区三区四区激情视频| 久久精品国产亚洲av涩爱| 少妇猛男粗大的猛烈进出视频| 成年女人在线观看亚洲视频| 国产精品免费大片| 亚洲无线观看免费| 日日爽夜夜爽网站| 欧美日韩综合久久久久久| 大香蕉97超碰在线| 在线观看av片永久免费下载| 久久久久国产精品人妻一区二区| 国产精品福利在线免费观看| 国产精品蜜桃在线观看| 精品久久久久久电影网| 日本欧美视频一区| av一本久久久久| 国产在线免费精品| 婷婷色综合www| 91久久精品电影网| 欧美日韩av久久| 亚洲美女黄色视频免费看| 极品教师在线视频| 如日韩欧美国产精品一区二区三区 | 亚洲精品乱码久久久久久按摩| 人妻系列 视频| 日韩中字成人| 亚洲av在线观看美女高潮| 一级毛片 在线播放| 成人美女网站在线观看视频| 国产成人精品婷婷| 国产成人午夜福利电影在线观看| 日本av手机在线免费观看| 性高湖久久久久久久久免费观看| 丰满少妇做爰视频| 成人毛片60女人毛片免费| 99热全是精品| 3wmmmm亚洲av在线观看| 九九爱精品视频在线观看| 最近最新中文字幕免费大全7| 青春草视频在线免费观看| 在线观看国产h片| 岛国毛片在线播放| 夜夜骑夜夜射夜夜干| 久久久亚洲精品成人影院| 国产69精品久久久久777片| 又大又黄又爽视频免费| 欧美精品高潮呻吟av久久| 男女国产视频网站| 免费看光身美女| 一本久久精品| 美女大奶头黄色视频| 日本黄色片子视频| 日本wwww免费看| 日韩精品免费视频一区二区三区 | 国产欧美亚洲国产| 一本一本综合久久| 2022亚洲国产成人精品| 欧美成人精品欧美一级黄| 男女边吃奶边做爰视频| 九九在线视频观看精品| 丝袜在线中文字幕| 丰满乱子伦码专区| 日本-黄色视频高清免费观看| 午夜精品国产一区二区电影| 我要看日韩黄色一级片| 亚洲欧美精品自产自拍| 午夜精品国产一区二区电影| 狂野欧美激情性xxxx在线观看| 亚洲欧美精品自产自拍| 亚洲精品乱码久久久v下载方式| 国产日韩一区二区三区精品不卡 | 久久国产乱子免费精品| 欧美变态另类bdsm刘玥| av不卡在线播放| 草草在线视频免费看| 麻豆成人av视频|