• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain

    2024-03-02 01:34:32YurongLuoWeiYouChaoShangXiongpengRenJinCaoandHuiLi

    Yurong Luo,Wei You,Chao Shang,Xiongpeng Ren,Jin Cao and Hui Li

    School of Cyber Engineering,State Key Laboratory of Integrated Service Network,Xidian University,Xi’an,710126,China

    ABSTRACT The dynamic landscape of the Internet of Things (IoT) is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among the pivotal applications within the realm of IoT,as a significant example,the Smart Grid(SG)evolves into intricate networks of energy deployment marked by data integration.This evolution concurrently entails data interchange with other IoT entities.However,there are also several challenges including data-sharing overheads and the intricate establishment of trusted centers in the IoT ecosystem.In this paper,we introduce a hierarchical secure data-sharing platform empowered by cloud-fog integration.Furthermore,we propose a novel non-interactive zero-knowledge proof-based group authentication and key agreement protocol that supports one-to-many sharing sets of IoT data,especially SG data.The security formal verification tool shows that the proposed scheme can achieve mutual authentication and secure data sharing while protecting the privacy of data providers.Compared with previous IoT data sharing schemes,the proposed scheme has advantages in both computational and transmission efficiency,and has more superiority with the increasing volume of shared data or increasing number of participants.

    KEYWORDS IoT data sharing;zero-knowledge proof authentication;privacy preserving;blockchain

    1 Introduction

    More than 15 billion devices including smart grid sensors will build up a new IoT application model consisting of massive clusters of edge fog nodes and mega cloud centers in the next 10 years[1].These devices are trending towards data processing and decision-making capabilities from sensing the environment.The rapid expansion of the IoT has also created an enormous quantity of multimodal data [2].Intelligent applications require deep integration and collaboration of multi-source data, specifically in the smart grid, events, such as power transmission strategy development, fault handling and billing.For example,accurate weather forecasts or environmental monitoring data are used to guide power transmission strategies[3].The Smart Grid(SG)has established a wide-ranging and intelligent energy transmission network based on information flow.SGs are characterized by distributed management,intelligent control and two-way(communication&electricity)information[4].Sensors are involved throughout the service of the smart grid, and contemporary smart grids connect to the Internet of Things to bring people more comprehensive electrical applications and information services with higher quality.Meanwhile,the widespread deployment of power equipment in IoT-based SGs will generate large-scale and diversified energy data[5]that can support other IoT applications.Data sharing between smart grids and other IoT applications is extremely valuable, so effective management and secure sharing of data are the key secure requirements for SGs[6].

    The smart grid is essentially an intelligent network consisting of massive sensors and electrical devices that link to the Internet.SGs achieve identification, positioning, monitoring, control and management, with a view to achieving the effect of interconnection of power networks and their customers [7].The SG’s two-way communication information is mainly derived from data collected by the IoT(internal and external of the SG power grid chain).Given that the IoT is a collaborative ecosystem and the huge data resources need to be used wisely and maximally, the secure sharing or trading of data is of extreme importance.At the same time, as an important part of the industrial Internet of Things, the smart grid data interaction and sharing with other IoT applications are the foundation of integrated applications.A large number of third-party data trading platforms have been established, but most of them are based on centralized architectures, whereby all data storage and transmission is done on a single central control system,which poses a challenge to trust establishment for the stakeholders of data sharing.At the same time,for power systems,large amounts of data are difficult to store and manage in a distributed manner[8].Current third-party data trading platforms can provide storage of data to IoT devices through a cluster of servers in the cloud.However,as the number of devices and data increases, it will lead to a surge in transmission, an increase in latency and a decrease in sharing efficiency.Most of the data traded in third-party platforms are enterpriselevel data, and there are often few transactions for the fragmented data held by individual users,which results in a shortage of diversified data sources.The introduction of fog nodes can promote sporadically distributed IoT devices with low computing power like SG devices for low-latency data sharing[9].

    The increased scale of individual users is also very valuable for the smart grid which can contribute to the diversification and enrichment of data sets.However,individual users are reluctant to trade their data on a platform because the transaction process is cumbersome and the transmission costs and trust establishment far outweigh the benefits.Blockchain is a distributed database that enables secure,tamper-evident data storage in a non-centrally backed,non-secure environment[10].In addition,it has the following advantages such as public verifiability,data traceability and tamper-proof,which can be a better solution for individual users’data transactions.Blockchain and cloud-fog-based architecture can provide a secure and convenient trading platform for individuals with low data amounts, and also facilitate the purchase of personal data by data buyers such as smart home manufacturers.Considering that malicious nodes can arbitrarily access data resources, it is a key point to achieve entity authentication in data processing.In addition,depending on data security requirements,data providers prefer to authenticate the data purchaser to know their true identity [11].Because data providers have to analyze the purchaser’s intention and the subsequent processing of the data.Also,they need to define the scope of data use after ownership has been transferred to avoid the misuse of those data.European Union (EU) and China data protection regulations explicitly require identity authentication of the data controller(i.e.,the data consumer in a data transaction).Art.13 of the EU General Data Protection Regulation(GDPR)[12]states that the identity of the data collector should be provided to the data owner.Current blockchain-based data-sharing solutions focus on solving technical problems such as bidding for transactions and transferring data ownership, and cannot achieve entity authentication,which may result in data misuse remaining untraceable after the transfer of data even with the use of blockchain.

    In this paper,we propose and implement a privacy-preserving decentralized secure data sharing platform namedZobricfor smart grid and IoT devices.The main innovations and contributions of this paper are as follows:

    (1) We design a cloud-fog enabled and privacy-preserving hierarchical data sharing model and introduce Hyperledger Fabric technology to build a identity management and transaction architecture for IoT nodes with low power consumption.The platform adopts a scheme where fog nodes collect, encrypt and publish data from the same management domain, and cloud servers act as transit points to store data.The proposed scheme can solve the problems of data encryption and transmission difficulties caused by limited computing resources.

    (2) We propose a non-interactive zero-knowledge proof-based group authentication and key agreement protocol that supports batch data sharing transactions and one-to-many sharing sets of data.The true identity of the data provider can only be known to the data consumer,which effectively protects the privacy of data providers.A transaction grouping method is adopted in which data is classified and tagged based on the source.Platform users join transaction groups according to the type of data they are sharing,using the Fabric channel to achieve a private transaction channel and a low blockchain storage consumption.The solution improves the efficiency of data transactions and enables the accurate transfer of data ownership with privacy preserving and untraceability.

    (3) We develop and realize a series of smart contracts to autonomously build,update and control cloud server data access lists to enable the reliable flow and efficient sharing of data collected from large-scale distributed and resource-constrained devices.

    (4) We employ a formalization security analysis tools and demonstrate that our proposed solution can resist against various protocol attacks and achieve several security properties including authenticity and confidentiality.And we implement experimental performance simulations to validate that the proposed IoT/SG data-sharing architecture enables the efficient and secure exchange of sensory data,which is more suitable for devices at scale,across domains and with low computing power.

    The structure of this paper is as follows.We introduce related work in Section 2 and explain some background knowledge in Section 3.Section 4 describes the system and the security model.In Section 5, the proposed scheme is described in detail.We give the security proof and performance analysis of the scheme in Section 6 and Section 7,respectively.Finally,Section 8 concludes the article.

    2 Related Work

    The data sharing/trading platforms currently in use are mainly hosted by large corporations or national governments and all employ a centralized trading architecture,such as Factual Open Platform[13]for location data and services.Such centralized trading platforms cannot provide data marketing for individual users between different IoT applications because the cost of monitoring the transfer of data ownership is extremely high.In addition,centralized platforms have access to the plaintext of data and cannot prevent platforms from misusing data or eavesdropping on users’privacy information[14].

    Access control mechanisms are the general security solution for data distribution, so control models with a third-party authorization are proposed for IoT data security[15,16].Zhang et al.[17]proposed an access control scheme using Ciphertext-Policy Attribute-Based Encryption(CP-ABE)in fog computing which realizes data sharing and attribute revocation but not trading for individuals.Data sharing is generally achieved using ciphertext and attribute-based encryption technology[18]on untrusted cloud storage servers which require a large computational overhead due to data processing.Sun et al.[19]designed a privacy-preserving data management model based on edge service layer and attribute-based encryption.Tan et al.[20]proposed a blockain-enabled access control framework for green IoT smart devices.The schemes based on CP-ABE can achieve one-to-many public cloud data sharing,but they cannot simultaneously share multiple pieces of data.Moreover,the above solutions do not take into account the identity management issues of both parties to the data exchange.

    There is a category of blockchain-based IoT/SG data sharing platforms designed for trading bidding solutions [21,22].They deployed smart contracts to make auctions for crowdsourcing data trading.Li et al.[23]proposed a framework of blockchain-enhanced decentralized IoT data trading,which cannot provide the secure solution for data sharing.Dixit et al.[24] presented a marketplace model and architecture to support trading of streaming data and yet focused on deal negotiation.Yu et al.[25]proposed a blockchain-enabled security data access control scheme.Boo et al.[26]introduced zero-knowledge proof protocol and designed a blockchain-based IoT data trading framework which supports traditional one-to-one data transmission, but cannot authenticate the transaction entities.?zyilmaz et al.[27] proposed a distributed marketplace for central-free machine learning data trading.However,the scheme does not protect the shared data with encryption.Chen et al.[28]developed a data batch aggregation mechanism for smart grids based on double-blockchain which introduces more consensus overhead.Zhang et al.[29] proposed a privacy-preserving and userdefined data sharing architecture with fine-grained access policy, utilizing blockchain technology and attribute-based cryptosystem.Walshe et al.[30] proposed a non-interactive zero-knowledge proof (NIZKP) authentication protocol for IoT devices with multi-rounds of challenges and high computational overhead.However, none of the above schemes enable the authentication of both parties to a transaction.Table 1 shows the properties comparison between the proposed scheme and previous related schemes.

    Table 1: Comparison with previous related schemes

    3 Preliminaries

    3.1 Non-Interactive Zero-Knowledge Arguments[31]

    3.1.1 Quadratic Arithmetic Program(QAP)Generator

    For a finite field F and integers 1 ≤l≤m,a QAP relationRis a set of binary pairs(φ,ω)in whichφ=(a1,...,al)∈Flis the statement andFora0=Σ 1,letui(X),vi(X)andwi(X)be degreen-1 polynomials,φandωsatisfy(X)modt(X).

    3.1.2 Zero-Knowledge Arguments

    A publicly verifiable zero-knowledge argument for relationRis a set of probabilistic polynomial algorithms(Setup,Prove,Vfy,Sim)as follows:

    Setup(R,λ)→(σ,τ):Setup derives a Common Reference String(CRS)σas a public parameter and a simulation trapdoorτfor the relationR.

    Prove(R,σ,φ,ω)→π:Prover porduces an argumentπwith inputingσand(φ,ω)∈R.

    Vfy(R,σ,φ,π)→{0,1}: Verifier enters the CRSσ, theφand the argumentπas input, and verification returns 0 for reject or 1 for accept.

    Sim(R,τ,φ)→π: Simulator produces an argumentπwith inputs the trapdoorτand the statementφ.

    Non-interactive zero-knowledge algorithms in[31]has been proven to have COMPLETENESS,ZERO-KNOWLEDGE,and COMPUTATIONAL KNOWLEDGE SOUNDNESS security capabilities defined as follows.

    COMPLETENESS.Completeness denotes that,a trustworthy prover can persuade verifiers who correctly executeVfywith the true statements.That is,Pr[(σ,τ)←Setup(R);π←Prove(R,σ,φ,ω):Vfy(R,σ,φ,π)=1]≈1.

    ZERO-KNOWLEDGE.Zero-knowledge denotes that, public parameters, including statement,will not disclose confidential information.That is,for any polynomial time adversariesA,Pr[(σ,τ)←Setup(R);π←Prove(R,σ,φ,ω):A(R,z,σ,τ,π)=1]-Pr[(σ,τ)←Setup(R);π←Sim(R,τ,φ):A(R,z,σ,τ,π)=1]≈0.

    COMPUTATIONAL KNOWLEDGE SOUNDNESS.Soundness denoted that,provers cannot prove to verfier without witness,nor can they generate false statement to passVfy.That is,for any polynomial time adversaries,Pr[(σ,τ)←Setup(R);(φ,π)←A(R,z,σ):φ /∈LRandVfy(R,σ,φ,π)=1] ≈ 0.Strengthening soundness to knowledge soundness, if there exists an extractor which can generate a witness every time that the adversary produces a valid argument, it know all about the adversary’s state including any random coins.Formally, for any polynomial time adversariesAwith a non-uniform polynomial time extractorXAsuch thatPr[(σ,τ)←Setup(R);((φ,π);ω)←RandVfy(R,σ,φ,π)=1]≈0.

    3.2 Elliptic Curve Discrete Logarithm Problem[32]

    An elliptic curveGover the field of integers moduloqFqis a point set(x,y)∈∪0,where 0 is the point at infinity.And the point can satisfy the equationy2≡x3+ax+bmodqwhere 4a3+27b2/=0 modq.For algebraic sum and scalar multiplication over groupGand a base pointP,there is a computational hard prolem ECDLP without known polynomial time algorithm to solve it.The problem is defined as follows:

    Elliptic Curve Discrete Log Problem(ECDLP):GivenPand a pointQ∈G,whereQ=zP,findzfrom.

    4 System and Security Model

    4.1 System Model of Zobric

    Based on the typical system architecture in IEEE IoT data management standards[33],the system architecture of the proposed IoT data market platform is shown in Fig.1,which consists of multiple parties.The following three roles of stakeholders in the proposed platform are defined.

    Figure 1:Cloud-fog enabled IoT data market platform

    Data Provider (DP).Data provider is defined as a party owning the data and wishing to sell or share it.The DP consists of a cluster of IoT sensors,which collect various types of data,and a cluster control center with high computing/storage/information transmission capability,which manages and controls the group devices.In this architecture,data transaction activities are carried out by the Data Control Center on behalf of the Data Provider.

    Data Consumer(DC).Data consumer is defined as a party who wishes to purchase or receive data from Data provider.Generally,data consumers need to purchase data in their real identity and reach a data use agreement with the data provider in order to be granted ownership of the data.

    Data Trading Services Platform.The service platform is a system for data trading.It consists of two entities:the Cloud Server(CS)and the Blockchain Server(BS)nodes,which provide infrastructure services for data providers and data consumers.For HyperLedger Fabric, BS nodes include CA,Orderers,Endorsers,Comitters and Anchors.

    4.2 Adversary Model and Assumption

    Without loss of generality,we set up the Dolev-Yao intruder model[34]as a security model within the IoT data trading platform.Adversaries in this model have access to all messages passing over the public network and may be legitimate entities or pretend to be legitimate users who can initiate sessions with or receive messages from any entity within the system.But an adversary is also limited in his ability to extract the private key through public key cracking,or to obtain information from the private storage portion of other entities.In addition,the following security assumptions are applied to the trust relationships of the system entities.

    1.Threat model of entities.External attackers have the same capabilities as described in the Dolev-Yao model.The internal potential adversaries are defined as follows.Individual users of the platform may try to disguise,replay and sell fake,invalid or duplicate data,at the same time,data buyers may misuse of shared data.Cloud storage servers are assumed to be honest-butcurious,specifically,the cloud servers execute the contents of smart contracts correctly but also attempt to view the data it stores.

    2.Blockchain security.Data stored on the blockchain is public to all nodes.Consortium blockchain peers are authorized to register to the platform but there might be malicious nodes.Edge nodes (Data providers and consumers) are endorsors for the blockchain and realize consensus based on Practical Byzantine Fault Tolerance(PBFT)[35].

    3.Consensus fault tolerance.Invalid nodes in fabric refer to nodes that cannot perform validity verification due to downtime or malicious operations.From the PBFT principle,the amount of invalid nodes(including malicious nodes)in the system must not exceed 1/3 of the committee validator nodes.

    4.3 Security Goals

    The Zobric platform is designed with the following security goals.

    1.Mutual Authentication.Data providers need to authenticate data consumers and clarify the flow of data for the sake of traceability of subsequent data processing.In addition, data providers need to achieve mutual authentication with data consumers under the premise of lacking an authentication center.

    2.Secure One-to-Many Data Sharing.If a data provider sells several sets of data to multiple data consumers using one-to-one data sharing schemes,it will result in a significant increase in transaction volume and computational cost of data provider in a distributed system.In addition, as cloud servers or data trading platforms are untrusted, the platform should also support secure sharing among data providers in bulk in the IoT environment.

    3.Privacy Preserving.Data providers are unwilling to disclose the trading or sharing status of the data.Meanwhile,data plaintext should not be accessed by unauthorized entities,including cloud servers.So the identity of the data provider should be secret during the transaction process,meanwhile the data consumer can be associated with the data provider.

    4.Data Access Control.Data transactions should guarantee that only authenticated data consumers who are authorized for the data have access to the specified data.This setting should be controlled by the data provider, but could be operated by the cloud server.Data providers should dynamically adjust the policy for data access control in real-time based on the transaction.

    5.Traceability, Auditable and Integrity of Data Transaction Records.In an IoT environment without a trusted center,data trading platforms need to record data transactions information for accountability including the entities of the transaction, data type, data volume, etc.In order to provide post-transaction fairness and negotiability,data transaction records should be guaranteed to be traceable and tamper-resistant upon consensus.In addition,records of data ownership transfer should be auditable.

    6.Resisting against Multiple Typical Attacks.The proposed authentication and data sharing protocols should be executable and resistant to existing protocol attacks such as replay attacks,Man-in-the-middle attacks,forgery attacks,data stealing and so on.

    5 Zobric Design

    The proposed IoT Data Market Platform Zobric runs on 3 layers: (1) The bottom layer is the data aggregation layer where data collection is performed by various IoT terminal devices; (2) The middle layer is the data control and transmission layer, in which the device group control center performs data sharing control and the establishment of secure channels for data transmission among IoT devices; (3) The top layer is the sharing and trading layer, where the data is traded or shared among the data provider,the demander and the cloud storage server,with secure authentication and key agreement protocol and smart contracts.The secure data transaction procedures are shown in Fig.2 and described as follows in detail.

    Figure 2:Procedures for zobric data sharing

    1) Identity registration,where the nodes involved in data transactions register in the data trading platform with the help of BS.

    2) Transaction group creation, where a data provider issues a data announcement or a data consumer initiates a data request to create a transaction group (Fabric Channel) to protect transaction privacy.

    3) The data provider encrypts the data using symmetric encryption with a data protection key and uploads it to the cloud server side.This step can be repeated multiple times for multiple sets of data.Then DP will issue data uploading transactions and wait for transaction confirmation.

    4) The group authentication and key agreement protocol would be executed among the data provider and the data consumers to negotiate data protection keys.

    5) The data provider and data consumers negotiate data bids/payments,etc.

    6) The data provider summarizes the valid data trades mentioned above,and only one blockchain data authorization transaction is issued,(with a list of storage addresses created by the cloud server)to authorize the data for the data consumers.

    7) Once the data authorization transaction is confirmed, a smart contract is triggered to create/update a list of data access rights on the cloud server and the data consumers side.

    8) The cloud server control the access of the consumers based on list of permissions.

    9) The authenticated data consumer can download the data and use the data encryption key to decrypt the data.

    5.1 Group Authentication and Key Agreement Protocol

    5.1.1 Registration and Setting Up Phase

    The notations used in the protocol and their corresponding definitions are shown in Table 2.On the registration phase, DPs and DCs need to register in the Fabric-based consortium chain to join the trading platform.The blockchain consists of identity management nodes and Fabric-CA.In this scheme,the node identity registration is done based on the existing registration architecture,and the registration process will be done under TLS (Transport Layer Security) protection.The registration procedures are as follows.

    Table 2: Definition of notation

    1.The data transaction nodeithat wishes to join the platform sends a registration request(ispecific,si)to the blockchain service node,i-specificmeans that the real identity of nodei,such as the combination of the username and its transaction identity,siis the secret of nodei,such as the password.

    2.After receiving the request message,the platform verifies the identity with consortium policy and generates an unprecedented identityIDifor nodei, and the blockchain service node generates the public/private key pair(PKi,SKi)and certificateCerti,then replies((PKi,SKi),Certi)to the node.

    Blockchain service nodes(BSs)will set public parameters for transaction validation and authentication initialization on the setting up phase.

    (1) The BS in the trading platform performs authentication initialization, selects the security parameterk∈Z?,and generates the authentication system parameters as follows:

    (1.1) Choose an elliptic curve G1of prime orderq.Assuming that the generator of the curve isP.Choose the master keysBS∈,the public key isPBS=sBSP.

    (1.2) Choose three hash functions as follows,H1:{0,1}?×G1×G1→,H2:{0,1}?×{0,1}?×G1×{0,1}?×G1→,H3:{0,1}?×{0,1}?×G1×{0,1}?→,and expose public parameters{G1,q,P,PBS,H1,H2,H3}.

    (1.3) Choose a nonceri∈, computeRi=riPandh1i=H1(IDDCi,Ri,PBS).Then compute a partial private keyki=(ri+sBSh1i)modq,and sendK1i=(ki,Ri)to theDCithrough a secure channel.

    (2) TheDCigenerates the aggregated signature key pair(APKi,ASKi)as follows:

    (2.1) After receiving theK1i,check whether the equationkiP=Ri+h1iPBSholds,if it holds,go to the next step.

    (2.2) Generate a random number assDCiand computeK2i=sDCiP,then set the public keyAPKi=(K2i,Ri)and the private keyASKi=(sDCi,ki).

    (3) TheBSgenerates the zero-knowledge proof authentication parameters for theDPas follows:

    (3.1) InvokeNIZK(σ,τ)←Setup(R)as described in Section 3, in which the calculation constraints for relationRare as follows, they are a series of polynomials that form computational problems.

    Balance:Assumed that this transaction includesm-l-1 pieces of data, for each dataDIj(l+2 ≤j≤m)in data listDLto be traded: Σ

    Trade authority:For uploading transaction block serial number forDIj(generally,privacy protection is performed)should be equal to trade transaction block which points out the upload block serial number.

    Data ownership authentication:For eachj(l+2 ≤j≤m)and a Hash functionH4:{0,1}→,satisfy the following equation.

    (3.2) For each witnesses(al+1,...,am)∈,al+1=SKDC aj=GSDIj,l+ 2 ≤j≤m, anda0= 0,statment(a1,...,al)∈can be determined based onR.Vpubj=DIjandVtransj=SigPKDP(DIj).The equation holds relationR:h(X)t(X),in whicht(X)is an(n-2)th degree polynomial.

    (3.3) AssumingG,His the arbitrary generator of group G2and G3, respectively.The DC chooses a random nonce ∈,and the BS chooses random noncesα,β,γ,δ,x∈.Setτ=(α,β,γ,x)and compute the public verification parameter common reference stringσ

    according to the following equation:

    5.1.2 Trading Group Formation and Negotiation

    1.For registered users, the corresponding data trading channel can be connected according to the demand.

    2.The data provider broadcasts the data sets information in the channel,such as data size,content summary, data price, etc.The data consumers(1-i)wishing to purchase this data join the group for this transaction and execute the group authentication and key agreement protocol in 5.1.4 with the data provider.

    5.1.3 Data Uploading Transaction

    Data providers can select the datasets to be uploaded depending on consumer feedback in the trading channel, and this operation increases the probability that the data will be purchased.For a data providerDP, it generatesDI=H(Data)and storage encryptionGSfor one set of data, then it applies to upload the encrypted data to the cloud.The cloud server will check if theDIappears repeatedly,if not,it will accept the request and assign a storage addressDAtoDI.After the upload is completed,theDPwill initiate an upload transaction with(DI,SigPK(DI),SigPK(H(DI,GS))).TheDPcan repeat this operation by uploading multiple sets of data for sale.It should be noted that data trading can only be carried out after the uploading transaction confirmation.

    5.1.4 Group Authentication and Key Agreement

    As shown in Fig.3,the authentication and key agreement procedures are as follows:

    (1) At first, theDPbroadcasts a list of tradable dataDIl+ 1...Dn,m≤nwithin the trading channel, and provides the nameTN=(TradingNumber)and valid timeTVof this trading.Note that during this period,the DP does not need to send its real ID and can use a temporary ID to achieve trading anonymity.

    (2) Within the validity period, allDCican choose the data they want to buy and generate a purchase listPLi=(DIj...).Then theDCichooses a random nonceyi∈and a timestampT1i, and computes the signature onH(TN)according to the following equations:Yi=yiP,h2i=H2(H(TN),IDDCi‖PLi,APKi,T1i,Yi),h3i=H3(H(TN),IDDCi‖PLi,APKi,T1i),Wi=(h2iyi+h3i(sDCi+ki))modq.TheDCireplies the messageM1i=(IDDCi‖PLi,Yi,Wi,T1i)to theDP.(3) After receiving different response messagesM1i (i= 1,···,N)beforeTV,theDPaggregates these messages by computing these equations:h1i=H1(IDDCi‖PLi,Ri,PBS),h2i=H2(H(π),IDDCi‖PLi,APKi,T1i,Yi),h3i=H3(H(π),IDDCi‖PLi,APKi,T1i).Then theDPcomputes the aggregated signatureand verifies whether the equationholds,if it holds,theseDCis are valid,otherwise,theDPdetects every member according to the equationWiP-h2iYi=h3i(K2i+Ri+h1iPBS),if it holds,the member and itsPLiis valid.

    (6) After confirming payment,theDPsends the messageM3i=EncPKDCi (GSPLi,DAPLi,TN,IDDCi)to thoseDCis who have successfully purchased data and been authenticated.For the dataDIisold toDCk..DCj, theDPissues a transaction withinSigPKDP(List(DIi,DCk...Dj),DIi∈DL)which indicates the ownership transfer list of every dataDIiinDL.

    (7) After receiving the messageM3i,respectiveDCidecrypts theM3ito obtain theGSDIjit wants.The hash header in the transaction can be indexed to the data provider.Alternatively,the DC can directly try downloading data from the cloud.

    Figure 3:Group authentication and key agreement protocol

    5.2 Fabric Smart Contract ZobricCC Design

    The data provider publishes a transaction to record the trading.Specifically, the transaction provides data access lists inDLand the accessible data addresses.

    5.2.1 Transaction Block Design

    The structure of the published transaction block is shown in Fig.4.ChannelHeaderincludes the transaction ID (Txid), timestamp (Timestamp), and channel information (ChannelId).SignatureHeadercontains the certificate of the block creator, his ID (mspid) and a nonce.The header also contains the period information used to identify the logical time window that is used to resist replay attacks.ChaincodeSpeccontains the version, name and timeout of the smart contract.

    Proposal Responserecords the response to a smart contract call.Chaincode Endorse Actioncontains the Endorser name and its Signature.

    Figure 4:Transaction block structure

    Inputis the function of the proposed smart contract including the transaction,the data provider signature (DPSign), the address of the data on the cloud server (DA), and the data consumer ID list(DCs).Transaction amount(TAmount),and this part are specified by the smart contract.When updating the access list,Inputcontains the UpdateAccessList(function name),the IP address of the cloud server, the user name (DC) to be updated and the data address to be added (NewDA).The content of theInputis specified by the Zobric smart contract(ZobricCC).Fig.5 shows the contents of each part when recording transactions and updating the permission list.

    5.2.2 Smart Contract Functional Design

    After the authentication procedures are finished,the smart contract is invoked for authorization.When a Smart Contract is executed,the Invoke method is first called,then the function of the Invoke and the parameters are analyzed before the relevant process is executed.The Invoke flows are shown in Fig.6.

    Figure 5:Contents of input function

    Figure 6:Smart contract invocation flow

    (1)RecordTransaction.When a request is received to record a transaction, the transaction ID(TxId) in the ChannelHeader is first checked for uniqueness and a transaction record can be identified based on this ID.The request parameters are then bound to an object called transaction,which mainly contains the data provider signature,data address,data consumers,transaction amount and other information as shown in Fig.5Input(1).The transaction is then checked for reasonableness, mainly to detect the existence of the user, and whether there are duplicate purchases.The TxId and transaction information is stored as a key-value pair in the state database after the test is completed and recorded in the chain.

    (2)UpdateAccessList.After the transaction has been recorded,the access list on the cloud server also needs to be updated so that the consumer who has purchased the data has permission to obtain the data address.The smart contract receives a call with the function UpdateAccessList.After parsing the parameters, it first checks the permissions and the validity of the user and the transaction by querying the transaction information related to that user with the function queryByDC().The UpdateRequest() method is then called to construct an update request,serialising the parameters,such as the user to be updated,the permissions to be added,and the validity of the permissions.The cloud server receives the request and updates the permission lists.

    (3)RecordAuthentication.Before a transaction is issued, the authentication and key agreement protocol needs to be completed,while protecting the privacy of data providers.The structure of ZKP is defined in the smart contract,which includes the transaction ID and the proofπ.Similar toRecordTransaction,this function detects whether the transaction ID is unique,then binds the parameter to a ZKP object and stores the transaction ID and ZKP as a key-value pair in the state database.When the DC needs to use the parameter,it can query the parameter by calling queryProof(TransactionID).

    6 Security Analysis and Discussion

    6.1 Correctness Analysis

    (1)Mutual authentication.The data provider authenticates all data consumers by verifying the aggregated signatures.The correctness of the signature algorithm is verified as follows:

    The correctness of the aggregation algorithm is verified as follows:

    The aggregated signature algorithm is based on the ECDLP, and the proof of security can be found in[36].The data consumers signs the fresh identity proofTNwith secret keysDCito respond to the authentication challenge.Moreover,zero-knowledge arguments in the proposed protocol have been proven to be computational knowledge soundness,that is,the DC who hasSKDCand knows theGSPLcan construct the convinced proofπ.This proves the identity of the DC and its ownship of all data in the data listDL.

    (2)Key distribution and secure data sharing.The scheme can ensure the security of data sharing.Firstly,the DP authenticates the data consumers and verifies the applicant for their required data list.Secondly,the DP encrypts the data key using the public key of data consumer,which ensures that only authenticated and payment confirmed consumers can obtain the key.Thirdly,the DP releases the data access list specified in the transaction and triggers the smart contract to update the data access permission list on the cloud server side.Even if the cloud server is untrustworthy or there exists disguised attackers,the data sharing security can be guaranteed.

    (3)Privacy protection.The DP does not need to provide a real ID for data transaction validation,that protects the trading status of the DP.Meanwhile, zero-knowledge arguments will not disclose the information about the DP and data keys, onlyDLaccess permission transfer can be observed on the public channel.Therefore, the proposed solution can achieve the protection of transaction and identity privacy information of data providers.Consumers who have purchased data, can obtain the DP’s identity information through the association of trading transactions.

    6.2 Formal Security Verification

    We use the formal verification tool Tamarin [37] to perform formal security verification of the proposed authentication and key distribution protocol.Tamarin prover is an effective tool, which has been applied to numerous protocols including Transport Layer Security (TLS) [38], for symbol modeling and analysis of security protocols.

    After inputting the security protocol model to Tamarin, it will specify the agents to perform the behavior simulations of different roles, the rules for the adversary and the rules for the security properties required by the protocol.And then Tamarin will automatically construct a security proof.We rewrite”rules”to define protocols and adversaries using an expressive language based on multiset.Subsequently, we convert the protocol into executable code in the Tamarin tool by the following four steps.(1) Function construction, where the equations and cryptographic algorithms within the protocol are written as functions to be called by the protocol.Some of the cryptographic algorithms such as hashing and asymmetric encryption are already included in the Tamarin tool.(2) The infrastructure(e.g.,authentication server)is modeled and the protocol environment is described using multiset rewriting rules that operate on the state of the system.(3)The proposed protocol is modeled by invoking the above rules and functions to compose a protocol flow that simulates the message transfer and computational operations between entities.(4) The security properties are modeled.In our protocol, we need to verify the mutual authentication between the data provider and the data consumers, the confidentiality and the integrity of keys, the resistance of the protocol to attacks,and other security properties.In this simulation, we write 6 types of rules to represent the actions of the proposed protocol,which include initialization,nonce generation,registration,key revealation,message transmission,and message validation,as shown in Fig.7.

    For the authentication properties of the protocol, Tamarin formalizes the entity resistance to attacks,such asAlivenessfor fake identity,Weak agreementfor replay attacks andInjective agreementfor Man-in-the-Middle attacks.Other claims likeExecutableandSecretrepresent the enforceability and confidentiality of the protocol, respectively.We model the data provider and multiple data consumers in Tamarin.As shown in Fig.8,the simulation results indicate that the multi-party entities in our protocol can be authenticated securely and are resistant to various attacks,with no valid attacks found under the Tamarin simulation.

    Figure 7:Protocol modeling in Tamarin

    Figure 8:Protocol security simulation results in Tamarin

    7 Performance Evaluation

    Performance includes the following two parts:the proposed protocol performance and blockchain service performance.On the protocol performance, we use algorithm simulation to evaluate it by comparing with other solutions in terms of computational cost and transmission cost.On blockchain service performance,we use the Hyperledger Caliper framework to evaluate the performance of Fabric in terms of permission distribution throughput and transaction confimration delay.

    This work is based on the Hyperledger Fabric version 1.4.0.Firstly, we deploy the Golang environment,Docker,and Docker Compose.The system uses Docker to establish a virtual machine for multi nodes environment simulation.The zero-knowledge proof adopted in this scheme is developed based on the Libsnake framework.For the convenience of use,we compile the executable binary ZKP.The tools and versions used during the compilation process are as shown in Table 3.

    Table 3: Zero-knowledge proof compiler version

    For the web service environment of trading platform,the testing browser is Microsoft Edge,and the specific version information is as shown in Table 4.

    Table 4: Web service environment

    7.1 Proposed Protocol Performance

    7.1.1 Computational Cost

    In this section, we simulate and calculate the time consumed by the proposed protocol by comparing the results with other related schemes in [24,25,28,30].We use the MIRACL library algorithms and the libsnake library for zero-knowledge proof to evaluate time consumption.The symmetric and asymmetric encryption algorithm adopts AES-256 and ECC-164, respectively.The results are shown in Table 5.

    Table 5: Cryptographic algorithm time cost

    Forndata consumers,each purchasingmpieces of data,the time consumption comparison of the solutions is shown in Table 6.

    Table 6: Time cost comparison

    As shown in Fig.9, the proposed protocol has the advantage on the computational efficiency when the number of data consumers or the number of datasets increases, because our solution can aggregate and verify data consumers,as well as simultaneously verify the ownership of multiple sets of data.Specifically,in our protocol,data consumers do not need to perform more validation calculations when purchasing more datasets.

    Figure 9: (Continued)

    7.1.2 Transmission Overhead

    On the transmission overhead, the size of transmission messages are evaluated other than the trading data itself.In platform construction, the hash output length of the elliptical curve is 512 bits and theID, timestamp is 16 bits.AndProofsize for Groth 16 in our scheme is 0.2 kb which is 0.08%of the proof size in Factual(250 kb)[13].The transmission overhead comparison is shown in Table 7 and Fig.10.As shown in Fig.10,the proposed protocol has fewer interaction rounds and lower message transmission consumption for verification than other related schemes.Similarly,when purchasing multiple data sets,data consumers do not need to incur additional transmission costs.

    Figure 10:Transmission Overhead Comparison

    Table 7: Transmission overhead

    7.2 Blockchain Service Performance

    Caliper is a benchmark testing framework specifically designed to test the permission distribution throughput and transaction confirmation delay.Currently,it supports multiple performance indicators,including transaction success rate,transaction throughput,and transaction latency.We simulate the impact of different transaction request rates on Fabric throughput and transaction latency when the block size is 50 MB.The following data are obtained as shown in Table 8.

    Table 8: Permission distribution throughput and transaction confirmation delay

    As shown in Fig.11,as the transaction request rate increases,the initial throughput also increases linearly, but after reaching a certain bottleneck (around 80 tps), the throughput maintains about 75 tps.When the transaction request rate is low,the transaction latency is maintained at around 0.6 s,but when the transaction request rate is higher than around 80 tps,the delay of the transaction starts to increase.Overall,the transaction confirmation time on this platform is in seconds,which is userfriendly.

    Figure 11:Permission distribution throughput and transaction confirmation delay

    8 Conclusion

    More and more intelligent sensing devices are connected to the internet,causing a rapid growth of networking data volume.The collaborative,integrated,and intelligent development of the Internet of Things requires data sharing and transaction support between multiple domain nodes.We designed a decentralized IoT secure data sharing platform that allows individual users to freely and conveniently join.The fog and cloud enabled trading platform realizes decentralized identity management and trading organization, balancing the security and the efficiency of data sharing.For the identity authentication module of the platform, we also innovatively combine the zero-knowledge proof technology with aggregated signature, authenticate the data provider and data ownership through the zero-knowledge proof identity authentication algorithm.The supplier simultaneously verifies the identities of multiple consumers through the aggregated signature algorithm.The proposed scheme can realize the secure one to many data sharing under the protection of transaction sensitive information,and reduce the computational overhead and transmission overhead,which is very suitable for the large amount of secure data sharing among resource-limited devices.

    Acknowledgement:The authors would like to acknowledge Ministry of Science and Technology of the People’s Republic of China and National Natural Science Foundation of China (NSFC) for the financial support through National Key R&D Program of China (No.2022YFB3103400) and NSFC under Grant 61932015 and Grant 62172317.The authors would like to give thanks to the School of Cyber Engineering, Xidian University, China, for promoting this research and providing the laboratory facility and support.

    Funding Statement:This work is supported by the National Key R&D Program of China (No.2022YFB3103400),the National Natural Science Foundation of China under Grants 61932015 and 62172317.

    Author Contributions:The authors confirm contribution to the paper as follows:study conception and design:Y.Luo,J.Cao;methodology:Y.Luo,W.You;data collection:C.Sahng,Y.Luo;analysis and interpretation of results:Y.Luo,C.Shang;draft manuscript preparation:X.Ren,Y.Luo,C.Shang;supervision:H.Li.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:Not applicable.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产精品综合久久久久久久免费 | 亚洲欧美日韩另类电影网站| 免费看a级黄色片| avwww免费| 亚洲成av片中文字幕在线观看| 国产av精品麻豆| 国产精华一区二区三区| 欧美日韩视频精品一区| 777久久人妻少妇嫩草av网站| 少妇的丰满在线观看| www国产在线视频色| 国产麻豆69| 最近最新免费中文字幕在线| 久久久精品欧美日韩精品| 国产精品偷伦视频观看了| 99久久综合精品五月天人人| 午夜91福利影院| 日韩中文字幕欧美一区二区| 欧美老熟妇乱子伦牲交| 18禁裸乳无遮挡免费网站照片 | 19禁男女啪啪无遮挡网站| 国产精品 国内视频| 成人国语在线视频| 日本撒尿小便嘘嘘汇集6| 69av精品久久久久久| 女人爽到高潮嗷嗷叫在线视频| xxx96com| 麻豆一二三区av精品| 他把我摸到了高潮在线观看| 免费在线观看完整版高清| 日本黄色日本黄色录像| 久久久精品欧美日韩精品| 欧美在线一区亚洲| 电影成人av| 青草久久国产| 中亚洲国语对白在线视频| 精品一区二区三区四区五区乱码| 香蕉久久夜色| 国产不卡一卡二| 国产av精品麻豆| 精品国产一区二区久久| netflix在线观看网站| 三上悠亚av全集在线观看| 黄片小视频在线播放| 最近最新免费中文字幕在线| 亚洲精品国产色婷婷电影| 亚洲一区中文字幕在线| 亚洲国产毛片av蜜桃av| 久久人妻福利社区极品人妻图片| 中出人妻视频一区二区| 国产乱人伦免费视频| 美女午夜性视频免费| 久久久精品欧美日韩精品| 无人区码免费观看不卡| 欧美乱码精品一区二区三区| 日本五十路高清| 91成年电影在线观看| 人人妻人人澡人人看| 脱女人内裤的视频| 99久久人妻综合| 亚洲av日韩精品久久久久久密| 后天国语完整版免费观看| 欧美久久黑人一区二区| 欧美一区二区精品小视频在线| 精品国产美女av久久久久小说| 亚洲av熟女| 大码成人一级视频| 一本综合久久免费| 一区福利在线观看| 18禁裸乳无遮挡免费网站照片 | 欧美日韩亚洲综合一区二区三区_| 三级毛片av免费| 99国产精品99久久久久| 成人三级黄色视频| 久久天躁狠狠躁夜夜2o2o| www.精华液| 色老头精品视频在线观看| 国产xxxxx性猛交| 亚洲av第一区精品v没综合| 久久久国产成人精品二区 | 色精品久久人妻99蜜桃| 淫妇啪啪啪对白视频| 国产成人欧美| 黑丝袜美女国产一区| 精品国产一区二区久久| 欧美日韩瑟瑟在线播放| 久久天堂一区二区三区四区| 亚洲人成电影免费在线| 一本综合久久免费| 日韩欧美一区二区三区在线观看| 一区二区三区精品91| 最近最新中文字幕大全电影3 | 91大片在线观看| 丰满饥渴人妻一区二区三| 亚洲精品一二三| 午夜免费激情av| 天堂影院成人在线观看| 麻豆久久精品国产亚洲av | 久久精品亚洲精品国产色婷小说| 男人舔女人下体高潮全视频| 国产成人影院久久av| 9色porny在线观看| 日韩免费av在线播放| 国产亚洲欧美在线一区二区| 中出人妻视频一区二区| 亚洲av五月六月丁香网| 99热只有精品国产| 欧美精品一区二区免费开放| 亚洲中文日韩欧美视频| 精品一区二区三卡| 久久精品成人免费网站| 国产精品野战在线观看 | 人妻久久中文字幕网| 曰老女人黄片| 两个人免费观看高清视频| 午夜福利在线观看吧| 正在播放国产对白刺激| 成人av一区二区三区在线看| 欧美日韩乱码在线| 免费av中文字幕在线| 久热爱精品视频在线9| 午夜免费观看网址| 日韩有码中文字幕| 曰老女人黄片| 国产黄a三级三级三级人| 热99re8久久精品国产| 久久精品亚洲精品国产色婷小说| 国产高清激情床上av| 男女下面插进去视频免费观看| 免费久久久久久久精品成人欧美视频| 色哟哟哟哟哟哟| 91精品三级在线观看| 午夜精品久久久久久毛片777| 日日摸夜夜添夜夜添小说| 韩国精品一区二区三区| 免费人成视频x8x8入口观看| 91老司机精品| 91字幕亚洲| 极品教师在线免费播放| 色尼玛亚洲综合影院| 日本黄色视频三级网站网址| 免费观看人在逋| 日韩欧美在线二视频| 亚洲五月色婷婷综合| 日本精品一区二区三区蜜桃| 国产麻豆69| 亚洲午夜理论影院| 久久精品91蜜桃| 国产精品综合久久久久久久免费 | 免费在线观看视频国产中文字幕亚洲| 亚洲欧美激情在线| 亚洲伊人色综图| 宅男免费午夜| 亚洲七黄色美女视频| 日韩有码中文字幕| 国产成人av激情在线播放| 国产精品98久久久久久宅男小说| 亚洲成人精品中文字幕电影 | 99久久精品国产亚洲精品| 免费观看精品视频网站| 黄网站色视频无遮挡免费观看| 午夜福利欧美成人| 日本免费a在线| 精品无人区乱码1区二区| 国产成+人综合+亚洲专区| 免费少妇av软件| 国产伦人伦偷精品视频| 久久人人爽av亚洲精品天堂| 天天躁狠狠躁夜夜躁狠狠躁| 黄片大片在线免费观看| 亚洲一区二区三区不卡视频| 一区福利在线观看| 99在线视频只有这里精品首页| 搡老熟女国产l中国老女人| 美女大奶头视频| 国产黄色免费在线视频| 亚洲精品一二三| 天堂中文最新版在线下载| 校园春色视频在线观看| 国产精品亚洲一级av第二区| 淫秽高清视频在线观看| 国产aⅴ精品一区二区三区波| 12—13女人毛片做爰片一| 国产一区二区激情短视频| 欧美中文日本在线观看视频| 亚洲国产欧美日韩在线播放| 亚洲一码二码三码区别大吗| 日日夜夜操网爽| 久久久久亚洲av毛片大全| 久久99一区二区三区| 最近最新中文字幕大全电影3 | 久久人妻av系列| 久久人人97超碰香蕉20202| 天堂中文最新版在线下载| 搡老乐熟女国产| 自线自在国产av| 久久精品国产亚洲av高清一级| 级片在线观看| 婷婷精品国产亚洲av在线| 亚洲七黄色美女视频| 黄色a级毛片大全视频| av天堂在线播放| 色精品久久人妻99蜜桃| 午夜福利影视在线免费观看| 99热只有精品国产| 美女扒开内裤让男人捅视频| 国产av在哪里看| 亚洲五月天丁香| av国产精品久久久久影院| 欧美av亚洲av综合av国产av| 国产av又大| 精品国产国语对白av| 美女午夜性视频免费| 男人操女人黄网站| 女性被躁到高潮视频| 久久精品影院6| 久久精品国产99精品国产亚洲性色 | 91精品国产国语对白视频| 成人三级黄色视频| 一级作爱视频免费观看| 777久久人妻少妇嫩草av网站| 黄色视频不卡| 法律面前人人平等表现在哪些方面| 悠悠久久av| 国产成人精品无人区| 91老司机精品| av视频免费观看在线观看| 免费在线观看黄色视频的| 亚洲午夜精品一区,二区,三区| 亚洲男人天堂网一区| 欧美丝袜亚洲另类 | 一进一出好大好爽视频| 两人在一起打扑克的视频| 女同久久另类99精品国产91| 日本a在线网址| 9色porny在线观看| avwww免费| 操出白浆在线播放| 亚洲中文字幕日韩| 欧美日韩亚洲综合一区二区三区_| 天堂影院成人在线观看| 亚洲成人精品中文字幕电影 | 亚洲欧美精品综合一区二区三区| 久久久精品欧美日韩精品| 高清在线国产一区| 好男人电影高清在线观看| 中亚洲国语对白在线视频| 精品国产国语对白av| 少妇被粗大的猛进出69影院| 美女 人体艺术 gogo| 国产精品98久久久久久宅男小说| 叶爱在线成人免费视频播放| 真人做人爱边吃奶动态| 深夜精品福利| 正在播放国产对白刺激| 男女下面进入的视频免费午夜 | av在线播放免费不卡| 欧美日韩福利视频一区二区| 日韩中文字幕欧美一区二区| 在线看a的网站| 丁香六月欧美| 国产免费av片在线观看野外av| 中文欧美无线码| 9191精品国产免费久久| 国产欧美日韩精品亚洲av| 美女扒开内裤让男人捅视频| 巨乳人妻的诱惑在线观看| 久99久视频精品免费| 亚洲精品成人av观看孕妇| 欧美激情高清一区二区三区| 亚洲av成人一区二区三| 久久香蕉国产精品| 黄色怎么调成土黄色| 国产又爽黄色视频| 99热国产这里只有精品6| 变态另类成人亚洲欧美熟女 | 欧美黄色淫秽网站| ponron亚洲| 欧美成人性av电影在线观看| 在线国产一区二区在线| 亚洲精品粉嫩美女一区| 级片在线观看| 一区二区日韩欧美中文字幕| 久久九九热精品免费| 国产精品一区二区免费欧美| 亚洲va日本ⅴa欧美va伊人久久| 日韩精品青青久久久久久| 深夜精品福利| 超色免费av| 国产高清国产精品国产三级| 一级毛片精品| 嫁个100分男人电影在线观看| 人人澡人人妻人| 国产精品综合久久久久久久免费 | 久久国产精品男人的天堂亚洲| 最近最新免费中文字幕在线| 啦啦啦在线免费观看视频4| 精品人妻1区二区| 久久久久久久久久久久大奶| 淫妇啪啪啪对白视频| av中文乱码字幕在线| 亚洲精华国产精华精| 男男h啪啪无遮挡| 91成人精品电影| 51午夜福利影视在线观看| 搡老乐熟女国产| 美女午夜性视频免费| 夜夜夜夜夜久久久久| 日本免费一区二区三区高清不卡 | 亚洲欧美日韩高清在线视频| 精品乱码久久久久久99久播| 免费久久久久久久精品成人欧美视频| 美女午夜性视频免费| 操美女的视频在线观看| 国产三级在线视频| 色婷婷av一区二区三区视频| 乱人伦中国视频| 久久香蕉激情| 成人av一区二区三区在线看| 99香蕉大伊视频| 亚洲精品在线美女| 亚洲人成电影观看| 成人特级黄色片久久久久久久| 亚洲五月天丁香| 在线十欧美十亚洲十日本专区| 91成年电影在线观看| 亚洲欧美日韩高清在线视频| 亚洲精品美女久久av网站| 国产精品一区二区在线不卡| 国产av一区二区精品久久| av网站在线播放免费| 成人三级黄色视频| 中出人妻视频一区二区| 午夜福利欧美成人| 法律面前人人平等表现在哪些方面| 巨乳人妻的诱惑在线观看| 国产单亲对白刺激| 日本欧美视频一区| 久久久国产成人精品二区 | svipshipincom国产片| 美女大奶头视频| 夜夜夜夜夜久久久久| av天堂在线播放| 国产成人一区二区三区免费视频网站| 亚洲精品在线观看二区| 免费在线观看亚洲国产| 久久人人精品亚洲av| 桃色一区二区三区在线观看| 国产亚洲精品第一综合不卡| 欧美丝袜亚洲另类 | 天堂中文最新版在线下载| 亚洲一区二区三区不卡视频| 日本a在线网址| 午夜福利影视在线免费观看| 亚洲欧美一区二区三区黑人| www日本在线高清视频| 久久人妻熟女aⅴ| 欧美人与性动交α欧美软件| 亚洲av第一区精品v没综合| 又黄又粗又硬又大视频| 18禁美女被吸乳视频| av电影中文网址| 久久中文字幕人妻熟女| 亚洲va日本ⅴa欧美va伊人久久| 中文字幕人妻丝袜制服| 99国产精品一区二区三区| 极品教师在线免费播放| 成人永久免费在线观看视频| 天堂中文最新版在线下载| 99国产精品一区二区三区| 亚洲av第一区精品v没综合| 久久精品亚洲熟妇少妇任你| cao死你这个sao货| 国产精品98久久久久久宅男小说| www.www免费av| 亚洲熟女毛片儿| 91国产中文字幕| 日韩中文字幕欧美一区二区| 69精品国产乱码久久久| 波多野结衣高清无吗| 三级毛片av免费| 99久久人妻综合| 日本撒尿小便嘘嘘汇集6| 国产男靠女视频免费网站| 性少妇av在线| 日本欧美视频一区| 夫妻午夜视频| 亚洲男人天堂网一区| 高潮久久久久久久久久久不卡| 天堂√8在线中文| 国产精品电影一区二区三区| 亚洲狠狠婷婷综合久久图片| av中文乱码字幕在线| 欧美日韩一级在线毛片| 国产深夜福利视频在线观看| 欧美黄色淫秽网站| 一区福利在线观看| 久久影院123| 欧美黑人欧美精品刺激| 在线观看免费高清a一片| 午夜福利在线免费观看网站| 又黄又粗又硬又大视频| av超薄肉色丝袜交足视频| 变态另类成人亚洲欧美熟女 | 91老司机精品| 琪琪午夜伦伦电影理论片6080| 亚洲av片天天在线观看| 性色av乱码一区二区三区2| 老司机亚洲免费影院| 高清黄色对白视频在线免费看| 欧美日韩精品网址| 国产精品成人在线| 男人舔女人的私密视频| 女人精品久久久久毛片| 午夜a级毛片| 亚洲精品国产色婷婷电影| 岛国视频午夜一区免费看| 脱女人内裤的视频| 99精国产麻豆久久婷婷| 日韩精品中文字幕看吧| 国产黄色免费在线视频| 一进一出抽搐gif免费好疼 | 亚洲视频免费观看视频| 黄色怎么调成土黄色| 久久久久久久午夜电影 | 久久精品91无色码中文字幕| 动漫黄色视频在线观看| 美女 人体艺术 gogo| 免费看a级黄色片| 狂野欧美激情性xxxx| 日韩精品免费视频一区二区三区| av天堂久久9| 久久精品影院6| 精品卡一卡二卡四卡免费| 性色av乱码一区二区三区2| 色婷婷久久久亚洲欧美| 中亚洲国语对白在线视频| 精品国产亚洲在线| 精品一区二区三区四区五区乱码| 国产在线观看jvid| 黄色丝袜av网址大全| 亚洲精品美女久久久久99蜜臀| 精品国内亚洲2022精品成人| 久久久国产精品麻豆| netflix在线观看网站| 在线看a的网站| av免费在线观看网站| 青草久久国产| 亚洲伊人色综图| 成人三级做爰电影| 岛国视频午夜一区免费看| 亚洲色图综合在线观看| 国产伦人伦偷精品视频| 午夜两性在线视频| 美女 人体艺术 gogo| 国产又爽黄色视频| 两个人看的免费小视频| 午夜精品国产一区二区电影| 午夜亚洲福利在线播放| 欧美最黄视频在线播放免费 | cao死你这个sao货| 国产成+人综合+亚洲专区| 90打野战视频偷拍视频| 亚洲精品久久午夜乱码| 在线观看免费视频网站a站| 首页视频小说图片口味搜索| 亚洲伊人色综图| av福利片在线| 12—13女人毛片做爰片一| 久久香蕉激情| 精品电影一区二区在线| 两性夫妻黄色片| a级毛片黄视频| 18美女黄网站色大片免费观看| 一区二区三区激情视频| 国产熟女午夜一区二区三区| 国产深夜福利视频在线观看| 亚洲精品国产一区二区精华液| 两个人免费观看高清视频| 一级毛片女人18水好多| 露出奶头的视频| 免费日韩欧美在线观看| 视频在线观看一区二区三区| 亚洲成人久久性| 人人妻人人澡人人看| 久久国产乱子伦精品免费另类| av网站在线播放免费| 国产成年人精品一区二区 | 亚洲欧美一区二区三区黑人| 一边摸一边做爽爽视频免费| 人人妻人人澡人人看| 亚洲国产精品sss在线观看 | 免费少妇av软件| 国产日韩一区二区三区精品不卡| 久久久国产精品麻豆| 欧美日韩瑟瑟在线播放| 两性夫妻黄色片| 最好的美女福利视频网| 日本三级黄在线观看| 成年人免费黄色播放视频| 国产精品久久久久成人av| 一边摸一边抽搐一进一小说| ponron亚洲| 精品欧美一区二区三区在线| 国产成年人精品一区二区 | 丝袜人妻中文字幕| 日本免费一区二区三区高清不卡 | 老司机在亚洲福利影院| 国产色视频综合| 91成人精品电影| av天堂久久9| 免费高清在线观看日韩| 亚洲欧美日韩另类电影网站| 18禁黄网站禁片午夜丰满| 巨乳人妻的诱惑在线观看| 黄色a级毛片大全视频| 久久人妻福利社区极品人妻图片| 黄网站色视频无遮挡免费观看| 性少妇av在线| 欧美老熟妇乱子伦牲交| 美国免费a级毛片| www.www免费av| 国产av在哪里看| 天堂影院成人在线观看| 大陆偷拍与自拍| 在线观看免费视频日本深夜| 亚洲欧美激情综合另类| 少妇被粗大的猛进出69影院| 午夜日韩欧美国产| 18美女黄网站色大片免费观看| 国产深夜福利视频在线观看| 伦理电影免费视频| 99精国产麻豆久久婷婷| 亚洲三区欧美一区| 国产区一区二久久| 88av欧美| 免费日韩欧美在线观看| 99精品久久久久人妻精品| 巨乳人妻的诱惑在线观看| 一级毛片女人18水好多| 欧美在线一区亚洲| 大型黄色视频在线免费观看| 男女高潮啪啪啪动态图| 90打野战视频偷拍视频| 亚洲人成网站在线播放欧美日韩| 国产区一区二久久| 亚洲久久久国产精品| 又黄又粗又硬又大视频| 国产欧美日韩一区二区精品| 日韩 欧美 亚洲 中文字幕| 可以在线观看毛片的网站| 亚洲av熟女| 欧美日韩亚洲高清精品| 亚洲avbb在线观看| 美女高潮到喷水免费观看| 国产精品一区二区精品视频观看| x7x7x7水蜜桃| 国产一卡二卡三卡精品| 中文字幕精品免费在线观看视频| 麻豆国产av国片精品| 国产真人三级小视频在线观看| 亚洲精品av麻豆狂野| cao死你这个sao货| 国产深夜福利视频在线观看| 成人18禁高潮啪啪吃奶动态图| 中文字幕人妻丝袜制服| 成人av一区二区三区在线看| 午夜久久久在线观看| 久久久久久久午夜电影 | 久久久精品国产亚洲av高清涩受| 少妇被粗大的猛进出69影院| 美国免费a级毛片| 香蕉国产在线看| 久久狼人影院| 亚洲av成人一区二区三| 超色免费av| 国产又爽黄色视频| 一级毛片高清免费大全| 国产黄色免费在线视频| 亚洲国产精品sss在线观看 | 亚洲av美国av| 欧美激情久久久久久爽电影 | 韩国av一区二区三区四区| 久久九九热精品免费| 亚洲第一av免费看| 在线观看免费高清a一片| a在线观看视频网站| 美女大奶头视频| 国产1区2区3区精品| 麻豆av在线久日| 天天躁狠狠躁夜夜躁狠狠躁| 99精品在免费线老司机午夜| 18美女黄网站色大片免费观看| 亚洲自拍偷在线| 欧美最黄视频在线播放免费 | 女性被躁到高潮视频| 国产精品美女特级片免费视频播放器 | 黄色女人牲交| 一本大道久久a久久精品| 在线观看日韩欧美| 久久精品国产清高在天天线| 欧美日韩国产mv在线观看视频| 成人黄色视频免费在线看| 婷婷六月久久综合丁香| 韩国av一区二区三区四区| 69精品国产乱码久久久| 精品国产美女av久久久久小说| 又黄又粗又硬又大视频| 99热国产这里只有精品6| 欧美老熟妇乱子伦牲交| 亚洲一区中文字幕在线| 久久这里只有精品19| 中文字幕人妻丝袜一区二区| 国产精品99久久99久久久不卡| 十分钟在线观看高清视频www|