• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    RCDS:a right-confirmable data-sharing model based on symbol mapping coding and blockchain?

    2023-09-01 03:29:10LiangWANGShunjiuHUANGLinaZUOJunLIWenyuanLIU

    Liang WANG ,Shunjiu HUANG? ,Lina ZUO ,Jun LI ,Wenyuan LIU

    1School of Cyber Security and Computer,Hebei University,Baoding 071000,China

    2Xiong’an Intelligent City Innovation Federation,Xiong’an 071700,China

    3School of Information Science and Engineering,Yanshan University,Qinhuangdao 066000,China

    Abstract: The problem of data right confirmation is a long-term bottleneck in data sharing.Existing methods for confirming data rights lack credibility owing to poor supervision,and work only with specific data types because of their technical limitations.The emergence of blockchain is followed by some new data-sharing models that may provide improved data security.However,few of these models perform well enough in confirming data rights because the data access could not be fully under the control of the blockchain facility.In view of this,we propose a rightconfirmable data-sharing model named RCDS that features symbol mapping coding (SMC) and blockchain.With SMC,each party encodes its digital identity into the byte sequence of the shared data by generating a unique symbol mapping table,whereby declaration of data rights can be content-independent for any type and any volume of data.With blockchain,all data-sharing participants jointly supervise the delivery and the access to shared data,so that granting of data rights can be openly verified.The evaluation results show that RCDS is effective and practical in data-sharing applications that are conscientious about data right confirmation.

    Key words: Data right confirmation;Symbol mapping coding;Blockchain;Data sharing;Traitor tracing;Access control

    1 Introduction

    1.1 Background

    The growth of the digital economy relies on trusted data sharing in which data right confirmation(DRC)remains a challenge.Data sharing is not equivalent to data ownership transferring.The ownership and use rights of the shared data should be correctly confirmed;otherwise,no one will be willing to share information with others.Unfortunately,transaction repudiation (Zhang R et al.,2023) and data piracy (Barni and Bartolini,2004)are still the worst adversaries of DRC.To withstand them,we need to put into effect a dependable DRC scheme that integrates more credible methods of traitor tracing(Zhang LY et al.,2020)and access control.

    However,the shortcomings of existing DRC approaches in traditional data-sharing models cannot be ignored.First,most of those models depend on trusted third parties (TTPs) (Coffey and Saidha,1996),which may not be that trustworthy.Then,some models are built on staged encryption (Ali et al.,2016),which is usually inefficient when dealing with a large volume data.Typically,digital watermarking based DRC schemes work only for sharing certain types of data (Wang HL et al.,2018),which could be detrimental to the availability of the ubiquitous undistorted data.The absence of watermark forgery supervision mechanisms is also a major limitation of those schemes.

    Recently,researchers proposed using blockchain as a distributed TTP to record data-sharing processes,aiming at providing DRC services(Zha et al.,2020;Zhao et al.,2021).Those blockchain-based data-sharing models support DRC to some extent,but they have limited control over the data-sharing processes.Moreover,those models either store excessive data on blockchain or require complicated encryption computation,and thus often result in high costs and low benefits in practice.

    Considering the above deficiencies,we propose a new data-sharing model,RCDS,which combines symbol mapping coding (SMC) and blockchain.SMC is a method that encodes data holders’ fingerprints into the byte sequence of the data copy.It allows data right granting to be independent of data content,so RCDS can work on any type of data.Blockchain in RCDS distinctively records the key mapping elements generated by SMC,and offers reliable evidence when confirming data rights.In RCDS,the blockchain witnesses the whole process of data sharing,and endows traitor tracing and access control with provable credibility.

    1.2 Related works

    Existing DRC schemes for data sharing can be divided into three groups:TTP-based schemes,phased encryption schemes,and blockchain-based schemes.We review them briefly below.

    1.2.1 TTP-based schemes

    TTP-based schemes usually employ third parties to supervise the communication among datasharing participants and to offer DRC proofs (Zhu ZM and Jiang,2016;Frattolillo,2017;Ganesh et al.,2017).TTPs in these schemes play the role of evidence verifier.Once disputes occur,a TTP will provide testimony for arbitration.The problem is that the so-called TTP may not be that trusted.Coffey and Saidha (1996) first proposed a TTP-based scheme for the general non-repudiation problem.In this scheme,the third party was relied upon without reserve,which may increase the possibility of collusion attacks.To solve this problem,Zhu ZM and Jiang (2016) introduced an anti-collusion attack data-sharing model based on an asymmetric cryptosystem and the Delov—Yao model.However,this model could not resist man-in-the-middle attack or data-tampering attacks because servers did not verify user registration(Ganesh et al.,2017).Moreover,the single point of failure is a problem that cannot be ignored under the centralized architecture.In summary,TTP-based schemes cannot meet the requirements of DRC because data can easily be tampered with and third parties are not fully trusted.

    1.2.2 Phased encryption schemes

    A phased encryption scheme implements reliable data sharing usually by encrypting shared data in phases (Ali et al.,2016;Zaghloul et al.,2020).In this scheme,shared data are divided into several parts and delivered piece by piece.Once a piece is received,an ACK must be returned from the receiver to the sender before the next piece can be sent.Then,the ACK is used as non-repudiation evidence.The drawback of this scheme is that too many rounds of communication could be needed in one data sharing instance.Ali et al.(2016) proposed a two-stage non-repudiation protocol,but the problem of low efficiency remained.Furthermore,TTPs assumed by these schemes are unrealistic.

    1.2.3 Blockchain-based schemes

    Blockchain has been introduced into data sharing as an infrastructure to provide irrefutable evidence of DRC(Huckle and White,2017;Gong et al.,2019;Zha et al.,2020).Blockchain’s excellent features are often used to produce traceability of data sources and their sharing histories(Saini et al.,2021;Zhao et al.,2021).Blockchain and digital watermarking are combined to improve the security of copyright protection and data source tracing(Wang HL et al.,2018;Qian et al.,2019).Wang HL et al.(2018) proposed a combinatorial model,using first a data holding proof method to audit data integrity and then a digital watermarking scheme to confirm the origin of the shared data.However,this degree of combination is still insufficient to fight against data piracy,because access control is not emphasized.

    Some researchers combined blockchain with encryption systems to improve access control in data sharing(Ersoy et al.,2021;Sifah et al.,2021),but it is usually not efficient when faced with large volumes of data.Wang S et al.(2022) proposed a big-data sharing scheme that uses smart contracts to execute access rules.However,encryption and decryption require a lot of time for a large amount of data,resulting in low efficiency.

    In addition,zero knowledge proof (ZKP) and non-fungible token(NFT)inspired researchers to develop some featured DRC methods.Some new studies constructed ZKP models to prove the ownership or use right of assets by third parties(Cao and Zhao,2021;Sun et al.,2021;Lin et al.,2022).Some other studies generated mainly unique digital certificates(i.e.,NFTs) to claim ownership of specific data assets and achieved secure data sharing by selling those NFTs.However,the above techniques have some intolerable shortcomings in DRC data sharing.For example,ZKP construction often has low efficiency and poor scalability (Giacomelli et al.,2016;Parno et al.,2016),and NFT is still a technically immature concept(Okonkwo,2021).

    1.3 Contributions

    The contributions of our work to research on DRC in the process of data sharing are as follows:

    1.We propose SMC to make fingerprint encoding suited to any type of data content.It prevents fingerprint forgery and enhances the credibility of DRC in the process of data sharing.

    2.RCDS enables data-sharing processes to be supervised on blockchain publicly by empowering trusted traitor tracing and access control.

    2 Preliminaries

    2.1 Basic concepts

    Here,we first introduce relevant technical concepts that will be used in the RCDS model.

    1.Transaction repudiation.There are currently two types of transaction repudiation (Chen et al.,2022;Wang L et al.,2022)in the process of data sharing:repudiation of sending(RoS)and repudiation of receipt (RoR).RoS occurs in a situation like this:Alice (the data sender) fabricates a record in which she sent data to Bob(the data receiver),thereby imposing responsibility for data security on Bob.RoR is another case:Bob denies the fact that he received data from Alice,thereby shirking his responsibility for data security.For non-repudiation,all participants must deny nothing about their behaviors.

    2.Data piracy.Data piracy refers to the acts of reproducing and redistributing data copies without the consent or authorization of data owners.It is tricky because of the replicability of the data.Antipiracy requires some control over access to data.

    3.Traitor tracing.Traitor tracing is a common countermeasure against transaction repudiation.It does not prevent users from denying what they have done,but tracks and obtains evidence of what they have done.It is often a strategy of pre-deterrence and post-accountability rather than prevention,and DRC is the underlying logic of this strategy.

    4.Access control.Access control refers to policies that prevent unauthorized access to data.Authentication and fine-grained data encryption are common methods for access control,and are generally premised on DRC.

    2.2 Blockchain

    Blockchain technology is capable of ensuring the security of data transmission and access by multi-party co-maintenance and cryptography,especially consistency achievement of data storage,tamper-resistance of records,and anti-repudiation of data delivery (Zhu LH et al.,2019).Therefore,blockchain systems are expected to facilitate data sharing in a more credible way than traditional cloud-and exchange-based systems(Gai et al.,2018).Generally,multi-party co-maintenance and redundant storage provide blockchain systems with decentralization.At the same time,tamper-resistance and anti-repudiation embody the reliability of data sharing.

    2.3 Symbol mapping coding

    SMC is the innovative underpinning of our work.For ease of understanding,Table 1 lists the notations used in this paper.

    Table 1 Notations used in this paper

    Given a data object,SMC works by dividing the byte sequence of the data object into symbols and recoding them using a generated symbol mapping table(SMT).SMT maps each symbol into two different types of digital codes:one is called plain code(which is used to encode symbols) and the other is called hidden code (which is used to carry fingerprints).Unlike ordinary encryption,SMC uses SMT instead of a secret key.To make SMT difficult to guess,we generate it using one-way mapping.

    Specifically,an SMT includes a symbol set,a plain code set,and a hidden code set.Each symbol will be linked to at least one plain code,so will each hidden code.LetSbe the symbol set,Pthe plain code set,andHthe hidden code set.An SMT should meet the following two irreversible surjections:

    Table 2 is an explanatory SMT.Given the string AAEIOU,the code “0x0041 0xE410 0xE452 0xE4C1 0xE4F0 0x004D” mapped with Table 2 carries the hidden string WORLD!.In this way,we can generate an SMT for any given data content to hide a string that is used as a fingerprint.

    Table 2 Schematic symbol mapping table

    3 RCDS model

    RCDS is a data-sharing model that achieves reliable DRC by identifying fingerprints in data copies.Fig.1 shows the working principle of this model,and we describe its workflow in detail below.

    Fig.1 Overview of RC DS

    1.DistributorDgenerates an SMTDfor data objectdwith his/her fingerprintFDand private key hashh(SKD),encodesdintowith the generated SMTD,and records,FD,,and DDes onto blockchain BC.

    2.Dsendsto userUthrough the off-chain channel,and uploads the transaction record to BC.

    3.Authorized userUobtainsand DDes from BC.

    4.Ugenerates an SMTUfor data objectwith his/her fingerprintFUand private key hashh(SKU),encodesintowith the generated SMTU,redacts queryqaccording to DDes,and recordsFU,,andqonto BC.

    5.Usends SMT?UtoDthrough the off-chain channel,and uploads the transaction record to BC.

    6.Dobtains,FU,andqfrom BC.

    7.Dencapsulates the access control policy into a decoder and uploads the decoder to BC.

    8.Uobtains the decoder from BC.

    9.The arbiter judges the repudiation behavior with the interactive records on the blockchain and fingerprint verification results.

    In this model,a data delivery process betweenDandUcan be formalized as the following steps:

    When an authorized user wants to accessd,he/she should generate a query statementqaccording to the data description DDes and apply for a decoder ?from the distributor.The user then obtains the data he/she needs according to ?,rather than directly obtaining the whole data from.Therefore,we designφ4which encapsulates the access control policy and publishes only minimal query interfaces that do not disclose the original data.We also designφ5to ensure that only the correct user can query information from the data.

    The arbiter can use the tester onto identify whether the holder ofdis an authorized user or a distributor:

    Each of the above testers returns either negative or positive.Positive means that a fingerprint is detected from,and negative means the opposite.From Fig.1,it is easy to understand that each party of data delivery holds a unique copy of the data,in which the party’s own fingerprint is embedded and the user’s copy of data is confidential to the distributor.φ6is the fingerprint identification algorithm that is the core of DRC.Any node in the blockchain can act as an arbiter to identify the fingerprints fromdto check users’permissions.

    In this model,we use the blockchain instead of a TTP,and use it to provide a complete evidence chain for each data-sharing process.Nodes of the blockchain network are exactly participants in data-sharing activities.Through consensus,they jointly maintain the consistency of the blockchain.The blockchain immutably records all key elements of each data delivery transaction to make the model credible.

    4 Model construction

    In RCDS,the sharing of a data object involves a series of processes including SMT generation,fingerprint embedding,fingerprint identification,and data query.Based on implementing these processes,the following subsections present the construction of RCDS.

    4.1 SMT generation

    Unlike watermarking on images,fingerprints are embedded with the help of an SMT,which works to encode and decode the raw data like a codebook.Fingerprints are encoded in the form of hidden codes along with the generation of SMTs.In turn,these fingerprints can be identified by parsing the encoded data with these SMTs.An SMT must be associated,one to one,with the corresponding data,so fingerprint identification can be unambiguous.With this in mind,we designφ1as described in Algorithm 1,where an SMT is divided into two parts:the private part,SMT+,consisting of〈sθ,pρ〉,and the public part,SMT?,consisting of〈pρ,hη〉.

    In Algorithm 1,the value ofθshould be a random number and meet two conditions.The first condition is SMT?≤τ,whereτis an upper limit artificially designed for SMT?in practice.The second condition is|dF|≥λ|F|,ensuring that there is enough encoding space ofdFat the side ofU.To ensure enough encoding space,we assume that the explicit code space is twice the symbol space.According to the givenτandλ,we can set the range ofθto satisfy the following conditions:

    The function symbolize(·) is used to randomize the value ofθwithin the range defined by inequality (1):

    Givenγ ∈(0,1],the fingerprint redundancy?should be evaluated in the following range to obtain sufficient strength of fingerprint embedding:

    Inequality (2) conforms to the constraint of being over perfect;i.e.,if?>|S|were true,each symbol of the data object would match more than one fingerprint,which would add to the size of SMT.

    It is clear that?|F|=η|S|,so the range ofηcan be calculated with inequality (3):

    Within this range,the function customize(·) is used to obtain a random value forη.

    The function obfuscate(·) increases the redundancy of SMT to makeθharder to guess.The value ofχshould not exceed the encoding space specified byρ,so it can be calculated by

    The value of c900 is derived from the third fivedigit hexadecimal string inh(SK).It is obtained by adding the first four characters together and multiplying the sum with the fifth string,so that the maximum result will not exceed 900.

    The parameterρspecifies the encoding space of the plain code and the expansion multiple ofd.For example,whenθ=1 andρ=2,2 GB size ofdFwill be obtained from 1 GB size ofd.Therefore,ρis usually calculated to meet the minimum requirement of the encoding space(line 3 in Algorithm 1).

    Specifically,because the secrecy ofθshould be maintained to make SMT difficult to forge,h(SK)in Algorithm 1 makes the outputs of symbolize(·)(line 1 in Algorithm 1),customize(·)(line 4 in Algorithm 1),and obfuscate(·) (line 14 in Algorithm 1)user-dependent.This makes it more difficult to guess,because no users will reveal their private keys.

    To facilitate authentication,we calculate the hash value of SMT?and recordh(SMT?) on the blockchain,so that everyone in the network can obtain and verify SMT?throughh(SMT?)and finally authenticate the corresponding data object through fingerprinting.

    4.2 Fingerprint embedding

    A data object should firmly carry its holder’s fingerprint before it can be used.For a single delivery,the data holders include the distributor and the authorized user of the data copy.A fingerprint must be able to uniquely bind to a publicly verifiable identity.A reasonable way to make such a fingerprint is to generate it from the public key that can uniquely identify a data holder.Another factor that should not be overlooked is the size of the fingerprint.For a data object that is not very large,a fingerprint should not be too long,to avoid losing its robustness of embedding.Therefore,a viable way of fingerprint generation is to use the hash of the data holder’s public key as a fingerprint and keep|F|≤|d|true.

    To enhance the strength of fingerprint embedding,it is better for a data object to be fully overlaid with redundant fingerprints.As inequality(2)requires,anη-partition (Ptη) of the redundant fingerprints should be done to fit|S|(line 6 in Algorithm 1).

    In addition,the fingerprint of each user will be recorded on the blockchain and open to the network,so that everyone in the network can use these fingerprints to check the identities of the shared data.

    The embedding of redundant fingerprints is actually an encoding on data objects,and it is a twostep process.First,Dpre-codesdthroughφ2to embedFD.dFDis unable to be directly read and thus can be directly delivered toU.Then,Ufinally codesdFDthroughφ2to embedFU.dFDUallowsUto query data through a dedicated decoder.Algorithm 2 detailsφ2.

    Algorithm 2 realizes a full coverage strategy in the encoding process.In the strategy,plain codes replace all the symbols of a data object,and hidden codes cover the duplicates of one fingerprint.Doing so can protect the original data from being leaked and make the cost of destroying a fingerprint unacceptable,because the data will not be recovered as usable if all the fingerprints hidden behind the data are broken.Another strategy in Algorithm 2 is randomized coding (line 6).It randomly chooses a plain code from SMT to match up with each hidden code,blocking the sequential guessing of the original symbols.

    It is worth noting that the delivery ofdFDis recorded as a main part of a transaction on the blockchain.Such records will be the compelling evidence for delineating suspects.

    4.3 Fingerprint identification

    The purpose of fingerprint identification is to test whether the data object contains the fingerprint of a specific user.Different from traditional digital watermarking,our method is based on hypothesis testing.In other words,for RCDS,it needs only to verify whether the data object contains specific fingerprints,and usually does not need to extract the fingerprints.We divide the fingerprint recognition algorithm into two parts:forward verification and backward verification.The details are as follows:

    Algorithm 3 is a concrete solution to forward verification ofφ6.This solution collects the possible hidden code by processing the plain code part of the data,then divides the collected hidden code part into|F|to obtain the possible fingerprint,and finally matches it with the user’s fingerprint to obtain the match frequency.By calculating the Pearson correlation coefficient (Pan et al.,2021),at least one full match is needed to pass the verification.

    When Algorithm 3 returns negative,it does not mean that there is no fingerprint match,because malicious processing on the encoded data might exist.So,we design Algorithm 4 to perform a backward verification,which estimates in reverse a set of possible plain codes of the complete redundant fingerprints,and compares the usage of each byte of these plain codes with that of the encoded data.Considering that a traitor may perform some special malicious operations on the data,such as adding 1 to each binary bit of the plain code,we analyze the difference between the bytes of the plain code and those of the malicious data to identify the embedded fingerprints.

    The most complicated part of forward verification and backward verification is parameter optimization,which has a great impact on the effect of fingerprint identification.The parameterεis the lower limit ratio of fingerprint redundancy.It indicates that the minimum number of duplicate fingerprints should be detected correctly.However,the forward verification in Algorithm 3 is strict with the sequence of plain codes,so it is sensitive only to the correctdF.When the forward verification of Algorithm 3 fails,the possibility of including fingerprints is not ruled out.So,at this time,reverse verification is another way to solve this situation.It uses the bytes of the complete string of redundant fingerprints as a function and observes to what extent the data to be processed conforms to this function.The parameter?sets the upper limit of this range.Adjustingεand?will have a decisive impact on the fingerprinting.According to inequality (1),we can do the following derivation:

    Obviously,if the above condition is not met,it is very likely that a deliberately manipulated piece of data is being managed.In Algorithms 3 and 4,parametersεand?are fine-tuned to increase the sensitivity of fingerprinting when the condition is not met.

    4.4 Data query

    For the data to be shared with RCDS,we use a secret encapsulation method to control the decoding ofdF.This method integrates data encryption and access control policies.

    In Fig.1,DDes is transmitted together with the encoded data.To enable users to obtain the data they need quickly and accurately,this description should be as detailed as possible,and at least include the parts shown in Fig.2.

    Fig.2 DDes format

    After an authorized user obtainsand DDes,they code their fingerprints into.Then,they need to send a query statementqto the data distributor according to DDes to apply for access.To help distributors better encapsulate decoders,we design the following query primitives for the encapsulation:

    First,the SELECT statement is the most frequently used and powerful query for relational databases.We use query primitives in structured query language (SQL) to query data for relational data described in DDes.See Fig.3 for the specific query statement.

    Fig.3 Relational data query primitives

    Second,to query file type data,we expand the query statements used in relational data by studying the literature (Wu,2009),so that it can accurately search in file type data.These extensions are manifested mainly in the WHERE clause.The WHERE clause describes the conditions that the target object should meet.The specific expression is shown in Fig.4,in which the keywords are explained in Table 3.

    Fig.4 File data query primitives

    Table 3 Explanation of the file query primitives

    For the query statement given above,we will further illustrate the language description ability of the query statement through a query example (mainly for file type data,because relational data are similar to an SQL query).

    Fig.5 shows an example of using file data query primitives.It is a query for a specific artwork and expresses the following meaning:there are two objects in the artwork;one is a dog and the features of its color are similar to those of picture dog.jpg,and the other is a house and the features of its shape are similar to those of picture house.jpg;the house is located on the left side of the dog.

    Fig.5 An example of using file data query primitives

    As shown in Fig.6,whenDreceivesq,he/she should judge it to determine whether it complies with the access control policy.The judging of this part is based mainly on the following:

    Fig.6 Access control:(a) D phase;(b) U phase

    1.Judge the origin ofq:check whetherqis sent by an authorized user.

    2.Check the query ofq:judge whether all datasets can be obtained by combining all local application queriesq.If not,continue with the following operations.

    3.Judge whetherqcomplies with the access rules in DDes.

    The access rules in DDes define what data can be accessed and what data cannot be.For example,in the employee information table of the relational database,the user’s name belongs to privacy and cannot be accessed at the same time.Salary and department cannot be accessed at the same time.Name and diagnosis-record or name and disease involve personal privacy and cannot be accessed.

    If the check ofqis not qualified,Dwill not return any decoder;otherwise,Duses functionφ3to decrypt the private part of user application data fromand reassemble it into a newThenDuses functionφ4to encapsulate the decoder?,including,public parameters,and access control policies of data transmission.The decoder provides only the necessary interface for users to obtain the data slots they need.

    We need to ensure thatUcannot obtain the contents of the decoder through other means.Some basic indicators for encapsulatinginclude:(1)it should be invisible and unable to be disassembled;(2) it should be small enough to be placed on the blockchain;(3)it should be able to check whether the new query of data meets the policy.When the above encapsulation indicators are met,we can use a smart contract to act as a decoder.

    However,considering that smart contracts may have data privacy security problems,data parameters during contract execution could be disclosed.We find some particular solutions from the literature,and summarize them in the following categories:

    1.Split contract (Kosba et al.,2016;Kalodner et al.,2018;Li et al.,2019).The contract for designing sensitive information is a private contract or an off-chain contract,and is not disclosed to the public.

    2.Define smart contract language(Steffen et al.,2019;Baumann et al.,2020).Permission control is performed on variables,functions,and other elements of sensitive information designed in the contract.

    3.Build a smart contract execution framework (Yan et al.,2020).Smart contracts are encrypted,decrypted,and executed in combination with a trusted execution environment(TEE).

    In RCDS,we use the certification function and the black box nature of the TEE to have smart contracts executed securely.The core idea of the TEE is to build a hardware security area,and data are calculated only in the security statement to ensure their confidentiality and integrity.The running state of a smart contract in the TEE is trusted and cannot be obtained by the outside world,to ensure parameter safety in execution processes.

    As shown in Fig.6,whenUreceives the decoder sent byD,he/she will input his/herand.Then,the decoder usesto check whether the user embeds his/her fingerprint in.If the check is qualified,the decoder will returnd?.To this end,we design Algorithm 5,and implement it on the blockchain as a template for a smart contract for authorized users to query data.The first step to ensure query security is to check whether a user embeds his/her own fingerprint inthroughφ6.This largely prevents unauthorized users from using the decoder.After passing theφ6check,the decoder usesandto convertinto,and then recoversd?fromby combining ?and access control policies.

    4.5 Blockchain network

    Blockchain network is important for prompting the aforementioned fingerprint identification and access control to come true,and should ultimately help realize the workflow shown in Fig.1 and the data distribution model shown in Fig.7.We design the blockchain network mainly in two parts:data model and consensus mechanism.

    Fig.7 Data distribution pattern for right confirmation

    To collect data-sharing records correctly,we design the transaction chain data structure shown in Fig.8 based on the following ideas:first,Dcreates an initial transaction txn1 which registers the data to be shared.At the same time,Dembeds the fingerprint in the original data to form,generates the corresponding DDes,and writes,FD,DDes,andinto txn1.When data sharing is required,Dcan transferand DDes to any authorized userU.Next,whenUreceives the data,he/she will execute SMC to obtain data,which contains his/her fingerprint.Meanwhile,q,FU,and the hash digest ofare written into a transaction txn2.Finally,for each upcoming queryqfrom any of the authorized users,the distributor will create a uniquely corresponding decoder ?and write its digest into a transaction txn3,so that the authorized user can access the data object.These transactions are linked together in chronological order to constitute a transaction chain.Different transaction chains are intertwined with the blockchain.The transactions in each transaction chain transmit consensus in the network through the shielded pool (Kappos et al.,2018),and are then packaged into different blocks.From the above transaction process,we can find that every time an authorized user wants to access a data object,he/she applies to the distributor for access permission and this behavior will be verified on chain.Before the digest of the data object is uploaded to the blockchain,a decoder has hadandFUencapsulated in the case where some attackers use fake parameters to defraud the distributor to obtain permission to access data.

    Fig.8 Transaction chain over blockchain

    For the consensus mechanism,we adopt the cascade consensus protocol (CCP) reported in our previous works (Wang L et al.,2020,2021).CCP organically coordinates the periodic data transmission through a consensus process,which makes the data transmission undeniable.Its working mode meets the requirements of the data transmission part of RCDS.

    We use Spring Boot to build a simulation blockchain platform (http://www.hbusoftsec.org.cn/files/rcds_bc.zip),which employs the above data model and consensus protocol.Some simulations that we discuss later in this study are conducted on this platform.

    5 Model analysis

    In this section,we present a theoretical analysis of RCDS effectiveness in DRC and attack resistance.

    5.1 Non-repudiation of RCDS

    BeforeUaccesses the shared data copy,he/she must perform SMC,which will inevitably leave traces on the blockchain.Suppose that the suspected datadFhave been captured byA.Acan perform traitor tracing using the following steps:

    Then,the non-repudiation of data sharing with RCDS is analyzed as follows:

    1.Both tasks of accessing data and tracing traitors are forced to obtain parameters from the blockchain.Doing so can form two-way containment of the misconduct of bothDandU.IfUprovides fakeorFU,qofUwill fail to pass the censorship;ifDprovides fakeorFD,there will be no way forDto authenticate the ownership ofd.In the interests of both parties,the best strategy is to honestly abide by the rules of data delivery.

    2.It is impossible to guess the fingerprints fromdFand SMT?.dFis actually a kind of cipher text ofdbecausedand its SMT are separate from each other.If the identity ofDorUis unknown,the fingerprints indFare completely imperceptible.The invisibility of fingerprints leaves no room for traitors to deny their misbehavior.

    3.Dcannot frameU.IfDintends to frameU,he/she has to useandto forge.However,such forgery is impossible in RCDS.First,h(SK) customizesθ.Then,χadds to the random redundancy of plain codes during the generation of SMTs (lines 14—20 in Algorithm 1),which makesθmore difficult to guess.Therefore,Dis unable to forgeat an acceptable cost.

    4.Ucannot frameD.IfUintends to frameD,he/she must either delete his/her fingerprint fromor publish a fakeHowever,deleting fingerprints from a data object will only make the data object unusable.Meanwhile,the genuinehas been immutably recorded on the blockchain,and only this one can be used to unlock the data object in decoder ?.Therefore,Uis not able to frameDby breaking fingerprints or undermining the synchronization between fingerprints and SMTs.

    5.Ucannot frame other users.IfUintends to frame another userW,he/she has to embedW’s fingerprint inwith greater strength.Even ifW’s fingerprint is embedded inwithφ2,the fingerprint cannot be identified withφ5.This is because the generation parameters of SMTs are fully managed by the blockchain network in a tamperresistant manner.Moreover,even ifW’s fingerprint is successfully identified by mistake,Wcan also clear his/her suspicion with the help ofDby disproving thatcan be restored todby using the corresponding SMT?on chain.

    5.2 Anti-piracy of RCDS

    RCDS provides data sharing with distributed access control,which increases the difficulty and cost of data piracy.The effect of this access control is analyzed as follows:

    1.Dsendsand DDes toUthrough the blockchain.

    2.Ugeneratesaccording to the receivedand its ownFU,and then generates the required queryqaccording to DDes and sends it toD.

    3.Dsets ? according to the queryqand,and sends it toU.

    4.Uuses its own,,and ?to query its application data.

    5.Ucannot obtain data that have not been applied for.IfUwants to obtain unapproved data,it must pass ?,butDhas set the judgment condition according toqin ?,soUcannot obtain unapproved data.

    6.Other users cannot query data.If other users want to obtain data according to ?,they must haveofU.However,is the private part SMT ofU,so other users cannot obtain the corresponding data.

    5.3 Surviving attacks

    In this subsection,we analyze mainly the impact of various attacks on RCDS DRC capabilities.

    5.3.1 Denial-of-service attacks

    The risk of denial-of-service(DoS)attacks might exist in the blockchain network.However,the nodes located in the consortium of RCDS should all be approved,so there should be no motivation to actively commit DoS attacks.In addition,these nodes are usually protected by the consortium’s defense in depth,and their safety should be ensured by systematic security mechanisms in all organizations of the consortium.As a data-sharing model,RCDS features mainly the ability of DRC,and many existing DoS defense methods can be used as supporting protection measures for RCDS.

    5.3.2 Spoofing attacks

    In RCDS,it is necessary to use the private keys of both parties to generate SMTs,and data must be partially obtained through authoritative decoders.Dgenerates its own SMT and fingerprint based on its private key,so doesU.Beyond that,the queryqthatUwants to execute is also associated withU’s private key.Because these parameters are all immutably stored on the blockchain,the authenticity of each party is publicly verifiable,so most spoofing attacks can be avoided.

    5.3.3 Sybil attacks

    In RCDS,we adopt the CCP consensus protocol that we proposed in our early works(Wang L et al.,2020,2021),which provides two ways to resist sybil attacks.One is to limit the way in which nodes join the network by forcing them to register valid data assets,that is,“First Share and Then Request.” The other is to delete the suspicious nodes from the address list using cascaded message passing.To say the least,even if an RCDS system were hit by a sybil attack,the confidentiality of shared data and the privacy of honest nodes would not be compromised,because the current and future information that reaches consensus on blockchain is always desensitized and separated from the raw data.

    5.3.4 Eclipse attacks

    First,an eclipse attack is unlikely to succeed in a consortium blockchain network.Even if it happened,the victim nodes would simply be quarantined.The CCP consensus protocol we adopt in RCDS provides a fault tolerance rate of nearly 1/2.This means that honest nodes can still reach consensus as long as they are more than half in number.Moreover,the node detection of CCP can find failed nodes agilely during at most one consensus round and exclude them from the network,thus preventing eclipse attacks from continuing.

    5.3.5 Replay attacks

    CCP,again,is essentially a fork-free consensus protocol.In each stage of CCP,the journey of a transaction begins and ends only on both parties of the transaction,while other nodes are responsible only for verifying and forwarding the transaction.In this process,each node grows its own blockchain,the consistency of which is temporally independent of transactions.Therefore,there is no problem of processing multiple new blocks simultaneously in CCP networks,which means that the hard-fork will not occur.Of course,replay attacks that exploit the vulnerability of hard-fork will not work against RCDS either.

    5.3.6 User identity security

    To prevent user identities from being analyzed in a way,we use the shielded pool concept to hide the addresses of both parties.We put all the records of on-chain transactions in the shielded pool;that is,when a transaction is conducted,the addresses of both parties will be encrypted right after the transaction enters the shielded pool.In this way,the onchain pseudonyms and information,such as SMT?and fingerprints,do not reveal users’real identities.In fact,the scenarios we envision for RCDS are generally for consortiums,and the connection between a user’s real identity and a pseudonym is handled by the off-chain administration of the consortium,which means that the nodes in the blockchain network should have been authorized and opened,and it is meaningless for an attacker to analyze identities.

    6 Evaluation

    From the above analysis,we find that the credibility of the RCDS model depends mainly on the acceptable performance of the fingerprint identification and the blockchain operations.Therefore,we conducted a group of simulations to evaluate the performance of RCDS mainly in correctness,robustness,and efficiency,and assess the efficiency of the blockchain network in terms of delay and throughput.

    6.1 Configuration

    In this subsection,we introduce the configuration for the fingerprint identification and blockchain operation tests.

    6.1.1 Configuration for fingerprinting simulations

    We programmed a testbed (http://www.hbusoftsec.org.cn/files/rcds_fingerprint.zip) in a Java SE v1.8 environment to simulate different fingerprint identification processes and test the fingerprint identification algorithms of RCDS on a single server(CPU:x64,2.6 GHz,6 cores,12 logic processors;RAM:16 GB;HDD:1 TB;SSD:256 GB).

    To be compatible with common blockchain technologies,the testbed adopted SHA-256 as the hash digest algorithm and ECDSA as the asymmetric encryption and signature scheme.The parameters used in the testbed were preset as follows:

    The parameterτrefers to the storage space limitation of SMT?;we first assume that it is 1 MB in the simulations.The parameterλrefers to the symbol length factor.Its significance is to embed enough fingerprints in the hidden code so that they cannot be easily erased.We first assumeλ=1024 in the simulations.The parameterγrefers to the number of fingerprints that can be embedded in each character.Here,we should make it no more than 1,because if it exceeds 1,which means one plain code corresponding to multiple fingerprints,it will be very easy to guess and erase these fingerprints.Allowing for this,we initially assumeγ=0.3 in the simulations.

    The main performance metrics of the simulations include correctness,robustness,and efficiency.Correctness reflects the ability of RCDS to successfully identify data fingerprints.Robustness reflects the ability of RCDS to resist malicious data processing.Efficiency reflects RCDS’s executive agility.

    The assessment terms we will use throughout the evaluation are defined as follows:

    6.1.2 Configuration for blockchain simulations

    We built a blockchain network (http://www.hbusoftsec.org.cn/files/rcds_bc.zip) by using the spring boot framework (JDK version:1.8) for the performance testing.Then,we ran it in a server machine (CPU:Intel Xeon Platinum 8269CY Cascade Lake,2.5 GHz,12 cores;bandwidth:1 Gb/s;memory:4 GB;ESSD:40 GB) by instantiating six containers and using multi-thread programming to simulate the communication between peer nodes.

    6.2 Correctness of fingerprint identification

    We measured the ability of RCDS to successfully identify fingerprints from data objects.

    1.Metrics.Accuracy reflects how correct RCDS is.Precision and Sensitivity metrics inversely correlate with the false alarm rate and the missed alarm rate,respectively.These three metrics are defined as

    2.Settings.The fingerprinting effects of RCDS under different parameters were observed in the simulations.We simulated random datasets,in which the values ofεand?were variable in the test.We set the parameters for this test as follows:d,randomly generated;number of users,50;|d|,1 MB;ε,0.2—0.7;?,10—16.The test was calculated 10 times and the results were averaged.

    3.Results.The results of the test are shown in Fig.9.

    Fig.9 Correctness of RCDS:(a) ?=10;(b) ?=12;(c) ?=14;(d) ?=16

    4.Discussion.As shown in Fig.9,the horizontal axis indicates the variation ofε,the vertical axis shows the values of the observed metrics,and the four subgraphs show the results for different values of?.

    It is easy to see that RCDS has perfect sensitivity when identifying fingerprint on randomly generated datasets,free of malicious processing.In terms of Accuracy and Precision,when?was set to a maximum of 12,the results were generally better than those at?=14,which means that constraining the threshold of backward verification within a measurable range can ensure that the system works correctly.We found that whenε ≥0.4,the fingerprint identification rate is as high as 100%,which gives the baseline ofεin forward verification.

    To sum up,the simulation results showed that RCDS can correctly identify users’fingerprints from encoded data which were free of malicious processing.

    6.3 Robustness of fingerprint identification

    We measured RCDS’s ability to correctly verify fingerprints from data objects when there was potentially malicious data processing.

    1.Metrics.Same as those in Section 6.2.

    2.Settings.RCDS’s ability was evaluated in the simulations to resist the potential presentation attacks described below.

    (1) Deletion attack.An adversary may delete a few bytes fromdFin an attempt to make the fingerprints undetectable.In the simulations,one third ofdFwere deleted at random.

    (2) Swap attack.An adversary may swap some pairs of bytes indFto disarrange the order of the codes.In the simulations,we swapped every two adjacent bytes.

    (3)Padding attack.An adversary may put some random bytes overdF,trying to reduce the fingerprint recall rate.In the simulations,we appended noisy bytes todFto extend the size ofdFto 2|dF|.

    (4) Negation attack.An adversary may negate some bytes indFto obfuscate the codes.In the simulations,we negated half of the bytes.

    (5)Reversion attack.An adversary may reverse the order in whichdFis stored,seeking to desensitize the program to correct fingerprints.In the simulations,we completely reverseddF.

    We chose the above attack models because each of them represents a class of content processing.φ5of RCDS has a strong adaptability because it does not depend on the type of data content.For each attack model above,we observed the influence of〈ε,?〉(ε ∈{0.4,0.5},? ∈{12,14}) on the fingerprinting effect.The test was calculated 10 times,and the results were averaged.

    3.Results.The results of the test are shown in Fig.10.

    Fig.10 Robustness of RCDS:(a) ε=0.4, ?=12;(b) ε=0.5, ?=12;(c) ε=0.4, ?=14;(d) ε=0.5, ?=14

    Fig.11 Symbol mapping generation runtime (SMRT) of RCDS:(a) |d|=1 MB;(b) |d|=8 MB;(c) |d|=16 MB;(d) |d|=32 MB

    4.Discussion.As shown in Fig.10,the horizontal axis lists the five attack types mentioned in the settings,the vertical axis shows the values of observed metrics,and the four subgraphs show the results based on different values ofεand?.

    It is clear that RCDS worked the best against those attacks whenε=0.5 and?=14,which tells us the threshold for making the system live in a malicious environment.It can be found that increasing?will increase the sensitivity of RCDS to these five types of attacks.In addition,the effect of a negative attack was not as good when?<14.The reason is that the negative attack essentially manipulates the plain code ofdF,while the forward verification phase of Algorithm 3 must be relatively rigorous to interpret the plain code.However,by raising?,the recognition rate against this attack obviously increased.It is important to note that the effect of fingerprinting is generally not influenced by the volumes and types of data objects,because the target of RCDS is the byte sequences of the data objects.All the above results support the acceptable reliability of RCDS.

    6.4 Efficiency of fingerprint identification

    We measured the efficiency of RCDS in running SMT generation and fingerprint identification.

    1.Metrics.The major performance costs of RCDS come from the activities of SMT generation and fingerprint identification.The symbol mapping generation runtime(SMRT)and the fingerprint identification runtime (FIRT) were logged when observing these two types of activities.

    2.Settings.The inputs that are closely related to RCDS’s efficiency includeθ,η,and|d|.The impact of these inputs’changes on SMRT and FIRT was observed in the simulations through several tests.According to inequalities (1) and (3),we calculated the ranges ofθandηbased on different assignments of|d|.Table 4 lists their values for this simulation.Each test was calculated 10 times,and the results were averaged.

    Table 4 Settings for the efficiency simulation

    3.Results.Figs.11 and 12 show SMRT and FIRT,respectively.

    4.Discussion.As shown in Figs.11 and 12,the horizontal axis indicates the variation of the hidden code lengthη,the vertical axis shows the values of observed metrics,and the four subgraphs show the SMRT and FIRT with different amounts of data,and the series shown in each subgraph represents different values ofθ.

    As seen in the results,we can adjust the value ofθto fit any size of|d|,while the efficiency of RCDS will not be affected.In other words,the size of|d|has almost no influence on the runtime,which indicates that RCDS is scalable in terms of data volume.At the same time,SMRT and FIRT decreased and tended to be stable with the increase ofθwhen the data volume was the same.The reason is that the possibility of symbol repeating indecreases with the increase ofθ.

    At the same time,whenθwas constant,the results showed that a smaller value ofηusually led to less runtime,as smaller hidden code lengths always require less searching effort.

    With regard to performance expansion,the values ofθandηaffected RCDS’s storage and communication performance.From|d|=θ|S|and,we know that the larger theθ,the smaller the,and the less storage and communication pressure there will be.

    In addition,in Fig.12,we can notice that some values were abnormally large.This was caused by the backward verification of the fingerprint (Algorithm 4),and was consistent with the theoretical basis of RCDS’s full fingerprint coverage strategy(i.e.,?|F|=η|S|).

    Fig.12 Fingerprint identification runtime (FIRT) of RCDS:(a) |d|=1 MB;(b) |d|=8 MB;(c) |d|=16 MB;(d) |d|=32 MB

    6.5 Blockchain performance

    We tested the average delay and throughput of the blockchain network when the RCDS model was working.

    1.Metrics.The average delay indicates mainly how fast a single transaction is confirmed,and the throughput reflects the number of transactions completed per unit of time.

    2.Settings.We set the numbers of nodes as{3,4,5},and the number of transactions from 5000 to 25 000.

    3.Results.The results are shown in Fig.13.

    Fig.13 Comparison of average latency (a) and throughput (b) (tps:transactions per second)

    4.Discussion.The duration of transaction generation and the time consumed by consensus are the main factors affecting blockchain efficiency.From Fig.13,we learn that the throughput changed little with increased numbers of nodes and transactions,and that the average delay was within an acceptable range.This means that RCDS does not cost much to run if an appropriate blockchain network is deployed,and that DRC is quite feasible on such a model.

    7 Conclusions and future work

    In this work,we propose RCDS—a rightconfirmable data-sharing model.By using SMC,RCDS encodes raw data in a non-distortion way,and thus is competent for DRC regardless of the types and volumes of shared data.By employing blockchain,RCDS imposes credible supervision on DRC through the whole network consensus.Furthermore,RCDS combines SMC and blockchain into a systematic mechanism,with which the data access can be fully under control during its sharing processes.Above features of RCDS make it possible to launch trusted traitor tracing and access control,better supporting the forensics on the acts of transaction repudiation and data piracy.

    Of course,our work inevitably has some limitations,and further research and expansion are needed.First,RCDS does not provide a fingerprint extraction function,which might further improve the credibility of fingerprint identification.Second,it is necessary to design a unified and effective access control strategy for different data content types,which can make the decoder encapsulation more secure.Third,a more complete user identity privacy protection scheme is required to ensure the security of user identities.Finally,the encapsulation strategy in this model is implemented by smart contracts,which always need closer check in security.We hope that dealing with the above issues will lead to the emergence of more effective DRC data-sharing models.

    Contributors

    Liang WANG designed the research.Shunjiu HUANG conducted the simulations and drafted the paper.Lina ZUO processed the data and helped organize the paper.Jun LI performed the formal analysis.Wenyuan LIU supervised the research.Liang WANG revised and finalized the paper.

    Compliance with ethics guidelines

    Liang WANG,Shunjiu HUANG,Lina ZUO,Jun LI,and Wenyuan LIU declare that they have no conflict of interest.

    Data availability

    The data that support the findings of this study are available from the corresponding author upon reasonable request.

    久久久久国内视频| 精品免费久久久久久久清纯| 精品久久久久久久毛片微露脸| 99国产精品免费福利视频| 99久久国产精品久久久| 视频区图区小说| 性少妇av在线| 亚洲一区高清亚洲精品| 欧美黄色淫秽网站| 人人澡人人妻人| 女警被强在线播放| 久久性视频一级片| 久久性视频一级片| 香蕉国产在线看| 亚洲色图 男人天堂 中文字幕| 如日韩欧美国产精品一区二区三区| 久久久久九九精品影院| 老鸭窝网址在线观看| 久久香蕉精品热| 好看av亚洲va欧美ⅴa在| 国产精品1区2区在线观看.| 女人高潮潮喷娇喘18禁视频| 一个人免费在线观看的高清视频| 午夜精品久久久久久毛片777| 国产精品久久电影中文字幕| www日本在线高清视频| 国产一区二区三区视频了| 亚洲精品在线观看二区| 久久久久亚洲av毛片大全| 不卡av一区二区三区| 搡老熟女国产l中国老女人| 一本综合久久免费| 女人爽到高潮嗷嗷叫在线视频| 9191精品国产免费久久| 咕卡用的链子| 欧美激情久久久久久爽电影 | 国产精品美女特级片免费视频播放器 | 一级毛片高清免费大全| 人妻久久中文字幕网| 国产精品久久电影中文字幕| 中文字幕最新亚洲高清| 久久久久久久久免费视频了| 夜夜躁狠狠躁天天躁| 亚洲精品av麻豆狂野| 午夜日韩欧美国产| 欧美国产精品va在线观看不卡| 久久国产精品影院| 午夜精品国产一区二区电影| 亚洲伊人色综图| 美女午夜性视频免费| 久久精品国产清高在天天线| 老汉色av国产亚洲站长工具| 黑丝袜美女国产一区| 中文字幕人妻丝袜制服| av网站免费在线观看视频| 久久九九热精品免费| 无人区码免费观看不卡| 99热国产这里只有精品6| 欧美成狂野欧美在线观看| 精品熟女少妇八av免费久了| 老司机午夜十八禁免费视频| 97超级碰碰碰精品色视频在线观看| 免费久久久久久久精品成人欧美视频| 久久影院123| 色婷婷久久久亚洲欧美| 欧美在线黄色| 一边摸一边抽搐一进一小说| 黄色a级毛片大全视频| 亚洲精品在线美女| 88av欧美| 久久九九热精品免费| 怎么达到女性高潮| 女人高潮潮喷娇喘18禁视频| 亚洲av熟女| av网站在线播放免费| 亚洲欧美一区二区三区久久| 国产精品99久久99久久久不卡| 久久精品国产综合久久久| 国产精品1区2区在线观看.| 一进一出抽搐gif免费好疼 | 欧美日韩视频精品一区| 婷婷丁香在线五月| 50天的宝宝边吃奶边哭怎么回事| 午夜日韩欧美国产| 女同久久另类99精品国产91| 97碰自拍视频| 另类亚洲欧美激情| 国内毛片毛片毛片毛片毛片| 日本一区二区免费在线视频| 婷婷丁香在线五月| 黑人操中国人逼视频| 午夜激情av网站| 丝袜在线中文字幕| 无遮挡黄片免费观看| 欧美黑人欧美精品刺激| 黄色视频不卡| 男女之事视频高清在线观看| 日韩av在线大香蕉| 51午夜福利影视在线观看| 曰老女人黄片| 又黄又爽又免费观看的视频| 欧美不卡视频在线免费观看 | 91成人精品电影| 国产xxxxx性猛交| avwww免费| 日本 av在线| 两个人免费观看高清视频| 日韩欧美一区二区三区在线观看| 97碰自拍视频| 18禁观看日本| 老司机亚洲免费影院| 久久久久国产精品人妻aⅴ院| 天天躁夜夜躁狠狠躁躁| 99热只有精品国产| 交换朋友夫妻互换小说| 亚洲欧美日韩高清在线视频| 国产精品亚洲一级av第二区| 日本欧美视频一区| 黄频高清免费视频| xxx96com| 亚洲成人免费电影在线观看| 亚洲成av片中文字幕在线观看| av网站免费在线观看视频| 99香蕉大伊视频| 亚洲中文日韩欧美视频| 精品国产亚洲在线| 午夜免费观看网址| 无人区码免费观看不卡| 91老司机精品| 国产精品一区二区精品视频观看| 国产又色又爽无遮挡免费看| 69av精品久久久久久| 极品人妻少妇av视频| 91老司机精品| 精品国产亚洲在线| 国产亚洲精品久久久久5区| 无人区码免费观看不卡| 国产1区2区3区精品| 超碰97精品在线观看| 日韩欧美一区视频在线观看| 亚洲av第一区精品v没综合| 别揉我奶头~嗯~啊~动态视频| 亚洲欧洲精品一区二区精品久久久| 免费在线观看视频国产中文字幕亚洲| 精品人妻1区二区| 日本精品一区二区三区蜜桃| 嫁个100分男人电影在线观看| 免费不卡黄色视频| 在线av久久热| 91国产中文字幕| 99在线视频只有这里精品首页| 夜夜爽天天搞| 久久人妻熟女aⅴ| 99国产精品一区二区蜜桃av| 色婷婷av一区二区三区视频| 国产成人av激情在线播放| 国产精品国产高清国产av| 一二三四在线观看免费中文在| 99久久99久久久精品蜜桃| 欧美一级毛片孕妇| 亚洲成a人片在线一区二区| 香蕉国产在线看| 69精品国产乱码久久久| 亚洲一码二码三码区别大吗| 国产精品久久视频播放| 两性夫妻黄色片| 欧美黄色片欧美黄色片| 美女高潮喷水抽搐中文字幕| 国产精品一区二区三区四区久久 | 热99国产精品久久久久久7| 女人爽到高潮嗷嗷叫在线视频| 9热在线视频观看99| 亚洲色图综合在线观看| 久久伊人香网站| 亚洲色图综合在线观看| 搡老熟女国产l中国老女人| 日韩国内少妇激情av| 欧美日韩瑟瑟在线播放| 在线十欧美十亚洲十日本专区| 久久热在线av| 97超级碰碰碰精品色视频在线观看| 桃色一区二区三区在线观看| 欧美一级毛片孕妇| www.熟女人妻精品国产| 真人做人爱边吃奶动态| 老司机深夜福利视频在线观看| 中文字幕精品免费在线观看视频| 国产精品99久久99久久久不卡| 大型黄色视频在线免费观看| 人人妻人人爽人人添夜夜欢视频| 亚洲精品粉嫩美女一区| cao死你这个sao货| 69av精品久久久久久| 制服诱惑二区| x7x7x7水蜜桃| 日韩一卡2卡3卡4卡2021年| 精品国产一区二区久久| 亚洲第一欧美日韩一区二区三区| 国产成人一区二区三区免费视频网站| 黄色片一级片一级黄色片| 久久草成人影院| 久久久久精品国产欧美久久久| 午夜免费鲁丝| 国产真人三级小视频在线观看| 亚洲成人久久性| 精品卡一卡二卡四卡免费| 国产精品美女特级片免费视频播放器 | www.精华液| 国产精品一区二区免费欧美| av片东京热男人的天堂| 欧美日韩亚洲国产一区二区在线观看| 人人妻人人添人人爽欧美一区卜| 国产熟女xx| 少妇 在线观看| 亚洲国产精品合色在线| 色尼玛亚洲综合影院| 看免费av毛片| 久久人妻av系列| 美女国产高潮福利片在线看| 在线观看www视频免费| 纯流量卡能插随身wifi吗| 在线观看一区二区三区激情| 少妇被粗大的猛进出69影院| 在线天堂中文资源库| av有码第一页| 久久香蕉国产精品| 一个人免费在线观看的高清视频| 99精国产麻豆久久婷婷| 亚洲精品中文字幕一二三四区| 视频在线观看一区二区三区| 三级毛片av免费| 黑人猛操日本美女一级片| 日日爽夜夜爽网站| 国产熟女xx| 亚洲五月色婷婷综合| 欧美日韩亚洲高清精品| 日本五十路高清| 午夜福利一区二区在线看| 一a级毛片在线观看| 午夜福利,免费看| 99国产精品一区二区蜜桃av| 欧美人与性动交α欧美精品济南到| 18禁裸乳无遮挡免费网站照片 | 日韩欧美三级三区| 国产欧美日韩一区二区三区在线| 一边摸一边做爽爽视频免费| 国产成人欧美| 亚洲伊人色综图| 国产免费av片在线观看野外av| 国产精品免费一区二区三区在线| 亚洲熟妇熟女久久| 99热只有精品国产| 亚洲片人在线观看| 国产欧美日韩一区二区三| 免费av毛片视频| 亚洲精品美女久久av网站| 亚洲狠狠婷婷综合久久图片| 这个男人来自地球电影免费观看| 欧美日韩视频精品一区| cao死你这个sao货| 99在线视频只有这里精品首页| 色综合欧美亚洲国产小说| 黄色片一级片一级黄色片| 午夜免费激情av| 亚洲一区二区三区欧美精品| 欧美中文综合在线视频| 水蜜桃什么品种好| 在线永久观看黄色视频| 91国产中文字幕| 欧美最黄视频在线播放免费 | 在线观看午夜福利视频| 一边摸一边抽搐一进一小说| 亚洲人成电影免费在线| 精品日产1卡2卡| 一本大道久久a久久精品| 成人三级黄色视频| 一个人观看的视频www高清免费观看 | 国产精品秋霞免费鲁丝片| 成熟少妇高潮喷水视频| 天堂影院成人在线观看| 成人18禁高潮啪啪吃奶动态图| 亚洲欧美日韩高清在线视频| 啦啦啦在线免费观看视频4| 午夜日韩欧美国产| 窝窝影院91人妻| 日韩免费高清中文字幕av| 啦啦啦免费观看视频1| 久久久久久大精品| tocl精华| 久久精品国产综合久久久| 色在线成人网| 久久久国产精品麻豆| 国产成人精品久久二区二区91| 久久精品国产亚洲av高清一级| 午夜精品久久久久久毛片777| 狂野欧美激情性xxxx| 国产成+人综合+亚洲专区| 一二三四在线观看免费中文在| 在线免费观看的www视频| av网站免费在线观看视频| 中文字幕最新亚洲高清| 亚洲一区中文字幕在线| 亚洲成人精品中文字幕电影 | 国产一区在线观看成人免费| 免费看十八禁软件| 国产av一区在线观看免费| 999久久久精品免费观看国产| 午夜福利一区二区在线看| 久久久国产精品麻豆| 婷婷丁香在线五月| 色婷婷久久久亚洲欧美| 国产精品免费一区二区三区在线| 电影成人av| 欧美日韩亚洲国产一区二区在线观看| 色婷婷久久久亚洲欧美| 日韩欧美三级三区| 在线观看午夜福利视频| 亚洲欧洲精品一区二区精品久久久| 老司机在亚洲福利影院| av在线播放免费不卡| 少妇裸体淫交视频免费看高清 | 99精品久久久久人妻精品| 国产精品一区二区在线不卡| 美女国产高潮福利片在线看| 乱人伦中国视频| 欧美日韩中文字幕国产精品一区二区三区 | 久久伊人香网站| 亚洲欧洲精品一区二区精品久久久| 高清欧美精品videossex| 成年版毛片免费区| 亚洲一区二区三区色噜噜 | 久久人人97超碰香蕉20202| 最好的美女福利视频网| 天天影视国产精品| 91麻豆精品激情在线观看国产 | 人妻久久中文字幕网| 欧美乱码精品一区二区三区| 日韩精品青青久久久久久| 亚洲熟妇中文字幕五十中出 | 国产97色在线日韩免费| 国产1区2区3区精品| av在线播放免费不卡| 国产av精品麻豆| 午夜精品在线福利| 久久久国产成人精品二区 | 欧美日韩av久久| 国产又爽黄色视频| 国产伦人伦偷精品视频| 在线观看免费午夜福利视频| 久久久久久亚洲精品国产蜜桃av| 人人妻人人添人人爽欧美一区卜| 香蕉久久夜色| 12—13女人毛片做爰片一| avwww免费| 日韩视频一区二区在线观看| 午夜精品在线福利| 国内久久婷婷六月综合欲色啪| 午夜91福利影院| 亚洲一区中文字幕在线| 亚洲精品在线美女| 波多野结衣av一区二区av| 无遮挡黄片免费观看| 久久中文看片网| 久久亚洲真实| 桃色一区二区三区在线观看| 国产日韩一区二区三区精品不卡| 国产精品乱码一区二三区的特点 | 亚洲激情在线av| 久久久久久久精品吃奶| 成年女人毛片免费观看观看9| 国产亚洲精品综合一区在线观看 | 久久伊人香网站| 又黄又粗又硬又大视频| 色哟哟哟哟哟哟| 在线观看免费视频网站a站| 久久精品国产亚洲av高清一级| 成人国语在线视频| 亚洲 欧美一区二区三区| 色婷婷久久久亚洲欧美| 波多野结衣av一区二区av| 叶爱在线成人免费视频播放| 无人区码免费观看不卡| 人妻丰满熟妇av一区二区三区| 日韩中文字幕欧美一区二区| 婷婷六月久久综合丁香| 成在线人永久免费视频| aaaaa片日本免费| 色播在线永久视频| 男人舔女人的私密视频| 人人妻人人爽人人添夜夜欢视频| cao死你这个sao货| 国产成人一区二区三区免费视频网站| 国产成人av激情在线播放| 99久久久亚洲精品蜜臀av| 亚洲av成人av| 夫妻午夜视频| 亚洲人成网站在线播放欧美日韩| 国产一区二区三区在线臀色熟女 | 校园春色视频在线观看| 成人av一区二区三区在线看| 国产亚洲欧美在线一区二区| 在线观看免费高清a一片| 国产精品香港三级国产av潘金莲| av超薄肉色丝袜交足视频| 免费av中文字幕在线| 女同久久另类99精品国产91| 精品乱码久久久久久99久播| 狠狠狠狠99中文字幕| 国产99久久九九免费精品| 天天躁夜夜躁狠狠躁躁| 嫩草影院精品99| 成年女人毛片免费观看观看9| 美女国产高潮福利片在线看| 婷婷六月久久综合丁香| 亚洲一区二区三区欧美精品| 久久草成人影院| 老熟妇仑乱视频hdxx| 亚洲中文av在线| 久久久久精品国产欧美久久久| 日本黄色视频三级网站网址| 中文字幕人妻丝袜一区二区| 操出白浆在线播放| 黑人操中国人逼视频| 最好的美女福利视频网| 五月开心婷婷网| av天堂久久9| 国产成人欧美| 女生性感内裤真人,穿戴方法视频| 视频区图区小说| 亚洲午夜理论影院| 日韩成人在线观看一区二区三区| 精品福利永久在线观看| 久久国产精品人妻蜜桃| 少妇粗大呻吟视频| 欧美日韩中文字幕国产精品一区二区三区 | 在线播放国产精品三级| 中文亚洲av片在线观看爽| 欧美日韩中文字幕国产精品一区二区三区 | 日日爽夜夜爽网站| 国产免费现黄频在线看| 真人做人爱边吃奶动态| 人人妻人人澡人人看| 中文字幕高清在线视频| 美女高潮喷水抽搐中文字幕| 国内久久婷婷六月综合欲色啪| 国产成年人精品一区二区 | 这个男人来自地球电影免费观看| 亚洲精品在线美女| 日韩大码丰满熟妇| 日日夜夜操网爽| 午夜精品国产一区二区电影| 国产成人影院久久av| 丰满迷人的少妇在线观看| 在线观看一区二区三区| 午夜免费激情av| xxxhd国产人妻xxx| 老司机深夜福利视频在线观看| 国产亚洲精品第一综合不卡| 欧美老熟妇乱子伦牲交| 久久性视频一级片| 丝袜美足系列| 精品人妻1区二区| 狠狠狠狠99中文字幕| 在线播放国产精品三级| 麻豆久久精品国产亚洲av | a级毛片在线看网站| 黑人猛操日本美女一级片| 欧美乱码精品一区二区三区| 久久精品91蜜桃| 天堂√8在线中文| 最新在线观看一区二区三区| 免费日韩欧美在线观看| 男女床上黄色一级片免费看| 国产国语露脸激情在线看| 香蕉久久夜色| 日韩欧美一区二区三区在线观看| 欧美人与性动交α欧美精品济南到| 在线国产一区二区在线| 久久狼人影院| 欧美丝袜亚洲另类 | 动漫黄色视频在线观看| 久久天堂一区二区三区四区| 欧美精品一区二区免费开放| 中文字幕av电影在线播放| 欧美在线黄色| 97超级碰碰碰精品色视频在线观看| 午夜福利影视在线免费观看| 一区二区日韩欧美中文字幕| 久久久国产成人精品二区 | a级片在线免费高清观看视频| 真人一进一出gif抽搐免费| 在线国产一区二区在线| 一级a爱片免费观看的视频| 国产成人影院久久av| 可以在线观看毛片的网站| 精品人妻1区二区| 91av网站免费观看| 精品久久久久久电影网| 久久精品亚洲精品国产色婷小说| 久热这里只有精品99| 麻豆国产av国片精品| 欧美日韩瑟瑟在线播放| 亚洲av美国av| 无人区码免费观看不卡| 女人爽到高潮嗷嗷叫在线视频| 久热这里只有精品99| 中文字幕人妻熟女乱码| 国产精品国产高清国产av| 长腿黑丝高跟| 操美女的视频在线观看| 国产精品99久久99久久久不卡| 国产精品日韩av在线免费观看 | 国产精品亚洲一级av第二区| 黄色成人免费大全| 欧美日韩亚洲国产一区二区在线观看| 侵犯人妻中文字幕一二三四区| 露出奶头的视频| 91在线观看av| 久久人妻福利社区极品人妻图片| 精品久久久精品久久久| 久久精品人人爽人人爽视色| 精品国产乱子伦一区二区三区| 欧美黑人欧美精品刺激| 黄色a级毛片大全视频| 欧美黄色片欧美黄色片| 亚洲欧美激情综合另类| 亚洲精品一卡2卡三卡4卡5卡| 男人舔女人下体高潮全视频| 在线观看免费日韩欧美大片| 日韩免费高清中文字幕av| 国产91精品成人一区二区三区| 国产精品秋霞免费鲁丝片| 777久久人妻少妇嫩草av网站| 人人妻人人爽人人添夜夜欢视频| 69精品国产乱码久久久| 色老头精品视频在线观看| 天堂√8在线中文| 人妻久久中文字幕网| 久久婷婷成人综合色麻豆| 日本免费a在线| 久久久久久久久免费视频了| 亚洲国产精品sss在线观看 | 欧美av亚洲av综合av国产av| 1024视频免费在线观看| 男男h啪啪无遮挡| 国产91精品成人一区二区三区| √禁漫天堂资源中文www| 婷婷六月久久综合丁香| 女人精品久久久久毛片| 欧美黑人欧美精品刺激| 国产成人av激情在线播放| 日本免费a在线| 国产精品乱码一区二三区的特点 | 最近最新中文字幕大全免费视频| 亚洲一区中文字幕在线| 国产精品久久久久久人妻精品电影| 黄色丝袜av网址大全| 一二三四在线观看免费中文在| 国产精品久久久av美女十八| 久久天躁狠狠躁夜夜2o2o| 9191精品国产免费久久| 久久久久国内视频| 久久婷婷成人综合色麻豆| 大香蕉久久成人网| 日韩免费av在线播放| 国产精品日韩av在线免费观看 | 波多野结衣一区麻豆| 曰老女人黄片| 久久香蕉国产精品| 在线国产一区二区在线| 久久久久国内视频| 天堂俺去俺来也www色官网| 狂野欧美激情性xxxx| av欧美777| 麻豆一二三区av精品| 香蕉丝袜av| 欧美人与性动交α欧美软件| 99香蕉大伊视频| 自线自在国产av| 黄色丝袜av网址大全| 久久精品影院6| 精品国产乱子伦一区二区三区| 亚洲aⅴ乱码一区二区在线播放 | 亚洲专区字幕在线| 午夜精品在线福利| 大型黄色视频在线免费观看| 久久久精品国产亚洲av高清涩受| 一进一出好大好爽视频| 精品国产乱子伦一区二区三区| 在线看a的网站| 变态另类成人亚洲欧美熟女 | 黄片小视频在线播放| 久久精品国产99精品国产亚洲性色 | 极品教师在线免费播放| 亚洲 欧美一区二区三区| 丝袜美腿诱惑在线| 色老头精品视频在线观看| 电影成人av| 一边摸一边抽搐一进一出视频| 人人妻人人澡人人看| 精品久久久久久,| 欧美日韩亚洲国产一区二区在线观看| 亚洲激情在线av| 一级毛片女人18水好多| 国产91精品成人一区二区三区| 亚洲欧美精品综合久久99| 亚洲成人免费电影在线观看| 久久久久久久精品吃奶| 韩国av一区二区三区四区| 欧美激情极品国产一区二区三区| 国产aⅴ精品一区二区三区波| 超碰97精品在线观看| 国产成人精品无人区| 夫妻午夜视频| 在线观看免费视频网站a站|