• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Research on Multi-Blockchain Electronic Archives Sharing Model

    2023-10-26 13:15:44FangYuWenbinBiNingCaoJunLuoDiantangAnLiqiangDingandRussellHiggs
    Computers Materials&Continua 2023年9期

    Fang Yu ,Wenbin Bi ,Ning Cao ,Jun Luo ,Diantang An ,Liqiang Ding and Russell Higgs

    1School of Information Engineering,Qingdao Binhai University,Qingdao,266555,China

    2School of Computer and Software,Dalian NeusoftUniversity of Information,Dalian,116023,China

    3School of Internet of Things and Software Technology,Wuxi Vocational College of Science and Technology,Wuxi,214028,China

    4Archives Management Department,Qingdao West Coast New Area Archives,Qingdao,266427,China

    5Editorial Research Department,Qingdao West Coast New Area Archives,Qingdao,266427,China

    6School of Mathematics and Statistics,University College Dublin,Dublin,Ireland

    ABSTRACT The purpose of introducing blockchain into electronic archives sharing and utilization is to break the information barrier between electronic archives sharing departments by relying on technologies such as smart contract and asymmetric encryption.Aiming at the problem of dynamic permission management in common access control methods,a new access control method based on smart contract under blockchain is proposed,which improves the intelligence level under blockchain technology.Firstly,the Internet attribute access control model based on smart contract is established.For the dynamic access of heterogeneous devices,the management contract,permission judgment contract and access control contract are designed;Secondly,the access object credit evaluation algorithm based on particle swarm optimization radial basis function (PSO-RBF) neural network is used to dynamically generate the access node credit threshold combined with the access policy,so as to realize the intelligent access right management method.Finally,combined with the above models and algorithms,the workflow of electronic archives sharing and utilization model of multi blockchain is constructed.The experimental results show that the timeconsuming of the process increases linearly with the number of continuous access to electronic archives blocks,and the secure access control of sharing and utilization is feasible,secure and effective.

    KEYWORDS Sharing and utilization of electronic archives;dynamic permission management;PSO-RBF;neural network;credit evaluation

    1 Introduction

    The development of modern electronic archives sharing service platform based on archives information resource sharing and data driving and the construction of electronic archives information security management system with multi blockchain structure based on big data analysis can provide guarantee from three aspects:information security,entity security and carrier security,and effectively solve the problem of users’distrust of electronic carriers.As a cutting-edge distributed data storage structure,blockchain has unique technical rules such as distributed ledger,asymmetric encryption and consensus mechanism,which can break the information barrier between electronic archives sharing departments,realize the tamperability,privacy protection and data tracking of shared information,and effectively ensure the data ownership,security and confidentiality of shared information.Fundamentally solve the conflict of interest and lack of trust between electronic archives sharing departments,and provide strong technical support for the safe storage,rapid response and cross departmental collaborative sharing of massive electronic archives information[1,2].

    The smart contract introduced in blockchain version 3.0 makes it possible to solve the access control problem through blockchain technology[3].At present,blockchain is used to solve the security problems of the Internet under integrated edge computing,mostly in terms of privacy protection[4,5]and data security[6,7].There are few studies on the access control of Internet edge nodes.They ignore the potential risks of edge nodes,and the default edge nodes are safe and reliable [8,9].Edge nodes should be confirmed through trusted mechanism when accessing the Internet.At the same time,the current edge computing has brought strong computing power.Under the new paradigm of Internet system integrating edge computing,the role of edge nodes in the process of electronic archives access control needs to be fully considered.Combined with the principles and characteristics of blockchain,this paper proposes an Internet electronic archives sharing access control model for multi blockchain with edge computing,which provides a new theoretical framework and effective technical support for realizing efficient,secure and reliable electronic archives information sharing.

    On February 25,2019,the National Archives and Records Administration (NARA) released a blockchain white paper,which showed the research of blockchain technology on archives management and other related aspects as of July 2018,such as the true and complete transmission and archiving of electronic data and electronic archives on the blockchain to the National Archives[10].In 2017,the National Archives of the UK,together with the University of Surrey and the open data research center,carried out the blockchain application and demonstration project-ARCHANGEL project,which uses blockchain to record and verify electronic archives metadata and is permanently preserved through point-to-point distribution and consistency check [11].Intan Permatasari and others in Indonesia proposed an electronic archives management system called Cilegon E-Archive (CEA) to improve information security in electronic archives management[12].Thomas Renner and others in Germany proposed an audit framework called Endolith to prevent electronic files from being tampered with.The framework uses the blockchain based on smart contract to verify the integrity of electronic files and track the file history.It uses the alliance chain in a single blockchain to manage electronic files,and all institutions in the alliance jointly manage and maintain the security of electronic files[13].

    Shi et al.proposed to use the digital summary of electronic documents to ensure the authenticity of the whole life cycle of electronic documents,and establish the conceptual model of blockchain technology for the authenticity assurance system of digital archives management,so as to ensure the authenticity and security of the electronic document management process[14].Referring to the open archive information system(OAIS)model,Wang Ping encapsulates the electronic document information on the block,and provides credible protection for the handover and receiving stage,storage and management stage,utilization and destruction stage of electronic document management[15].

    2 Related Work

    2.1 Internet Attribute Access Control Model Based on Smart Contract

    In the Internet environment,attributes are inherent in each subject,object,operation and environment.By associating the attributes of each device and resource with access rights,attribute based access control(ABAC)model is suitable for managing devices and a wide range of data on the Internet.However,for the dynamic access management of heterogeneous devices,ABAC adopts the attribute discovery mechanism,which can not accurately and appropriately allocate the permissions of the receiving devices according to {attributes,permissions}.This will limit the normal access and real-time processing of data by heterogeneous devices,and bring challenges to the scene with edge nodes.Aiming at the dynamic access of heterogeneous devices,this paper combines smart contract with ABAC[16],and designs management contract(MC),authority judge contract(AJC)and access control contract(ACC).

    2.1.1 Manager Contract

    MC is used to manage relevant policies.The main body is the access initiator,which is replaced by the corresponding media access control(MAC)address.The attribute is the inherent characteristic of the object.The permission is an operable behavior described by numerical value.The permissions are read,write,management,etc.The custom functions are shown below:

    ManageAdd():used to add permission information of an object.

    ManageUpdate():used to update the permission information of an object.

    ManageDelete():used to delete the permission information of an object.

    QueryData(hash):used to obtain the information of an object through hash.

    2.1.2 Authority Judge Contract

    AJC is used to judge when an object applies for an operation on a resource.The structure is obtained by comparing the subject permission and resource permission,including allowing all operations,read-write,readable and illegal access.

    JudgeFromMC()is used to obtain the permission information of the object from MC.

    JudgeToACC()is used to send judgment results to personal computer(PC).

    JudgeAccess()is used to judge whether the sensor device has access exceptions,and the generated exception report is sent to ACC.

    AddAccessIssue()is used to add access exception events.

    DeleteAccessIssue()is used to delete access exception events.

    PSO-RBFNeualNetworks () calls the trained PSO-RBF neural network model to calculate the threshold of sensor access credit(0~1).

    Feedback()is used to feed back the access credit threshold of the access object.

    2.1.3 Access Control Contract

    ACC is used to realize the final access control of devices and resources,and return the judgment result to the subject through the AJC result.

    ACCAnswer () returns the AJC result to the principal to complete the access control of the resource

    ACCSetMC()calls the function in MC to modify the object permission through the result of AJC.

    AddPolicy()is used to add a new access policy and receive the new access policy to the policy list.

    UpdatePolicy()is used to update the access policy.

    DeletePolicy()is used to delete the access policy.

    AccessControl()is used for access decision-making.It combines the predefined access policy with the access credit threshold fed back in the AJC contract to make permission decision.

    PublishToACC()is used to send penalty results to ACC.

    2.2 Credit Evaluation Method of Access Object Based on Particle Swarm Optimization-Radial Basis Function(PSO-RBF)Neural Network

    Design a three-layer neural network credit evaluation model[17],see Fig.1 below.

    Figure 1:PSO-RBF neural network model for credit evaluation

    The number of nodes in the input layer is 6.The access feature vector includes the following six categories,illegal request proportion (IRP),unauthorized request proportion (URP),no access resources proportion (Narp),Exception request proportion (ERP),prohibition request proportion(PrP)and request disallowed proportion(NAFRP).Take the above six types of vectors as the input features,which are recorded asX=(x1,x2,···,x6).The number of hidden layer nodes is 20,which is recorded asB=(b1,b2,···,b20).The output node isY,which represents the trust of the access object,expressed asY=γ,γ∈(0,1).

    The hidden layer adopts Gaussian kernel function as the basis function.

    The relationship between outputY(x)and inputxis as follows:

    In Eq.(2),w0is the offset used to adjust the output.wirepresents the weight between the basis function of the i-th hidden node and the output node.Xis the input vector,Ciis the field center of the i-th hidden node,σiis the field width of the i-th hidden node.

    The parameter update of the model adopts PSO algorithm [18–23].Suppose the space for searching food isP-dimensional,the total number of particles isn,and the position of the i-th particle inP-dimensional space isxi=(xi1,xi2,···,xiP),flight speed is?i=(?i1,?i2,···,?iP).The following two factors should be considered when searching:

    (1) The particle searches the best positionPbso far.

    (2) Search all particles to the bestPg.

    The position and velocity equation of PSO algorithm is as follows:

    In Eq.(4),ρminis the minimum,ρmaxis the maximum value of inertia weight,respectively.his the current number of iterations,hmaxis the maximum number of iterations,respectively.

    Eis the square of the difference between the model output and the actual value,γiis the model output value,oiis the actual value.When the errorEdecreases to a suitable value,the algorithm stops.At the same time,the centerCand weight valuewof the obtained radial basis function are saved,and the learning process ends.

    3 Workflow of Electronic Archives Sharing and Utilization Model Based on Multi Blockchain

    This paper designs a multi blockchain electronic archives sharing and utilization model.The model is suitable for the integration of internal information system and archives.At the same time,it has expansibility and supports the integration of cross organizational electronic archives security management.There are two blockchain networks in the whole process of electronic archives management and use:one blockchain network is the electronic archives management chain,and the other blockchain network is the electronic archives use chain.The file management chain uses the alliance chain.Only authorized enterprises and institutions can operate this file management chain.Its main function is to create,modify,delete,approve and other management operations of electronic files.The file use chain uses the public chain,which is mainly used to provide users with electronic file access,electronic file download and verification functions.

    Figure 2:Multi blockchain electronic archives sharing and utilization control process

    The sharing and utilization process of multi blockchain electronic archives (Fig.2) is mainly divided into four stages: Initialization stage,device registration stage,authority dynamic allocation stage and execution stage.

    In the initialization phase,the agent node deploys the smart contract.After the MC,AJC and ACC contracts are successfully deployed in the blockchain,the proxy node obtains the addresses of the three contracts and lets all nodes on the blockchain get the addresses through broadcasting.

    In the registration phase,the manager sends a registration request to the MC,registers itself and its managed devices,and generates a pair of keys,including public and private keys.The manager sends a request to AJC to add an access policy for device S1to access device S2resource R2.The management node encapsulates the access policy as a transaction,broadcasts it in the blockchain with S1public key as the transaction output address,and adds the transaction to the AJC contract after being verified by the miner to complete the addition of the access policy.

    In the access control phase,the device S1accesses the resource R2of the target device S2,and the MC sends an access policy request to ACC after receiving the message.After ACC obtains the request,it inquires from AJC whether there is any access exception event.If it is normal,it will feed back to MC access policy.If it is abnormal,ACC sends a request for obtaining credit value to AJC.AJC generates the access credit threshold by calling PSO-RBF algorithm and feeds it back to ACC,and updates the access history of the access object.ACC calculates the access decision in combination with the credit and access policy,and feeds back the result to MC.

    In the execution phase,the proxy node MC generates access control results and initiates transactions in the blockchain.Miner obtains the management of electronic files,writes the transaction information into the new block after using the transaction,triggers the corresponding event of smart contract,and feeds back the access permission result to the manager.Assuming that the permission is allowed access,the R2resource of S2allows S1access and feeds back the request result to S1.

    4 Experimental Simulation and Security Test

    4.1 Simulation and Result Analysis of Credit Model Based on PSO-RBF Neural Network

    Select 500 sample data and credit evaluation results.First,initialize the initial data,enlarge it by 100 times as the network input,take 400 node samples as the training data,the number of training rounds is 200,and the remaining 100 node sample data as the test data.As shown in Figs.3 and 4,the credit model based on PSO-RBF neural network has the characteristics of good convergence,high learning efficiency and high accuracy.Compared with multiple linear regression algorithm,it is more accurate.Compared with back propagation(BP)neural network algorithm,it has the characteristics of fast convergence and stable learning.

    Figure 3:Error variation curve

    Figure 4:Error variation curve

    4.2 Performance Test of Electronic Archives Sharing and Utilization Model Based on Multi Blockchain

    Fig.5 shows the time-consuming of 500 consecutive accesses to different data by different subjects,and the corresponding data is the average time-consuming of every 10 times.With the increase of the number of visits,the time of each visit increases linearly,and the average time of each visit in the 500th time is about 1.3 s.Since the access records are stored in the blockchain after each access process,the query data of each access is increasing,resulting in a linear increase in access time with the increase of access times.

    Figure 5:Time-consuming situation under different access times

    Test the response time of the model access control request,and the response time of sending request nodes from 0 to 10000 per second.Test the response time comparison after calling PSO-RBF algorithm and not calling the algorithm,as shown in Fig.6.Due to the large amount of calculation required to call PSO-RBF algorithm,there will be delay,and the response time of 10000 request nodes will increase by about 5 s.

    By simulating the concurrent requests of multithreaded clients,test the processing time of ManageAdd(),QueryData()and PublishToACC()under different concurrent requests with proof of work(PoW)difficulty of 0,difficulty of 1 and difficulty of 2,as shown in Fig.7.

    It can be seen that under different concurrent requests,adding and judging contracts will hardly take time,which proves the superiority of edge nodes in the Internet scenario.Based on the need to complete consensus,access record and synchronous query in the blockchain during the query process,the time will increase with the increase of the number of requests.Due to the small difficulty discrimination,the time required for PoW is negligible compared with the query time,but in comparison,the method proposed in this paper still has high application value.

    Figure 6:Response times of access control request

    Figure 7:The processing time of ManageAdd(),QueryData()and PublishToACC()

    5 Conclusions and Future Work

    The electronic archives sharing and utilization model based on multi blockchain has the following typical characteristics: The public chain and alliance chain adopt distributed ledger technology to make multiple backups of data,which can effectively ensure the integrity of shared data within and among entities.All members in the public chain and alliance chain have been authenticated and have high credibility.The three smart contracts of MC,AJC and ACC are used to realize the functions of registration management,authority management and access policy management.By introducing PSORBF algorithm,the access credit threshold of access nodes is evaluated,the dynamic and intelligent management of access control of massive nodes is realized,and the flexible,intelligent and finegrained control process is realized.The economy of the model is mainly reflected in cost and operation efficiency.The multi-layer blockchain model is dominated by the alliance chain and supplemented by the public chain.The data is mainly stored in the alliance chain,and only a small amount of data to be shared is uploaded to the public chain,so as to avoid the circulation of too much redundant data in the public chain.Electronic archive data is stored in the form of hash value in the chain,which can reduce the storage burden of the model,effectively improve the throughput and response speed of the model and improve the operation efficiency.For future work,we will try to combine attribute based encryption to build an efficient alliance chain environment.At the same time,because this model introduces PSO-RBF neural network algorithm to learn and record the knowledge of access nodes,it requires large data storage space and high requirements for computing power.However,there are bottlenecks in the storage capacity and computing power of the current blockchain system.In the next step,further research will be carried out in the aspect of model lightweight.

    Acknowledgement:None.

    Funding Statement:This work was supported by Shandong Social Science Planning and Research Project in 2021(No.21CPYJ40).

    Author Contributions:Conceptualization,Yu and Cao;methodology,Yu and Bi;software,Yu and Bi;validation,Yu and Luo;formal analysis,An and Ding;investigation,Yu;resources,Yu;writing—original draft preparation,Yu;writing—review and editing,Higgs;All authors have read and agreed to the published version of the manuscript.

    Availability of Data and Materials:The authors do not have permission to share the data.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    黄色视频,在线免费观看| 亚洲精品国产色婷婷电影| 王馨瑶露胸无遮挡在线观看| 亚洲全国av大片| 他把我摸到了高潮在线观看| 这个男人来自地球电影免费观看| 亚洲一区高清亚洲精品| 韩国av一区二区三区四区| 免费在线观看影片大全网站| 男女床上黄色一级片免费看| 国产av又大| 一级片'在线观看视频| 99国产精品99久久久久| 精品人妻1区二区| 精品乱码久久久久久99久播| 国产成人精品无人区| 亚洲人成电影免费在线| 久久久久国产一级毛片高清牌| 日日夜夜操网爽| 看免费av毛片| 久久婷婷成人综合色麻豆| 91麻豆精品激情在线观看国产 | 久久99一区二区三区| 日本撒尿小便嘘嘘汇集6| 黄色a级毛片大全视频| 麻豆乱淫一区二区| 免费在线观看完整版高清| 免费看十八禁软件| 亚洲国产中文字幕在线视频| 亚洲五月色婷婷综合| avwww免费| 久久中文字幕人妻熟女| 久久久久国产一级毛片高清牌| 午夜福利影视在线免费观看| 日韩成人在线观看一区二区三区| 俄罗斯特黄特色一大片| 91麻豆av在线| 欧美精品啪啪一区二区三区| 国产xxxxx性猛交| 欧美日韩亚洲综合一区二区三区_| 人人妻人人澡人人看| 怎么达到女性高潮| 天天躁夜夜躁狠狠躁躁| 国产精品一区二区在线观看99| 欧美日韩福利视频一区二区| 男男h啪啪无遮挡| 少妇粗大呻吟视频| 亚洲av电影在线进入| 一进一出抽搐动态| 香蕉久久夜色| 天天躁狠狠躁夜夜躁狠狠躁| 99精国产麻豆久久婷婷| 色综合欧美亚洲国产小说| 欧美人与性动交α欧美软件| 欧美黑人精品巨大| 中文欧美无线码| 久久影院123| 侵犯人妻中文字幕一二三四区| 一区二区日韩欧美中文字幕| 中亚洲国语对白在线视频| √禁漫天堂资源中文www| 亚洲午夜精品一区,二区,三区| 日本欧美视频一区| 久久久久国内视频| 免费观看精品视频网站| 韩国精品一区二区三区| 黄频高清免费视频| 成人18禁在线播放| 精品一区二区三区视频在线观看免费 | 久久国产精品影院| 免费在线观看完整版高清| 中文欧美无线码| 50天的宝宝边吃奶边哭怎么回事| 乱人伦中国视频| 国产成人精品在线电影| 在线av久久热| 国产在视频线精品| 久久狼人影院| 超色免费av| 精品久久久久久久久久免费视频 | 欧美+亚洲+日韩+国产| 国产精品.久久久| 人人妻人人澡人人看| 窝窝影院91人妻| 老司机靠b影院| 99在线人妻在线中文字幕 | 免费少妇av软件| 满18在线观看网站| 成人三级做爰电影| 亚洲三区欧美一区| videosex国产| 精品国产一区二区久久| 国产精品乱码一区二三区的特点 | 精品亚洲成a人片在线观看| 国产av精品麻豆| 久久久国产成人精品二区 | 亚洲精品久久成人aⅴ小说| 久久精品91无色码中文字幕| 日日爽夜夜爽网站| 国产一区在线观看成人免费| 18禁裸乳无遮挡免费网站照片 | av视频免费观看在线观看| 一边摸一边抽搐一进一小说 | 国产成人精品在线电影| 美女扒开内裤让男人捅视频| 一二三四在线观看免费中文在| 国产欧美日韩一区二区三| 黄片大片在线免费观看| 在线国产一区二区在线| 涩涩av久久男人的天堂| 亚洲精品自拍成人| 日日爽夜夜爽网站| 亚洲国产看品久久| 国产熟女午夜一区二区三区| 免费在线观看视频国产中文字幕亚洲| 国产精品香港三级国产av潘金莲| 91国产中文字幕| 99精品在免费线老司机午夜| 国产成人系列免费观看| 99riav亚洲国产免费| 怎么达到女性高潮| 亚洲第一av免费看| 久久午夜亚洲精品久久| 久久精品亚洲精品国产色婷小说| 宅男免费午夜| x7x7x7水蜜桃| 一二三四在线观看免费中文在| 男女床上黄色一级片免费看| 亚洲精品乱久久久久久| 在线观看免费视频日本深夜| 免费高清在线观看日韩| 中文字幕最新亚洲高清| 十八禁高潮呻吟视频| 狠狠婷婷综合久久久久久88av| av网站在线播放免费| 女同久久另类99精品国产91| 90打野战视频偷拍视频| 午夜久久久在线观看| 日韩中文字幕欧美一区二区| 久久中文字幕人妻熟女| 国产日韩一区二区三区精品不卡| videos熟女内射| 天天操日日干夜夜撸| 久久午夜综合久久蜜桃| 亚洲 国产 在线| 午夜亚洲福利在线播放| 黑人欧美特级aaaaaa片| 国产亚洲精品第一综合不卡| 91国产中文字幕| 男男h啪啪无遮挡| 久久国产精品男人的天堂亚洲| 日韩人妻精品一区2区三区| 国产成人av激情在线播放| 亚洲av成人不卡在线观看播放网| 母亲3免费完整高清在线观看| 国产日韩一区二区三区精品不卡| 亚洲av成人不卡在线观看播放网| 18在线观看网站| 免费在线观看日本一区| 在线观看一区二区三区激情| a在线观看视频网站| 亚洲色图综合在线观看| av中文乱码字幕在线| 国产精品久久久久久人妻精品电影| 制服人妻中文乱码| 91成人精品电影| av超薄肉色丝袜交足视频| 50天的宝宝边吃奶边哭怎么回事| 午夜福利欧美成人| 国产精品美女特级片免费视频播放器 | 日本vs欧美在线观看视频| 欧美日韩瑟瑟在线播放| 啦啦啦 在线观看视频| 少妇的丰满在线观看| 亚洲专区国产一区二区| 天天添夜夜摸| 午夜免费鲁丝| 久久精品aⅴ一区二区三区四区| 后天国语完整版免费观看| 久久精品国产综合久久久| 精品视频人人做人人爽| 午夜老司机福利片| 国产精品亚洲一级av第二区| 国产精品九九99| 中出人妻视频一区二区| 午夜精品国产一区二区电影| 日韩人妻精品一区2区三区| 中文字幕av电影在线播放| 精品亚洲成国产av| 国产亚洲精品久久久久5区| 热99re8久久精品国产| 中文字幕高清在线视频| 亚洲精品成人av观看孕妇| av欧美777| 国产伦人伦偷精品视频| 国产单亲对白刺激| 韩国av一区二区三区四区| 国产人伦9x9x在线观看| 女同久久另类99精品国产91| 日韩成人在线观看一区二区三区| 老汉色av国产亚洲站长工具| 又大又爽又粗| 成人国语在线视频| 国产亚洲精品一区二区www | 欧美精品av麻豆av| 久久 成人 亚洲| 亚洲精品中文字幕在线视频| 天堂动漫精品| av网站免费在线观看视频| 国产精品久久电影中文字幕 | videos熟女内射| av有码第一页| 日韩一卡2卡3卡4卡2021年| 在线国产一区二区在线| 欧美+亚洲+日韩+国产| 午夜影院日韩av| 亚洲熟妇中文字幕五十中出 | 亚洲一区二区三区欧美精品| 十分钟在线观看高清视频www| 午夜免费鲁丝| av天堂在线播放| 精品久久久久久久毛片微露脸| 很黄的视频免费| 久久性视频一级片| 正在播放国产对白刺激| 黑人巨大精品欧美一区二区mp4| 亚洲,欧美精品.| 国产成人精品无人区| 亚洲欧美激情综合另类| 亚洲欧洲精品一区二区精品久久久| 亚洲熟女毛片儿| 亚洲中文av在线| 极品人妻少妇av视频| 欧美日韩瑟瑟在线播放| 91精品三级在线观看| x7x7x7水蜜桃| 久久久久国产精品人妻aⅴ院 | 国产人伦9x9x在线观看| 国产亚洲精品久久久久久毛片 | 熟女少妇亚洲综合色aaa.| 窝窝影院91人妻| 18禁观看日本| 国产av精品麻豆| 桃红色精品国产亚洲av| 99久久99久久久精品蜜桃| 免费黄频网站在线观看国产| 国产成人精品在线电影| 麻豆国产av国片精品| 成人18禁高潮啪啪吃奶动态图| 亚洲欧美日韩另类电影网站| 搡老岳熟女国产| 亚洲熟妇熟女久久| 欧美激情高清一区二区三区| aaaaa片日本免费| 窝窝影院91人妻| 午夜影院日韩av| av超薄肉色丝袜交足视频| 欧美日韩福利视频一区二区| 久久久久久久久免费视频了| 欧美日韩亚洲高清精品| 一a级毛片在线观看| 亚洲精华国产精华精| 成人18禁高潮啪啪吃奶动态图| 热re99久久国产66热| 久久久国产欧美日韩av| 女人久久www免费人成看片| 亚洲人成电影免费在线| 两个人看的免费小视频| 韩国精品一区二区三区| 香蕉丝袜av| 操美女的视频在线观看| 中文字幕高清在线视频| videos熟女内射| 亚洲黑人精品在线| 91麻豆av在线| 精品久久久精品久久久| 国产一区在线观看成人免费| av中文乱码字幕在线| 99精品欧美一区二区三区四区| 免费高清在线观看日韩| 香蕉国产在线看| 女人爽到高潮嗷嗷叫在线视频| 丁香欧美五月| 丝袜美腿诱惑在线| 亚洲第一欧美日韩一区二区三区| 精品久久蜜臀av无| 下体分泌物呈黄色| 99精品欧美一区二区三区四区| 国产区一区二久久| 亚洲一区中文字幕在线| 91麻豆精品激情在线观看国产 | 亚洲av第一区精品v没综合| 久久热在线av| 亚洲欧美日韩另类电影网站| 国产精品九九99| 可以免费在线观看a视频的电影网站| 淫妇啪啪啪对白视频| 欧美亚洲日本最大视频资源| 黄片小视频在线播放| a级毛片在线看网站| 免费在线观看日本一区| 亚洲少妇的诱惑av| 俄罗斯特黄特色一大片| 精品久久久久久电影网| 亚洲欧美精品综合一区二区三区| 欧美日本中文国产一区发布| 日本wwww免费看| 成年人午夜在线观看视频| 一进一出好大好爽视频| 国产欧美日韩综合在线一区二区| 女人爽到高潮嗷嗷叫在线视频| 国产免费av片在线观看野外av| 亚洲精品自拍成人| 少妇猛男粗大的猛烈进出视频| 精品一区二区三卡| 欧美日韩成人在线一区二区| 看免费av毛片| 香蕉久久夜色| 午夜福利乱码中文字幕| 超色免费av| 久久人人爽av亚洲精品天堂| 男人舔女人的私密视频| 亚洲aⅴ乱码一区二区在线播放 | 一级片免费观看大全| 大码成人一级视频| 国产精品1区2区在线观看. | 亚洲七黄色美女视频| 18禁裸乳无遮挡免费网站照片 | 国产成人影院久久av| 黄色怎么调成土黄色| 韩国精品一区二区三区| 国产成人精品无人区| 国产在线精品亚洲第一网站| 91字幕亚洲| 51午夜福利影视在线观看| 国产高清videossex| 亚洲精品在线观看二区| 免费女性裸体啪啪无遮挡网站| 国产高清国产精品国产三级| 一进一出抽搐gif免费好疼 | 亚洲五月婷婷丁香| 久久 成人 亚洲| 亚洲国产看品久久| 99香蕉大伊视频| 亚洲自偷自拍图片 自拍| 久久精品国产亚洲av香蕉五月 | 精品卡一卡二卡四卡免费| 国产在线一区二区三区精| 狠狠狠狠99中文字幕| 成人影院久久| 久久久久久人人人人人| 久久久久久久精品吃奶| 18禁黄网站禁片午夜丰满| 国产免费男女视频| 久热这里只有精品99| 在线观看日韩欧美| 美女国产高潮福利片在线看| 亚洲成av片中文字幕在线观看| 青草久久国产| 欧美日韩国产mv在线观看视频| 宅男免费午夜| 18禁裸乳无遮挡动漫免费视频| 欧美日韩黄片免| 91麻豆精品激情在线观看国产 | 亚洲欧美激情综合另类| 亚洲五月色婷婷综合| 午夜福利在线免费观看网站| 久久人妻av系列| 99re在线观看精品视频| 精品熟女少妇八av免费久了| 亚洲va日本ⅴa欧美va伊人久久| 精品人妻熟女毛片av久久网站| 欧美中文综合在线视频| 久久人人97超碰香蕉20202| 中文字幕人妻丝袜制服| 国产aⅴ精品一区二区三区波| 成人国产一区最新在线观看| 少妇裸体淫交视频免费看高清 | 国产精品免费一区二区三区在线 | 9191精品国产免费久久| 欧美激情 高清一区二区三区| 成年女人毛片免费观看观看9 | 亚洲精品国产精品久久久不卡| 久久久国产成人免费| 美女国产高潮福利片在线看| 久久久久精品人妻al黑| 少妇的丰满在线观看| 水蜜桃什么品种好| 亚洲av美国av| 中出人妻视频一区二区| 麻豆乱淫一区二区| 99国产综合亚洲精品| 国产高清国产精品国产三级| 日韩制服丝袜自拍偷拍| 国产成人精品久久二区二区91| 日韩欧美在线二视频 | 国产黄色免费在线视频| 看黄色毛片网站| 国产又爽黄色视频| 制服诱惑二区| 水蜜桃什么品种好| 91成年电影在线观看| 一级片'在线观看视频| 久久精品国产a三级三级三级| 电影成人av| 久久久久久久久免费视频了| 日韩 欧美 亚洲 中文字幕| 嫁个100分男人电影在线观看| 丝袜美足系列| 亚洲第一青青草原| 国产精品永久免费网站| 亚洲美女黄片视频| 国产成人av教育| 曰老女人黄片| 黑丝袜美女国产一区| 免费在线观看日本一区| 少妇被粗大的猛进出69影院| 亚洲第一欧美日韩一区二区三区| 女人高潮潮喷娇喘18禁视频| 日本一区二区免费在线视频| 在线观看66精品国产| 狠狠狠狠99中文字幕| 国产精品电影一区二区三区 | 国产男女内射视频| 亚洲av成人不卡在线观看播放网| 这个男人来自地球电影免费观看| 老司机深夜福利视频在线观看| 亚洲人成77777在线视频| 91老司机精品| 国产蜜桃级精品一区二区三区 | 18禁观看日本| 欧美精品一区二区免费开放| 在线观看免费视频日本深夜| 久久久久久久精品吃奶| 亚洲一区二区三区不卡视频| 欧美黑人精品巨大| 少妇的丰满在线观看| 欧美+亚洲+日韩+国产| 亚洲五月婷婷丁香| 老熟妇乱子伦视频在线观看| 久久国产精品大桥未久av| 99精品在免费线老司机午夜| 他把我摸到了高潮在线观看| 中出人妻视频一区二区| 波多野结衣一区麻豆| 成人永久免费在线观看视频| 99在线人妻在线中文字幕 | 丁香欧美五月| 精品无人区乱码1区二区| 丝瓜视频免费看黄片| 中文欧美无线码| 老熟妇乱子伦视频在线观看| 日韩视频一区二区在线观看| 淫妇啪啪啪对白视频| 日韩 欧美 亚洲 中文字幕| 视频区图区小说| 中国美女看黄片| 亚洲自偷自拍图片 自拍| 成在线人永久免费视频| 精品少妇久久久久久888优播| 日韩欧美一区二区三区在线观看 | 精品国产国语对白av| 久久精品人人爽人人爽视色| 人人澡人人妻人| 黄片小视频在线播放| 多毛熟女@视频| 乱人伦中国视频| 99热国产这里只有精品6| 老司机靠b影院| 久久精品亚洲av国产电影网| 777久久人妻少妇嫩草av网站| 国产男女超爽视频在线观看| 丝袜美足系列| 午夜福利在线免费观看网站| 真人做人爱边吃奶动态| 啦啦啦 在线观看视频| 精品国产乱子伦一区二区三区| 日韩 欧美 亚洲 中文字幕| 日韩一卡2卡3卡4卡2021年| 三上悠亚av全集在线观看| 一进一出抽搐动态| 亚洲av成人不卡在线观看播放网| 久久精品亚洲av国产电影网| 九色亚洲精品在线播放| 亚洲av熟女| 天天躁日日躁夜夜躁夜夜| 国产一卡二卡三卡精品| 国产片内射在线| www.自偷自拍.com| 免费观看a级毛片全部| 亚洲成人免费电影在线观看| 久久天躁狠狠躁夜夜2o2o| 在线十欧美十亚洲十日本专区| 午夜福利在线免费观看网站| 一级毛片高清免费大全| av有码第一页| 亚洲精品av麻豆狂野| 国产精品二区激情视频| 伦理电影免费视频| av视频免费观看在线观看| 高清av免费在线| 国产成人系列免费观看| 十分钟在线观看高清视频www| 老熟女久久久| 免费在线观看亚洲国产| 日韩欧美国产一区二区入口| 亚洲欧美激情综合另类| 久久精品国产a三级三级三级| 成人国语在线视频| 精品人妻1区二区| 日本撒尿小便嘘嘘汇集6| 国产男靠女视频免费网站| 免费在线观看黄色视频的| 不卡一级毛片| 亚洲五月婷婷丁香| 亚洲中文字幕日韩| 黄片大片在线免费观看| 久久久精品区二区三区| 两性夫妻黄色片| 老司机靠b影院| 欧美日韩福利视频一区二区| 悠悠久久av| 18禁黄网站禁片午夜丰满| 自线自在国产av| 午夜久久久在线观看| 国产精品九九99| 成年版毛片免费区| 99久久国产精品久久久| 午夜福利一区二区在线看| 男男h啪啪无遮挡| 国产午夜精品久久久久久| 久久国产精品人妻蜜桃| 亚洲精品美女久久av网站| 国产日韩一区二区三区精品不卡| 亚洲成人国产一区在线观看| 国产淫语在线视频| 夫妻午夜视频| 久久精品国产亚洲av香蕉五月 | 久久国产精品影院| 18在线观看网站| 国产一区二区三区视频了| 国产极品粉嫩免费观看在线| 精品电影一区二区在线| 国产单亲对白刺激| 久久精品国产亚洲av香蕉五月 | 涩涩av久久男人的天堂| av福利片在线| 大型黄色视频在线免费观看| 极品人妻少妇av视频| 国产在线一区二区三区精| 国产麻豆69| 久久久国产欧美日韩av| 大片电影免费在线观看免费| 黄色女人牲交| 精品一区二区三区av网在线观看| 国产免费现黄频在线看| 九色亚洲精品在线播放| 99久久精品国产亚洲精品| 国产91精品成人一区二区三区| netflix在线观看网站| 黄片大片在线免费观看| 丁香欧美五月| 黄色毛片三级朝国网站| 免费看十八禁软件| 精品久久久久久,| 看免费av毛片| 一级片免费观看大全| 乱人伦中国视频| 久久热在线av| 久久99一区二区三区| 亚洲 国产 在线| 国产高清国产精品国产三级| 国产伦人伦偷精品视频| 国产欧美日韩一区二区三区在线| 国产精品永久免费网站| 久久人妻福利社区极品人妻图片| 亚洲精品中文字幕在线视频| 国产激情久久老熟女| 黑丝袜美女国产一区| 亚洲成人免费电影在线观看| 中出人妻视频一区二区| 久久久久久久午夜电影 | 人妻一区二区av| www日本在线高清视频| 18禁黄网站禁片午夜丰满| 国产不卡av网站在线观看| 高清欧美精品videossex| 欧美人与性动交α欧美精品济南到| 涩涩av久久男人的天堂| svipshipincom国产片| 国产一区二区三区综合在线观看| 9热在线视频观看99| 久久这里只有精品19| 亚洲男人天堂网一区| 国产成+人综合+亚洲专区| 午夜精品久久久久久毛片777| 国产真人三级小视频在线观看| 搡老乐熟女国产| videosex国产| 777久久人妻少妇嫩草av网站| 99热网站在线观看| 91精品三级在线观看| 咕卡用的链子| 最近最新免费中文字幕在线| 欧美日韩亚洲高清精品| 亚洲欧洲精品一区二区精品久久久| 久久人妻熟女aⅴ| 中文字幕制服av| 欧美大码av| 国产成人精品久久二区二区91| 国产精品影院久久| 精品国产乱子伦一区二区三区| 国产精品 国内视频| tube8黄色片| 一区二区三区国产精品乱码|