• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Blockchain-Based Cognitive Computing Model for Data Security on a Cloud Platform

    2024-01-12 03:46:40XiangminGuoGuangjunLiangJiayinLiuandXianyiChen
    Computers Materials&Continua 2023年12期

    Xiangmin Guo ,Guangjun Liang,? ,Jiayin Liu and Xianyi Chen

    1Department of Computer Information and Cyber Security,Jiangsu Police Institute,Nanjing,210031,China

    2Jiangsu Electronic Data Forensics and Analysis Engineering Research Center,Jiangsu Police Institute,Nanjing,210031,China

    3School of Computer and Software,Nanjing University of Information Science and Technology,Nanjing,210044,China

    ABSTRACT Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and security.However,information shoplifting poses significant threats,potentially leading to poor performance and privacy breaches.Blockchain-based cognitive computing can help protect and maintain information security and privacy in cloud platforms,ensuring businesses can focus on business development.To ensure data security in cloud platforms,this research proposed a blockchain-based Hybridized Data Driven Cognitive Computing(HD2C)model.However,the proposed HD2C framework addresses breaches of the privacy information of mixed participants of the Internet of Things(IoT)in the cloud.HD2C is developed by combining Federated Learning(FL)with a Blockchain consensus algorithm to connect smart contracts with Proof of Authority.The “Data Island” problem can be solved by FL’s emphasis on privacy and lightning-fast processing,while Blockchain provides a decentralized incentive structure that is impervious to poisoning.FL with Blockchain allows quick consensus through smart member selection and verification.The HD2C paradigm significantly improves the computational processing efficiency of intelligent manufacturing.Extensive analysis results derived from IIoT datasets confirm HD2C superiority.When compared to other consensus algorithms,the Blockchain PoA’s foundational cost is significant.The accuracy and memory utilization evaluation results predict the total benefitsof the system.In comparison to the values 0.004 and 0.04,the value of 0.4 achieves good accuracy.According to the experiment results,the number of transactions per second has minimal impact on memory requirements.The findings of this study resulted in the development of a brand-new IIoT framework based on blockchain technology.

    KEYWORDS Blockchain;Internet of Things(IoT);blockchain based cognitive computing;Hybridized Data Driven Cognitive Computing(HD2C);Federated Learning(FL);Proof of Authority(PoA)

    1 Introduction

    The term“cloud storage”refers to storing data digitally on servers in different physical locations.Information within the network is organized,administered,and protected by a third-party provider.Data saved on the provider’s servers are always guaranteed to be available,whether accessed through a public or private network.The ability to store,retrieve,and manage data on the cloud allows businesses to switch from a capital expenditure strategy to an operational expenditure model regarding data storage costs.In addition,cloud storage is adaptable,allowing businesses to extend or contract their data presence as needed.

    Cloud storage varies from traditional storage in the following ways.Cloud storage refers to storing digital information across a network of remote servers.Archiving data in the form of digital files on physical media such as Hard Disk Drives (HDDs),Solid-State Drives (SSDs),or external storage devices is what is known as “traditional storage.”Security,consistency,and efficiency are the three main features of cloud storage.In light of cloud provider’s ability to deliver assets upon request through the Internet,the Information Technology sector is moving away from traditional storage and towards online storage[1].

    Cloud storage incorporates security event tracking at your fingertips,or you may utilize suggestion tools that employ machine learning to discover over-provisioned accounts and inform you proactively,or you can encrypt all data.It may also combine security visibility across the entire infrastructure into a user-friendly management panel[2].The Industrial Internet of Things(IIoT)refers to the use of IoT in industrial settings,most frequently for remote monitoring and control of sensors and machines via the cloud[3].Using a Machine-to-Machine(M2M)connection,industries can utilize wireless automation and control.Cloud computing and related technologies(like data analytics and machine learning)are on the rise,which means that sectors could experience a higher level of automation,leading to new sources of income and corporate structures[4].Hence,the IIoT is called Industry 4.0 automation or the fourth industrial revolution[5].

    To be truly innovative,blockchain technology must provide the following: a distributed,cryptographically-based shared organization;timestamped records of all events;a detailed description of consensus mechanisms;and sufficient transparency and verification of stored information.Data security and economy in the IIoT industry may be improved by combining blockchain and Artificial Intelligence(AI)[6].In contrast to Artificial Intelligence(AI)systems,Cognitive computing learns by observing patterns and advises human behaviour based on its knowledge.This method is heading toward more informed decision-making and data-driven intelligent manufacturing due to the proliferation of AI and Machine Learning (ML) tools [7].Poisoning assaults,speed,and a lack of data resources are a few recent problems that still need to be fixed [8].Researchers can learn more about how cognitive computing works [9] thanks to big data acquired from various sources.On the contrary,privacy issues arise when analyzing data that may be linked to sensitive user information in the cognitive computing system [10].Industry 4.0 automation’s reliability,attack resistance,and incentive systems may be considerably improved by blockchain integration with FL.It provides a cutting-edge framework for adapting the FL concept to big data-driven cognitive computing to enhance the productivity of Industry 4.0 production[11].The provided architecture has improved the performance and privacy issues associated with cognitive computing.

    This research suggests a paradigm for Industry 4.0 models called Hybridized Data Driven Cognitive Computing(HD2C)[12].HD2C is the fusion of FL and Blockchain.A consensus mechanism is any protocol for establishing and maintaining confidence,agreement,and security in a distributed computer system [13].The consensus mechanism is vital to every Blockchain network because it ensures the integrity and verifiability of the entire system.To agree on the shared ledger’s current state,nodes in a Blockchain network employ a consensus method.Consensus algorithms are one of the most important innovations of blockchain technology.Many different protocols,such as Proof of Stake(PoS),Proof of Authority(PoA),and Practical Byzantine Fault Tolerant(PBFT),were developed by the blockchain community based on this original idea.These are designed to promote consensus in a decentralized system,making Blockchain crucial [14].PoA,which uses a system where nodes in the network are assigned the privilege of manufacturing new blocks for the chain via a round-robin or another arbitrary scheme,seems like a good bet [15].To improve accuracy and resilience against poisoning attacks,an optimization model employs a modified Markovian decision process.

    This work’s primary contribution may be summed up as follows:

    ? Blockchain-based HD2C paradigm increases data security and resistance against poisoning assaults in the IIoT sector.

    ? The Consensus Algorithm Proof-of-Authority(PoA)is fundamental to Blockchain’s ability to strengthen the security and integrity of stored data.

    ? Results reveal that the proposed method can find the best optimization model for Industry 4.0 automation.

    The paper is structured as follows:Section 2 discusses the related works of the proposed model;the proposed blockchain-enabled federated learning and HD2C with PoA consensus mechanism are investigated in Section 3 and its sub-sections;the result obtained by the proposed model and its analysis are represented in Section 4;finally,overall summarization of the proposed model is discussed in Section 5.

    2 Related Works

    The COGNITWIN (Cognitive Digital Twins) project framework,described by [16],is a fourstage Big Data and artificial intelligence pipeline designed to enable digital twins.Hybrid digital twins consist of data-driven digital twins and first-order physical models.

    To address the need for de facto standards like fast healthcare interoperable resources (FHIR)to facilitate the meaningful exchange of healthcare records among all the participants,reference[17]presented a blockchain with proof of authorization for sharing sensitive medical records securely.Data is exclusively governed within the nodes,and communication with end users is authorized via smart contracts and PoA.

    In [18],Zhang et al.proposed a blockchain-based cognitive cloud computing (BC-CCC) architecture.The Internet of Things (IoT)’s most potent edge computing systems are used by artificial intelligence (AI) to uncover information retrieved from a massive amount of sensory input,such as cyber impacts.BC-CCC devised numerous strategies for incorporating individual traits into cryptographic and security frameworks.

    Connected automated cars (CAVs) in the Cognitive Internet of cars (CIoVs) can better plan their routes and decrease congestion by using real-time cognitive perception and prediction of traffic conditions,as stated by[19].

    Reference[20]proposed the cognitive systems of Blockchain Technology,Cognitive Computing,and Healthcare Innovations to provide security for carrying out any trade of products or services.This study surveyed Blockchain technology innovation in fields other than finance (i.e.,fields unrelated to Bitcoin).In the final section of the study,the researchers weighed the pros and cons of applying blockchain technology in two intra-horizons:healthcare and cognitive computing.

    Cloud-IIoT-Based Electronic Health Record Privacy Preserving through a convolutional neural network(CNN)was proposed by[21]to increase data security and Privacy through Blockchain-based Federated learning and avoid Critical concerns in the healthcare sector.This method uses Blockchain and deep learning to protect the privacy of electronic health records.

    With potential and issues,Federated learning meets Blockchain in edge computing was proposed by [22].By coordinating several mobile devices to train a general AI model without releasing their data and considerably improving Privacy,Federated Learning(FL)has been proposed as a solution for shared data training.However,when a slow node improperly uses the ML models of other clients without proper training,the FL chain encounters a plagiarism problem during the block verification procedure.

    In [23],a Blockchain-enabled federated learning data protection aggregation approach is introduced for the IIoT that uses differential Privacy and homomorphic encryption.This study employed distributed K-means clustering with differential Privacy and homomorphic encryption,distributed random forest with differential Privacy.

    Qu et al.[24]proposed decentralized Privacy in fog computing via blockchain-enabled federated learning,and analyzed the efficacy,security,and scalability of FL-Block(federated learning enabled by Blockchain).The proposed FL-Block strategy is meant to close the gap and solve the abovementioned issues.Unfortunately,attacks on the FL smart contract typically cause significant financial losses.

    In engineering education,Problem-Based Learning(PBL)is an effective paradigm for cybersecurity training.It integrates lecture-based instruction with laboratory tasks to improve problem-solving abilities and prepare students for real-world issues.A Knowledge Graph-guided online laboratory environment improves learning results,and cybersecurity awareness,and promotes continuous development[25].

    Reference [26] proposed a privacy-preserving Distributed Application (DA) that utilizes blockchain technology for managing secure healthcare certificates.The system interfaces with healthcare centres,verifiers,and authorities through smart contracts,aiming to enhance security and overcome issues like collusion and phishing.Experimental tests using Etherscan reveal improved efficiency compared to existing techniques.

    Reference [27] presented a decentralized blockchain-based cab-sharing system that addresses issues like congestion and privacy concerns.It replaces central authorities with a reputation system on Ethereum’s platform,ensuring driver and rider information remains private.The system’s use of smart contracts maintains efficiency and security,offering a practical cab-sharing solution.

    The objective of this study [28] is to develop a virtual educational environment for teaching algorithms,big data processing,and machine learning.It makes use of Unity’s Visual IoT/Robotics Programming Language Environment (VIPLE) and a traffic simulator.The study focuses on developing realistic traffic data and implementing dynamic routing algorithms using VIPLE,with actual traffic data from Arizona’s Maricopa County being used to improve simulation accuracy.

    The proposed suite of security measures addresses current and future security issues,including a path-aware network architecture,source authentication,bandwidth reservation,and privacy-focused forwarding[29].

    Data security in a cloud environment requires multilevel cyber security analysis and additional processing mechanisms in the IIoT sector.Cyber security is achieved by implementing a blockchainenabled FL in this research.This cognitive computing is constructed by HD2C,which is explained in the following section.The comparison between the existing methods is shown in Table 1.

    Table 1:Comparison of existing methods

    3 Blockchain-Enabled Federated Learning

    Blockchain is utilized as a foundational framework to increase a variety of performance indicators,such as speed and precision,and federated learning is used to build cognitive computing.PoA is utilized in Blockchain as a consensus algorithm since it requires less time and energy than PoW or PoS.It can verify transactions at a faster rate.With PoA,you get the most significant features of both PoS and PoW in one convenient package;it is faster than PoW and more secure.

    Nevertheless,blockchain-enabled FL has captured the interest of academics and the industry to hurry up the spread of FL.Researchers present the paradigm of Hybridized Data-Driven Cognitive Computing (D2C) in Industry IoT using blockchain-enabled federated learning (Fig.1).Though privacy concerns have emerged from consumers or device edges,cognitive computing necessitates data collecting from several IIoT.To avoid sharing unprocessed information,federated learning is preferred,in which only the model is shared.Decentralized federated learning can be achieved using FL and the PoA consensus mechanism provided by blockchain technology.

    Figure 1:Proposed block diagram of hybridized data-driven cognitive computing

    Poisoning-attack-proofing is made possible by decentralization,and it additionally offers incentives and an additional accuracy guarantee through a member choosing the network.As shown in Fig.1,participants with a local model in cloud IIoT is the collection of input data from the different IIoT sector.When specific criteria are met,agreements can be automatically carried out in a decentralized setting using the smart contract FL.In its simplest form,a smart contract is a piece of computer code designed to automatically carry out the conditions of a contract or agreement without human interaction.Once a transaction is finalized,it cannot be undone by anybody else.This is done to maintain the network’s security,dependability,and immutability.The output of the appended blocks from the blockchain miner is the global model,which has all information with a global identity.The secured and verified output is transferred to all the IIoT participants in the cloud platform,as shown in Fig.1.

    3.1 Data Security in the Cloud

    Three fundamental pillars must be present for a cloud-based data security strategy to be successful:

    ? Identity: A key component of a successful cloud-centric data security policy recognizes the identities of individuals,devices,and apps during the creation,modification,shopping,application,exchange,and ultimately destruction of data.

    ? Access Boundaries: Limiting who may access the data is the second essential premise for safeguarding data in the cloud.Your data security plan with a cloud focus should use identity to regulate access via policy using several cloud-based services and tools that are already accessible.

    ?Visibility:If data gates are in place,use the cloud’s robust visibility capabilities to audit usage and deliver compliance reports showing how data is managed and accessed by ad hoc administrators.These visibility technologies permit focused response activities by quickly spotting risks and irregularities.On top of these pillars,the program is developed,and other controls can be implemented to achieve the best comprehensiveness for your company.

    Fig.2 shows how cloud storage is set up to protect user information.Data integrity is a crucial part of any computerized system.Data integrity protects data from illegal destruction,modification,or fabrication.In addition,the management entity has access to and rights over some of the company’s resources,which helps to safeguard such resources from misuse,misappropriation,and theft.Ensuring data integrity is simple in a standalone system with a single database.

    Figure 2:Cloud data privacy and security structure

    Consumers must know that their sensitive information will be safe in the cloud.Authentication and other forms of access control ensure that only authorized parties can view sensitive information.Improving cloud dependability and trustworthiness could help put fears about exposed data,compromised authentication,and unauthorized access to rest.Encryption is frequently used to safeguard the confidentiality of data.

    In their proposal,Rivest et al.offered homomorphic encryption as a security means.It is unnecessary to decrypt the data during the procedure if the results of the algebraic operation on the cipher text are compatible with the clear operation.This plan may end the need for privacy protections around cloud-based information and actions.Data privacy and security can be guaranteed using a proposed hybrid method that utilizes key-sharing and authentication procedures.A more secure connection between the user and the cloud service provider is possible by implementing strong keysharing and authentication methods.Using the Rivest–Shamir–Adleman(RSA)public key algorithm[30],the user and cloud service providers can safely exchange keys.

    The term“data availability”refers to how easily and quickly a user’s data can be used or retrieved in the event of a disaster,such as a damaged hard drive,an Internet Data Center (IDC) fire,or a network outage,and how the user can verify the integrity of their data without having to rely solely on the cloud service provider’s credit guarantee.Finally,to have Privacy is to conceal one’s identity and other personal information from others,with limited exceptions.Here are the several aspects of personal space:

    ?Under what conditions may someone worry more about disclosing information about the here and now or the future than about information about the past?

    ?Users may feel more comfortable if their friends can proactively seek them out for information,but they may not enjoy receiving constant,unprompted updates.

    ?Users may prefer to have their data reported as an amorphous region(or“extent”)rather than a pinpointed place.The trade community is obligated to protect its customers’Privacy and context.To protect individuals’Privacy,businesses must have policies,safeguards,and practices for managing sensitive data.Users risk having their data misused by other users.Users commonly share the same information saved just once due to the widespread use of deduplication technology in cloud storage.While this helps cloud providers save money and storage space,it does not protect users’data from attackers who know the file’s hash code.As a result,the cloud storage service may leak confidential data.Therefore,it has been proposed that cloud users’identities be verified via a proof of ownership mechanism.

    Hackers may cause cloud services to become more expensive.Consuming resources without paying for them is a form of cloud service payment fraud.Threat actors can use this information to increase the price of cloud services.Participants’data is kept safe in this case,and attacks are prevented using the suggested HD2C.

    3.2 HD2C-Federated Learning and Blockchain to Achieve Data Confidentiality and Privacy

    A machine learning method called federated learning enables data models to learn from several data sets hosted in various locations(such as regional data centres or a central server)without sharing the training information.However,in today’s world of numerous applications,collecting all the data in one place is practically impossible.Obtaining data at a single location also adds the added cost of disseminating the data across secure channels during such precarious periods.However modern artificial intelligence is moving in the direction of a decentralized strategy.The most recent AI models are being trained collaboratively on the edge or at the source through data from smartphones,laptops,private servers,and other devices.As a result,Federated learning,an advanced type of Artificial Intelligence(AI)training,is quickly becoming the norm for complying with new rules for collecting and preserving personal data.FL has modified many applications by delivering distributed AI solutions at the network’s edge utilizing a wide range of IIoT devices.FL makes Distributed learning possible because it allows Artificial Intelligence(AI)functions like AI model training to be sent directly to the devices rather than to a centralized server in the cloud.This allows the devices to contribute to the creation of a shared global model at an aggregator,such as a MEC (Mobile Edge Computing) server at a Base Station(BS) or an Access Point (AP).Several intelligent edge services,such as those in the transportation,healthcare,and automation sectors,find FL appealing because of recent advancements in mobile technology and growing user privacy concerns.Due to the distributed nature of IoT devices,a BS cannot collect all of the data required for AI/ML training,making FL critical for the next generation of cognitive edge networks to acquire full intelligence.With FL,devices and the BS can train a shared model utilizing users’local raw datasets.In the FL operation,M represents the total number of IoT devices.Each m device contributes to the M-device AI model through its unique dataset Dm ∈M.Each node in the network trains its model during each communication cycle,arriving at an updatewmby minimizing a loss function F(wm),as shown in Eq.(1).

    In this case,the loss function used by various FL algorithms may vary.In the case of linear regression FL modelling,the loss function F can be computed asF(Wm)=(aiTWm-bi)2 where ai and bi are input and output pairs,M i=1 is the number of inputs,and m is the number of outputs.The MEC server then takes the aggregated and computed updateswmfrom each device m and generates a new global model as

    Once the next training cycle has begun,this global model is downloaded to all devices to finish the global learning process.It should be noted that the MEC server computers and updates the global modelWGas given in Eq.(2)in the traditional FL.On the other hand,the FL chain uses blockchain technology to enable decentralized computation of the global model locally on the devices themselves.

    3.3 Blockchain to Achieve Reliability of Data

    Blockchain is employed as a core framework to improve a range of outcome measures,including speed and precision,and federated learning is used to construct cognitive computing.Blockchain primarily functions as a peer-to-peer(P2P)networked public,trustworthy,and shared ledger.Decentralization,or the idea that a single institution does not control data on a blockchain,is the main tenet of the blockchain concept.However,blockchains are maintained using consensus mechanisms,which means that each node in a blockchain,such as IIoT devices and MEC servers located on edge networks,has equal authority to control and monitor the information contained in blockchains.Due to its decentralized design,blockchain technology is invulnerable to hacking and other data abuse.In addition,blockchain solutions are more reliable and resistant since there is no single point of failure,the central server.The proposed Blockchain-based transaction mechanism with FL is broken down into three phases,as shown in Fig.3.

    ?In the initial stage,Industrial users use the private and public keys associated with their account to create an action with metadata(such as the user ID),a user signature,and a timestamp.Complex computational tasks,such as mining and the execution of smart contracts FL,may be planned and conducted in the cloud due to the limited computer capability of IIoT devices.The user then issues a command to the cloud to perform some action,such as handling Internet of Things data,authenticating users,or providing a service.

    ?Second,the cloud storage service fulfils the request by making its available resources accessible to the user.Trade(i.e.,the exchange of assets between users and service providers),payment authentication,user verification,and purchasing can all be carried out automatically using smart contracts.In addition,cloud-based virtual machines powered by mining blocks validate user transactions.All miners can now choose this one from the list of pending transactions.A network of digital miners might utilize a PoA-like consensus method.

    ?The third stage involves the miner who validated the data block quickly sending the block’s signature to the other miners so they may check it.When a consensus is reached among miners,a newly validated block and its associated signature are added to the Blockchain.Once all nodes in the network have received this block,the Blockchain’s global copy has been synchronized with all industrial users.

    Figure 3:Proposed blockchain-based transaction method using FL

    3.4 Cognitive Learning on FL to Achieve the Data Privacy

    IIoT devices,mobile devices,and gaming produce enormous amounts of data.Models may be created based on cognitive computing that stores the data initially and then does local training.A machine learning technique known as FL trains the parameters of local models.Then it aggregates those models to create a global model independent of the original data.In many cases,local and global models have the same architecture.However,there could be a lot of circumstances when various local models with various computational difficulties exist.A unique combined learning system called FL is employed to equip the very varied computations and their communication capabilities to satisfy the needs of heterogeneous clients of IIoT devices.Local data from heterogeneous IIoT devices,such as{a1,...,andan}are used to train global models.Local model parameters are denoted by the letters{y1,...,yn}.To determine the global parameter yg,the local parameters are averaged in the model.Iterations of this process are performed,and the local parameters of the(i+1)thiteration get theygcalculation from the previous iteration’s procedure.The network size may be controlled by altering the network’s breadth for effective cognitive learning to occur.As a result,this can help reduce local parameters while preserving the same model class for the global parameters’underlying design.In addition,this improves the consistency of the global model as a whole.When determining the global parameters for FL,this paper considers the input channel size(ig),the output channel size(og),and the computational complexity(c).For the submerged layer,the shrinking ratio is crucial.

    Equations for the output channel shrinkage ratio are written as shown in the upcoming Eq.(3):

    The following Eq.(4)illustrates the formula for the input channel shrinkage ratio:

    Let’s simplify and say that s1=s2=s.Then,the following Eq.(5) mentions the local model parameter shrinkage ratio:

    In the foundation of allotted subsets,global model parameters may be built by the local model parameter’s computed capability.The computation of the global parameter frequently uses the set difference concept.All participants’parameters are a part of the combined parameter matrix.As a result,models of intermediate complexity contain parameters that are fully aggregated with larger models while being partially aggregated with smaller models.Additionally,smaller local models that can help the global model are more likely to be aggregated.The data in the global model is used to generate the learning aspect of cognitive learning.The primary goals of Algorithms 1 and 2 are to broadcast participant updates and use FL for cognitive learning applications.

    3.5 Combining Cognitive Learned Data with Blockchain

    Effective cognitive learning data storage relies heavily on blockchain technology.Since these records will be used to make decisions based on them,protecting their anonymity is paramount.The contributing elements of security and Privacy include traits like blockchain-like immutability,tamperresistance,decentralization,pseudonymous identification,etc.This section discusses blockchain technology in the context of a global information model.Here,Blockchain protects the confidentiality of the globally significant model parameters by embedding the acquired knowledge into the blocks.Here,Blockchain protects the confidentiality of the globally significant model parameters by embedding the acquired knowledge into the blocks.Our proposed blockchain model is structurally indistinguishable from the original Blockchain.The function of Intelligence data secured by the Blockchain is described in Fig.4.

    Figure 4:Intelligence data secured by the blockchain

    Each block’s output from the smart contract includes a data field with newly learned information,a previous block hash,a current block,a timestamp,and a parameter.The prior hash field in the genesis block(the first block)is all zeros.Each block contains a cryptographic hash of the one before it,creating an unbreakable chain.A small change in any field can result in a different hash for the entire block.

    Our approach uses the PoA consensus methodology to ensure that each block is adequately checked and validated before being added to the distributed Blockchain.When they meet the restrictions of the target nonce,the miners keep trying to generate the random parameter.

    Once a miner has the required parameter,they can announce the block to the distributed Blockchain as a new block.Each miner’s Blockchain will be updated to include the new block,creating a shared ledger.

    Due to its append-only nature,Blockchain can only have data added to it in chronological order.This feature shows that information stored on a blockchain is nearly impossible to alter after it has been recorded.

    4 Result and Analysis

    This section used the performance of the proposed HD2C framework with cloud platform service provider,which supports many types of 1000 nodes,for evaluation.Some nodes are special-purpose vehicles,while others are complete nodes.A Linux Virtual Machine is installed on each node.Learned data privacy is assessed in a testing setting.There were five sets of tests,with the number of participants in each set corresponding to the difficulty level.To communicate with other IoT devices and offer secure signatures,every IoT device is issued a public and private key.

    This study contributes to the Edge-IIoT set,a novel,sizable,and realistic cyber security dataset of Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications,which machine learning-based intrusion detection systems can use in centralized or federated learning modes.This data set’s summary lists 52 files with 1638 distinct columns.Edge computing,cloud computing,software-defined networking,a blockchain network,fog computing,and an IoT/IIoT perception layer are the seven components.Following the preparation and analysis of the realistic cyber security dataset [31],this paper provides an introductory exploratory data analysis and assesses machine learning algorithms’performance in centralized and federated learning settings.A 16-byte ID is used to distinguish each framework-connected IoT device.The FL method is utilized for effective cognitive learning.The FL method streamlines the process by cutting down on the amount of computation and data transfer required.As a result,fewer local models are trained compared to the global model.Blockchain computations are performed on the private Ethereum platform.This vers00ion employs a Core i7-8565U CPU(1.8 GHz,1992 MHz,4 Cores,8 Logical Processors).Our proposed system’s performance was analyzed for the following characteristics[32].

    4.1 Memory Utilization

    Memory utilization is mainly determined by the amount of the fundamental information of the block,omitting transaction data,as well as the size of the transactions.To calculate Memory Utilization here,the inputs are taken as appended output blocks from the blockchain miners with different numbers of transactions per block considered.Memory usage is analyzed for three distinct block sizes(10 transactions,20 transactions,and 30 transactions).The blocks store the results of the global models.This number is then used to calculate how many transactions should be included in the block.Fig.5 shows that when the number of transactions per block increases,HD2C’s memory usage decreases.According to the experiment results,the memory requirements are mostly unaffected by the number of transactions per second.

    Accuracy:To fine-tune the magnitude of the steps taken during each iteration toward minimizing the loss function,the learning rate is a tuning parameter in optimization methods used in machine learning and statistics.To calculate accuracy,input is the data sample size to the account number of appended blocks.Additionally,the performance is assessed at three different learning rates (),namely 0.004,0.04,and 0.4.The learning rate is a tuning parameter in an optimization method that controls the size of each iterative step taken toward the minimum of a loss function in cognitive learning and statistics.As shown in Fig.6,with the increased value of the learning rate,the accuracy has been increased.Compared to thevalue of 0.004 and 0.04,thevalue of 0.4 attain good accuracy as shown Fig.6.The HD2C accuracy score is a metric that evaluates models based on how many predictions they get right out of the total number of predictions they make.As illustrated in Fig.6,good accuracy is also seen for high data sample sizes.Rapid learning results in maximum accuracy,yet the graph shows that linear learning occurs first and then becomes constant in all three instances.A similar graph is anticipated in the event of bigger data sample sizes (in the thousands).In comparison to current solutions,this also ensures excellent scalability.

    Figure 5:Memory utilization with number of appended blocks in HD2C

    Figure 6:Data sample size’s effect on HD2C accuracy over a range of learning rates

    Latency:The time elapsed between a stimulus and a response or reaction is known as latency.Shorter response times can result in faster brain processing or improved memory in cognitive methods.

    The network calculates it.

    Duration=Serialization Delay+Propagation Delay

    Delay in Propagation=Distance/Speed

    Packet Size(Bits)/Transmission Rate(bps)=Serialization Delay

    A thread,usually referred to as the execution or control thread,is a single sequential flow of operations that is carried out during a process.Now,every Operating System process can execute a thread.Here proposed system consists of four threads to access output blocks immediately.In addition,a process may include several threads.The time to produce blocks with 10,20,and 30 transactions per block utilizing two threads is shown in Fig.7.Fig.8 shows the processing time for four threads for generating blocks with 10,20,and 30 transactions per block.Fig.9 shows the amount of time it takes to run eight threads,each of which generates a block with a different number of transactions in it:10,20,and 30 more blocks are added and more transactions are processed in each block,execution time increases,but execution time per thread decreases.Fig.8 shows little execution time,which is to be expected given that our system has four cores and four threads.Using this metric,the time it takes to execute a block varies depending on its environment.Less time spent in execution thanks to instantaneous block updates in a blockchain will lead to a faster network.By doing so,the system’s ledger will be more in sync with its most recent learnings.

    Figure 7:Latency with 2 threads is compared with HD2C

    Figure 8:Latency with 4 threads is used in HD2C

    Figure 9:Latency with 8 threads is compared with HD2C

    4.2 Evaluation of Block Rate and Signal-to-Noise Ratio

    The time miners or other network validators take to verify the transactions in a block and generate a new block on a blockchain is measured in units called“blocks per second”or“block rate.”Figs.9 and 10 display the effect of varying the Signal-to-Noise ratio on the time it takes for HD2C to converge.The signal-to-noise ratio(SNR)is frequently used;a higher SNR value implies a better-quality signal.The signal-to-noise ratio is often expressed in decibels and can be computed with a logarithm of base 10.However,how Signal and noise levels are measured will determine the exact formula.

    Figure 10:Block generation rate with the convergence latency in HD2C

    For instance,if microvolts are used as the unit of measurement,the formula would be:20log10(Ps/Pn)=S/N

    The Signal is denoted by Ps,where Ps is the microvolt level and the noise by Pn.The miner’s output takes the signal strength as appended block strength with noise affected in output.As seen in Fig.10,the latency decreases as the signal-to-noise ratio rises,demonstrating that HD2C is more effective than previous techniques.

    5 Conclusion

    The blockchain-based HD2C technique has been employed to build and implement the suggested framework.This study provides a valuable foundation for enhancing the IIoT infrastructure’s performance in a complex environment.This framework is suitable for guaranteeing communication security in the future when large amounts of data are transferred in a diverse environment.FL Idea solves issues with efficiency and Privacy.FL requires less iteration to achieve the best results,whereas Blockchain safeguards the Privacy of learned information.When checking the legitimacy of a block,the PoA consensus protocol is applied.The accuracy and memory utilization evaluation results predict the system’s total benefits.The findings of this study created a brand-new IIoT framework using blockchain technology.The Blockchain PoA’s foundational cost is significant compared to other consensus algorithms.

    Acknowledgement:The author wishes to express heartfelt thanks to the methodologies that have made a substantial contribution to this research.

    Funding Statement:No funds were received for this research.

    Author Contributions:The authors confirm their contribution to the paper as follows:study conception and design;data collection:Xiangmin Guo;analysis and interpretation of results:Guangjun Liang,Xianyi Chen;draft manuscript preparation:Jiayin Liu.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:Not applicable.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产精品久久久av美女十八| 大话2 男鬼变身卡| 国产精品一区www在线观看| 国产在视频线精品| 婷婷色综合www| 美国免费a级毛片| 春色校园在线视频观看| 卡戴珊不雅视频在线播放| 午夜福利视频精品| 丝袜美足系列| 久久精品久久精品一区二区三区| 成人影院久久| 夫妻午夜视频| 国产国拍精品亚洲av在线观看| 美女国产视频在线观看| 亚洲国产精品专区欧美| 成人国产麻豆网| 一级毛片 在线播放| 国产麻豆69| 只有这里有精品99| 亚洲一区二区三区欧美精品| 亚洲av中文av极速乱| 久久99精品国语久久久| 日本与韩国留学比较| 国产黄色免费在线视频| 免费人妻精品一区二区三区视频| 国产精品成人在线| 18在线观看网站| 国产极品天堂在线| 国产一区二区在线观看日韩| 日韩av不卡免费在线播放| 看免费成人av毛片| 高清视频免费观看一区二区| 久久亚洲国产成人精品v| 在线观看免费视频网站a站| 少妇被粗大的猛进出69影院 | 精品少妇黑人巨大在线播放| 18+在线观看网站| 亚洲欧美成人精品一区二区| 久久亚洲国产成人精品v| kizo精华| 80岁老熟妇乱子伦牲交| 国产又色又爽无遮挡免| 日韩在线高清观看一区二区三区| 国产不卡av网站在线观看| 欧美人与善性xxx| 欧美日本中文国产一区发布| 色94色欧美一区二区| 国产av精品麻豆| 最近最新中文字幕大全免费视频 | 街头女战士在线观看网站| 国产极品天堂在线| 男人操女人黄网站| av福利片在线| 国产欧美日韩综合在线一区二区| 一区在线观看完整版| 国产极品粉嫩免费观看在线| 精品国产一区二区久久| 精品国产一区二区久久| 黑人高潮一二区| av一本久久久久| 亚洲国产精品一区三区| 精品少妇久久久久久888优播| 久久97久久精品| 毛片一级片免费看久久久久| 国产精品久久久久成人av| 一二三四在线观看免费中文在 | 国产乱人偷精品视频| 韩国精品一区二区三区 | 亚洲欧洲国产日韩| 色吧在线观看| 国产激情久久老熟女| 亚洲欧洲精品一区二区精品久久久 | 男女免费视频国产| 国产福利在线免费观看视频| 日产精品乱码卡一卡2卡三| 哪个播放器可以免费观看大片| 国产一区二区在线观看日韩| 亚洲成国产人片在线观看| 激情五月婷婷亚洲| 日韩成人av中文字幕在线观看| 一区二区三区乱码不卡18| a 毛片基地| 一边摸一边做爽爽视频免费| 国产无遮挡羞羞视频在线观看| 韩国精品一区二区三区 | 又大又黄又爽视频免费| 国产精品人妻久久久久久| 国产又色又爽无遮挡免| 午夜免费男女啪啪视频观看| 亚洲精品美女久久av网站| 日本免费在线观看一区| 只有这里有精品99| 亚洲欧美成人综合另类久久久| 少妇的丰满在线观看| 日韩中文字幕视频在线看片| 亚洲欧洲精品一区二区精品久久久 | 中文字幕最新亚洲高清| 午夜免费鲁丝| 美国免费a级毛片| 国产乱来视频区| 熟妇人妻不卡中文字幕| 精品一品国产午夜福利视频| 日本黄色日本黄色录像| 国产精品.久久久| 全区人妻精品视频| 男女边摸边吃奶| av免费观看日本| 国产精品国产三级国产av玫瑰| 国产亚洲午夜精品一区二区久久| 啦啦啦中文免费视频观看日本| 亚洲欧美清纯卡通| 国产乱来视频区| 丁香六月天网| 久久这里有精品视频免费| 久久鲁丝午夜福利片| 午夜福利在线观看免费完整高清在| 精品人妻偷拍中文字幕| 国产麻豆69| 国产精品欧美亚洲77777| 日日摸夜夜添夜夜爱| 色婷婷久久久亚洲欧美| 如何舔出高潮| 国产高清三级在线| 国产在线视频一区二区| 母亲3免费完整高清在线观看 | 成年av动漫网址| 男女午夜视频在线观看 | 国产男人的电影天堂91| 人人澡人人妻人| 亚洲av免费高清在线观看| 久久精品久久久久久久性| 免费黄频网站在线观看国产| 亚洲精华国产精华液的使用体验| 亚洲成人av在线免费| 91午夜精品亚洲一区二区三区| 日本wwww免费看| 91久久精品国产一区二区三区| 久久 成人 亚洲| 狂野欧美激情性bbbbbb| 免费黄网站久久成人精品| 久久精品aⅴ一区二区三区四区 | 九九爱精品视频在线观看| av视频免费观看在线观看| 国产一区二区三区综合在线观看 | www日本在线高清视频| 另类精品久久| 夜夜爽夜夜爽视频| 看免费成人av毛片| 永久网站在线| 国产精品秋霞免费鲁丝片| 欧美性感艳星| 在线 av 中文字幕| 乱人伦中国视频| 成人午夜精彩视频在线观看| 精品国产露脸久久av麻豆| 91aial.com中文字幕在线观看| 五月玫瑰六月丁香| 亚洲精品久久午夜乱码| 午夜激情av网站| av线在线观看网站| 精品人妻熟女毛片av久久网站| 国产高清不卡午夜福利| 一区二区三区精品91| 2018国产大陆天天弄谢| 美女内射精品一级片tv| 久久人人爽人人片av| 老女人水多毛片| 亚洲国产日韩一区二区| 免费观看av网站的网址| 欧美人与性动交α欧美精品济南到 | av在线老鸭窝| 97超碰精品成人国产| 亚洲欧美精品自产自拍| 99热国产这里只有精品6| av天堂久久9| 侵犯人妻中文字幕一二三四区| 在线观看一区二区三区激情| 色5月婷婷丁香| 肉色欧美久久久久久久蜜桃| 精品国产乱码久久久久久小说| 精品一区在线观看国产| 亚洲av免费高清在线观看| 成年av动漫网址| 18禁国产床啪视频网站| 国产成人精品久久久久久| 婷婷色综合大香蕉| www.熟女人妻精品国产 | 免费高清在线观看日韩| 国产精品成人在线| 97在线视频观看| 成年人午夜在线观看视频| 亚洲国产精品国产精品| av片东京热男人的天堂| 狂野欧美激情性xxxx在线观看| 日韩免费高清中文字幕av| 国产 精品1| av在线app专区| 90打野战视频偷拍视频| 观看av在线不卡| 一级毛片电影观看| 国产亚洲精品久久久com| 久久精品国产鲁丝片午夜精品| 久久久久精品人妻al黑| 这个男人来自地球电影免费观看 | 欧美精品高潮呻吟av久久| 亚洲精品美女久久久久99蜜臀 | 天天操日日干夜夜撸| 免费在线观看黄色视频的| 激情五月婷婷亚洲| 午夜福利影视在线免费观看| 亚洲精品国产av蜜桃| 国产不卡av网站在线观看| 男女下面插进去视频免费观看 | 亚洲美女搞黄在线观看| 看免费成人av毛片| 欧美人与性动交α欧美精品济南到 | 国产69精品久久久久777片| 性高湖久久久久久久久免费观看| 国产免费一级a男人的天堂| 老司机影院毛片| 国产高清国产精品国产三级| 亚洲国产精品一区三区| 在线 av 中文字幕| 亚洲国产毛片av蜜桃av| 熟女电影av网| 免费在线观看黄色视频的| 中国国产av一级| 黄色视频在线播放观看不卡| 少妇精品久久久久久久| 黑丝袜美女国产一区| 一区二区av电影网| 卡戴珊不雅视频在线播放| 另类精品久久| 欧美激情 高清一区二区三区| 天天躁夜夜躁狠狠久久av| 一区二区av电影网| 热re99久久国产66热| 如何舔出高潮| 99re6热这里在线精品视频| 亚洲av中文av极速乱| 国产成人精品婷婷| 亚洲国产最新在线播放| 韩国精品一区二区三区 | 国产国拍精品亚洲av在线观看| 精品卡一卡二卡四卡免费| 久热久热在线精品观看| 高清视频免费观看一区二区| 国产精品 国内视频| 国产亚洲午夜精品一区二区久久| 老司机影院成人| 国产精品麻豆人妻色哟哟久久| 亚洲人成77777在线视频| 亚洲欧美成人综合另类久久久| 卡戴珊不雅视频在线播放| 久久久久久久国产电影| 国产在线视频一区二区| 亚洲色图 男人天堂 中文字幕 | 少妇 在线观看| 久久婷婷青草| 男女免费视频国产| 国产成人免费观看mmmm| 午夜91福利影院| 高清在线视频一区二区三区| 黄色一级大片看看| 午夜av观看不卡| 制服人妻中文乱码| 国产精品国产三级国产专区5o| 久久婷婷青草| 纵有疾风起免费观看全集完整版| 中文精品一卡2卡3卡4更新| 又黄又粗又硬又大视频| 亚洲国产精品国产精品| 免费大片黄手机在线观看| 国产精品一国产av| 青青草视频在线视频观看| 国产精品国产三级国产专区5o| 人妻一区二区av| 国产 一区精品| 青春草亚洲视频在线观看| 少妇熟女欧美另类| 在线观看免费视频网站a站| 国产av码专区亚洲av| 一本色道久久久久久精品综合| 久久精品久久精品一区二区三区| 成人二区视频| 国产成人一区二区在线| 国产黄频视频在线观看| 精品第一国产精品| 天堂俺去俺来也www色官网| 久久精品国产亚洲av涩爱| 欧美精品一区二区免费开放| 久久影院123| 久久久精品区二区三区| 亚洲,欧美精品.| 只有这里有精品99| 国产日韩一区二区三区精品不卡| 国产成人aa在线观看| 在线观看免费视频网站a站| 亚洲av日韩在线播放| 又粗又硬又长又爽又黄的视频| 2021少妇久久久久久久久久久| 国产又爽黄色视频| 中文天堂在线官网| 多毛熟女@视频| 一边摸一边做爽爽视频免费| 精品一区二区三卡| 女人久久www免费人成看片| 精品一区二区三区四区五区乱码 | 国产片内射在线| 亚洲四区av| 精品国产一区二区三区四区第35| 亚洲国产精品一区二区三区在线| 18禁裸乳无遮挡动漫免费视频| 最后的刺客免费高清国语| 国产亚洲精品第一综合不卡 | 春色校园在线视频观看| 日日啪夜夜爽| 国产av精品麻豆| 亚洲av.av天堂| 中文乱码字字幕精品一区二区三区| 欧美变态另类bdsm刘玥| 亚洲精品久久久久久婷婷小说| 中国国产av一级| 欧美亚洲日本最大视频资源| 精品少妇黑人巨大在线播放| 五月伊人婷婷丁香| 美女内射精品一级片tv| 在线观看人妻少妇| 男女免费视频国产| 男女高潮啪啪啪动态图| 久热久热在线精品观看| 99视频精品全部免费 在线| 精品一区二区三区四区五区乱码 | 国产精品免费大片| 亚洲av综合色区一区| 日韩熟女老妇一区二区性免费视频| 色吧在线观看| 日韩 亚洲 欧美在线| 中国美白少妇内射xxxbb| 黄片无遮挡物在线观看| 日日爽夜夜爽网站| 男女午夜视频在线观看 | 国内精品宾馆在线| 日韩精品免费视频一区二区三区 | 国产亚洲午夜精品一区二区久久| 久久久精品区二区三区| 人人妻人人澡人人爽人人夜夜| 99久久中文字幕三级久久日本| 秋霞在线观看毛片| 大香蕉久久网| 免费不卡的大黄色大毛片视频在线观看| 免费日韩欧美在线观看| 午夜免费观看性视频| 国产 一区精品| 日韩欧美精品免费久久| 亚洲丝袜综合中文字幕| 久久精品国产自在天天线| 大香蕉97超碰在线| 国产精品国产av在线观看| 国产国语露脸激情在线看| 免费日韩欧美在线观看| 午夜福利,免费看| 久久久久精品久久久久真实原创| 热99国产精品久久久久久7| 久久久欧美国产精品| 成人黄色视频免费在线看| 王馨瑶露胸无遮挡在线观看| 久久狼人影院| 街头女战士在线观看网站| 精品国产国语对白av| 国产又爽黄色视频| 国产精品偷伦视频观看了| 午夜91福利影院| 一区二区日韩欧美中文字幕 | 国精品久久久久久国模美| 国产又爽黄色视频| 观看av在线不卡| 国语对白做爰xxxⅹ性视频网站| 国产精品国产av在线观看| 菩萨蛮人人尽说江南好唐韦庄| 9热在线视频观看99| 国产一区二区三区综合在线观看 | 亚洲第一av免费看| av播播在线观看一区| 午夜福利视频精品| 免费少妇av软件| 国产黄频视频在线观看| 咕卡用的链子| 中国美白少妇内射xxxbb| 国产一区二区在线观看av| 国产精品99久久99久久久不卡 | 美女内射精品一级片tv| 午夜视频国产福利| 日本wwww免费看| 97精品久久久久久久久久精品| 大香蕉久久网| 国国产精品蜜臀av免费| 欧美日韩亚洲高清精品| 天堂中文最新版在线下载| 成人18禁高潮啪啪吃奶动态图| 久久精品国产a三级三级三级| 精品人妻偷拍中文字幕| 中文字幕av电影在线播放| 美女中出高潮动态图| av福利片在线| 人妻少妇偷人精品九色| 成人亚洲精品一区在线观看| 青春草亚洲视频在线观看| 高清在线视频一区二区三区| 亚洲精品乱码久久久久久按摩| 9191精品国产免费久久| 亚洲人成网站在线观看播放| 成人国产麻豆网| 下体分泌物呈黄色| 国产精品.久久久| 久久ye,这里只有精品| 乱码一卡2卡4卡精品| 超色免费av| 99久久精品国产国产毛片| 欧美+日韩+精品| 欧美精品国产亚洲| 亚洲国产欧美日韩在线播放| 边亲边吃奶的免费视频| 亚洲 欧美一区二区三区| 国产成人精品一,二区| av福利片在线| 在线免费观看不下载黄p国产| 99国产综合亚洲精品| 久久精品久久精品一区二区三区| 一级爰片在线观看| 中文字幕人妻熟女乱码| 午夜激情av网站| 久久精品人人爽人人爽视色| 一级毛片电影观看| 亚洲av在线观看美女高潮| 欧美亚洲 丝袜 人妻 在线| 亚洲欧美清纯卡通| 成年人免费黄色播放视频| 丰满乱子伦码专区| 新久久久久国产一级毛片| av在线观看视频网站免费| 最近手机中文字幕大全| 色5月婷婷丁香| 18禁裸乳无遮挡动漫免费视频| 丁香六月天网| 又大又黄又爽视频免费| 麻豆精品久久久久久蜜桃| 人体艺术视频欧美日本| 国产成人av激情在线播放| 夜夜爽夜夜爽视频| 久久久久精品久久久久真实原创| 最近的中文字幕免费完整| 国产av码专区亚洲av| xxxhd国产人妻xxx| 成人午夜精彩视频在线观看| 亚洲美女视频黄频| 国产精品一二三区在线看| 免费女性裸体啪啪无遮挡网站| 欧美日韩视频高清一区二区三区二| 少妇精品久久久久久久| 少妇人妻久久综合中文| 青春草亚洲视频在线观看| 一级爰片在线观看| 国产极品粉嫩免费观看在线| 亚洲精品第二区| 男女免费视频国产| 久久韩国三级中文字幕| 亚洲性久久影院| 黑人猛操日本美女一级片| 十八禁高潮呻吟视频| 香蕉国产在线看| 亚洲五月色婷婷综合| 成人毛片60女人毛片免费| 在线观看免费高清a一片| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 国产成人一区二区在线| 免费不卡的大黄色大毛片视频在线观看| 亚洲精品456在线播放app| 天堂中文最新版在线下载| 99九九在线精品视频| 久久精品国产亚洲av涩爱| 久久午夜综合久久蜜桃| 欧美变态另类bdsm刘玥| 国产国拍精品亚洲av在线观看| 99久久人妻综合| 五月伊人婷婷丁香| 国产日韩欧美视频二区| 边亲边吃奶的免费视频| 国产精品久久久久成人av| av有码第一页| 黄片播放在线免费| 久热这里只有精品99| 自拍欧美九色日韩亚洲蝌蚪91| 国产亚洲精品第一综合不卡 | 成人二区视频| 亚洲精品视频女| 欧美日韩av久久| 高清黄色对白视频在线免费看| 美国免费a级毛片| 亚洲人成77777在线视频| 一二三四中文在线观看免费高清| 色5月婷婷丁香| 男女国产视频网站| 成人综合一区亚洲| 日韩中文字幕视频在线看片| 亚洲av在线观看美女高潮| 国产欧美日韩综合在线一区二区| 国产69精品久久久久777片| 视频在线观看一区二区三区| 国产精品久久久久久精品电影小说| 精品熟女少妇av免费看| 咕卡用的链子| 大陆偷拍与自拍| av在线播放精品| 在线精品无人区一区二区三| av天堂久久9| 国产不卡av网站在线观看| 多毛熟女@视频| 精品视频人人做人人爽| 中文精品一卡2卡3卡4更新| 午夜影院在线不卡| 亚洲综合色惰| 亚洲精品一区蜜桃| 免费播放大片免费观看视频在线观看| 韩国高清视频一区二区三区| 亚洲精品久久久久久婷婷小说| 亚洲欧美日韩另类电影网站| 精品人妻偷拍中文字幕| 久久久久网色| 亚洲av日韩在线播放| 大香蕉97超碰在线| 欧美xxⅹ黑人| 色婷婷久久久亚洲欧美| 在线看a的网站| 亚洲国产色片| 亚洲一码二码三码区别大吗| 亚洲精品日本国产第一区| 日本-黄色视频高清免费观看| 一本大道久久a久久精品| 全区人妻精品视频| 午夜福利影视在线免费观看| 九九在线视频观看精品| 最后的刺客免费高清国语| 人体艺术视频欧美日本| 午夜老司机福利剧场| 亚洲成人av在线免费| 美国免费a级毛片| 香蕉丝袜av| 国内精品宾馆在线| 纵有疾风起免费观看全集完整版| 国产精品嫩草影院av在线观看| 男女免费视频国产| 中文乱码字字幕精品一区二区三区| 午夜福利网站1000一区二区三区| 五月天丁香电影| 男的添女的下面高潮视频| a 毛片基地| 亚洲av中文av极速乱| 三级国产精品片| 欧美亚洲 丝袜 人妻 在线| 天堂俺去俺来也www色官网| 街头女战士在线观看网站| 欧美成人精品欧美一级黄| 国产欧美日韩综合在线一区二区| 九九爱精品视频在线观看| 菩萨蛮人人尽说江南好唐韦庄| 久久精品国产鲁丝片午夜精品| 亚洲国产av新网站| 精品亚洲乱码少妇综合久久| 我的女老师完整版在线观看| 极品少妇高潮喷水抽搐| 国产精品国产三级国产av玫瑰| tube8黄色片| 一本色道久久久久久精品综合| 国产精品久久久av美女十八| 一级片'在线观看视频| 亚洲人成网站在线观看播放| 国产精品女同一区二区软件| 黄色配什么色好看| 精品国产国语对白av| av.在线天堂| 9热在线视频观看99| 精品人妻偷拍中文字幕| 欧美成人午夜精品| 久久精品国产自在天天线| 亚洲av在线观看美女高潮| 色吧在线观看| 国产xxxxx性猛交| 黑人猛操日本美女一级片| 中国美白少妇内射xxxbb| 综合色丁香网| 成人亚洲精品一区在线观看| 精品卡一卡二卡四卡免费| 国产精品久久久久久久电影| 日韩免费高清中文字幕av| 寂寞人妻少妇视频99o| 9热在线视频观看99| 2022亚洲国产成人精品| 欧美 日韩 精品 国产| 人人妻人人澡人人看| 国产色爽女视频免费观看| 在线观看三级黄色| 欧美变态另类bdsm刘玥| 欧美性感艳星| 免费人成在线观看视频色| 亚洲精品乱码久久久久久按摩| 99热全是精品| 哪个播放器可以免费观看大片| 九九爱精品视频在线观看| 十分钟在线观看高清视频www| 国产免费又黄又爽又色| 黑人猛操日本美女一级片| 欧美+日韩+精品| 欧美日韩国产mv在线观看视频|