• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    EduASAC:A Blockchain-Based Education Archive Sharing and Access Control System

    2024-01-12 03:46:54RongleiHuChuceHeYapingChiXiaoyiDuanXiaohongFanPingXuandWenbinGao
    Computers Materials&Continua 2023年12期

    Ronglei Hu ,Chuce He ,Yaping Chi ,Xiaoyi Duan ,Xiaohong Fan ,Ping Xu and Wenbin Gao,?

    1Department of Electronics and Communication Engineering,Beijing Electronic Science and Technology Institute,Beijing,100070,China

    2Department of Cyberspace Security,Beijing Electronic Science and Technology Institute,Beijing,100070,China

    ABSTRACT In the education archive sharing system,when performing homomorphic ciphertext retrieval on the storage server,there are problems such as low security of shared data,confusing parameter management,and weak access control.This paper proposes an Education Archives Sharing and Access Control (EduASAC) system to solve these problems.The system research goal is to realize the sharing of security parameters,the execution of access control,and the recording of system behaviors based on the blockchain network,ensuring the legitimacy of shared membership and the security of education archives.At the same time,the system can be combined with most homomorphic ciphertext retrieval schemes running on the storage server,making the homomorphic ciphertext retrieval mechanism controllable.This paper focuses on the blockchain access control framework and specifically designs smart contracts that conform to the business logic of the EduASAC system.The former adopts a dual-mode access control mechanism combining Discretionary Access Control(DAC)and Mandatory Access Control(MAC)and improves the tagging mode after user permission verification based on the Authentication and Authorization for Constrained Environments(ACE)authorization framework of Open Authorization(OAuth)2.0;the latter is used in the system to vote on nodes to join requests,define access control policies,execute permission verification processes,store,and share system parameters,and standardize the behavior of member nodes.Finally,the EduASAC system realizes the encryption,storage,retrieval,sharing,and access control processes of education archives.To verify the performance of the system,simulation experiments were conducted.The results show that the EduASAC system can meet the high security needs of education archive sharing and ensure the system’s high throughput,low latency,fast decision-making,and fine-grained access control ability.

    KEYWORDS Blockchain;data security;access control;smart contract

    1 Introduction

    With the rapid improvement of social education,many multidisciplinary and multi-form education archives have been generated involving students,educational institutions,enterprises,government departments,and other stakeholders.At the same time,data breaches occur frequently in the education field,and attack methods are increasing day by day.In January 2022,Illuminate Education,an online scoring and attendance system,was attacked,and hackers gained access to the personal database of approximately 820,000 New York City public school students.In May of the same year,a large-scale data breach occurred in Chicago Public Schools in the United States,and the data of nearly 500,000 students and 60,000 employees were leaked.Therefore,the needs of organizations and institutions for the authority,security,and comprehensiveness of education archives have increased,and the confidentiality,completeness,authenticity,and availability of educational archive-sharing systems have been improved[1].In particular,new privacy regulations(such as the California Privacy Rights Act (CPRA) implemented in California,USA on July 01,2023) impose stricter privacy protection obligations on organizations.The high-requirement education archive-sharing system is designed to store education archives in the ciphertext state in the storage server and control the access of users who request data.After the user access permission is approved,the storage server runs the ciphertext retrieval mechanism,thus completing the process of searching and sharing the target data in the database.

    In the research work,this storage server used for data storage,ciphertext retrieval,and access control is generally designed as a third-party storage service provider.It has the advantages of large storage capacity,low cost,multi-functionality,and easy sharing.Still,as a third party of interest,it may raise problems such as low user trust,high user privacy risk,and less user control over data.The homomorphic ciphertext retrieval mechanism running on the storage server has a high algorithm,key,encrypted data security,and retrieval efficiency.Still,it has problems such as extensive computation,complex parameter sharing,and retrieval access control.The centralized access control mechanism running on storage servers can deny unauthorized access requests from illegal users and overstepped access requests from legitimate users to ensure controlled and legitimate use of system resources.Still,it has problems such as centralized power,single point of failure,high operating costs,third-party service trust,low scalability,etc.It cannot be used in application scenarios with decentralized equipment,multi-party management,and multiple power assignments[2,3].

    This paper adopts a blockchain network with distributed,non-tamperable,public,and traceable features to run the access control mechanism to solve the abovementioned problems and challenges.It can provide a retrieval permission verification service for the homomorphic ciphertext retrieval mechanism on the storage server.It finally realizes a blockchain-based education archive sharing and access control system,EduASAC.The system scheme includes access control policies and an education archive-sharing framework and realizes data encryption,storage,retrieval,sharing,and access control processes in modules.The blockchain can realize voting node joining requests,algorithm parameter sharing,access policy storage,access permission verification,and record system behavior,which is a verifiable and unchangeable ledger.The storage server is responsible for storing big data education archives and running homomorphic ciphertext retrieval mechanisms.The smart contract on the chain automatically executes the behaviors,functions,and strategies that have reached consensus,responds to member nodes’join requests or access data requests,and ensures the consistency of network-wide behavior under non-manual intervention.

    The significance and value of this paper are that the designed system framework can be combined with most of the proposed retrieval schemes in the homomorphic cryptographic retrieval research field and has universal applicability.We adopt blockchain technology to realize distributed access control,including the fusion of multiple access control models and the innovation of an access authorization framework.We use smart contracts to modularize and automate the system workflow,reducing errors’impact,improving operational efficiency,and reducing system costs.The system is applied to the field of education to ensure confidentiality,integrity,controllability,availability,and non-repudiation in the process of sharing education archives,which provides new solutions and ideas for various problems faced by the research work of educational systems.The main contributions of the article can be summarized as follows:

    1) The EduASAC system adopts a dual-mode access control mechanism combining DAC and MAC models.It improves the access authorization framework based on the ACE authorization framework of OAuth 2.0.The system can be combined with most homomorphic ciphertext retrieval schemes to provide retrieval permission verification,retrieval parameter sharing,retrieval process records,and other services for homomorphic ciphertext retrieval mechanisms.This article details the architecture,parameters,workflow,access control,and homomorphic ciphertext retrieval modules of the EduASAC.It can encrypt,store,retrieve,share,and access education archives among educational institutions and record system parameters and user behavior in a way that prevents tampering.

    2) Four smart contracts,Vote Contract,Mapping Contract,Control List Contract,and Access Control Contract are designed to automate the process of secure sharing and access control of education archives.In the scheme,joining new member nodes requires the whole network to call Vote Contract to vote,and then the vote count,result return,and record on the chain are completed through contract automation.The management of system security parameters is executed through Mapping Contract,and a variety of parameter mappings are formed and stored on the chain.Users call Control List Contract to dynamically set up Access Control List (ACL) for education archives,including adding,deleting,updating,and querying table items.The access control scheme is written into the Access Control Contract to verify permission when users request data,and the system behavior logs are recorded on the chain.

    3) The theoretical analysis and experiments tested the EduASAC system.The specific work includes analyzing and comparing the system’s security and performance,testing the efficiency of four smart contracts on the chain,and simulating the system’s data sharing and user access control process to test the system’s operational efficiency.The experimental results show that the EduASAC system has a short running time,low cost,and high application value.

    The rest of this paper is organized as follows.In Section 2,we introduce the relevant work of this paper.In Section 3,we present the system architecture,system parameters,and workflow of EduASAC,and we detail the access control module and homomorphic ciphertext retrieval module.Section 4 introduces the design of four smart contracts in detail.In Section 5,we theoretically analyze the system’s security and performance,test the EduASAC system’s operation efficiency in the sharing and access control process of education archives,and analyze the experimental results.Section 6 concludes the paper and looks forward to future research work.

    2 Related Works

    This section outlines the research on blockchain application in education,focusing on innovative research on access control schemes running on different blockchain system frameworks.The advantages of blockchain technology in education are becoming increasingly prominent[4–6].These applications include (1) ensuring the integrity and traceability of educational information on the chain [7],(2) student degree management and summative assessment of learning outcomes [8],(3)management,dissemination,and documentation of learning resources [9],(4) peer-to-peer,secure interaction and sharing of relevant people[10],(6)and decentralized control of a distributed digital ledger[11].These advantages motivate the following summary of related research.

    Literature [7] proposed an education record storage and sharing scheme EduRSS on the blockchain architecture,in which the storage server ciphertext stores the original education records and the blockchain records Hash to ensure the security and reliability of the education record storage and sharing process.The scheme design smart contract standardizes the storage and sharing behavior between nodes,and introduces cryptographic technology to encrypt and sign data.In the literature[10],a practical architecture for student certificate sharing was proposed on the underlying technology of the blockchain,using an off-chain storage mechanism and a novel privacy protection mechanism to ensure shared data security,user identity privacy,and system scalability.Finally,develop a Decentralized Application (DApp) based on Ethereum for testing.In the literature [12],a system CredenceLedger that uses blockchain to store certificate Hash was designed,which can be used to protect,share and verify student certificates.Literature [13] designed a lifelong learning log for students that can be recorded on the blockchain.That is,verifiable proof of all learning activities is recorded on the chain,which can verify the authenticity of the log and evaluate student achievement,employment options,and intelligence.In the literature [14],a blockchain-based academic degree traceability authentication system was designed,and smart contracts were used to realize the functions of data collaborative storage,user access control,and degree determination to ensure the safe and efficient operation of the system.

    The above summarizes some system research work that uses the blockchain as the underlying technical architecture to serve the upper education platform.Among these works,the research on implementing access control to educational information is one of the key points which can allow or restrict users’access to education archives and improve the security of shared data.Unfortunately,the results of the survey show that there is little research work on educational systems based on blockchain networks operating access control mechanisms,and this model is mainly applied in healthcare[15],the Internet of Things[16],the Internet of Vehicles[17],and other fields.

    The literature [18] was specifically designed for Internet of Things (IoT) data traffic,using blockchain technology for distributed access control,sensor data management,and auditable logging to support secure sharing and fine-grained access control of data-by-data owners.The literature[19]designs a distributed trusted access control system for IoT,which is centered on three smart contracts,namely Access Control Contract (ACC),Judgment Contract (JC),and Registration Contract (RC),and finally implemented based on the Ethernet smart contract platform.In the literature [20],IoTChain,designed based on the Object Security Architecture for the Internet of Things(OSCAR)object security model and the ACE authorization framework [21],was proposed to provide an End to End(E2E)solution for secure authorized access to IoT resources.In the literature[22],a medical application framework based on blockchain,and a cloud database solved the problem of storing and sharing big medical data in a trustless environment.The literature[23]used encryption and signature techniques to control user access to shared data pools.It used permission blockchain to ensure the security of electronic medical records,user identity legality,and traceability of behavior logs.The literature [24] proposed a cloud storage framework with fine-grained access control capability by combining Ethernet with Ciphertext-Policy Attribute-Based Encryption(CP-ABE).The data owner can set properties and access validity periods for users and invoke smart contracts to realize on-chain data storage and tracking.In the literature [25],based on the Hyperledger Fabric framework and smart contract,Attribute Based Access Control(ABAC)and decentralized,fine-grained,and dynamic access control management were implemented that can be applied to large-scale IoT environments.

    The above research shows that blockchain-based access control research focuses on different system frameworks,can meet business needs in various fields,and has different research characteristics,application advantages,and realization value.The core of the research work in this paper is the framework design of a blockchain-based access control system,which is the first to serve a homomorphic ciphertext retrieval mechanism and provide retrieval permission verification service for storage servers running a homomorphic ciphertext retrieval mechanism.Therefore,the designed access control scheme is antecedence,innovation,and universality.Meanwhile,the data sharing scheme designed can solve the problems of third-party service distrust,data source uncertainty,data legitimacy,data access control,user identity privacy,as well as log integrity recording,and illegal behavior pursuit when running homomorphic ciphertext retrieval mechanisms on storage servers.In addition,the system application fully considers the user needs in the field of education,the data characteristics,and security features of education archives,so that the blockchain system has both data security sharing and access control capabilities.

    3 System Model and Design

    In this section,the architecture,threat model,parameters,workflow,and core functional modules of the EduASAC system are outlined in detail,which can ensure the security of educational archives and the privacy of user identities and perform efficient access control management on data.

    3.1 System Architecture

    The EduASAC system architecture is shown in Fig.1,which mainly includes four major entities:government,educational institutions,storage servers,and blockchain.

    Figure 1:System architecture

    1)Educational Institution:Educational institutions refer to schools,training institutions,educational enterprises,and other organizational units involved in student education.As the largest subject in the EduASAC system,each educational institution has a lifetime-bound account on the blockchain,where keys and identity information are stored.The identity information of the new educational institution is verified by the member nodes of the whole network and then joins the network after voting.Educational institutions can carry out the process of uploading,retrieving,and downloading education archives;set access rights to education archives to define the scope of data sharing;and request access tokens for target education archives.

    2) Storage Server:As another main body in the EduASAC system,the storage server can provide educational institutions with services such as cryptographic storage of education archives,homomorphic cryptographic retrieval,and source data download.It can verify the identity legality of the data requestor and the authenticity of the access token on the chain and run the homomorphic ciphertext retrieval mechanism in the database after verification is passed.

    3)Government:The only authoritative entity in the field of education,with the force of law and administrative capacity.The government can be divided into three major departments:management,secrecy,and supervision.Different departments have different identities,different participation links,and different roles in the system.The following describes separately:

    ?Management Department:responsible for the off-chain verification of the identity information of the nodes requesting to join;able to assign the static access permission level of the system based on the identity information;publish the verified identity information and level on the chain,and initiate Vote Contract to count the opinions of the whole network on the new nodes joining the network;record all registration behaviors and voting results on the chain.

    ?Secrecy Department:responsible for re-encryption work of ciphertext data to ensure the security of the key.

    ?Supervision Department:for illegal member nodes,illegal system behavior,and illegal data sharing.Review,determine responsibility and punish illegal targets,and maintain the security and stability of the system.

    4)Blockchain:blockchain is the underlying technical architecture of the system and is responsible for promoting the network-wide voting process,verifying entity identity information,sharing system security parameters,enforcing data access control,and recording system behavior and data.The on-chain nodes are responsible for constructing new transactions from the uploaded,shared data,packaging them into blocks after verification,and recording all behaviors and data of the system as evidence of future review and accountability by the Supervision Department.

    In addition to the system architecture briefly described above,to simplify the description of the scheme,this paper divides the system participants into two identity entities,i.e.,Data Owners(DO)and Data Users(DU):

    ? DO: It has the authority to manage,control,and share education records,is the owner of interests related to the data,and can set data access permission to control the scope of sharing.

    ? DU:It requests targeted education archives from multiple parties according to individual needs and uses the data in various application scenarios.

    3.2 Threat Model and Goals

    The threat model of the EduASAC system is divided into three levels:

    ?Data threat level:The data threat level defines that the attacker performs some illegal operations on the data without the data owner’s knowledge or against the data owner’s will,thereby endangering the privacy of the user’s identity and the value of the data.

    ?Entity identity threat level:The entity identity threat level defines that attackers join the network with illegal identities or pretend to be legal identities and bring security threats to other legitimate users.

    ?System behavior threat level:The system behavior threat level defines the system or system entity,due to its own economic interests or software and hardware failures,does not operate following pre-consensus rules and terms,which affects the stability of the system operation.

    This paper aims to achieve the following threat model goals:

    ? The public key encryption algorithm is used to encrypt the data,and the private key is stored confidentially to ensure the security of the encrypted data;some sensitive data are stored on the chain,relying on the anti-tampering feature of the blockchain to ensure the integrity of the data.

    ? The authoritative entity verifies the identity information off-chain,and allows new users to join by voting to ensure the fairness and openness of entity identity information;the smart contract automatically executes the process of storing entity identity information on the chain,ensuring that there is no manual intervention so that the entire network can query that identity information.

    ? Record all system behaviors through smart contracts to ensure that system behaviors are auditable and traceable;the authoritative entity determines the system behavior threat level based on high-reliability records on the chain.

    3.3 Access Control Model

    As a core module of the system architecture,access control is based on improving the ACE authorization framework,DAC,and MAC model,with enhanced security and availability as research objectives.

    Internet Engineering Task Force(IETF)ACE[21]proposes a generic framework for authentication and authorization in restricted environments-an ACE based on OAuth 2.0[26].DO do not have the ability to control access by themselves and need to issue tokens through third-party authorization servers to control access to sensitive,protected resources.To securely distribute Tokens with access control capabilities must establish a secure channel between users and authorization servers to encrypt data and verify the identity or use technologies such as certificates and secret sharing.At the same time,the third-party authorization server that performs access control according to the user’s wishes must be honest and trustworthy to ensure the authority and authenticity of the Token.These problems make the application of the ACE framework subject to multiple environmental constraints,with low security and availability.The research work in this paper uses blockchain instead of a third-party authorization server in the ACE framework,and smart contracts are responsible for generating access Tokens and storing them securely on the chain for other users to query and verify.

    DAC means that the data owner can autonomously grant or withdraw access permissions for the object requesting access to the data.The research work in this paper uses an ACL to add,change,and delete user access permissions dynamically.It combines with MAC to improve access control management’s flexibility,reduce access control mechanisms’operating costs,and make the system scheme more robust and available.

    MAC is a mandatory security attribute setting rules for all subjects,where the system decides whether the user can access according to the user’s fixed security attributes.The research work in this paper adopts static permission levels as the fixed security attributes.They are collectively referred to as Static Access Control (SAC) below for ease of description.It can make up for the decentralized permission control ability of ACL.Because the system forcibly sets the static authority level,it has unchangeable and strong control characteristics and improves user permissions’security.

    3.4 System Parameter

    In this subsection,we define the designed system security parameters.The parameters include four Identity Documents (ID) of Data Owner(IDDO),Data User(IDDU),Data(IDdata),and Access Token(IDtoken),two access control policies(P)of SAC and ACL,three mappings(M)of Verification Parameter Mapping(MV),Retrieval Parameter Mapping(MR),and Encryption Parameter Mapping(ME),four smart contracts of Vote Contract,Mapping Contract,Access Control Contract,and Control List Contract,three attributes of User,Data,and T with the access token(Token).The used symbols are described in Table 1.The above system parameters are defined as follows:

    Table 1:Symbol descriptions

    3.5 Workflow

    As shown in Fig.2,the entire workflow of the system is divided into four parts.This section will detail the specific steps of each part,and the symbols are shown in Table 1.

    1) Register

    When an educational institution joins the network,it sends a registration application to the government.As the guide node,the Government Management Department verifies the identity information of the node off-chain and publishes it on the chain,and then initiates a Vote Contract to vote for the joining request of the new node by the nodes of the whole network.

    Step 1 When an educational institution applies to enter the EduASAC system,it will send Info to the government off-chain,including the institution’s name,type,number,and relevant identity certificates.The Government Management Department is responsible for verifying the authenticity of the Info.

    Figure 2:Workflow of EduASAC system

    Step 2 After the Government Management Department approves,the static node access level SInfois allocated according to Info.Pack{Info,S}into Message,forming a transaction and publishing it on the chain.

    Step 3 The Government Management Department calls Vote Contract to initiate an on-chain vote.The nodes of the entire network participate in the voting within the voting period,and the contract automatically counts the number of votes.If the consent vote exceeds 90%of the total votes,the contract returns the Yes result and allows the new node to join;otherwise,it returns the Refuse result and rejects the new node.

    Step 4 Vote Contract will record the results on the chain after the voting is completed,providing valid evidence for the follow-up work such as review and accountability.Details are shown in Table 2.

    Table 2:Voting result record

    Step 5 When a new educational institution joins the EduASAC system,it will act as a blockchain member node.Certificate Authority(CA)creates a certificate for it,generates a public key(PK)and secret key(SK),and deposits them in the wallet.PK is published to the public as a blockchain address,a unique identifier on the chain of educational institutions to participate in or link to the blockchain network.SK is secretly stored for transaction signatures or decryption of secret data.

    2) Data Management

    DO first processes the data with various algorithmic mechanisms for the education archives that must be uploaded to the storage server,generating parameters that participate in the sharing and access control process.Then DO invokes the Mapping Contract to establish three parameter mappings and store them securely on the chain for easy calling by other system entities when performing arithmetic operations on the data.

    Step 1 DO generate parameters or keys EP,RP and VP off-chain applying them to homomorphic encryption,ciphertext retrieval,and access control processes,respectively.The VP settings are shown in Table 3.

    Table 3:VP settings

    Step 2 DO extract n(n ≥1)keywordsK1,K2,K3,···,Knfrom the education archive and set static access permission level Sdatafor the education archive.

    Step 3 DO homomorphically encrypts the education archive with EP and sends it to the storage server;homomorphically encrypts the keywords with the same EP;encrypts the EP with PK of the Government Secrecy Department to get C(EP);for the ciphertext keyword list and RP,encrypt them with PK of the storage server to form C(RK).This step is the data processing process,the algorithmic process runs off-chain,and the computing process can be changed according to the system scheme design.

    Step 4 DO invokes Mapping Contract to establish ME,MR,and MV and stores the three mapping on the chain.Different mappings will be used in different system entities and steps,effectively reducing the correlation between algorithm parameters and keys and facilitating system management and sharing.

    3) Access Control

    The access control process of the EduASAC contains SAC,ACL,or other access control mechanisms to realize DO fine-grained access control education archives.

    Step 1 DO calls Control List Contract as needed to set data access permissions on the chain.The process will be matched to the VP values,as shown in Table 2.

    ? SAC:the Sdataof the data has been set when DO creates the MV of the education archive.The SInfoof educational institutions has been configured by government management according to the Info of educational institutions and voted by the member nodes of the whole network.

    ? ACL:realize adding,updating,deleting,and querying dynamic access list.The dynamic access list is divided into Dynamic Allowed Access List (DAAL),Dynamic Denied Access List(DDAL):

    a.DAAL:can be used in the separate ACL process,allowing only the allowed objects set by DO in the list to share data;can be used in the ACL and SAC co-working process,which is for users with low static access permission level,and DO adds their information to DAAL to give them additional access permissions.See Table 4.

    Table 4:Dynamic allowed access list

    b.DDAL: serves SAC and will allow DO to deny access to users with high static access permission levels.See Table 5.

    Table 5:Dynamic denied access list

    Step 2 DU calls the Access Control Contract to request access to the target data.The contract validates DU access permissions according to DO’s access control management of the data.When the access permissions are verified,the contract generates Tokens and forms blockchain transactions stored on the chain.

    Step 3 Access Control Contract will record the access control process and results for review and accountability by the Government Supervision Department.The access control information records are shown in Table 6.

    Table 6:Access control information record

    4) Data Sharing

    Step 1 DU sends IDDUand IDdatato the storage server on the chain,requesting C(D).

    Step 2 The storage server queries the Token and verifies the validity according to the correspondence of IDDU,IDdata,and IDtokenstored on the chain.After passing,SK is used to decrypt some parameters of the Token to obtain RP,C(K);the homomorphic ciphertext retrieval mechanism is run to get C(D)returned to DU.

    Step 3 DU sends C(D) through the off-chain secure channel to the Government Secrecy Department to request a re-encryption process to obtain D.This step aims to reduce the range of key sharing and improve key security.

    Step 4 According to the correspondence of IDDU,IDdataand IDtokenstored on the chain,the Government Secrecy Department queries the Token and verifies the validity;after passing,decrypts some parameters of the Token to obtain EP using SK;runs the re-encryption process and returns the DU decryptable education archive.The re-encryption process is that the Government Secrecy Department Decrypts C(D) with EP,then queries PK of DU on the chain,and re-encrypts the education archive back to DU.

    Step 5 DU uses SK to decrypt the education archives of the cryptographic state.

    3.6 Homomorphic Ciphertext Retrieval Module

    The ciphertext retrieval scheme [27] based on a homomorphic encryption algorithm was first proposed by BONEH [28],and it is based on Difficulties in cryptography.The strategy is to obtain retrieval results by comparing homomorphic ciphertext and ciphertext keywords with high data security and retrieval efficiency.The EduASAC system proposed in this paper can be used with most homomorphic ciphertext retrieval schemes running on storage servers to achieve decentralized finegrained access control and efficient data sharing.

    Homomorphic encryption schemes generally consist of four Probabilistic Polynomial Time(PPT)algorithms[29].The specific content is as follows:

    1) Key generation algorithm (KeyGen).Input security parameters and public parameters that meet other actual needs and can output the encryption key (public key),the decryption key(private key),and the public key used for homomorphic ciphertext calculation.

    2) Encryption algorithm (Encrypt).Input the plaintext and encryption key and output the ciphertext result of the encryption operation.Among them is a one-to-one correspondence between plaintext and ciphertext,and the ciphertext results obtained by encrypting the same plaintext are different.

    3) Decryption algorithm (Decrypt).Input the ciphertext and decryption key and output the plaintext result of the decryption operation.

    4) Homomorphic computing algorithm(Evaluate).It is a homomorphic correctness verification algorithm,which does not involve any system modules in this paper,and the specific process is omitted.

    In the workflow shown in Fig.2,Mark 2.1 corresponds to KeyGen ().DO generates keys and security parameters of the homomorphic encryption algorithm.Mark 2.2 is DO extracts keywords from archives.Mark 2.3 corresponds to Encrypt (),DO encrypts education archives and keywords and uploads them to the storage server and blockchain.Mark 4.4 corresponds to Decrypt (),the government department decrypts education archives,performs re-encryption operations,and then shares them with DU.Mark 4.2 corresponds to the homomorphic ciphertext retrieval algorithm Retrieval (),which is run independently by the storage server.The above steps are all run off-chain.It can effectively reduce the amount of computation on the chain,improve the system’s scalability,enable the system framework to be used in conjunction with most homomorphic ciphertext retrieval schemes,and meet the different needs of different retrieval schemes for access control.

    The EduASAC system provides the following services for the homomorphic ciphertext retrieval mechanism:

    1) For the key and security parameter EP of the homomorphic encryption algorithm,it is packaged to form ME and stored on the chain.

    2) For the ciphertext keywords after homomorphic encryption,they are packaged together with the retrieval security parameter RP to form MR and stored on the chain.

    3) For the educational archives stored on the storage server,the access control management of SAC and ACL is carried out based on the blockchain network,and the retrieval permission can be verified before running the homomorphic ciphertext retrieval mechanism.

    4) Blockchain implements access control on the DU that requests the retrieval data service,calls the contract to verify the DU’s retrieval permission,and automatically generates a Token and stores it on the chain.Token indicates the access permission of DU and provides corresponding parameters for the subsequent retrieval and decryption process.

    The above content can be set according to user needs and the homomorphic ciphertext retrieval scheme.For example,the generation algorithm of the key and security parameter EP is set according to the homomorphic encryption scheme;when the homomorphic ciphertext retrieval process does not require additional security parameters,there is no RP setting;DO implement different levels of access control for different education archives and users.

    4 Smart Contract Design

    The EduASAC system uses smart contract technology to control the system’s workflow,that is,the process of education archive sharing and access control.This section details four kinds of smart contracts: Vote Contract,Mapping Contract,Control List Contract,and Access Control Contract,and their associated algorithms and logic interfaces.

    4.1 Vote Contract

    The Government Management Department invokes the Contract and can initiate the voting of the entire network nodes on the educational institutions applying to join the network.After the voting,the Contract will automatically count the votes,return the information of allowing or rejecting the joining request,and record the voting results in a table on the chain,see Table 2 in the previous section.The specific content of the Contract is as follows:

    VoteInstitution():As shown in Algorithm 1,member nodes vote before the voting deadline.Info is the identity information of the voting node.Nodes vote for the Info included in the AccessmemberMap mapping and against the Info in the RefusememberMap mapping.Both mapping records will be uploaded to the chain.The two-mapping records deadline is the voting period,a fixed value stipulated and released by the Government Management Department on the chain.

    typedefineInfo{

    ID:String.

    Publickey:String.

    Verification:String.

    Level(SInfo):String.}

    VoteCounting():As shown in Algorithm 2,after the voting deadline,the votes are counted.When the approval votes account for more than 90% of the total votes,new nodes are allowed to join.Otherwise,the joining request is rejected.The percentage of votes allowed to join can be changed according to actual needs.

    institutionMap(): As shown in Algorithm 3,this function describes the process of establishing a mapping between ID and Info,which is executed by newly joined member nodes to initialize their official information and provide parameter records for the subsequent process of verifying user identity.

    isExitInstitution(): This function checks whether the educational institution applying to join already exists in the network to prevent the internal nodes from sending many requests to affect the system’s proper operation.

    addVoteCase()/queryVoteCase(): Upload or query events that require member nodes to vote,including the id,name,content,time limit,and the number of votes in favor and against.In the initial state,the number of votes in favor and against is 0;after the voting,this value is the final result provided toVoteCounting()for calculation.

    4.2 Mapping Contract

    This Contract is invoked by DO,who uploads education archives and hopes to share them with other users,to establish three parameter mapping: ME,MR,and MV.It can associate DO identity information,education archives information,and parameters required for system work and serve the homomorphic ciphertext retrieval,access control,and re-encryption process.DO initiates the Contract,and its blockchain address needs to match the input IDDOso that the Contract can normally execute the process of establishing,updating,deleting,and querying parameter mapping.The specific content of the Contract is as follows.

    initVerifyMap()/initRetrievalMap()/initEncryptMap(): Establish validation parameter mapping,retrieval parameter mapping and encryption parameter mapping process,as shown in Algorithm 4.The same input parameters of the three functions are the IDs of DO and data,and the different input parameters are VP and Sdata,C(RK),and C(EP).

    updateVerifyMap()/updateRetrievalMap()/updateEncryptMap(): It is the same as the input of establishing the mapping function,and the old mapping is overwritten with IDdata,as shown in Algorithm 5.

    deleteVerifyMap()/deleteRetrievalMap()/deleteEncryptMap(): Need to input the IDs of DO and data to delete the corresponding parameter mapping,as shown in Algorithm 6.

    queryVerifyMap()/queryRetrievalMap()/queryEncryptMap(): Query validation parameter mapping,retrieval parameter mapping and encryption parameter mapping procedures,as shown in Algorithm 7.Need to input the IDs of DO and data to query the parameter mapping and return the corresponding parameter or error reminder information.

    4.3 Control List Contract

    The role of this Contract is for the DO to perform access control management on shared education archives and call the Contract to manage and maintain two types of lists on the chain,namely the DAAL and the DDAL.As the contract initiator,DO’s blockchain address needs to match the input IDDO,and then the Contract can be called to add,delete,and modify the list.

    addAllowList()/updateAllowList()/deleteAllowList()/queryAllowList(): This function is to add,delete,modify,and query table items in the DAAL.

    addDenyList()/updateDenyList()/deleteDenyList()/queryDenyList(): This function is to add,delete,modify,and query table items in the DDAL.

    4.4 Access Control Contract

    This Contract is the core of the system access control process and is used to verify the access permissions of the person who initiated the Contract.The Contract is designed according to the EduASAC system scheme,and the verification parameter mapping corresponding to the target data is queried on the chain.According to VP settings,execute the related access control process to verify DU access permissions.After the verification is passed,a Token is generated for the legal DU and stored on the chain,which can be used for subsequent operation of the homomorphic ciphertext retrieval mechanism and re-encryption process.

    checkAccess():Check DU access permissions,as shown in Algorithm 8.The input is the IDs of DU,data,and DO.A Token is generated if the verification is successful;otherwise,empty data returns to indicate that the verification failed.The access control mechanism adopted by the system will be based on the VP value set by DO.See Table 3 in the previous section.

    ? If VP is 0,no verification permission is required to access data,and the contract directly generates a Token.

    ? If VP is 1,only the SAC mechanism is required to access the data.The contract compares the static permission level S of the DU and the target data and allows access when the DU level is high.The comparison algorithm can change according to the design of the actual scheme,and choosing an algorithm with higher security and efficiency is recommended.

    ? If VP is 2,only the ACL mechanism is needed to access the data.The contract queries the DAAL item of the target data and allows access when there is DU information.

    ? If VP is 3,it indicates that SAC and ACL mechanisms are required to access data.The contract compares the static permission level S of the DU and the target data: When the DU level is high,query the DDAL item of the target data and deny access if there is DU information;when the DU level is low,query the DAAL item of the target data,and allow access if there is DU information.

    ? If VP is other values,the scheme will implement other access control procedures.VP represents other access control schemes or is used as a parameter in the access permission verification algorithm.The smart contract still performs the verification process,and the corresponding algorithm code needs to be written into the contract.

    deleteToken()/queryToken():Delete or query the Token already stored on the chain.

    5 Implementation and Evaluation of EduASAC

    5.1 Security Analysis

    According to the threat model mentioned in Section 3.2,this section theoretically analyzes the specific solutions proposed by the EduASAC system for data threat,entity identity threat,and system behavior threat.

    1) Data security on the chain

    The EduASAC system uses the blockchain network to store and share the data used or generated during the system’s work.It deploys the smart contract that regulates the system’s behavior on the chain to record the data operation process and ensure the data’s integrity,correctness,and validity.Table 7 below is the security data stored on the chain.

    Table 7:Secure data on the chain

    One data item is not listed in the above list,i.e.,all system workflow records stored on the chain.These records will serve as evidence of dishonest behavior by system entities and reduce the impact of malicious tampering of execution results or changes to the execution process by system entities.It can also provide extremely reliable data records for authorities’subsequent review and accountability process.

    2) Parameter security

    The generation,storage,and sharing of security parameters in the EduASAC system are all done by DO alone without third-party participation.Each workflow of the system is modularized,and different system working mechanisms require different security parameters,which can meet the security requirements of different mechanisms.The security parameters required by a system entity to run a certain mechanism have been encrypted by the asymmetric key of the system entity and stored on the chain in a ciphertext state.

    a) The access control mechanism needs VP when verifying access permissions.Because it does not involve the security of the data itself,the access control policy setting of the data by DO,therefore,VP does not need to be stored in a ciphertext state and can be viewed by any system entity.

    b) The homomorphic ciphertext retrieval mechanism requires RP and ciphertext keywords to be used when retrieving data.When a data owner grants permission to a storage server to share data,the SK of that storage server is used to encrypt the retrieved security parameters.It improves the control of DO over the data,ensures that the data is not shared by unauthorized third-party storage servers,and improves the security of the homomorphic ciphertext retrieval mechanism.

    c) The re-encryption mechanism requires EP to be used when decrypting the data,which are critical keys to protect the data security and cannot be obtained by third-party service providers.Therefore,DO encrypts it with SK of the authoritative Government Secrecy Department and then uploads it to the chain in a ciphertext state.It dramatically reduces the scope of sharing critical keys and improves the security of education archives.

    3) Security of system entity identity

    a) At the time of registration,the system entity’s identity information must be verified off-chain by the Government Management Department.After verification,the identity information will be published on the chain and voted on by the whole network.The opinions will be counted before deciding whether to allow them to join the EduASAC system.

    b) The identity information,public key,voting process,and results of newly joined nodes are recorded on the chain for network-wide nodes to verify node identity,obtain SK and review the voting process.The private key is kept independently by the user and is not known by any system entity to ensure the secure operation of the system workflow.

    c) The blockchain address of the contract initiator needs to match the input ID to ensure the authenticity and legitimacy of the participant’s identity in the process of parameter mapping setting,data access permission setting,and request permission verification.

    d) When DU requests retrieval and re-encryption of education archives from storage servers and the Government Secrecy Department,respectively,they need to verify the entity’s identity information in the chain based on its ID.

    5.2 Performance Comparison and Testing

    This section explains the research characteristics,application advantages,and realization value of the EduASAC system by comparing the performance of related research schemes and conducting simulation tests.

    1) Test environment

    The performance test environment is shown in Table 8.

    Table 8:Simulation environment

    2) Performance analysis

    Table 9 below will use the designed EduASAC system as the base point to compare the data characteristics of the shared system under different storage modes.

    Table 9:Comparison of data characteristics

    The system solution in this paper uses a combination of storage server and blockchain to store different data based on two different storage models,centralized and decentralized ledger,to jointly complete the work of sharing the data.As shown in the above table,the blockchain is a distributed structure,an open platform,without third-party participation and user access control.At the same time,because the authenticity of pre-chain data cannot be verified,there is a security threat of legitimate users uploading illegal data.There are third-party government departments with the force of law and administrative capacity in the EduASAC system,which can guarantee data security,verify data authenticity,and protect user identity privacy.Therefore,the advantages of system data characteristics are significant,and the social application value is greater.Table 10 below compares the research schemes of other blockchain education systems,highlighting the uniqueness of the scheme in this paper.

    Table 10:Comparison of system characteristics

    By comparing the system’s characteristics,it can be concluded that there is originality in the research of EduASAC system.It can be combined with most homomorphic ciphertext retrieval schemes.It adopts on-chain authorization and off-chain storage,integrates multiple access control modes,and realizes sharing and access control of educational archives based on smart contracts.Table 11 compares other system research schemes that run access control policies on the blockchain.

    As can be seen from the Table 11,compared with the centralized trusted institutions used in the literature[18]to manage access permissions,this paper uses a distributed network of blockchain without trust relationship to manage access permissions,which solves the problems of single point failure and third-party service trust;compared with the literature [19] based on static access permissions verification,this paper adopts a combination of static and dynamic access permissions verification mode,which has higher system flexibility and usability;compared with the literature [22,23],which use encryption or signature technology to control access to sensitive data,the security encryption technology used in this paper does not play a role in access control,but ensures the security of data sharing on the chain and reduce security threats from members of the system;compared with the public platform of the Ethernet blockchain used in literature[24],the newly registered system entities in this paper need to be joined after a whole network voting vote;literature [25] is similar to the research scheme of this paper,but the access control mechanism and specific application scenarios adopted by both are different,and this paper also combines homomorphic ciphertext retrieval mechanism and improves the access authorization framework.By comparing various research works,the safety,efficiency,and functional advantages of the scheme in this paper are outstanding,and it has high research significance and application value.

    3) Test results

    a) Test contract efficiency

    On the Hyperledger Fabric,test the running time of installing and instantiating four EduASAC system smart contracts,and test the impact of the average memory of the contract Docker container and the number of APIs in the contract on the contract initialization efficiency,as shown in Fig.3.

    Figure 3:Comparison chart of various factors affecting contract efficiency

    Smart contract code written in the Go language generally cannot run directly on the blockchain but needs to be run in a specific sandbox environment Docker container.The installation process is that the smart contract is uploaded to the chain,and the running time is short.The instantiation process needs to call the Docker container and initialize the smart contract,which takes a long time.As can be seen from the figure above,the on-chain efficiency of different smart contracts is related to the amount of memory in the Docker container,the number of APIs,and the complexity of the system behavior controlled by the contract.Tested the average latency and Central Processing Unit(CPU)of the three contracts when writing and querying ledger data,as shown in Fig.4;tested the average latency and throughput of AccessControlContract under different transaction numbers,as shown in Fig.5.

    Figure 4:Average latency and CPU when contracts write and query ledger data

    Figure 5:The average latency and throughput of AccessControlContract under different transaction numbers

    The experimental results in the above figure show that the EduASAC system can maintain high throughput in a large-scale transaction environment with high efficiency and low latency.It enables all network parties to reach a low-cost consensus to ensure data consistency.

    b) Test contract API

    To illustrate the system performance of EduASAC,four contracts of the EduASAC system are called,and the running time of each contract API was recorded in detail.The specific test results are shown in Figs.6–9.

    Figure 6:API runtime of Vote Contract

    Figure 7:API runtime of Map Contract

    Figure 8:API runtime of Control List Contract

    Figure 9:API runtime of Access Control Contract

    Note:checkAccess()in the Access Control Contract is when VP is set to 0,the API running time without access control.

    API is the behavior code for smart contracts to perform specific operations on data on the chain,including adding,deleting,updating,and querying data.As can be seen from the figure above,the operating efficiency of codes of the same behavior is roughly the same,and the subtle difference is the amount of data stored on the chain and the amount of data of the operation object.The scheme in this paper stores and shares the parameters relating to the homomorphic ciphertext retrieval scheme and access control strategy on the chain.Asymmetric algorithms encrypt all of them.Mechanisms with a large amount of calculation are all run off-chain,and education archives with a large amount of data are stored in the storage server.The data operated by smart contracts on the chain has high security,a small amount of data,and simple operation,improving the EduASAC system’s operating efficiency to a certain extent.

    c) Test access verification

    When DO sets different VP parameters for shared data,different access control mechanisms will operate in the Access Control Contract.In the experimental system of EduASAC,the process of DU callingcheckAccess() in the Access Control Contract to verify the access permission has been simulated.The specific running time of 9 verification access permission workflows has been tested.Table 12 below shows the previous conditions for operating the nine verification access permissions processes.

    Table 12:Operating conditions

    In the simulation test,if DU’s access request to the data is allowed,the test content will include the generation of the Token and the storage process on the chain;otherwise,the contract will end directly after the verification permissions fail.Fig.10 below shows the running time results ofcheckAccess()in the Access Control Contract under different conditions.

    Figure 10:Runtime of checkAccess()

    It can be seen from the figure that compared with the running time ofcheckAccess() without access control when VP is 0,the efficiency of the various access control processes designed in this paper is higher,and the running time of Token generation and on-chain storage is shorter.It shows that the EduASAC system using smart contracts for on-chain access control is well-designed,with low operating costs,high efficiency,and high application value.

    6 Conclusion and Future Works

    The EduASAC system studied in this article takes advantage of the decentralization,tamperproof,and traceability of blockchain technology,and applies blockchain smart contract technology to implement a dual-mode access control mechanism and a new access authorization framework.At the same time,the system can be combined with most homomorphic ciphertext retrieval schemes running on storage servers to solve the problem of low data security in the storage and sharing of education archives.The paper designs the system workflow of educational archive sharing and access control in detail,including the core modules of the system—access control and homomorphic ciphertext retrieval;introduces the algorithm input,operating logic,and data output of four smart contracts running on the blockchain,emphasizing the role of each smart contract in the system;tests the operating efficiency and memory of the smart contract,as well as the running time of the smart contract API and access control process to prove the availability of the system.

    In summary,the design and implementation of the EduASAC system provide a practical reference for other researchers to carry out relevant research.In future work,we can improve in the following areas:

    1) The experiments in this paper were conducted on the test network of Hyperledger Fabric.In the future,we will consider deploying a Blockchain as a Service(BaaS)platform closer to the actual blockchain application and further verify the system’s performance.

    2) This scheme involves the design and implementation of multiple smart contracts.In the future,we will consider using a more professional platform to deploy,schedule and manage smart contracts.

    3) Sharing homomorphic ciphertext data involves the security of sharing encryption keys.This paper uses a re-encryption process that allows education archives in a ciphertext state to be shared among education institutions without revealing the encryption key to third-party service providers.In the future,we can try to combine the homomorphic ciphertext retrieval mechanism with proxy re-encryption to jointly complete the secure retrieval and sharing process of data.

    Acknowledgement:Not applicable.

    Funding Statement:This work was supported by the Fundamental Research Funds for the Central Universities.Nos.3282023017,328202251.RL H received the grant.

    Author Contributions:Study conception and design:Ronglei Hu,Chuce He;Data collection:Yaping Chi,Xiaohong Fan;Analysis and interpretation of results:Xiaoyi Duan,Ping Xu;Draft manuscript preparation:Chuce He,Wenbin Gao.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The scheme design,flow,smart contract pseudo-code and related data of this paper have been provided in the paper,readers can reproduce the scheme according to the content of the article.If you need the smart contract code and simulation data,please contact the corresponding author.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲欧美成人综合另类久久久| 美女大奶头黄色视频| 90打野战视频偷拍视频| 亚洲九九香蕉| 久久精品人人爽人人爽视色| 亚洲性夜色夜夜综合| 捣出白浆h1v1| 亚洲第一青青草原| 水蜜桃什么品种好| 亚洲精品第二区| 久久国产精品影院| 亚洲精品第二区| 亚洲专区国产一区二区| 精品国产超薄肉色丝袜足j| 一边摸一边做爽爽视频免费| 欧美日韩黄片免| 日韩欧美国产一区二区入口| 久久精品熟女亚洲av麻豆精品| 午夜免费观看性视频| 亚洲,欧美精品.| 捣出白浆h1v1| 日韩欧美免费精品| 亚洲天堂av无毛| 午夜久久久在线观看| 国产1区2区3区精品| 在线观看www视频免费| 欧美在线黄色| 91av网站免费观看| 极品人妻少妇av视频| 亚洲中文日韩欧美视频| 久久久久久久大尺度免费视频| 国产野战对白在线观看| 纵有疾风起免费观看全集完整版| 国产极品粉嫩免费观看在线| 视频区图区小说| 亚洲欧美一区二区三区黑人| 亚洲全国av大片| 久久国产精品影院| 97精品久久久久久久久久精品| 狂野欧美激情性bbbbbb| www日本在线高清视频| 少妇 在线观看| 少妇粗大呻吟视频| 丁香六月天网| 亚洲精品一二三| 久久久国产精品麻豆| 最近最新中文字幕大全免费视频| 桃红色精品国产亚洲av| 人人妻人人澡人人看| 中文精品一卡2卡3卡4更新| 久久影院123| 一本久久精品| 日韩制服丝袜自拍偷拍| 亚洲第一青青草原| 男人操女人黄网站| 热re99久久国产66热| 好男人电影高清在线观看| 日韩三级视频一区二区三区| 日本wwww免费看| 少妇猛男粗大的猛烈进出视频| 成人av一区二区三区在线看 | 别揉我奶头~嗯~啊~动态视频 | 大片免费播放器 马上看| 高清视频免费观看一区二区| 美女中出高潮动态图| 日韩欧美一区视频在线观看| 中文字幕人妻丝袜一区二区| 国产精品自产拍在线观看55亚洲 | 中文字幕精品免费在线观看视频| 久久久久国产精品人妻一区二区| 免费在线观看影片大全网站| 国产精品久久久av美女十八| 欧美午夜高清在线| 午夜福利免费观看在线| 成年美女黄网站色视频大全免费| 国产av又大| 黄色片一级片一级黄色片| 人人澡人人妻人| 午夜两性在线视频| 亚洲精品国产精品久久久不卡| 久久天躁狠狠躁夜夜2o2o| 狂野欧美激情性xxxx| 国产在视频线精品| 天天躁夜夜躁狠狠躁躁| 久久国产精品大桥未久av| 首页视频小说图片口味搜索| 久久国产精品影院| 亚洲国产精品成人久久小说| 久久精品aⅴ一区二区三区四区| 久久免费观看电影| 国产人伦9x9x在线观看| 免费在线观看影片大全网站| 日韩熟女老妇一区二区性免费视频| 国产成人av教育| 99国产精品99久久久久| 91成人精品电影| 国产亚洲精品久久久久5区| av又黄又爽大尺度在线免费看| 欧美性长视频在线观看| 另类亚洲欧美激情| 国产色视频综合| 精品国内亚洲2022精品成人 | 日日摸夜夜添夜夜添小说| 午夜两性在线视频| 欧美日韩中文字幕国产精品一区二区三区 | 欧美日韩黄片免| 蜜桃在线观看..| 国产精品成人在线| 人妻人人澡人人爽人人| 人妻 亚洲 视频| 人成视频在线观看免费观看| 青春草亚洲视频在线观看| 老司机在亚洲福利影院| 99精品欧美一区二区三区四区| 欧美亚洲 丝袜 人妻 在线| 黄片播放在线免费| 99久久人妻综合| 黄色视频,在线免费观看| 一本—道久久a久久精品蜜桃钙片| 一本综合久久免费| 国产精品香港三级国产av潘金莲| 亚洲美女黄色视频免费看| 免费久久久久久久精品成人欧美视频| 建设人人有责人人尽责人人享有的| 99精品欧美一区二区三区四区| 国产欧美日韩综合在线一区二区| 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲国产av新网站| 老熟妇乱子伦视频在线观看 | 欧美黄色淫秽网站| 下体分泌物呈黄色| 久久亚洲国产成人精品v| 成人黄色视频免费在线看| 人人妻人人添人人爽欧美一区卜| 美女国产高潮福利片在线看| 搡老岳熟女国产| 中文字幕另类日韩欧美亚洲嫩草| 亚洲伊人久久精品综合| 国产成人免费无遮挡视频| 午夜激情av网站| 亚洲国产毛片av蜜桃av| 91成年电影在线观看| 伊人亚洲综合成人网| 最新在线观看一区二区三区| netflix在线观看网站| av线在线观看网站| 深夜精品福利| 丝袜人妻中文字幕| 女警被强在线播放| 日韩制服骚丝袜av| 男女国产视频网站| 国产亚洲精品一区二区www | 久久久久国产一级毛片高清牌| 亚洲av片天天在线观看| 美女视频免费永久观看网站| 日韩精品免费视频一区二区三区| 精品久久久久久久毛片微露脸 | 精品久久蜜臀av无| 午夜福利视频精品| 久久久久久人人人人人| 国产伦理片在线播放av一区| 亚洲av男天堂| 女人爽到高潮嗷嗷叫在线视频| 亚洲精品中文字幕在线视频| 免费少妇av软件| 国产日韩欧美在线精品| 久久中文看片网| 午夜福利在线观看吧| 18禁裸乳无遮挡动漫免费视频| 亚洲av成人一区二区三| 午夜精品国产一区二区电影| 亚洲av美国av| 18在线观看网站| 国产成人啪精品午夜网站| av不卡在线播放| 国产野战对白在线观看| 久久精品人人爽人人爽视色| 后天国语完整版免费观看| 久久午夜综合久久蜜桃| 久久久久国产精品人妻一区二区| 国产主播在线观看一区二区| 欧美精品一区二区免费开放| 老司机亚洲免费影院| 欧美午夜高清在线| 可以免费在线观看a视频的电影网站| 9热在线视频观看99| 国产又色又爽无遮挡免| 操美女的视频在线观看| 亚洲三区欧美一区| 51午夜福利影视在线观看| 高清在线国产一区| 老司机靠b影院| 久久精品人人爽人人爽视色| 久久久精品94久久精品| videos熟女内射| 中亚洲国语对白在线视频| 免费一级毛片在线播放高清视频 | 欧美激情高清一区二区三区| 丁香六月欧美| 免费在线观看完整版高清| 99热网站在线观看| 国产精品久久久久久精品古装| 欧美激情极品国产一区二区三区| 别揉我奶头~嗯~啊~动态视频 | 国产精品一区二区免费欧美 | 免费人妻精品一区二区三区视频| 国产色视频综合| 在线av久久热| 国产一区二区 视频在线| 亚洲熟女毛片儿| 国产欧美日韩一区二区三 | 亚洲av男天堂| 色婷婷久久久亚洲欧美| 欧美老熟妇乱子伦牲交| 性色av乱码一区二区三区2| 精品熟女少妇八av免费久了| 国产免费一区二区三区四区乱码| 久久久精品区二区三区| 嫩草影视91久久| 女人久久www免费人成看片| 亚洲国产av影院在线观看| 丁香六月欧美| 国产日韩欧美亚洲二区| 国产精品自产拍在线观看55亚洲 | 99精品欧美一区二区三区四区| 欧美成狂野欧美在线观看| 久久综合国产亚洲精品| 麻豆乱淫一区二区| 亚洲精品美女久久av网站| 精品国产一区二区久久| 99久久综合免费| 丝瓜视频免费看黄片| 老司机影院毛片| 亚洲国产欧美在线一区| 超碰成人久久| 欧美黑人精品巨大| 香蕉丝袜av| 精品一区在线观看国产| av线在线观看网站| 99精品久久久久人妻精品| 欧美乱码精品一区二区三区| 亚洲成人国产一区在线观看| 午夜老司机福利片| 亚洲精品中文字幕在线视频| a在线观看视频网站| 天天躁日日躁夜夜躁夜夜| 男女床上黄色一级片免费看| 亚洲国产中文字幕在线视频| 久久国产精品男人的天堂亚洲| 麻豆国产av国片精品| 手机成人av网站| 国产精品.久久久| svipshipincom国产片| 亚洲av成人不卡在线观看播放网 | 中文字幕制服av| 欧美日韩中文字幕国产精品一区二区三区 | 亚洲成人国产一区在线观看| 女警被强在线播放| 免费日韩欧美在线观看| 国产免费av片在线观看野外av| 午夜福利在线观看吧| 正在播放国产对白刺激| 国产成人欧美| 91精品三级在线观看| av福利片在线| 9色porny在线观看| 另类精品久久| 90打野战视频偷拍视频| 精品久久蜜臀av无| 久久久久国产精品人妻一区二区| 国产免费av片在线观看野外av| 欧美日韩视频精品一区| 亚洲成人手机| 美女午夜性视频免费| 亚洲av日韩精品久久久久久密| 在线av久久热| 国产精品熟女久久久久浪| 国产又爽黄色视频| 狠狠婷婷综合久久久久久88av| 在线av久久热| 久久久久国产精品人妻一区二区| 亚洲国产日韩一区二区| 国产区一区二久久| 91字幕亚洲| 嫁个100分男人电影在线观看| 日韩免费高清中文字幕av| 黄色视频不卡| 精品久久久久久电影网| 精品国产超薄肉色丝袜足j| 国产三级黄色录像| 久久久精品94久久精品| 日本欧美视频一区| a在线观看视频网站| 夫妻午夜视频| 又黄又粗又硬又大视频| 制服人妻中文乱码| 蜜桃国产av成人99| 在线永久观看黄色视频| 欧美97在线视频| 汤姆久久久久久久影院中文字幕| 久久久精品免费免费高清| 一本色道久久久久久精品综合| 美女大奶头黄色视频| 久久久久精品国产欧美久久久 | 久久久久久人人人人人| 中文字幕另类日韩欧美亚洲嫩草| 欧美另类一区| 麻豆乱淫一区二区| 国产av精品麻豆| av网站在线播放免费| 建设人人有责人人尽责人人享有的| 捣出白浆h1v1| 亚洲av男天堂| 日韩中文字幕欧美一区二区| 五月开心婷婷网| 777米奇影视久久| 999精品在线视频| 啦啦啦 在线观看视频| 色综合欧美亚洲国产小说| 夜夜骑夜夜射夜夜干| 在线观看一区二区三区激情| 久久人妻熟女aⅴ| 一区二区av电影网| 亚洲一区中文字幕在线| 久久久精品免费免费高清| 18禁黄网站禁片午夜丰满| 五月天丁香电影| 在线精品无人区一区二区三| 99久久精品国产亚洲精品| 五月天丁香电影| 黄片小视频在线播放| 日韩中文字幕视频在线看片| 国产无遮挡羞羞视频在线观看| 性高湖久久久久久久久免费观看| 极品人妻少妇av视频| www.自偷自拍.com| 亚洲人成77777在线视频| 女警被强在线播放| 欧美性长视频在线观看| 在线精品无人区一区二区三| 国产成人欧美在线观看 | 精品免费久久久久久久清纯 | 欧美xxⅹ黑人| 制服人妻中文乱码| 国产在线观看jvid| 国产成人av教育| 999久久久精品免费观看国产| 中文字幕另类日韩欧美亚洲嫩草| 日日爽夜夜爽网站| 久久精品aⅴ一区二区三区四区| 亚洲国产av影院在线观看| 麻豆乱淫一区二区| 中文字幕另类日韩欧美亚洲嫩草| 日日夜夜操网爽| 考比视频在线观看| 操美女的视频在线观看| 亚洲精品在线美女| 啦啦啦免费观看视频1| 男女边摸边吃奶| av电影中文网址| 亚洲成av片中文字幕在线观看| 大码成人一级视频| 999久久久国产精品视频| cao死你这个sao货| 午夜免费鲁丝| 亚洲国产毛片av蜜桃av| 99久久精品国产亚洲精品| 少妇粗大呻吟视频| 国产免费福利视频在线观看| 精品少妇久久久久久888优播| 久热这里只有精品99| 各种免费的搞黄视频| 亚洲 国产 在线| 国产精品 国内视频| 精品久久久精品久久久| 成年人免费黄色播放视频| 亚洲av男天堂| 欧美成人午夜精品| 国产男女超爽视频在线观看| 91老司机精品| 少妇被粗大的猛进出69影院| 日本撒尿小便嘘嘘汇集6| 亚洲三区欧美一区| 大型av网站在线播放| 免费高清在线观看视频在线观看| 日韩免费高清中文字幕av| 欧美日韩中文字幕国产精品一区二区三区 | 国产麻豆69| 老熟妇乱子伦视频在线观看 | 18禁黄网站禁片午夜丰满| 一本久久精品| 亚洲中文av在线| 精品一区在线观看国产| 男女无遮挡免费网站观看| 女人精品久久久久毛片| 亚洲国产成人一精品久久久| 久久免费观看电影| 一本大道久久a久久精品| 国产三级黄色录像| 777米奇影视久久| 欧美日韩亚洲高清精品| 黄色视频,在线免费观看| 美女福利国产在线| 精品少妇黑人巨大在线播放| 久久久精品94久久精品| 亚洲国产欧美日韩在线播放| a级毛片在线看网站| 伦理电影免费视频| 午夜福利视频在线观看免费| 精品国产一区二区久久| 女人被躁到高潮嗷嗷叫费观| 国产精品自产拍在线观看55亚洲 | 国产男女超爽视频在线观看| 9色porny在线观看| 精品视频人人做人人爽| 一本色道久久久久久精品综合| 老熟妇仑乱视频hdxx| 亚洲av欧美aⅴ国产| 欧美 亚洲 国产 日韩一| 亚洲精品国产精品久久久不卡| 亚洲精品国产色婷婷电影| 一个人免费看片子| bbb黄色大片| 麻豆乱淫一区二区| 成年美女黄网站色视频大全免费| 美国免费a级毛片| 国产欧美日韩一区二区三区在线| 美女大奶头黄色视频| 中文字幕高清在线视频| 国产精品九九99| 人人妻人人添人人爽欧美一区卜| 80岁老熟妇乱子伦牲交| 狂野欧美激情性xxxx| 国产日韩欧美视频二区| 色94色欧美一区二区| 法律面前人人平等表现在哪些方面 | 他把我摸到了高潮在线观看 | 美女扒开内裤让男人捅视频| 精品亚洲成国产av| 啪啪无遮挡十八禁网站| netflix在线观看网站| 亚洲,欧美精品.| 中文精品一卡2卡3卡4更新| 人人妻,人人澡人人爽秒播| 两性夫妻黄色片| av免费在线观看网站| 狠狠婷婷综合久久久久久88av| 看免费av毛片| 久久中文看片网| 国产精品免费大片| 美女视频免费永久观看网站| 性色av乱码一区二区三区2| 50天的宝宝边吃奶边哭怎么回事| 亚洲全国av大片| 亚洲 欧美一区二区三区| 久久精品aⅴ一区二区三区四区| 国产区一区二久久| 99国产极品粉嫩在线观看| 一进一出抽搐动态| 婷婷成人精品国产| a在线观看视频网站| 一二三四在线观看免费中文在| 久久人妻熟女aⅴ| 夜夜骑夜夜射夜夜干| 欧美日韩亚洲综合一区二区三区_| 亚洲成人手机| 人人妻人人澡人人爽人人夜夜| 久久影院123| 欧美老熟妇乱子伦牲交| 午夜久久久在线观看| 精品一区二区三卡| 桃花免费在线播放| 人人妻,人人澡人人爽秒播| 精品国产一区二区久久| 纯流量卡能插随身wifi吗| 免费观看a级毛片全部| 黄色 视频免费看| 超色免费av| 亚洲中文字幕日韩| 这个男人来自地球电影免费观看| 亚洲国产精品成人久久小说| 亚洲欧美一区二区三区黑人| 免费日韩欧美在线观看| 最近最新中文字幕大全免费视频| 色老头精品视频在线观看| 成年美女黄网站色视频大全免费| 一本大道久久a久久精品| 久久精品人人爽人人爽视色| 国产av国产精品国产| 国产一区二区三区综合在线观看| 国产日韩一区二区三区精品不卡| 在线观看免费视频网站a站| 久久久久久亚洲精品国产蜜桃av| 丰满饥渴人妻一区二区三| 亚洲av国产av综合av卡| 国产精品久久久久久精品电影小说| 最近最新中文字幕大全免费视频| 精品久久久精品久久久| 国产男女超爽视频在线观看| 精品国内亚洲2022精品成人 | 十八禁人妻一区二区| 777久久人妻少妇嫩草av网站| 亚洲一码二码三码区别大吗| 国产在视频线精品| 免费女性裸体啪啪无遮挡网站| 女人爽到高潮嗷嗷叫在线视频| 人人妻人人澡人人爽人人夜夜| 在线观看舔阴道视频| 免费高清在线观看日韩| 中文字幕av电影在线播放| 亚洲精品美女久久av网站| 黄色怎么调成土黄色| 亚洲中文av在线| 亚洲中文日韩欧美视频| 国产精品av久久久久免费| 亚洲av成人一区二区三| 最近中文字幕2019免费版| 一区二区三区乱码不卡18| 肉色欧美久久久久久久蜜桃| 亚洲自偷自拍图片 自拍| 久久精品国产亚洲av高清一级| 亚洲专区字幕在线| 99精国产麻豆久久婷婷| 亚洲精品国产av成人精品| 满18在线观看网站| 9热在线视频观看99| 亚洲精品久久久久久婷婷小说| 国产无遮挡羞羞视频在线观看| 国产欧美日韩综合在线一区二区| 99国产极品粉嫩在线观看| 国产一区二区在线观看av| www.自偷自拍.com| 亚洲欧美成人综合另类久久久| 亚洲 国产 在线| 老司机午夜十八禁免费视频| 亚洲av成人不卡在线观看播放网 | 国产精品一二三区在线看| 最近最新免费中文字幕在线| 一二三四在线观看免费中文在| 久久久久国内视频| 精品福利观看| 亚洲av日韩在线播放| 欧美性长视频在线观看| 大型av网站在线播放| 狂野欧美激情性bbbbbb| 亚洲人成电影观看| 亚洲三区欧美一区| 国产av又大| 成人av一区二区三区在线看 | 成人国产一区最新在线观看| 国产成人av教育| 国产日韩欧美亚洲二区| 亚洲第一欧美日韩一区二区三区 | 亚洲全国av大片| 老司机午夜十八禁免费视频| 丝袜喷水一区| 国产男人的电影天堂91| av视频免费观看在线观看| 人人澡人人妻人| 亚洲精品国产精品久久久不卡| 黑人操中国人逼视频| 免费观看av网站的网址| 老司机在亚洲福利影院| 午夜福利在线观看吧| 老熟妇仑乱视频hdxx| 国产精品欧美亚洲77777| 老司机影院毛片| 一区二区三区激情视频| 成人国语在线视频| 99精品欧美一区二区三区四区| 欧美精品啪啪一区二区三区 | 啦啦啦啦在线视频资源| 亚洲综合色网址| 欧美激情极品国产一区二区三区| 亚洲专区国产一区二区| 成人国语在线视频| 亚洲精品美女久久av网站| 777久久人妻少妇嫩草av网站| 精品久久久久久电影网| 深夜精品福利| 老熟妇乱子伦视频在线观看 | 久久久久久人人人人人| 男女高潮啪啪啪动态图| 成在线人永久免费视频| 蜜桃国产av成人99| 国产成人啪精品午夜网站| 大陆偷拍与自拍| 动漫黄色视频在线观看| 91麻豆av在线| 一个人免费在线观看的高清视频 | 亚洲精华国产精华精| 午夜免费成人在线视频| 黄色a级毛片大全视频| av网站免费在线观看视频| 97在线人人人人妻| 日本av手机在线免费观看| a级毛片在线看网站| 在线观看人妻少妇| 国产av国产精品国产| 国产黄色免费在线视频| 免费少妇av软件| 丝袜美足系列| 黄片大片在线免费观看| 日韩电影二区| 王馨瑶露胸无遮挡在线观看| 欧美日韩视频精品一区| 午夜福利一区二区在线看| 我要看黄色一级片免费的| 精品国产乱码久久久久久小说| av视频免费观看在线观看| 我要看黄色一级片免费的| 国产国语露脸激情在线看| 亚洲国产精品999| 丝袜脚勾引网站| 十分钟在线观看高清视频www|