• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Enhancing the Trustworthiness of 6G Based on Trusted Multi-Cloud Infrastructure:A Practice of Cryptography Approach

    2024-02-19 12:03:24MingxingZhouPengXiaoQixuWangShuhuaRuanXingshuChenandMenglongYang

    Mingxing Zhou,Peng Xiao,Qixu Wang,★,Shuhua Ruan,Xingshu Chen and Menglong Yang

    1School of Cyber Science and Engineering,Sichuan University,Chengdu,610207,China

    2Cyber Science Research Institute,Sichuan University,Chengdu,610207,China

    3Information Center,China Southern Power Grid Yunnan Power Grid Co.,Ltd.,Kunming,650000,China

    4School of Aeronautics and Astronautics,Sichuan University,Chengdu,610065,China

    ABSTRACT

    Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario.However,the openness and heterogeneity of the 6G network cause the problems of network security.To improve the trustworthiness of 6G networks,we propose a trusted computing-based approach for establishing trust relationships in multi-cloud scenarios.The proposed method shows the relationship of trust based on dual-level verification.It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units.Firstly,SM3 algorithm establishes the chain of trust for the system’s trusted boot phase.Then,the remote attestation server(RAS)of distributed cloud units verifies the physical servers.Meanwhile,the physical servers use a ring approach to verify the cloud servers.Eventually,the centralized RAS takes one-time authentication to the critical evidence information of distributed cloud unit servers.Simultaneously,the centralized RAS also verifies the evidence of distributed RAS.We establish our proposed approach in a natural OpenStack-based cloud environment.The simulation results show that the proposed method achieves higher security with less than a 1% system performance loss.

    KEYWORDS

    6G;multi-cloud;trusted Infrastructure;remote attestation;commercial cipher

    1 Introduction

    With the standardization of the 5G standard and its commercial application on a global scale starting in 2019,6G has quickly become a research hotspot[1–3].The real physical and virtual digital worlds will be connected by 6G in the future,which will significantly impact our lives [4].In order to cover the global space,air,ground,and sea scenarios,the 6G network architecture must have the characteristics of distributed autonomy.The architecture of the distributed cloud computing platform can better manage homogeneous or heterogeneous networks[5,6].

    Although cloud computing technology is developing and becoming more sophisticated,its security issues still need to be considered[7–9].Nalini used a security tree to illustrate the significance of cloud security and summarize security challenges at three levels: virtualization,applications,and networks [10].In the future,6G technology will tightly integrate networks and computing [11],necessitating the realization of unified hosting and the use of infrastructure resources.Virtualization technology will be of great technical value [12].However,its security risks,such as virtual network vulnerabilities,virtual machine vulnerabilities,and hypervisor vulnerabilities [13],can pose deadly threats.At present,research on 6G security mainly covers physical layer security,network slicing security,platform security,and artificial intelligence security [14].Ismaeel integrates zero trust architecture into the 6G network supporting digital twins,achieving the purpose of protecting data,equipment and users [15].Frehat proposed a mitigation method for adversarial attacks against 6G machine learning model[16,17].Security for 6G virtualization has received little research to date.6G is considered promising for providing deep learning to aid in the virtualization of security functions[18].DTCPN focuses on solving the complex and inaccurate modeling processes of existing network platforms and monitoring the security of virtual network resources [19].The software-based RINA solution ensures high-performance connectivity and meets isolation requirements for virtual network functions [20].A delay-aware dual hypervisor placement and control path approach enables the virtualization layer to adapt to sudden load changes[21].

    The trend involves multiple cloud service providers (CSPs) participating due to the large layout and extensive business capabilities of the 6G network architecture,which will involve how trust relationships are established between various clouds.Kurdi et al.proposed a lightweight trust management algorithm based on subjective logic,building mutual trust relationships based on the system ratings received by CSPs for their past behavior and the ratings given by other CSPs [22].For the lack of trust management models for cross-cloud federation scenarios,Ahmed et al.proposed a cloud-tocloud trust paradigm based on trust bidirectionality,trust portfolio,delegated control,and resource awareness [23].The fog-based hierarchical trust mechanism Wang et al.proposed [24] considers the trust in the underlying architecture and the trust in CSPs and SSPs(sensor service providers).In the literature [25],dynamic interactions between cloud tenants and CSPs,and QoS (quality of service)parameters of cloud service have also been used to establish trust.All of these trust models aim to show users that CSPs are reliable,but they all call for the selection of metrics,which has the drawback that it is challenging to find metrics that accurately reflect the trust relationship.

    A strong foundation of trust for 6G network can be created by establishing a secure and reliable cloud infrastructure based on trusted computing technology.Hardware-based security,the comprehensive approach of trusted computing and secure areas,will become the cornerstone of future computing networks,as Dr.Mikael Prytz of Ericsson believes.Smart Habitat defines several protection levels for 5G and 6G,such as multi-level isolation and protection of the integrity of SDN and VNF components,and recommends using trusted hardware environments[26].According to the 6G white paper[27],the integrity of remote platforms,including operating systems,virtual machines,and services,can be addressed by tying critical platform operations to hardware TPM.In addition to designing a remote proof approach for 5G core services and implementing trust and remote proof in the cloud and mobile infrastructures,Oliver also summarized a proof of concept for the plan in the healthcare industry [28].All of the above studies point out,at a theoretical level,that applying trusted computing-related technologies to 6G networks can improve security based on the fact that remote proofs can address the integrity of the platform.However,there is a gap in establishing trust relationships between multiple cloud environments.

    The risks of distributed cloud deployment in 6G network are shown in Fig.1.It consists of many small distributed cloud units,including distributed cloud units (DCU) and a centralized cloud unit(CCU).The lack of trust between cloud units in this architecture and the security risks associated with virtualization will inevitably prevent its widespread use.Motivated by the research,we propose a trust construction method for multi-cloud scenarios in 6G network architecture.The trustworthy state of multiple cloud units is divided into the trust within the cloud unit and the trust between cloud units to achieve dual-level verification and solve the weak trust problem among them.This method can detect system components whose integrity is compromised in time,including attacks introduced through virtualization threats.The work is based on our previous work[29],but the previous work only focused on extending the cryptographic algorithm to the vTPM so that the virtual machine could use SM2/SM3/SM4 algorithm through the vTPM.Firstly,we enabled the PCR bank for SM3 algorithm and modified the BIOS and kernel source code to use SM3 algorithm in the trusted boot phase.Then the centralized RAS(the remote attestation server of CCU)verifies the distributed RAS(the remote attestation server of DCU),the distributed RAS verifies the physical server(PS),and the PS verifies the integrity of the cloud servers circularly.Finally,critical evidence information of all servers is verified by the centralized RAS at one time.In summary,this paper makes the following contributions:

    · We propose a method for building trust between cloud units.This method leaves the verification of servers in DCU to the centralized RAS,the distributed RAS,and PS,and the centralized RAS verifies key evidence for all servers at one time,greatly reducing the verification burden on the centralized RAS.

    · A method of applying commercial cipher SM2/SM3/SM4 algorithms to vTPM is proposed.Extended the cryptographic algorithms supported by vTPM to enable virtual machines to use them.The chain of trust based on SM3 algorithm can be established by modifying the BIOS and IMA(Integrity Measurement Architecture).

    · We conducted related experiments on a real OpenStack cloud platform,showing that the proposed approach has better effectiveness and efficiency.Only less than 1% system performance loss of the host is impacted when the chain of trust is created using SM3 algorithm.The computation time for the additional step is less than 3 seconds,even when validating a cloud unit with 10,000 server sizes.

    The rest of this paper is organized as follows.Section 2 introduces the related work of cloudto-cloud trust,trusted computing technology,and the 6G security scheme.We overview the system architecture,assumptions,and design requirements in Section 3.Section 4 introduces the design and implementation of each part of the proposed scheme.The experimental results and performance evaluation are given in Section 5.Finally,we conclude the work in Section 6.

    2 Related Work

    This section summarizes and reviews related work on cloud trust assessment,trusted computing technology,and 6G security solutions.

    2.1 Trust Evaluation for Cloud

    At present,the schemes for establishing or improving the trust of a single cloud can be mainly divided into three categories: (1) improving the credibility based on anomaly detection of the cloud environment [30,31]; (2) based on reputation,quality of service (QoS),feedback rating and other indicators to establish trust evaluation methods[32,33];(3)building a trusted cloud based on trusted computing technology[34,35].Solutions related to anomaly detection mainly detect security threats in the cloud environment promptly by monitoring system performance data,behavioral feature data,and training models through machine learning and deep learning.The trust evaluation method mainly provides cloud users with an evaluation model method for CSP.Such methods,such as literature[34],evaluate the credibility of cloud services based on quality feedback ratings and cloud-specific security indicators.The related method based on trusted computing combines trusted computing with cloud computing technology,which can effectively verify the behavior of the cloud and prove the trust relationship.

    As for the trust relationship between clouds and clouds,Kurdi et al.[22]proposed the InterTrust scheme to improve trust in interconnected clouds.The approach builds mutual trust based on system ratings of CSPs’past behavior and ratings given by other CSPs,which is used to address the interconnected cloud computing paradigm in which multiple CSPs participate.Aiming at the lack of a trust management model in cross-cloud joint scenarios,Ahmed et al.[23] identified trust bidirectionality,trust composition,delegated control,and resource awareness as the theoretical principles that constitute the interconnected cloud computing paradigm based on a large number of literature surveys.Wang et al.[24] proposed a fog-based layered trust mechanism that considers the trust of the underlying architecture and the trust of CSPs and SSPs,focusing on the real-time comparison of service parameters,collection of behavior monitoring exception information,and quantitative evaluation of entities.Other related studies are basically based on the dynamic interaction between cloud users and cloud service providers in,QoS,and other parameters to establish trust[25].These trust models need to use the index characteristics of the system and cloud services as model parameters,but the defect is that it is challenging to propose indicators that can fully describe the trust relationship.

    2.2 Trusted Computing Technology

    Trusted computing technology[36]has the characteristics of measurement,storage,and reporting,which provide security functions such as trusted boot,remote attestation,integrity checking,and encryption and decryption.From the time of system power-on to the running process,the trusted boot[37]measures the components and loads them in a specific order.Extending the measurement results into the PCR of the TPM builds a chain of trust from the root of trust to system applications [38].For the Linux operating system,the trust chain construction process is measured by BIOS and IMA based on the SHA1 algorithm,but the SHA1 algorithm has been proven not to have strong collision resistance[39].Although the SHA256 algorithm can be used for measurement,SM3 algorithm is more secure and effective against boomerang attacks[40].

    Remote attestation techniques declare the properties of the target by providing evidence to the evaluator,which can be used to verify the secure state of a viable execution environment.In recent years,many scholars have focused on solving the application in the Internet of Things,and some have researched the efficiency of the remote attestation process[41–44].Some representative remote attestation tools,such as OpenCIT,OAT,OpenPTS,and Keylime.provide attestation frameworks to implement request initiation,evidence return,and integrity verification.Existing verification tools can work well for a single cloud computing environment but will face more significant challenges once applied to scenarios with complex cloud environments such as 6G.

    2.3 Security Solution for 6G

    In order to promote the development of next-generation wireless communication networks,the potential security challenges of 6G are studied to provide valuable security considerations for 6G standardization work [45,46].Domestic and foreign researchers and related institutions propose to enhance the security and privacy of 6G in terms of physical layer security,network slicing security,platform security,and artificial intelligence security,which can utilize distributed ledgers,quantum computing,platform monitoring and detection,identity authentication,privacy protection technology[47,48].Although using these techniques can improve security,their essence is to secure certain parts of the architecture.Trusted computing technology can establish the security cornerstone of the basic environment.When combined with other security protection technologies,it will perform better in improving the security of the 6G architecture.

    Therefore,Smart Habitat [26] defines three protection solutions for the security problems in 5G/6G networks and outlines the security solutions in detail.It is proposed to protect the integrity of hypervisors,virtual machines,operating systems,controllers and containers for building network infrastructure,which can apply secure boot devices and feasible execution environment technologies.The white paper [27] summarized the research challenges of 6G in terms of trust,security and privacy.For example,for the security of telecom cloud convergence,the integrity of the computing domain of virtual services that may change dynamically needs to be solved,which can provide verifiable remote proof in some cases,combining platform operations with tamper-resistant hardware TPM to address remote platform integrity issues.Digitization of the medical and railway sectors through cloud computing and network technologies such as 5G or 6G brings additional security challenges.Authentication and integrity of devices,services,and other functional components need to be addressed,and the introduction of trusted computing technology can solve this problem based on remote attestation[28].

    3 Framework and Requirements

    In this section,we present our approach’s framework,assumptions and design requirements.

    3.1 Framework Overview

    The proposed method aims to establish the trust relationship within and between the cloud units for the 6G network architecture.Fig.2 shows the overall architecture of this method,which divides the trust relationship into two levels trust within cloud units and trust between cloud units.

    Figure 2 :Architecture overview

    1)Internal trust in the cloud unit

    The physical host in cloud unit is configured with a hardware TPM that supports SM3 algorithm.The virtual machine is configured with a vTPM that supports the SM3 algorithm,whose integrity is protected.From power-on to running,the system completes the trusted boot based on the SM3 algorithm,establishing the server’s trust.At the same time,a remote attestation server is set in each distributed cloud unit to verify the integrity status of other servers.

    2)Trust between cloud units

    The 6G network involves multiple cloud units cooperating,so it is necessary to ensure the authenticity and credibility of the cloud units.The communication module(CM)is used to establish the connection between cloud units,and the centralized RAS maintains a reference value library to store the key evidence of each DCU.The centralized RAS initiates two remote certifications to the remaining distributed cloud nodes,first verifying the integrity of the distributed RAS and then verifying the integrity of the remaining servers.

    What’s more,a baseline value library(Baseline)that stores key evidence information of all DCU units is maintained in the centralized RAS.Considering the huge scale of servers in multi-cloud architecture of 6G,the key evidence information refers to the boot_aggregate value of each server in the proposed approach.The boot_aggregate is a cumulative hash over TPM registers 0 to 7.

    As shown in Fig.3,the process of establishing the trust relationship between the multi-cloud environments of the 6G network can be decomposed into the following steps:

    1)Trusted boot:All servers measure the system’s critical components based on trusted boot and extend the results into the PCR registers of the TPM/vTPM.

    2) Verification of the distributed RAS: The centralized RAS initiates a certification request to the distributed RAS of the cloud unit through the communication module and performs an integrity verification based on the current IMA measurement log and PCR register information of the distributed RAS.

    3)Internal verification of the cloud unit:The distributed RAS initiates a certification request to all physical servers(PS)and compares and verifies the evidence information with the benchmark value database.The PS verifies the cloud server(S)of another PS according to the rules.

    4)One-time verification of key evidence:The centralized RAS obtains the key evidence information of all servers in the current cloud node through the communication module and completes the integrity verification of all servers at one time.

    Figure 3 :The process of establishing trust relationship between multiple clouds

    3.2 Assumptions

    Our approach is developed with the following assumptions:

    1)Cloud servers are all equipped with hardware TPM or vTPM,and an attacker can’t destroy the server physically.

    2)The virtual machine images and vTPM instances may be tampered with before starting,such as adding malware,Trojan backdoor,etc.,to them.

    3) The remote attestation server in CCU guarantees integrity based on trusted boot,and the centralized RAS is always authentic and credible.

    3.3 Design Goals

    We aim to achieve the following goals for the multi-cloud environment in the 6G network architecture.

    1)Practical goals

    Based on the large scale,low communication delay,and diversified customization of 6G networks,our goal is to provide a practical method for establishing trust relationships to ensure the authenticity of all cloud units.The proposed method needs to have the characteristics of flexible deployment and bring as little performance overhead as possible.

    2)Security goals

    Our security goal is to guarantee the integrity of each cloud unit’s infrastructure and verify the trusted state of each distributed cloud unit,which is resistant to impersonation and sybil attacks.

    Resistance to impersonation attack:When using the proposed method,attackers cannot masquerade new distributed cloud units into the architecture.

    Resistance to sybil attack:The attacker cannot hijack the server through the vulnerability of the virtualization layer.Once the attacker hijacks the server and pretends to be a legitimate user,the integrity verification of the server will inevitably fail.

    4 The Proposed Approach

    In this section,we present the critical techniques of the proposed method.Our approach can be divided into three main components:(1)Establishment of trust relationship between cloud units;(2)Trusted boot within cloud units;(3)Expansion of virtual trusted platform modules.

    4.1 Chain of Trust for Multi-Cloud

    A single cloud unit contains many servers,so the cloud unit can be completely trusted only when all servers are trusted.For the trust relationship between multiple cloud units,it is necessary to ensure that the cloud unit itself is trustworthy and that the CCU passes the integrity verification of its distributed cloud unit (DCU).For convenience of expression,CRAS denotes the centralized RAS and DRAS denotes the distributed RAS.In this section,multi-cloud trust is divided into the trust within and between cloud units,and the weak trust problem is solved through dual-level verification.

    Definition 1: The trust relationship of multiple cloud units means that the status of all servers in the cloud unit is trusted,and other clouds successfully verify its integrity.That is to say,the trust relationship of multiple cloud units is divided into cloud unit internal trust and cloud unit trust.The trust relationship of multiple clouds is recorded asCmulti,the internal trust relationship of cloud units is respectively recorded asCCCU(centralized cloud unit)andCDCU(distributed cloud unit),and the trust relationship between cloud units (that is,the trust of CCU to DCU) is recorded asCC→D.The trust relationship model is

    Among them,the trust chain of the server(such asCCRAS,CDRASandCserver)is established based on trusted boot,and the trust chain of CCU to DCU is established through remote certification.

    1)Internal trust in the cloud unit

    All servers in the cloud unit establish their trust chain based on a trusted boot and then establish the trust relationship of the entire cloud unit through remote certification.The process of establishing the internal trust relationship of the cloud unit is shown in Fig.4.The distributed RAS verifies the integrity of all physical servers,and the physical servers then verify the integrity of the virtual machines.Considering that if an attacker hijacks the physical server(host),the verification results of the PS on all the above cloud servers are not credible.Therefore,we designed a ring verification method,where the physical server verifies the cloud server on the next physical server in sequence.The validation model is as follows:

    PSirefers to the ith physical server(host)of the cloud unit,andSPS(i+1)modnrefers to all the cloud servers on the(i+1)mod n host.

    This method requires that the reference values of allPSicloud servers be stored in thePS(i+1)modn,and the corresponding reference values must be updated in time when operations such as VM migration,creation,and destruction occur.The advantage is that it can reduce the verification burden of the RAS and simultaneously avoid the virtual machine’s untrustworthy verification result caused by the hijacking of the host machine(referring to PS).Only by hijacking all the hosts in the cloud unit can the attacker avoid the detection of the attack,which is more difficult.

    Figure 4 :The establishment of trust relationship within the cloud

    2)Trust between cloud units

    In order to avoid the significant performance overhead required by the centralized RAS to verify all servers in DCU,we designed the trust relationship establishment method between cloud units,as shown in Fig.5.The distributed RAS in the DCU is responsible for collecting the key evidence of the server in the unit and sending it to the benchmark library(baseline)of the centralized RAS.Here we use the boot_aggregate value of the virtual machine as the key evidence.Boot_aggregate indicates the result of aggregation of key component measurements from BIOS to kernel during the trusted boot process of the server.The centralized RAS maintains a baseline with DCU flags and corresponding key evidence.The communication module (CM) is responsible for establishing the communication connection between the two clouds and undertakes the task of transmitting data.

    Figure 5 :Establishment of trust relationship between cloud units

    When the CCU verifies the state of the DCU,it first verifies the integrity of the distributed RAS server.Then request the distributed RAS to send the key evidence information of the rest of the servers,calculate the aggregation result by the method such as formula(7),and send badcu to the centralized RAS.The centralized RAS reproduces the aggregation process based on the evidence information stored in the baseline and compares and verifies the status of the DCU.

    where there are m servers in total,bacurrepresents the result after thebai(boot_aggregate) of the evidence information of the i server is aggregated,andbaDCUrepresents the result of all aggregation the evidence information of DCU.‖means to concatenate two strings.

    Algorithm 1:Trusted state between clouds Input: bai,PCR10,ima.log Output: trusted_state 1: trusted_state=false&&t1=RA(the distributed RAS)2: while i in(0,n)do 3: t2+=RA(PSi)4: end while 5: while j in(0,m)do 6: t2+=RA(serverj)7: end while 8: if(t1+t2)>0 then//0 represents success,1 means failure 9: return trusted_state 10: end if 11: while i in(0,m)do 12: baDCU=SM3(baDCU‖bai)13: end while(Continued)

    The complete process of establishing a trust relationship between the CCU and the DCU is shown in Algorithm 1.This includes the internal trust of the DCU and the verification of the CCU to the DCU:(1)Firstly,the CCU initiates a verification request to the target DCU,and the centralized RAS verifies the integrity of the distributed RAS.(2)When the verification is passed,the distributed RAS verifies the integrity of all internal PSs,and the PS verifies the integrity of the virtual machine.(3)Then the distributed RAS collects key evidence from other servers to calculatebaDCU,and the centralized RAS calculates based on the evidence information of the baseline,and compares it with the receivedbaDCUto verify whether it passes.(4)Judge whether the trust relationship can be established according to the results of each step.

    4.2 Trusted Boot of OS in Cloud

    In the trusted boot phase,we take the TPM or vTPM as the trust starting point.The SHA1 algorithm is used to measure the application in the order of CRTM,BIOS,Grub,and OS,and then the IMA subsystem of OS measures the application based on the default SHA1 algorithm.

    Definition 2:The critical components at each stage of the trusted startup process are marked as entity E,and the trust relationship of entities is marked as T.Starting with entityE1as the source of trust establishment,the key components are measured and verified in the sequence of installation and startup.If the entityEipasses the verification ofEi+1,the trust is passed toEi+1.When all the essential componentsEiin the startup phase are verified as credible,the startup process is credible.The trust relationship transfer model is as follows:

    Definition 3: The trusted boot process of a physical server takes the hardware TPM as the starting point of the trust relationship.After the startup is completed,only the hypervisor and other applications closely related to the virtual machine will run.The trust model is

    whereEVM_envirepresents critical applications such as hypervisor,vTPM software,and vBIOS program.The integrity of theEVM_envicomponent is one of the prerequisites for the trustworthiness of the virtual machine.

    Definition 4: The trusted boot process of a cloud server (virtual machine) takes vTPM as the starting point of trust,and the trust model is as follows:

    Definition 5:Since the trust starting point of the virtual machine is vTPM,which does not have the characteristics that the hardware is difficult to be tampered with,we design an instance security module(ISM)to verify the integrity of the vTPM.The trust model is as follows:

    whereEISMrepresents the security management module(ISM)in the cloud environment,its function is to protect the integrity of the vTPM instance.

    For the chain of trust in a single cloud,we use SM3 algorithm to measure the critical components in the trusted boot process,maintain the trust chain of the host machine and virtual machine,respectively,based on the layered idea,and establish the trust transfer relationship between them.As shown in Fig.6,this method enables SM3 PCR bank of the vTPM,which makes it possible to store the hash value during the trusted measurement process into SM3 PCR bank.Then the BIOS program of the virtual machine and the measurement algorithm used by Kernel IMA are modified to SM3,which involves the BIOS extension module,IMA extension module and instance security management.

    Algorithm 2:BIOS extension for SM3 measurement Input: VM startup command Output: bios_measurements//bios measurement log 1: u8 digest[sm3_bufsize](Continued)

    Figure 6 :Trusted boot chain of trust in a cloud unit

    1)BIOS extension module

    The BIOS extension module needs to fulfil the following objectives:(i)Supporting SM3 algorithm.(ii)The BIOS trusted measurement function is based on SM3 algorithm.(iii)The trusted measurement results were extended to SM3 PCR bank.Algorithm 2 demonstrates the process of the BIOS expansion module.

    2)IMA extension module

    IMA is the integrity subsystem in kernel.When the operating system starts,the file integrity is measured according to the measurement policy,and the measurement results are recorded in the log file ima.log.The IMA extension module needs to meet the following requirements:(i)Kernel support for SM3 algorithm,(ii)trust measurement process of IMA using SM3 algorithm,and(iii)measurement results extended to SM3 PCR bank.The critical function of the IMA extension module is shown in Algorithm 3.

    Algorithm 3:IMA extension for SM3 measurement Input: OS boot instructions Output: ascii_runtime_measurements//ima measurement log 1: #define IMA_DIGEST_SIZE sm3_digest_size 2: ima_hash_algo=HASH_ALGO_SM3_256 3: tpm_buf_append_u16(&buf,TPM2_ALG_SM3_256)4: memcpy(res_buf,out→digest,sm3_digest_size)5: memcpy(digest_list[i].digest,hash,TPM_DIGEST_SIZE)6: tpm2_pcr_extend()7: return ascii_runtime_measurements

    3)Instance security management

    The vTPM instance and virtual machine image on the host are at risk of being tampered with.Although the related method [49] proposed to store the hash value of the instance in the hardware TPM by means of a measurement list,so as to maintain the trust relationship between the TPM and the vTPM.However,this method does not take into account that in actual scenarios,multiple cloud servers running on the same physical machine may need to be turned on and off frequently,which causes great difficulties in the maintenance of the measurement list.Therefore,we designed the instance security management(ISM)module to manage instances and image files.

    The flow of the instance security management module is shown in Fig.7,and its purpose is to protect the integrity of the vTPM and image files.Before starting the virtual machine,first use the hardware TPM to verify the integrity of the ISM,and here we store the integrity measurement result of the ISM in PCR 11 of the TPM.Then verify the integrity of the virtual machine image file and vTPM instance through the ISM module,and the virtual machine can start only after the comparison with the basevalue is verified.When the virtual machine is running,the vTPM is in the occupied state,so there is no need to consider the instance being tampered with at this time.After shutdown,ISM measures the virtual machine image file and vTPM instance and updates the stored basevalue results.Since the size of the virtual machine image file is measured in GB,the hash operation is timeconsuming.Therefore,we cut the image file into multiple small files of equal size and then perform a hash operation,and finally perform a hash operation on the hash values of all the small files.

    Figure 7 :Instance security management module

    4.3 Algorithms Extension in vTPM

    The SM2/SM3/SM4 series algorithm(referring to SMx)proposed by China has been incorporated into the international standard ISO/IEC.They are improved on the basis of ECC/SHA-256/AES-128,which can resist universal key replacement attacks,boomerang attacks,and key leaking Trojans[40,50,51],respectively.Currently,vTPM does not support the SMx algorithm,so neither trusted boot nor encryption services could use the more secure SMx algorithm.

    Considering the security of the algorithm used in the measurement process,we use SM3 algorithm to complete the measurement operation in trusted boot.However,vTPM does not have the PCR bank of SM3 algorithm for the time being,and the rest of the encryption algorithms have certain defects.Therefore,we extended the SMx algorithm to the vTPM and enabled SM3 PCR bank.

    We transform the vTPM function library libtpms of the software implementation and the TPM2.0 software stack used inside the trusted virtual machine.Fig.8 shows the vTPM extend method and depicts the interaction of the qemu virtual machine process with the vTPM instance through the software stack.We added SM2/SM4 call module and response result processing module to the vTPM library(libtpms)and the SMx support module to TPM2.0 software stack.

    Figure 8 :The vTPM extend method

    1)SM3/SM4 calling module

    This module adds the registration and definition of SM3/SM4 algorithm data structure to the function library.Towards SM3 algorithm,data structure SM3_256_Def is added,and functions for processing messages are defined,including sm3_init,sm3_update,sm3_final,memcpy,data length and algorithm identifier TPM_ALG_SM3_256.For SM4 algorithm,the data structure is added to the symmetric encryption algorithm selector SELECT,and functions such as SM4_encrypt,SM4_decrypt,and SM4_KEY,the encryption key setting function TpmCryptSetEncryptKeySM4,and the decryption key setting function TpmCryptSetDecryptKeySM4 are defined.

    2)Response result processing module

    This module is used to process the result of SM3/SM4 algorithm operations.For SM3 algorithm,add the encoding interface tpmHashStateSM3_256_Marshal,which is designed to load SM3 message bytes and sort them,splicing the message streams into strings,and writing them into SM3 operation result data structure.For SM4 algorithm,add the key encoding interface TPMI_SM4_KEY_BITS_Marshal to encode the key type and key value.

    3)SMx support module

    Modify the FAPI interface in the tpm2-tss software stack,and add the calling options of the SM2/SM3/SM4 algorithm according to the specification in the function interface involving signature,hash and symmetric encryption.Besides,added calling options towards SM2/SM3/SM4 algorithms for ECC,hash,and symmetric encryption algorithms in tpm2-tools,respectively.

    The timing diagram of invoking SMx algorithm based on virtual trusted computing technology is shown in Fig.9.vTPM provides SM2 signature and signature verification services as an example to introduce the execution process:

    1)Generate an algorithm key pair.The VM requests to generate a SM2 algorithm key pair,and the TPM2.0 software stack generates a public-private key pair.When the VM requests to load the public-private key pair,the software stack loads the key into the vTPM.

    2)Issue a signature or signature verification request.When the VM issues a SM2 algorithm signature or verification request,the software stack processes the request,and uses the set_key_algorithm function to set the ECC algorithm interface to use the SM2 algorithm.The corresponding API component in the software stack sends the TPM command stream to the vTPM,and the algorithm identification is extracted by the asymmetric cryptographic algorithm module of the vTPM.

    3) Perform a signature or verification operation.The ECC algorithm interface parses the TPM command stream and obtains the signature frame SM2 identifier.For the signature request,the signature function CryptEccSign calls the BnSignEcSm2 function to sign.For the signature verification request,the signature verification function CryptEccValidateSignature calls the BnValidateSignatureEcSm2 function for verification.

    4) Return the signature or verification result.The signature or signature verification result is encoded by the TPMS_SIG_SCHEME_SM2_Marshal and TPMS_SIGNATURE_SM2_Marshal interfaces.The obtained command response stream is sent to the software stack through the tpm_tis driver,and the software stack parses the result and returns it to the VM.

    Figure 9 :Timing diagram for using SM2/SM3/SM4 via vTPM

    In addition,when vTPM provides SM3 hash service and SM4 algorithm encryption and decryption service,the execution process is similar to that of SM2 algorithm.

    5 Experiments and Evaluation

    Our ultimate goal is to establish a trust relationship for multiple cloud units in a distributed cloud computing scenario to enhance the credibility of the 6G network architecture.In this section,we provide relevant experiments to evaluate the effectiveness and performance of the proposed approach.The system of the physical server is CentOS 7.8,and the configuration is Xeon(R)Silver 4216 CPU@ 2.10 GHz/DDR4 32G*8 memory/1.3T disk.The configuration of cloud servers is Qemu virtual CPU/2G memory/20G disk,with the OS version of CentOS 7.8 and kernel version of 3.10.The experimental environment is based on the open-source OpenStack cloud platform,in which each physical server is equipped with a hardware TPM,and the cloud server can be configured with a vTPM on the host machine.

    The trusted platform module or the trusted cryptographic module has functions for cryptographic calculation and measurement storage.Therefore,we compared the proposed scheme with the existing TPM,vTPM,and TCM,and the supported functions are shown in Table 1.In contrast,this solution not only supports the trusted boot process to extend the measurement results to SM3 PCR bank of the vTPM device but also provides vTPM-based SM2/SM3/SM4 cryptographic algorithm services for virtual machines.

    Table 1 : Supported function comparison

    We have carried out experiments in CentOS system to verify that the modified BIOS and kernel can establish trust chain based on SM3 algorithm.It turns out that our approach can store the trusted measures into SM3 PCR bank,and the results of the SM3 hash measures are stored in the IMA measure log.For the time efficiency of trusted boot,we calculate the startup time of virtual machines without trusted platform modules (denoted as VM-null),trusted virtual machines with trust chains based on the SHA1 algorithm (denoted as TVM-SHA1),and trusted virtual machines with trust chains based on SM3 algorithm (denoted as TVM-SM3).The method for calculating the virtual machine startup time is that the execution of the qemu command is used as the start time,and the start of the network service process is used as the end time.The startup time overhead of the three virtual machines is shown in Fig.10.The data shows that the startup time are 25.508,30.783 and 35.499 s,respectively,and TVM-SHA1 and TVM-SM3 both enable IMA integrity measurement.Compared with VM-null,TVM-SM3 increases the time overhead because it needs to measure key components and applications such as BIOS and GRUB during the trusted boot process,which increases the time consumption by 39.17%.Compared with TVM-SHA1,TVM-SM3 increases the time overhead by 15.32%,because the calculation of SM3 algorithm takes more time than SHA1 algorithm.Although the calculation efficiency of SM3 is not as good as that of SHA1,its security is higher,and the added time overhead does not exceed 5 s.In order to ensure the safety and reliability of the virtual machine trust chain construction process,we believe that the increased performance overhead is within the acceptable range.

    We designed three sets of experiments to test the performance overhead of the host machine through SM3 algorithm to achieve trusted boot.These three sets of experiments repeatedly started VM-null,TVM-SHA1 and TVM-SM3,and tested the performance overhead of the host through Unixbench during the period.Fig.11 shows the performance overhead brought by the three types of virtual machine startup process to the host,and the final System Benchmarks Index Scores are 864.1,856.6,and 856.1,respectively.It shows that when starting TVM-SM3,the total score of the system is only reduced by 0.93% and 0.06% compared with when starting VM-null and TVM-SHA1 and the scores of other benchmark items have little difference,which will cause performance loss to the host system Negligible.

    Figure 10 :Three types of virtual machine startup time overhead

    Figure 11 :Performance overhead of starting three types of virtual machines under Unixbench

    Next,we compared the most time-consuming virtual machine image verification and update operations in the management process of the ISM module.The regular approach is to verify integrity by computing a hash of the entire image file.However,the proposed method firstly divides the image file into several small files of equal size,uses SM3 algorithm to hash all the small files,and finally hashes all the hash values again to obtain the final image base value.As shown in Fig.12,the regular method counts the time consumption of calculating the hash value of the image file,and the proposed approach counts the time consumption of splitting the image file,calculating the hash value of all small files,and calculating the total hash value.The data clearly shows that the time overhead increases with the file size,but the proposed method is much less time-consuming,taking only 20% of the regular method.

    Figure 12 :Time cost comparison of IMS module measurement verification stage

    When establishing the trust relationship between CCU and DCU,we hand over the remote atteattestation of the server in DCU to the centralized RAS,the distributed RAS,and PS in a layered manner,which can reduce the verification burden of the centralized RAS.Regardless of the direct network transmission delay and other losses of different cloud units,the method proposed in this paper only introduces the time overhead caused by the one-time verification of the key evidence(boot_aggregate)of all servers in the DCU by the centralized RAS.Fig.13 shows the time overhead as the number of servers in the cloud cell increases.Since the centralized RAS only aggregates the key evidence of each server,even if the number of servers reaches 10000,the time overhead is less than 3 seconds.

    Figure 13 :The calculation time of the centralized RAS varies with the number of servers

    6 Conclusion

    We suggest a trust-building method based on trusted computing for multi-cloud scenarios in 6G architectures to improve the trustworthiness of 6G networks.In this study,we have extended the supported cryptographic algorithms of vTPM and enabled the PCR bank of SM3 algorithm,which enabled SM3 algorithm to be used in the trusted boot phase and brought about only 15.32% of the startup time overhead.The proposed trust establishment method first establishes the OS trust chain by trusted boot,and then the centralized RAS,the distributed RAS,and PS verify different objects by remote attestation,respectively.Regardless of the verification overhead of the distributed RAS and PS,it costs no more than 3 seconds to finish the one-time verification of the key evidence towards 10,000 servers by the centralized RAS.

    Acknowledgement:We are very grateful to the editors and reviewers for their valuable comments on the experimental design and English writing,which have been very helpful in improving the quality of the manuscript.

    Funding Statement: This work was supported by the Ministry of Education and China Mobile Research Fund Project(MCM20200102),the 173 Project(No.2019-JCJQ-ZD-342-00),the National Natural Science Foundation of China (No.U19A2081),the Fundamental Research Funds for the Central Universities (No.2023SCU12129),the Science and Engineering Connotation Development Project of Sichuan University(No.2020SCUNG129).

    Author Contributions: The authors confirm contribution to the paper as follows: study conception and design: Mingxing Zhou,Qixu Wang; data collection: Peng Xiao,Menglong Yang; analysis and linterpretation of results: Shuhua Ruan,Xingshu Chen; draft manuscript preparation: Mingxing Zhou,Qixu Wang.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The relevant data and code of this manuscript can be accessed:https://github.com/ittlelearnlive/cmes28612.

    Conflicts of Interest:The preliminary work of this paper is published in 2022 IEEE 15th International Conference on Cloud Computing (IEEE CLOUD 2022).The authors declare that they have no conflicts of interest to report regarding the present study.

    国产精品亚洲av一区麻豆 | 亚洲第一青青草原| 午夜日韩欧美国产| 国产 一区精品| 国产成人精品在线电影| 国产不卡av网站在线观看| 丁香六月天网| 亚洲欧美精品综合一区二区三区 | 丰满饥渴人妻一区二区三| 天天躁日日躁夜夜躁夜夜| 久久 成人 亚洲| 精品一区二区免费观看| 午夜福利网站1000一区二区三区| 91精品三级在线观看| 老熟女久久久| 日韩一区二区三区影片| 超碰成人久久| 搡老乐熟女国产| 亚洲欧洲精品一区二区精品久久久 | 又大又黄又爽视频免费| 哪个播放器可以免费观看大片| 男女免费视频国产| 成年人免费黄色播放视频| 欧美老熟妇乱子伦牲交| av在线app专区| 男男h啪啪无遮挡| 国产一区二区 视频在线| 亚洲国产av影院在线观看| 大香蕉久久成人网| 在线天堂最新版资源| 国产精品二区激情视频| 亚洲精华国产精华液的使用体验| 欧美精品高潮呻吟av久久| 久久久久久人人人人人| 777久久人妻少妇嫩草av网站| 午夜日韩欧美国产| 亚洲国产欧美网| 久久韩国三级中文字幕| 国产人伦9x9x在线观看 | 亚洲欧美日韩另类电影网站| 亚洲av免费高清在线观看| 亚洲精品国产av成人精品| 欧美国产精品一级二级三级| av又黄又爽大尺度在线免费看| 精品一区二区免费观看| 免费在线观看黄色视频的| 一级片免费观看大全| 满18在线观看网站| 边亲边吃奶的免费视频| 久久人妻熟女aⅴ| 国产熟女欧美一区二区| 人妻一区二区av| 午夜福利视频在线观看免费| 美女视频免费永久观看网站| 三级国产精品片| 国产无遮挡羞羞视频在线观看| 麻豆乱淫一区二区| 侵犯人妻中文字幕一二三四区| 下体分泌物呈黄色| 国产成人aa在线观看| 免费黄色在线免费观看| 最近2019中文字幕mv第一页| av卡一久久| 美国免费a级毛片| 亚洲精品国产av成人精品| 欧美 亚洲 国产 日韩一| 99久国产av精品国产电影| 日本欧美国产在线视频| 一级毛片我不卡| 黄片播放在线免费| 在线观看国产h片| 麻豆精品久久久久久蜜桃| 免费观看无遮挡的男女| 久久 成人 亚洲| 一二三四中文在线观看免费高清| 日日摸夜夜添夜夜爱| 久久青草综合色| 综合色丁香网| 国产成人av激情在线播放| 国产激情久久老熟女| 搡老乐熟女国产| 国产精品女同一区二区软件| 午夜激情久久久久久久| 777米奇影视久久| 桃花免费在线播放| 日本免费在线观看一区| 国产av一区二区精品久久| av在线老鸭窝| 国产爽快片一区二区三区| 久热久热在线精品观看| 韩国精品一区二区三区| 狂野欧美激情性bbbbbb| 97精品久久久久久久久久精品| 亚洲国产欧美在线一区| 91国产中文字幕| 边亲边吃奶的免费视频| 久久免费观看电影| 日韩av不卡免费在线播放| 亚洲人成电影观看| 久久精品亚洲av国产电影网| 亚洲精品视频女| 亚洲一码二码三码区别大吗| 中文天堂在线官网| 亚洲欧美精品自产自拍| 精品福利永久在线观看| 永久免费av网站大全| 一级片免费观看大全| 亚洲综合色惰| 久久ye,这里只有精品| 我要看黄色一级片免费的| 国产日韩欧美视频二区| 久久久国产欧美日韩av| 国产成人一区二区在线| 人人妻人人澡人人爽人人夜夜| 国产一区二区激情短视频 | 日韩精品免费视频一区二区三区| 午夜免费男女啪啪视频观看| 另类亚洲欧美激情| 伦精品一区二区三区| 久久久国产精品麻豆| 亚洲欧美精品自产自拍| 麻豆av在线久日| 汤姆久久久久久久影院中文字幕| 视频区图区小说| 国产成人精品婷婷| 国精品久久久久久国模美| 性色avwww在线观看| 精品少妇一区二区三区视频日本电影 | 亚洲久久久国产精品| 在线天堂最新版资源| 国产极品天堂在线| 少妇人妻 视频| 少妇的丰满在线观看| 亚洲国产精品一区三区| 亚洲成人手机| 亚洲综合精品二区| 日韩一区二区三区影片| 精品亚洲乱码少妇综合久久| 巨乳人妻的诱惑在线观看| 久久av网站| 久久久久久久久久久免费av| 永久网站在线| 女人久久www免费人成看片| 精品国产露脸久久av麻豆| 亚洲av日韩在线播放| 老鸭窝网址在线观看| 男的添女的下面高潮视频| av在线观看视频网站免费| 精品国产乱码久久久久久小说| 日本午夜av视频| 一级毛片 在线播放| 成人国语在线视频| 丰满乱子伦码专区| 少妇猛男粗大的猛烈进出视频| 女性被躁到高潮视频| 啦啦啦啦在线视频资源| 伊人久久国产一区二区| 91成人精品电影| 精品人妻一区二区三区麻豆| 青春草视频在线免费观看| 在线天堂中文资源库| 日本免费在线观看一区| 永久免费av网站大全| 香蕉国产在线看| 亚洲一级一片aⅴ在线观看| 免费不卡的大黄色大毛片视频在线观看| 中国国产av一级| 亚洲美女黄色视频免费看| 少妇人妻 视频| 国产精品人妻久久久影院| av又黄又爽大尺度在线免费看| 最近最新中文字幕免费大全7| 国产日韩一区二区三区精品不卡| 午夜日韩欧美国产| 亚洲五月色婷婷综合| 自线自在国产av| 美女午夜性视频免费| 国产成人精品福利久久| 久久人妻熟女aⅴ| 观看av在线不卡| 最近最新中文字幕免费大全7| 久久ye,这里只有精品| av国产精品久久久久影院| av国产久精品久网站免费入址| 日韩一区二区三区影片| 国产深夜福利视频在线观看| 国产精品久久久av美女十八| 午夜免费观看性视频| 女人久久www免费人成看片| 亚洲av欧美aⅴ国产| 久久99精品国语久久久| 日本wwww免费看| √禁漫天堂资源中文www| 国产精品久久久久久av不卡| 我要看黄色一级片免费的| 精品少妇内射三级| 亚洲精品国产av成人精品| 少妇人妻精品综合一区二区| 如何舔出高潮| 亚洲欧美色中文字幕在线| 宅男免费午夜| 亚洲经典国产精华液单| 久久99精品国语久久久| 久久精品久久久久久噜噜老黄| 一本色道久久久久久精品综合| 日韩成人av中文字幕在线观看| 国产精品嫩草影院av在线观看| 热re99久久精品国产66热6| 妹子高潮喷水视频| 天天躁夜夜躁狠狠躁躁| 一个人免费看片子| 日韩欧美一区视频在线观看| 伦精品一区二区三区| 大话2 男鬼变身卡| 香蕉国产在线看| 中文精品一卡2卡3卡4更新| 日本爱情动作片www.在线观看| 国产成人免费无遮挡视频| 国产 精品1| 丁香六月天网| av视频免费观看在线观看| 一级毛片黄色毛片免费观看视频| 亚洲人成电影观看| 亚洲国产欧美在线一区| 国产成人免费无遮挡视频| 超碰97精品在线观看| 久热这里只有精品99| 国产在线视频一区二区| 日韩一本色道免费dvd| 日本色播在线视频| 欧美少妇被猛烈插入视频| 丰满少妇做爰视频| 韩国高清视频一区二区三区| 波多野结衣av一区二区av| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 亚洲国产精品999| 大话2 男鬼变身卡| 美女主播在线视频| 黄片播放在线免费| 美女国产高潮福利片在线看| 国产成人欧美| 18禁国产床啪视频网站| 久久久久久久久久久久大奶| 亚洲一级一片aⅴ在线观看| 国精品久久久久久国模美| 美女国产高潮福利片在线看| 亚洲美女搞黄在线观看| 18+在线观看网站| 久久精品国产亚洲av高清一级| 最黄视频免费看| 久久久国产一区二区| 国产免费一区二区三区四区乱码| 久久精品久久久久久久性| 午夜影院在线不卡| 亚洲,欧美,日韩| 亚洲一码二码三码区别大吗| 欧美精品一区二区免费开放| 国产精品人妻久久久影院| 国产精品久久久久久av不卡| 97精品久久久久久久久久精品| 免费黄频网站在线观看国产| 美女高潮到喷水免费观看| 这个男人来自地球电影免费观看 | 国产精品秋霞免费鲁丝片| 美女xxoo啪啪120秒动态图| 欧美日韩精品网址| av线在线观看网站| 在线精品无人区一区二区三| 91午夜精品亚洲一区二区三区| 亚洲成国产人片在线观看| 亚洲精品日本国产第一区| 丝袜喷水一区| 中文天堂在线官网| 久久ye,这里只有精品| 韩国av在线不卡| 亚洲人成网站在线观看播放| 国产免费福利视频在线观看| 亚洲欧美成人综合另类久久久| 国产精品女同一区二区软件| 亚洲精品成人av观看孕妇| 秋霞伦理黄片| 国产有黄有色有爽视频| 亚洲欧美成人综合另类久久久| 国产免费福利视频在线观看| av免费观看日本| 多毛熟女@视频| 欧美国产精品va在线观看不卡| 日韩欧美一区视频在线观看| 亚洲一区二区三区欧美精品| 丰满迷人的少妇在线观看| 亚洲五月色婷婷综合| 伦精品一区二区三区| 黄片无遮挡物在线观看| 亚洲 欧美一区二区三区| 老女人水多毛片| 日韩av在线免费看完整版不卡| 亚洲色图综合在线观看| 丝瓜视频免费看黄片| 美女高潮到喷水免费观看| 性少妇av在线| 在线 av 中文字幕| 日本黄色日本黄色录像| 各种免费的搞黄视频| 麻豆精品久久久久久蜜桃| 国产探花极品一区二区| 国产欧美日韩综合在线一区二区| 最近手机中文字幕大全| 亚洲视频免费观看视频| 亚洲天堂av无毛| 一区二区三区四区激情视频| 亚洲精品中文字幕在线视频| 老汉色av国产亚洲站长工具| 街头女战士在线观看网站| 精品第一国产精品| 亚洲伊人色综图| 亚洲欧美精品自产自拍| 免费不卡的大黄色大毛片视频在线观看| 久久精品国产综合久久久| 亚洲欧美一区二区三区久久| 久久久久久久国产电影| 国产精品二区激情视频| 各种免费的搞黄视频| 亚洲精品中文字幕在线视频| 欧美激情高清一区二区三区 | 成人国语在线视频| 啦啦啦啦在线视频资源| 伦理电影大哥的女人| 最新中文字幕久久久久| 国产免费视频播放在线视频| 久久精品国产a三级三级三级| 亚洲国产日韩一区二区| 成人手机av| 日韩成人av中文字幕在线观看| 妹子高潮喷水视频| 高清视频免费观看一区二区| 国产精品成人在线| 激情五月婷婷亚洲| 精品少妇一区二区三区视频日本电影 | 男女啪啪激烈高潮av片| 性少妇av在线| 大片免费播放器 马上看| 久热久热在线精品观看| 久久精品国产亚洲av涩爱| 最近最新中文字幕免费大全7| 欧美日韩av久久| 亚洲男人天堂网一区| 国产麻豆69| 欧美国产精品va在线观看不卡| 蜜桃在线观看..| 这个男人来自地球电影免费观看 | av天堂久久9| 黄网站色视频无遮挡免费观看| 欧美激情 高清一区二区三区| 99热国产这里只有精品6| av国产久精品久网站免费入址| videos熟女内射| 中文字幕人妻丝袜制服| 一边亲一边摸免费视频| 欧美日韩av久久| 国产在线免费精品| 亚洲欧洲国产日韩| a 毛片基地| 老司机影院毛片| 在线观看国产h片| 丝袜在线中文字幕| 色94色欧美一区二区| 亚洲国产av新网站| 99久久精品国产国产毛片| 国产av一区二区精品久久| 视频在线观看一区二区三区| 亚洲内射少妇av| 日韩 亚洲 欧美在线| 午夜免费男女啪啪视频观看| 国产精品 国内视频| 国产亚洲最大av| 一边摸一边做爽爽视频免费| 欧美+日韩+精品| 免费播放大片免费观看视频在线观看| 最近的中文字幕免费完整| 久久久久久久久久久免费av| 亚洲综合色网址| 亚洲三区欧美一区| 亚洲精品aⅴ在线观看| 黄片播放在线免费| 中文字幕制服av| 90打野战视频偷拍视频| 一本色道久久久久久精品综合| 啦啦啦在线免费观看视频4| 久久精品国产a三级三级三级| 国产女主播在线喷水免费视频网站| 综合色丁香网| 自线自在国产av| 国产精品av久久久久免费| 大码成人一级视频| 美女国产高潮福利片在线看| 久久精品aⅴ一区二区三区四区 | 国产国语露脸激情在线看| 午夜老司机福利剧场| 亚洲第一av免费看| av.在线天堂| 又粗又硬又长又爽又黄的视频| 亚洲欧美精品综合一区二区三区 | 高清黄色对白视频在线免费看| 亚洲精品国产一区二区精华液| 一二三四在线观看免费中文在| 欧美变态另类bdsm刘玥| 亚洲人成电影观看| 亚洲 欧美一区二区三区| 伊人久久大香线蕉亚洲五| 国产男女超爽视频在线观看| 中文字幕色久视频| 一二三四在线观看免费中文在| 大香蕉久久网| 色婷婷av一区二区三区视频| 2021少妇久久久久久久久久久| 一区二区日韩欧美中文字幕| 精品酒店卫生间| 国产熟女午夜一区二区三区| 9191精品国产免费久久| 国产一区有黄有色的免费视频| 国产精品 国内视频| 青青草视频在线视频观看| 久久久久久久国产电影| 欧美日韩一区二区视频在线观看视频在线| 国产97色在线日韩免费| 欧美精品亚洲一区二区| 欧美+日韩+精品| 亚洲伊人久久精品综合| 欧美精品亚洲一区二区| 91精品三级在线观看| 日本vs欧美在线观看视频| 国产老妇伦熟女老妇高清| 亚洲视频免费观看视频| 99热国产这里只有精品6| 久久国内精品自在自线图片| 赤兔流量卡办理| 亚洲国产av新网站| av女优亚洲男人天堂| 亚洲久久久国产精品| 久久久久久伊人网av| 人妻少妇偷人精品九色| 深夜精品福利| 精品一区二区免费观看| 在现免费观看毛片| 欧美激情极品国产一区二区三区| 亚洲精品乱久久久久久| 日韩欧美精品免费久久| 人人妻人人澡人人爽人人夜夜| 亚洲精品乱久久久久久| 欧美日韩国产mv在线观看视频| 美女中出高潮动态图| 亚洲美女视频黄频| 欧美精品亚洲一区二区| 国产伦理片在线播放av一区| 日本wwww免费看| 欧美精品亚洲一区二区| 欧美激情极品国产一区二区三区| 可以免费在线观看a视频的电影网站 | 在线观看免费日韩欧美大片| 91精品伊人久久大香线蕉| 日韩精品免费视频一区二区三区| 波多野结衣一区麻豆| 亚洲四区av| 亚洲在久久综合| 亚洲一级一片aⅴ在线观看| 国产精品国产三级国产专区5o| 久久人妻熟女aⅴ| 青春草亚洲视频在线观看| 日日啪夜夜爽| 久久99精品国语久久久| 一本久久精品| 高清视频免费观看一区二区| 亚洲成国产人片在线观看| 亚洲三区欧美一区| 精品国产乱码久久久久久男人| av国产精品久久久久影院| 久久狼人影院| 国产极品粉嫩免费观看在线| 国产 精品1| 久久女婷五月综合色啪小说| 国产视频首页在线观看| 极品少妇高潮喷水抽搐| 欧美日韩成人在线一区二区| 久久精品国产综合久久久| 尾随美女入室| 国产精品亚洲av一区麻豆 | 亚洲欧美一区二区三区国产| 日韩熟女老妇一区二区性免费视频| 欧美国产精品一级二级三级| 国产亚洲精品第一综合不卡| 国产精品无大码| 亚洲精品日本国产第一区| 叶爱在线成人免费视频播放| www.熟女人妻精品国产| 日日啪夜夜爽| 成人手机av| 欧美国产精品va在线观看不卡| 亚洲国产日韩一区二区| 欧美国产精品一级二级三级| 十八禁高潮呻吟视频| 91aial.com中文字幕在线观看| 9热在线视频观看99| 熟女电影av网| 一区二区三区四区激情视频| 赤兔流量卡办理| 一本色道久久久久久精品综合| 亚洲国产欧美日韩在线播放| 交换朋友夫妻互换小说| 99九九在线精品视频| a级片在线免费高清观看视频| 日韩大片免费观看网站| www.自偷自拍.com| 2022亚洲国产成人精品| 国产精品熟女久久久久浪| 在线天堂中文资源库| 成人影院久久| 国产在线一区二区三区精| 青草久久国产| 国产精品99久久99久久久不卡 | 欧美日韩一级在线毛片| 最近2019中文字幕mv第一页| 99国产综合亚洲精品| 91在线精品国自产拍蜜月| 少妇的逼水好多| 久久久久国产一级毛片高清牌| 午夜精品国产一区二区电影| 只有这里有精品99| 亚洲欧美一区二区三区国产| 你懂的网址亚洲精品在线观看| 一二三四中文在线观看免费高清| 亚洲欧美成人精品一区二区| 最近最新中文字幕免费大全7| 久久久久久久大尺度免费视频| 超色免费av| 国产成人aa在线观看| 永久网站在线| 亚洲国产最新在线播放| 精品少妇黑人巨大在线播放| 成人影院久久| 秋霞伦理黄片| 亚洲国产欧美在线一区| 在线观看人妻少妇| 久久久久久伊人网av| 亚洲成人一二三区av| 麻豆av在线久日| 国产 精品1| 满18在线观看网站| 婷婷色综合www| 成人亚洲欧美一区二区av| 毛片一级片免费看久久久久| 亚洲国产日韩一区二区| 国产精品女同一区二区软件| 赤兔流量卡办理| 熟女少妇亚洲综合色aaa.| 久久久久久久亚洲中文字幕| 精品久久久久久电影网| 女的被弄到高潮叫床怎么办| 日本av免费视频播放| 三级国产精品片| 最新的欧美精品一区二区| 韩国高清视频一区二区三区| 日韩av不卡免费在线播放| 免费黄色在线免费观看| 男女免费视频国产| 国产精品久久久久成人av| 精品国产一区二区三区久久久樱花| 国产成人a∨麻豆精品| 国产成人精品福利久久| 午夜免费鲁丝| 免费看不卡的av| 伦理电影免费视频| 亚洲人成网站在线观看播放| √禁漫天堂资源中文www| 国产色婷婷99| 一级毛片电影观看| 亚洲精品久久成人aⅴ小说| 国产精品免费大片| 男女无遮挡免费网站观看| 自拍欧美九色日韩亚洲蝌蚪91| 在线观看一区二区三区激情| 少妇人妻久久综合中文| 免费黄网站久久成人精品| 亚洲熟女精品中文字幕| 国产一级毛片在线| 国产熟女午夜一区二区三区| 久久久久久久大尺度免费视频| 哪个播放器可以免费观看大片| 香蕉精品网在线| 国产熟女午夜一区二区三区| 欧美成人精品欧美一级黄| 观看av在线不卡| 国产爽快片一区二区三区| 最新中文字幕久久久久| 欧美成人精品欧美一级黄| 日韩中字成人| 成年av动漫网址| 亚洲av男天堂| 丝瓜视频免费看黄片| 亚洲综合色惰| 一个人免费看片子| 自拍欧美九色日韩亚洲蝌蚪91| 国产xxxxx性猛交| 午夜久久久在线观看| 欧美变态另类bdsm刘玥| 青春草亚洲视频在线观看| 深夜精品福利| 高清不卡的av网站| 女性生殖器流出的白浆| 亚洲欧美清纯卡通| 午夜福利网站1000一区二区三区| 欧美日韩av久久| 亚洲精品日韩在线中文字幕| 建设人人有责人人尽责人人享有的| 久久99蜜桃精品久久| 国产精品蜜桃在线观看|