• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure

    2024-05-25 14:43:30AodiLiuNaWangXuehuiDuDibinShanXiangyuWuandWenjuanWang
    Computers Materials&Continua 2024年4期

    Aodi Liu,Na Wang,Xuehui Du,Dibin Shan,Xiangyu Wu and Wenjuan Wang

    He’nan Province Key Laboratory of Information Security,Information Engineering University,Zhengzhou,450000,China

    ABSTRACT Big data resources are characterized by large scale,wide sources,and strong dynamics.Existing access control mechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy management efficiency and difficulty in accurately describing the access control policy.To overcome these problems,this paper proposes a big data access control mechanism based on a two-layer permission decision structure.This mechanism extends the attribute-based access control (ABAC) model.Business attributes are introduced in the ABAC model as business constraints between entities.The proposed mechanism implements a two-layer permission decision structure composed of the inherent attributes of access control entities and the business attributes,which constitute the general permission decision algorithm based on logical calculation and the business permission decision algorithm based on a bi-directional long short-term memory(BiLSTM)neural network,respectively.The general permission decision algorithm is used to implement accurate policy decisions,while the business permission decision algorithm implements fuzzy decisions based on the business constraints.The BiLSTM neural network is used to calculate the similarity of the business attributes to realize intelligent,adaptive,and efficient access control permission decisions.Through the two-layer permission decision structure,the complex and diverse big data access control management requirements can be satisfied by considering the security and availability of resources.Experimental results show that the proposed mechanism is effective and reliable.In summary,it can efficiently support the secure sharing of big data resources.

    KEYWORDS Big data;access control;data security;BiLSTM

    1 Introduction

    The continuous development of cloud computing,the Internet of Things,and other emerging technologies in recent years has contributed toward the generation of massive data resources.Thus,the onset of the era of big data[1,2]has led to significant changes in all aspects of industry and society.Big data is widely used in medicine,energy,finance,education,and other fields[3–5].Data has become an important asset that can flow.The analysis and utilization of big data resources can create social and economic value;the larger the data volume and the wider the source,the larger the value.However,although big data provides new development opportunities,it also faces severe security challenges.For example,in March 2018,it was revealed that Facebook suffered a serious data breach.Specifically,Cambridge Analytica illegally accessed the personal data of more than 50 Facebook million users without their authorization and used the data to build mathematical models for analyzing citizens’political preferences.In May 2018,Under Armour revealed that an attacker had illegally accessed the information of more than 150 million users of MyFitnessPal—a platform that is used to track diet and exercise.In February 2019,India’s state-owned gas company revealed that a database containing the biometric information of millions of users had been illegally accessed owing to a security breach.Thus,unauthorized sharing of big data poses a security threat to users.Realizing safe and controllable big data resource circulation and sharing is a fundamental requirement for big data application and development.

    As an important means to protect data security,access control technology [6,7] manages users’permissions.It enables legitimate users to access the corresponding resources in the system according to their permissions and prevents unauthorized access by illegal users.Thus,it can effectively guarantee data security and normal operation of business systems.Therefore,effective access control measures are urgently required to ensure the safe and controllable sharing of big data resources.However,in the era of big data,access control faces some new challenges[8].Big data resources are characterized[9]by large scale,wide sources,and strong dynamics,which makes the management scenarios more complex and the security requirements more diverse.The current access control methods can be classified according to the different bases of access control permission decisions.Discretionary access control and mandatory access control are early access control mechanisms.Discretionary access control directly establishes the user-permission relationship between users and resources.It is flexible,but the permission control is scattered and difficult to manage.Mandatory access control is implemented according to the subject-object security tag level.It has strong permission control ability but lacks flexibility and does not support fine-grained access control.Role-based access control implements control based on the operation permissions of subject roles and objects.It simplifies authorization operations and is easier to maintain,but it is difficult to support large-scale dynamic and fine-grained access control.Hence,the above mechanism is mainly applied to the closed computing environment with limited resource scale,which is difficult to apply to big data environments.With the ever-changing demand for access control,in recent years,researchers have introduced risk [10],intent [11],spacetime [12,13],behavior [14] and other factors to achieve access control in different scenarios.With the increasing demand for large-scale dynamic and fine-grained access control,attribute-based access control(ABAC)[15]is proposed.The ABAC uses attributes as the basic elements of access control,which can realize a more accurate description of the subject and object,and has the advantages of strong semantic expression ability,high flexibility,and strong expansibility.Access control elements in other access control mechanisms,such as security tags,roles,risks,intents,and space-time,can be abstracted into specific types of attributes in ABAC.

    Existing research on attribute-based access control uses attributes to describe entities,and uses policies to describe attribute-permission correspondence [16].In this way,access control policies and attributes together provide support for the implementation of access control.Security managers configure policies based on their professional knowledge,such as security requirements and service requirements.These policies consist of static rules and do not have the ability to evolve dynamically.When the access control service receives the access request,it determines the permission strictly according to the entity attribute and policy.In a big data scenario,the scale of attributes and policies increases with the increase of users and resources.It is increasingly difficult for security managers to implement effective and comprehensive policy management manually.Therefore,it is necessary to endue the traditional static strategy with dynamic and automatic adaptability.Due to the complexity of big data applications and the diversity of security requirements,big data access control presents a new trend and characteristics of diversified decision basis,fuzzy decision results and integration of multiple access control technologies.New requirements for automatic and adaptive access control have been proposed.The present study focuses on the following two challenges of big data access control.

    (1) It is difficult for security managers to conduct efficient policy management of massive and dynamic big data resources based on professional knowledge,which poses a challenge to the implementation of dynamic access control.In existing access control methods,the management of policies is inseparable from specific application scenarios.It is necessary for security managers to manually formulate access control policies on the basis of their professional knowledge to protect data resources.In a closed environment,it is safe and feasible to manage a policy manually with limited data resources.However,in the open big data environment,it is tedious to manually manage massive and dynamic data resources.Therefore,an access control mechanism for big data resources needs to be automatic and adaptive to improve the efficiency of permission management.

    (2) It is difficult to accurately describe the access control policy of big data resources gathered from multiple sources,which poses a challenge to the implementation of fine-grained access control.The value density of big data resources is low.The core value does not lie in a single data resource itself,and analysis results show a significantly higher value density after the analysis of massive data.Furthermore,the characteristics of multi-source convergence and cooperative sharing of big data make policy management more difficult,leading to the increasingly serious phenomena of excessive authorization and insufficient authorization.How to determine “which users are allowed to access which resources”is an important professional problem that is difficult to accurately describe in the context of big data.Systems often adopt excessive authorization to maintain their availability.In addition,owing to application complexity,some new access requirements are often not considered in advance by security managers.The phenomenon of insufficient user authorization is becoming increasingly common from the viewpoint of protecting resources.Thus,it is difficult to achieve a tradeoff between the security and availability of resources.

    The existing extended research on the ABAC model includes introducing extended attribute elements such as behavior,negative attribute,task,trust and risk into the model to improve the expression ability of the ABAC model.Different extended attributes have different capabilities and advantages in different scenarios.However,the ability to describe the content of data resources is still lacking.To address the above-mentioned challenges of big data access control,this research extends the existing ABAC model and introduces the concept of business attributes in the ABAC model to constrain the business behavior of entities.A big data access control mechanism based on a two-layer permission decision structure is proposed.The inherent attributes and business attributes of access control entities are combined to form a two-level permission decision structure,which combines accurate decisions based on static policy with fuzzy decisions based on business constraints.This method can implement adaptive and intelligent policy management according to the similarity calculation between the business attributes of subjects and resources.The method considers both the security and availability of resources and provides effective support for the secure sharing of big data resources.The main contributions of our research are as follows:

    (1)This research proposes a big data access control mechanism based on a two-layer permission decision structure (BDAC-TPDS).This model introduces the concept of business attributes and implements a two-layer hybrid access control structure composed of the inherent attributes and business attributes of entities.

    (2)This research implements a general permission decision algorithm based on logical calculation for the inherent attributes of entities.Based on the logical relationship between the inherent attributes of subjects and resources,it can make accurate permission decisions.

    (3)This research implements the business permission decision algorithm based on a bi-directional long short-term memory (BiLSTM) neural network,which calculates the similarity between the business attributes of subjects and resources to make permission decisions.

    Through the two-layer mixed access control structure,we can flexibly implement permission decisions with different strengths and policy management with different granularities.The remainder of this paper is organized as follows.Section 2 reviews the related work.Session 3 formalizes the adaptive access control model based on business constraints and introduces the implementation framework in detail.Session 4 proposes a two-layer permission decision algorithm and describes the details of the algorithm.Session 5 analyzes the security and availability of the model.Session 6 describes experiments conducted to verify the effectiveness of the mechanism and discusses the experimental results.Finally,Section 7 concludes the paper.

    2 Related Work

    Although existing research on big data access control remains in its infancy,some progress has been made in this field.In order to improve the adaptive ability of access control of massive data resources,it mainly includes trust-based access control,risk-based access control,and semantic-based access control.Trust-based access control principle determines whether an authorization requester is allowed to access a resource based on its trust level.That is,only the requester with a certain trust level can obtain access authorization.Zhao et al.[17]proposed a zero trust access authorization and control of network boundary based on cloud big data fuzzy clustering.The fuzzy clustering algorithm of cloud big data is used to mine the data related to user behavior,obtain the user’s trust level by designing a trust evaluation mechanism,and then implement dynamic access control by combining the user’s trust level to distinguish legitimate requests from illegal requests,and complete the zerotrust access authorization and control at the network boundary.To solve the access control problem in the fog computing environment,Daoud et al.[18]proposed an access control service protocol based on trust evaluation and user activity monitoring.The trust level of the user is calculated and measured by the access history of the user,the type of host the type of user.Then,the certificate is authorized for each user that meets the requirements for the trust level.Users with authorization certificates will not repeat the access process when they access the node.Jiang et al.[19]proposed a trust-role-based access control(T-RBAC)model based on two-dimensional dynamic trust evaluation.The model uses analytic hierarchy process and grey theory to quantify the role attribute trust and uses Euler measurement and probability statistics to quantify the user behavior trust in the historical behavior dimension.Then the trust knowledge base performs hierarchical authorization according to the weighted average comprehensive trust value.Subsequently,Jiang et al.[20]proposed an access control model based on user credibility to solve the problem that existing methods could not describe the timeliness and trend of quantized values,which may not reflect the real trust situation well.This model also quantifies trust based on user history access records but introduces user history behavior trends into trust evaluation model through the corresponding regression analysis model.Chen et al.[21] divided user trust into two parts:Attribute trust and historical trust.Attribute trust is calculated according to the attributes of users,and historical trust is calculated according to the historical access behavior of users.Riskbased access control is a technique that uses risk assessment to decide whether to grant or deny access requests from users or systems.The principle is to assess the risk of a system,network or application according to security policies and security requirements and apply the risk assessment results to access control decisions.For the medical big data scenario,Jiang et al.[10]proposed an access control model based on spectral clustering(SC)and risk(SC-RBAC).The improved SC algorithm was adopted in this model to cluster doctors’users,and user classification was introduced into information entropy as a parameter,thus improving the accuracy of quantifying user access behavioral risks.Finally,access permissions are assigned to users based on the risk value of access behavior and the constructed access control function.Jiang et al.[22]introduced information entropy to quantify the access request risk and privacy risk when doctors access clinical data.Based on the assumption of bounded rationality,a multi-person evolutionary game model of risk access control is constructed.The dynamic selection strategy and evolutionary stability of participants can be analyzed,and the risk of doctor’s visit behavior can be included in the profit function of evolutionary game,thus realizing the risk-adaptive access control.Ma et al.[23]proposed a risk-aware topic-based access control model(RTBAC),which uses topic to represent the content relationship between users and data,and uses risk techniques to grant users access permissions based on their historical behaviors and access requests.Semanticbased access control uses semantic information to represent the attributes of resources and users,and ontological knowledge to represent access policies and access control rules,so as to achieve more sophisticated,flexible and intelligent access control.Drozdowicz et al.[24]proposed an access control method that combines XACML(eXtensible Access Control Markup Language)policy with semantic reasoning.This approach allows “mix and match” (depending on the circumstances of the system being developed)XACML rules with properties derived from semantic reasoning,separating expertmade system rules from user preferences,and each user can dynamically make their own rules that represent individual attitudes toward privacy.Verginadis et al.[25] proposed a context-aware access control framework that combines effective context-aware access control policies and infuses them into cloud applications.It has a semantic reasoning function and supports minimal human intervention and work.

    Due to the complexity of big data applications and the diversity of security requirements,the current access control mechanism makes it difficult to balance the security and availability of resources.Big data access control presents a new trend and characteristics of diversified decision basis,fuzzy decision results and integration of multiple access control technologies.Existing access control mechanisms are difficult to get rid of the dependence on static policies,which limits the dynamic and adaptive nature of access control.When the access control service receives the access request,it determines the permission strictly according to the attribute and policy.As the number of users and resources increases,it becomes more and more difficult for security managers to implement effective and comprehensive policy management manually.Therefore,it is necessary to endue the access control mechanism with dynamic and automatic adaptability and achieve accurate semanticlevel access control.In order to solve this problem,it is necessary to improve the existing access control mechanism and combine precise decisions based on static policy with fuzzy decision based on business constraints to provide effective support for secure sharing of big data resources.

    3 BDAD-TPDS Model

    To impart the ABAC model with stronger dynamics and adaptive access control ability,this study extends the concept of entity attribute and introduces the concept of business attribute.A big data access control mechanism based on two-layer permission decision structure (BDAC-TPDS) is proposed,and a two-layer hybrid access control structure consisting of entity inherent attributes and business attributes is implemented.

    3.1 Model Formulation

    Definition 1Entity attribute is used to describe the information of entity characteristics involved in the access control process.It is the core concept of the BDAC-TPDS model.Entity attributes are identified by attribute name and attribute value(Attribute:AttName=value).The process of assigning values to attributes is called attribute assignment.For convenience,we abbreviate entity attributes as attributes hereafter.

    Definition 2Inherent attribute is used to describe the inherent constraint information for entity access control.The quaternions(IS,IR,IE,IA)are used to represent the inherent attributes of subject,resource,environment,and action,which correspond to the concept of attributes in the classical ABAC model.

    Definition 3Business attribute is used to describe the business constraint information contained in subjects and resources.Binary groups (BS,BR) are used to represent subject business attributes and resource business attributes.Subject business attribute is used to describe the characteristics of relevant business resources that the subject can access.Resource business attribute is used to describe the business characteristics of relevant resources.Business attributes can be obtained through attribute mining technology[26,27].

    Definition 4Attribute tuple is a collection of attributes used to describe a particular entity.It is expressed as X(A1,A2,...,An).An attribute is relatively static and stable,while an attribute tuple is dynamic and changes over time.

    Definition 5Attribute-based access request is a description of the visitor of the resource,the accessed resource,and the requested operation.It consists of a set of attribute tuples that contain at least one subject attribute,one resource attribute,and one action attribute.It can be expressed as AAR:{XS,XR,XA,XE}.

    Definition 6Access control policy is the constraint on the access ability of the subject and a concrete embodiment of the subject’s authorization behavior toward the resource.It can be represented as ACP={PID,IAS,IAR,action,sign},where PID denotes the policy ID and sign ∈{permit,deny}indicates whether access is permitted or denied.

    Definition 7Policy decision is based on whether the entity attributes meet the constraint of the access control policy to make a decision as to whether the subject can access the corresponding resources.It can be expressed as PD={IAS,BAS,IAR,BAR,action,Decision (IAS,IAR,ACR)&&Verify (BAS,BAR)} Decision() and Verify() are used to determine whether inherent attributes and business attributes can meet the access conditions,respectively.If both Decision()and Verify()are satisfied,the subject can access the corresponding resource.

    3.2 Model Description

    Business constraints and user intent are described by business attributes in BDAC-TPDS.Business constraint is determined by the business attributes of the resource,while user intent is determined by the business attributes with which the subject is authorized.The access control framework is shown in Fig.1.It includes the policy enforcement point(PEP),attribute authority(AA),policy administration point(PAP),and access decision point(ADP).AA includes the inherent attribute authority(AAI)and business attribute authority (AAB),while ADP is divided into the policy decision point (PDP) and business decision point(BDP).As shown in Fig.1,the access control workflow of BDAC-TPDS can be divided into two phases:The preparation stage and the execution stage.

    Figure 1: Access control framework of BDAC-TPDS

    The preparation stage involves the management of entity attribute information and access control policy information involved in the access control process.It includes initial authorization and business authorization.a)In the initial authorization stage(also known as general authorization),the security manager sets the access control policy of the system according to the user’s inherent attribute information.Users can access the resources on the basis of the initial authorization.However,the initial authorization is based only on the user’s inherent attribute information (such as role,unit,position,gender),which is relatively long-term and static.The granularity of access control based on the inherent attribute information is too coarse.To achieve finer granularity and business-adaptive access control,business authorization will be performed dynamically after the initial authorization.b)In the business authorization stage,different types of business resources are characterized by different types of business attributes,and business authorization is realized by dynamically granting business attributes to users.

    The execution stage deals with the decision,response,and execution of access requests.a)Original access request(OAR)is accepted by PEP as the original request for access to a specific resource sent by the user.PEP analyzes the semantics of subjects,resources,and action attributes in NAR.According to the attribute information obtained by AA,the processing access request AAR is generated and sent to ADP from PEP.b)ADP queries PAP for access control policy sets related to the requested big data resource.PDP makes a general decision of access control according to the policy set.If the decision result is denied,the result will be sent directly back to PEP.If the decision result is permitted,AAR will be sent to BDP.c)After receiving AAR,BDP calculates the similarity of the business constraints according to the authorized business attributes of the subject and the business attributes of the accessed resource.If the calculation result is similar,the decision result is permitted.If the calculation result is non-similar,the decision result is denied,and the result is sent back to PEP.d)PEP responds to the user’s access request on the basis of the ADP decision result.

    A two-layer hybrid access control structure constituted by two-layer authorization in the preparation stage and two-layer permission decision in the execution stage can realize access control of big data resources with finer granularity and greater relevance to business intentions.

    3.3 Description of Inherent Attributes and Business Attributes

    Inherent attribute is used to describe inherent constraint information of the access control entity.It includes multiple types of subject attributes(role,department,job,gender,age,credit,etc.),resource attributes (security level,risk,owner,creation time,etc.),and environment attributes.The use of inherent attributes facilitates a clear and precise description of entities and permissions.For example,the policies in a medical information system are summarized in Table 1.

    Table 1: Examples of policies

    According to policy 1,when the subject’s department is surgery and the position is chief physician,the case resource can be read.According to policy 2,a doctor with a doctorID of 0010 can write and read the case resource with a resourceID of 0003.This permission management is extremely precise.However,the form of authorization in policy 1 is extremely coarse-grained,and the authorized user will be able to read all the case information.By contrast,the form of authorization in policy 2 is extremely fine-grained.It is difficult for security administrators to carry out such labor-intensive authorization with massive resources.In this case,the relatively fuzzy policy of “doctors can access case resources related to their research direction” is more consistent with the practical application requirements under the condition of big data.Access control entities and permissions can be vaguely described using business attributes.The simplest form is case 1 in Table 2.Physicians specializing in cardiovascular disease,cardiopathy,hypertension,and congenital heart disease will be able to access the case resources whose business attributes are cardiovascular disease,cardiopathy,hypertension,and congenital heart disease.In this case,the role of the business attributes is equivalent to that of inherent attributes.For case 2 in Table 2,physicians specializing in cardiovascular disease,cardiopathy,hypertension,and congenital heart disease can also access similar semantic case resources such as angina,cardiac failure,myocarditis,heart failure,arrhythmia,and sudden cardiac death.The business attributes of the subject and resource need not be completely consistent but only semantically similar(or comprise the vocabulary of the same domain) so that access permission can be granted.At the same time,the business attribute information of the resource does need not rely on strict and accurate manual management by the security manager.Automatic mining and extraction of resource business attributes can be realized by intelligent methods [26,27] that can effectively reduce the workload of attribute management and permission management.

    Table 2: Examples of attributes

    Thus,we can transform the permission decision problem of the subject and resource into the problem of semantic similarity matching between the business attribute sets of the subject and resource.As BiLSTM neural networks have been shown to perform well in the field of natural language processing,this study employs a BiLSTM network to realize permission decisions based on business attribute similarity (see Section 4.3 for details).Although permission decision based on business attributes can improve the efficiency of attribute and policy management,the decision accuracy is not as high as that in the case of inherent attributes.In particular,in scenarios where precise access control is required(such as data resources with high security levels),the role of precise permission management based on inherent attributes is irreplaceable.Therefore,we propose a two-layer permission decision structure that combines inherent attributes with business attributes.The structure can fully exploit the advantages of the two methods and overcome the shortcomings of each method.In the next section,we will elaborate on the process of two-layer permission decision.

    4 Two-Level Permission Decision Algorithm

    4.1 Permission Decision Process

    The process of permission decision is shown in Fig.2.First,a general authorization decision is made on the basis of logical calculation.If the decision result is denied,it is directly returned.If the decision result is permitted,the business permission decision algorithm based on the BiLSTM network will be executed.The business permission decision result is the final result.

    Figure 2: Permission decision process

    4.2 General Permission Decision Algorithm Based on Logical Calculation

    In BDAC-TPDS,a general permission decision based on logical calculation is processed by the PDP module.The sign of the access control policy is a binary token of PERMIT or DENY.If the attribute information involved in the access request AR satisfies the logical constraint in the access control policy,the access request AR is responded to according to the policy sign (response result is PERMIT or DENY).If access request AR does not have a matching policy,it indicates that the policy and attribute information is insufficient to make a decision response.The response result will be UNKNOWN.Therefore,there are three results,namely PERMIT,DENY,and UNKNOWN,in BDAC-TPDS.We use ATTR_SETAR to denote the set of associated attributes involved in access request AR and ATTR_SETACP to denote the set of associated attributes involved in access control policy ACP.The general permission decision can be expressed as follows:

    If all the inherent attributes in ATTR_SETAR conform to the constraint condition of the policy attribute in ATTR_SETACP,i.e.,ATTR_SETAR ?ATTR_SETACP,then:

    If the inherent attributes in ATTR_SETAR cannot all meet the constraints of the policy attribute in ATTR_SETACP,i.e.,ATTR_SETAR ?ATTR_SETACP,then:

    The algorithm is as follows:

    Algorithm flow: 1) Traverse the policies in the access control policy set and make the permission decision of access request AR.Three policy decision result sets,namely PERMIT_RESULT,DENY_RESULT,and UNKNOWN_RESULT,are obtained.2)If only a single result,PERMIT or DENY,exists,the corresponding result(PERMIT or DENY)is returned.If the decision includes both PERMIT and DENY,or if the decision result is UNKNOWN,UNKNOWN is returned.

    4.3 Business Permission Decision Algorithm Based on BiLSTM Network

    (1)Algorithm concept

    In BDAC-TPDS,the business permission decision algorithm based on the BiLSTM network is processed by the BDP module.The core concept of the algorithm is shown in Fig.3.The business attribute sets of the subject and resource are expressed in the form of word vectors based on the Word2Vec model.The similarity between the business attribute sets of the subject and the resource is calculated based on a permission decision BiLSTM(PD-BiLSTM)neural network,and the decision result is output according to the similarity result.

    Figure 3: Algorithm concept

    (2)Principles of neural network

    A recurrent neural network (RNN) is a very powerful neural network owing to its internal storage structure.Each neuron can store previous input information using the storage structure.Therefore,an RNN can effectively process time series data.However,although the classical RNN can process time series information,it will lose its ability to learn past remote information with time.The most memorable information in the network is the last input information,which shows insufficient performance.LSTM (Long Short-Term Memory) has been proposed to overcome the existing problems in the RNN model.By introducing the memory cell structure,the neural network can realize long-term sequence information memory without the need for debugging complex super parameters.It has been widely used in many fields such as language modeling,machine translation,and speech recognition.Fig.4 shows the memory cell structure in LSTM.Each cell structure contains four layers of the neural network.Because there may be correlations between attributes,an attribute may be associated with both its previous and next attributes.The LSTM can only use the historical data information,but cannot use the future data information in the data.Therefore,in this case,BiLSTM(Bi-directional Long Short-Term Memory)is used to link two LSTM with opposite timing directions into the same network output.This structure is shown in the BiLSTM Layer in Fig.5.With this structure,BiLSTM adds computable information in LSTM,enabling the network model to obtain both historical and future information.

    Figure 4: Memory cell structure of LSTM

    Figure 5: Neural network structure

    LSTM uses the“gate”structure to delete and enhance the information stored in the memory cells.The core components of LSTM are the storage stateCt,output gateOt,input gate it,and forget gate ft.Ot determines how the current storage state affects other memory cells.Based on the current state of the network,it and ft determine the information to be discarded and control the information input into the memory cells.The updating formulas of the LSTM network at time t are given below:

    (3)PD-BiLSTM model

    The structure of the PD-BiLSTM model is shown in Fig.5.PD-BiLSTM is a type of Siamese Network [28] with bidirectional LSTM structure.It is composed of two neural networks,namely BiLSTMS and BiLSTMR.BiLSTMS is used to process the business attributes of the subject,and BiLSTMR is used to process the business attributes of the resource.The input of each network is a set of business attributes.BiLSTMS and BiLSTMR have the same model weight parameters.PDBiLSTM uses BiLSTM to read the word vector representing each business attribute and uses the final hidden state hfinal of the BiLSTM as the vector representation of each business attribute set.Then,the similarity between the final hidden states hfinal in the two networks is used for the prediction of business semantic similarity.

    BiLSTM maps the set of business attributes of an entity from a vector space of a variable length sequence of length M to a constant multi-dimensional vector space VN of length N,where M is the dimension of the word vector and N is the maximum number of allowed attributes.In other words,the business attribute set of each entity is represented as the sequence{attr1,attr2,...,attrn}.The sequence is passed to BiLSTM,which updates the hidden state information at each sequence index by Eqs.(4)–(10).The final set of entity business attributes is encoded as the final hidden state hfinal∈VN of the model.For a given set of business attributes for the subject and resource,our model applies the predefined business permission decision function Verify: VN→VN→Result to the BiLSTM representation.The similarity of business attribute representation is used to infer the similarity of business attribute constraints between subjects and resources.Then,the business permission is decided by the similarity.The similarity calculation formula used in this study is given by:

    5 Security and Availability Analysis

    (1)Privilege escalation attack

    In a permission escalation attack,under normal operation of the access control mechanism,the attacker obtains higher unauthorized access permission to the system through a lower authorized permission.To implement such an attack in BDAC-TPDS,the attacker needs to obtain the business attributes of the resource Data1 through the access ability of the authorized resource Data1 after calculating the business permission similarity based on the BiLSTM network.Because there may be differences between Data1’s business attributes and the attacker’s business attributes,the attacker can access the unauthorized data resource Data2 through the business attributes of Data1.Thus,a permission escalation attack may be successful.However,this situation is not true in the BDAC-TPDS model.The user’s business attribute is set by the security administrator when the user receives the corresponding business access demand.The user’s business attribute cannot be changed through its access to resources;only the security administrator can change the user’s business attribute.When the user’s business is completed,the system can automatically withdraw the user’s business attributes and cancel the user’s access permission to relevant business resources.An attacker cannot change his own business attribute information;hence,he/she cannot access other business data.Thus,a permission escalation attack cannot be implemented in the BDAC-TPDS model.

    (2)Attribute forgery attack

    In an attribute forgery attack,the attacker can gain access to additional resources by forging entity attribute information.In BDAC-TPDS,the entity attribute information(including inherent attributes and business attributes)is uniformly managed by attribute certificates of the trusted attribute authority AA.In the process of parsing access requests,it is necessary to send attribute query requests to the attribute authority to ensure the correctness of the entity attributes.In the process of access control decision of business attributes,the validity of the attribute certificate issued by the attribute authority AA can be verified to avoid possible attacks on business attributes (such as attribute tampering,attribute reasoning,and attribute collusion).Changes in the subject’s attribute information must be approved by the security administrator,and the entity’s attribute information can only be generated by the security administrator or automated generation technology.Therefore,as long as the attribute authority is reliable,an attacker cannot forge the attribute.

    (3)Security assurance

    The BDAC-TPDS model manages users’permissions on the basis of the two-layer permission decision structure of the entity’s inherent attributes and business attributes.The business attribute is not to extend the user’s basic permission of inherent attributes but to narrow the user’s permission for more granular and precise access control.Business attributes are used to restrict users to access only the resources related to the corresponding business in order to overcome the difficulty in dividing the permission granularity of the resource and the rigidity of user authorization under the condition of big data.Therefore,we believe that the introduction of business constraints further improves the security of the system on the basis of the classical ABAC model.

    (4)Availability analysis

    In BDAC-TPDS,the security administrator only needs to give the users a set of business attributes related to the user’s business that can complete the authorization operation of the user.Meanwhile,the system can automatically determine whether the user can access the corresponding resources through the calculation of business similarity.This method is highly consistent with the characteristics of the need for effective sharing and utilization of massive resources in the big data environment,which overcomes the difficulty of effectively managing the permission of massive resources.It can effectively improve the efficiency of big data resource analysis and utilization under a specific business background and improve the availability of data resources to ensure their security.

    6 Experimental Analysis

    6.1 Experiment Settings

    Simulation experiments were conducted on the Tensorflow1.12 platform to evaluate the effectiveness of the proposed method.The experimental software and hardware environment was as follows:Operating system,Windows 10 64-bit;CPU,Intel?Core?i7-8750H @ 2.21 GHz;GPU,GeForce GTX 1050 Ti max-q;memory,16 GB,Tensorflow version is 1.14.0,and the Keras version is 2.1.3.The simulation experiments were conducted on the basis of the text semantic similarity data set[29] published by the Stanford University SNLI project [30],which includes more than 360,000 experimental data marked with text similarity.In the simulation experiments,we randomly divided the data set into a training set of 300,000 data,a verification set of 30,000 data,and a test set of 30,000 data.In addition,we built access control policy sets with policy scales of 1000,2000,3000,4000,5000,6000,7000 and 8000 to conduct performance tests.These policy sets covered 100 subject attributes,1000 resource attributes,and 10 action attributes.The maximum number of attribute data that describes the same subject,resource,and action was four.The maximum achievable distinguishable subject size space,resource size space,and action size space were 1004,10004,and 104 based on the attribute information.

    6.2 Experimental Results and Analysis

    To evaluate the performance and effect of the proposed access control technology,we performed three experiments: A comparison of business permission decision performance among different methods,a comparison of calculation methods for different similarity distances,and a comparison of permissions decision time costs with benchmark methods.

    (1)Comparison of business permission decision performance among different methods

    To compare the performance of different neural network models in the process of business permission decision,five neural network models are selected as the benchmark for performance comparison.The baseline comparison models are RNN,BiRNN,GRU,BiGRU,and LSTM,respectively.The experiment adopts a control variable method to compare the performance of different methods under the condition of the same parameter.Meanwhile,we test the effect of different word vector models on decision performance.Figs.6a and 6b use the latest Google pre-training language model BERT[31](Bidirectional Encoder Representation from Transformers)as the Embedding Layer.Figs.6c and 6d use the pre-training language model based on skip-gram as an Embedding Layer.The skip-gram pre-training model is based on Wikipedia data.The pre-trained language model is not the core of the paper.We use a publicly released pre-trained model.

    In Fig.6,the experiment results show that the performance of the business permission decision stabilizes after the 12th epoch.In the test data set,our method combined with the use of the Google BERT pre-training model can achieve optimal performance.The optimal accuracy rate reaches 87.39%and the optimal loss value reaches 0.0997.It can basically meet the requirements of access control under business permission decisions for big data.The performance of Google BERT pre-training model is better than the skip-gram pre-training model,which is caused by BERT’s use of a Transformer network structure.It can implement more targeted training and more training layers.Since the pretraining language model of word vectors is not the focus of this paper,no more discussion will be given.

    In Fig.7,the experiment results show the influence of different hyper-parameters on the performance.Fig.7a compares the effect of the number of neurons in the network on performance.When the number of neurons reaches 200,the performance is stable and will not continue to improve.Therefore,there is no need to use too many neurons in the network.Too many neurons will lead to overfitting of the model.Fig.7b shows the influence of different sizes of batch_size on the accuracy rate during training.When batch_size reaches 150,the performance is basically stable,and the accuracy cannot be further improved by improving batch_size.

    Figure 6: Performance comparison among different methods

    Figure 7: Effects of different hyper-parameters on performance

    (2)Comparison of calculation methods for different similarity distances

    Calculation methods for four similarity distances are shown in Table 3.As shown in Fig.8 and 9,the calculation methods for four different business attribute similarity distances(Euclidean distance,Normalized Euclidean distance,Manhattan distance,and cosine distance)are compared in terms of decision performance.

    Table 3: Calculation methods for four similarity distances

    Figure 8: Comparison of decision accuracy for different similarity distances

    It can be seen from the experimental results in Fig.8 that the Euclidean distance,Normalized Euclidean distance,and Manhattan distance can achieve better decision effects.Among them,the actual decision effect that can be achieved by adopting the Euclidean distance is optimal,while the cosine distance adopted by the model cannot be fitted in the training process and its effect is the worst.In Fig.9,we compare the effects of different attribute lengths on experimental performance.We can find that the model performs best when the attribute length is 20.This is because the attribute length is too small to mine the semantic information between attributes effectively.However,if the attribute length is too large,it will be difficult to realize the effective training of the model,and the attention will be more easily distracted during the training.Therefore,we choose to set the attribute length to be 20.

    Figure 9: Comparison of decision accuracy for different attribute lengths

    (3)Comparison of permissions decision time costs with benchmark methods

    Figs.10a shows the required time costs for the general permission decision and business permission decision,respectively,under policy scales of 1000,2000,3000,4000,5000,6000,7000 and 8000.We can find that the time cost of the general permission decision increases with the policy scales.However,the time cost of the business permission decision is independent of the policy scales.This is mainly because the general permission decision requires logical calculation of the access request AR and all the policies in the policy set.Hence,an increase in the policy scales has a great impact on the delay of the general decision.The time complexity of the general permission decision is O(n),and n is the policy size.The time complexity of the business permission decision is O(1).This is because the implementation of the business permission decision only needs to input the business attribute information of the subject and resource into the decision engine based on the neural network to complete the decision.It does not need logical calculation with all the policies in the policy set.Hence,an increase in the policy scale does not have a significant impact on the delay of the business permission decision.

    Figure 10: Performance comparison with benchmark methods

    Meanwhile,in Figs.10b–10d,we test the concurrent permission decision performance of different benchmark methods [32,33] under the 2000,5000 and 8000 policy scales.Experimental results show that our method requires the least decision time under the same conditions.This is because business permission decisions based on similarity can significantly reduce the complexity of permission decisions.Therefore,this method is more suitable for big data scenarios with massive data resources.

    7 Conclusion

    Existing policy management methods based on manual formulation of the access control policy suffer from low efficiency and difficulty in accurately describing the access control policy.To overcome these problems,this paper proposed a big data access control mechanism based on a two-layer permission decision structure (BDAC-TPDS) as a new solution for automatic and intelligent big data access control,which can adapt to the business needs between entities.In addition,a two-layer permission decision structure was designed to account for the different access control requirements of big data resources.Furthermore,the security and availability of resources were also considered.Experimental results showed that the proposed method can achieve good permission decision results.However,there are some limitations to our method.The reliability of access control is also closely related to the accuracy of entity business attribute labeling.This paper focuses on the research of access control and does not consider the technology of business attribute annotation.In addition,to ensure the timeliness of processing massive and highly concurrent data access requests,performance optimization should be combined with big data systems in practical applications.In the future,we will also research high-performance business attribute annotation technology to provide attribute support for access control and optimize the performance of BiLSTM-based business permission decision algorithm to further improve decision efficiency and accuracy.

    Acknowledgement:We thank all the members who have contributed to this work with us.

    Funding Statement:This work is supported by Key Research and Development and Promotion Program of Henan Province (No.222102210069),Zhongyuan Science and Technology Innovation Leading Talent Project (224200510003),National Natural Science Foundation of China (No.62102449).

    Author Contributions:The authors confirm contribution to the paper as follows: study conception and design: Aodi Liu,Na Wang,Xuehui Du;data collection: Aodi Liu,Dibin Shan;analysis and interpretation of results:Aodi Liu,Na Wang,Xiangyu Wu;draft manuscript preparation:Aodi Liu,Na Wang,Xuehui Du,Dibin Shan;validation: Wenjuan Wang,Xiangyu Wu.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The data that support the findings of this study are openly available in SNLI project repository at https://nlp.stanford.edu/projects/snli/.The data that support the findings of this study are openly available at https://drive.google.com/open?id=1itu7IreU_SyUSdmTWydniGxW-JEGTjrv.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    熟妇人妻不卡中文字幕| 国产成人aa在线观看| 黑人欧美特级aaaaaa片| 亚洲美女视频黄频| 18禁裸乳无遮挡动漫免费视频| 亚洲激情五月婷婷啪啪| 人妻一区二区av| 亚洲在久久综合| 九九爱精品视频在线观看| 国产老妇伦熟女老妇高清| 啦啦啦中文免费视频观看日本| 日韩免费高清中文字幕av| 国内精品宾馆在线| 曰老女人黄片| 午夜激情av网站| 建设人人有责人人尽责人人享有的| 国产亚洲一区二区精品| 黄色怎么调成土黄色| 国产aⅴ精品一区二区三区波| 亚洲一卡2卡3卡4卡5卡精品中文| 男女无遮挡免费网站观看| 久久毛片免费看一区二区三区| 天堂动漫精品| 两个人免费观看高清视频| 国产主播在线观看一区二区| 久久婷婷成人综合色麻豆| 欧美成人午夜精品| 欧美日韩国产mv在线观看视频| 一级毛片电影观看| 性少妇av在线| 国产精品久久电影中文字幕 | 国产在线视频一区二区| 涩涩av久久男人的天堂| 91精品国产国语对白视频| 操出白浆在线播放| 女警被强在线播放| 99久久人妻综合| xxxhd国产人妻xxx| 久久中文字幕一级| 国产野战对白在线观看| 九色亚洲精品在线播放| 两个人看的免费小视频| 午夜福利在线免费观看网站| 午夜福利乱码中文字幕| 国产成人欧美| 丝瓜视频免费看黄片| 精品国产乱子伦一区二区三区| av超薄肉色丝袜交足视频| 天堂动漫精品| 欧美av亚洲av综合av国产av| 无遮挡黄片免费观看| 男女午夜视频在线观看| 免费看a级黄色片| 岛国在线观看网站| 我要看黄色一级片免费的| av福利片在线| 亚洲av日韩在线播放| 十八禁网站免费在线| 亚洲av美国av| 十八禁网站网址无遮挡| 老司机在亚洲福利影院| 国产成人欧美| 亚洲熟女毛片儿| 亚洲专区国产一区二区| 国产精品电影一区二区三区 | 久久天躁狠狠躁夜夜2o2o| av网站免费在线观看视频| 欧美在线一区亚洲| 日韩人妻精品一区2区三区| 性高湖久久久久久久久免费观看| 亚洲人成77777在线视频| 高清黄色对白视频在线免费看| a在线观看视频网站| 亚洲熟女精品中文字幕| 免费不卡黄色视频| 免费av中文字幕在线| 亚洲人成伊人成综合网2020| 欧美成人免费av一区二区三区 | 色在线成人网| 高潮久久久久久久久久久不卡| 99香蕉大伊视频| 少妇裸体淫交视频免费看高清 | 亚洲五月色婷婷综合| www.自偷自拍.com| 天堂动漫精品| 性色av乱码一区二区三区2| 在线观看免费午夜福利视频| 制服人妻中文乱码| 又黄又粗又硬又大视频| 18禁观看日本| 一二三四社区在线视频社区8| 狠狠狠狠99中文字幕| 欧美黄色片欧美黄色片| videosex国产| 91国产中文字幕| a在线观看视频网站| 丝袜美腿诱惑在线| 18禁国产床啪视频网站| 欧美黑人欧美精品刺激| 国产伦人伦偷精品视频| 一区二区av电影网| 老司机午夜福利在线观看视频 | 曰老女人黄片| 老汉色∧v一级毛片| 中文字幕制服av| 午夜福利一区二区在线看| 黄片小视频在线播放| 精品少妇黑人巨大在线播放| 露出奶头的视频| 亚洲国产精品一区二区三区在线| 纯流量卡能插随身wifi吗| 一级毛片精品| 午夜激情久久久久久久| 中国美女看黄片| www.999成人在线观看| www.自偷自拍.com| 一区二区三区国产精品乱码| 老司机午夜福利在线观看视频 | 后天国语完整版免费观看| 捣出白浆h1v1| 精品福利观看| 国产片内射在线| 国产男女内射视频| 黄片播放在线免费| 免费日韩欧美在线观看| 狠狠精品人妻久久久久久综合| 国产不卡一卡二| 欧美激情 高清一区二区三区| 黄色视频不卡| 日韩欧美免费精品| 国产免费福利视频在线观看| 久久精品熟女亚洲av麻豆精品| 三上悠亚av全集在线观看| 搡老熟女国产l中国老女人| 老司机午夜十八禁免费视频| 久久免费观看电影| 久久中文看片网| 亚洲精品在线美女| 黄色怎么调成土黄色| av一本久久久久| 18在线观看网站| 久久精品国产亚洲av高清一级| 欧美黑人欧美精品刺激| 韩国精品一区二区三区| 又紧又爽又黄一区二区| 精品视频人人做人人爽| 亚洲人成77777在线视频| 亚洲色图 男人天堂 中文字幕| 首页视频小说图片口味搜索| 免费av中文字幕在线| 丝袜美足系列| 欧美性长视频在线观看| 一级a爱视频在线免费观看| 日韩中文字幕欧美一区二区| 成年动漫av网址| 天天添夜夜摸| 国产麻豆69| 日日夜夜操网爽| 黄色 视频免费看| 欧美黄色片欧美黄色片| 欧美亚洲 丝袜 人妻 在线| 免费av中文字幕在线| 激情在线观看视频在线高清 | a级片在线免费高清观看视频| 免费女性裸体啪啪无遮挡网站| 热99re8久久精品国产| 怎么达到女性高潮| 老司机在亚洲福利影院| 久久精品国产a三级三级三级| 99在线人妻在线中文字幕 | av超薄肉色丝袜交足视频| av片东京热男人的天堂| 国产高清videossex| 免费日韩欧美在线观看| 在线观看人妻少妇| 国产欧美亚洲国产| 69精品国产乱码久久久| 脱女人内裤的视频| 国产高清视频在线播放一区| 十八禁网站免费在线| 中文字幕另类日韩欧美亚洲嫩草| 久久精品亚洲精品国产色婷小说| av天堂在线播放| 叶爱在线成人免费视频播放| 国产黄频视频在线观看| 国产男女内射视频| 亚洲欧美日韩另类电影网站| 天堂动漫精品| 男女下面插进去视频免费观看| 91麻豆av在线| av又黄又爽大尺度在线免费看| 欧美 亚洲 国产 日韩一| 80岁老熟妇乱子伦牲交| 又大又爽又粗| 免费不卡黄色视频| 久久精品亚洲熟妇少妇任你| 免费看a级黄色片| 国内毛片毛片毛片毛片毛片| 99热网站在线观看| 一本大道久久a久久精品| 国产精品久久久av美女十八| 交换朋友夫妻互换小说| 欧美久久黑人一区二区| 人人妻,人人澡人人爽秒播| 狠狠婷婷综合久久久久久88av| 法律面前人人平等表现在哪些方面| av免费在线观看网站| 亚洲精品美女久久av网站| 日本vs欧美在线观看视频| 欧美精品啪啪一区二区三区| 国产又爽黄色视频| a级毛片在线看网站| 一级毛片电影观看| 岛国在线观看网站| 欧美+亚洲+日韩+国产| 老司机影院毛片| av又黄又爽大尺度在线免费看| 一二三四在线观看免费中文在| 午夜福利乱码中文字幕| 亚洲av国产av综合av卡| av天堂久久9| 亚洲精品成人av观看孕妇| 国产精品二区激情视频| e午夜精品久久久久久久| 国产精品99久久99久久久不卡| 人人妻人人爽人人添夜夜欢视频| 丝袜人妻中文字幕| 天堂8中文在线网| 成人av一区二区三区在线看| 久久中文字幕人妻熟女| 91麻豆av在线| 国产精品98久久久久久宅男小说| 午夜福利一区二区在线看| 麻豆av在线久日| 一本一本久久a久久精品综合妖精| 亚洲男人天堂网一区| 叶爱在线成人免费视频播放| 操美女的视频在线观看| 免费一级毛片在线播放高清视频 | 久久久久久久国产电影| 亚洲性夜色夜夜综合| 热99re8久久精品国产| 午夜日韩欧美国产| 国产视频一区二区在线看| 国产三级黄色录像| 欧美日韩福利视频一区二区| 精品第一国产精品| 97人妻天天添夜夜摸| 在线天堂中文资源库| 两性夫妻黄色片| 精品国产乱子伦一区二区三区| 婷婷成人精品国产| a级片在线免费高清观看视频| 一区二区三区精品91| 在线av久久热| 亚洲欧美一区二区三区久久| 国产日韩欧美亚洲二区| 91av网站免费观看| 久久精品国产99精品国产亚洲性色 | 日本黄色视频三级网站网址 | avwww免费| 一区二区三区精品91| 欧美大码av| 777久久人妻少妇嫩草av网站| 男女无遮挡免费网站观看| 欧美精品一区二区大全| 欧美另类亚洲清纯唯美| 国产精品1区2区在线观看. | av免费在线观看网站| 亚洲av成人不卡在线观看播放网| 久久99一区二区三区| 国产成人啪精品午夜网站| 成年人午夜在线观看视频| 国产成人系列免费观看| 大型av网站在线播放| 欧美日韩亚洲国产一区二区在线观看 | 大香蕉久久成人网| 久久久精品94久久精品| 欧美日韩精品网址| 久久精品熟女亚洲av麻豆精品| 国产免费福利视频在线观看| √禁漫天堂资源中文www| 侵犯人妻中文字幕一二三四区| 亚洲精品一二三| 香蕉国产在线看| 亚洲成人手机| 国产真人三级小视频在线观看| 久久精品91无色码中文字幕| 丰满迷人的少妇在线观看| 亚洲全国av大片| 肉色欧美久久久久久久蜜桃| 高清av免费在线| 精品一区二区三区视频在线观看免费 | av网站免费在线观看视频| 国产成人精品久久二区二区免费| 成年人免费黄色播放视频| 国产精品欧美亚洲77777| 国产成人系列免费观看| 少妇的丰满在线观看| 日韩欧美国产一区二区入口| 在线观看免费午夜福利视频| 在线亚洲精品国产二区图片欧美| 中文字幕人妻熟女乱码| 亚洲精品国产区一区二| 91国产中文字幕| 一级a爱视频在线免费观看| 日本a在线网址| 色综合婷婷激情| 精品人妻熟女毛片av久久网站| 搡老乐熟女国产| 男女无遮挡免费网站观看| 一本—道久久a久久精品蜜桃钙片| 日韩免费av在线播放| 制服诱惑二区| 12—13女人毛片做爰片一| 黄片大片在线免费观看| 亚洲成人免费电影在线观看| 又大又爽又粗| 亚洲三区欧美一区| 视频在线观看一区二区三区| 一级a爱视频在线免费观看| 最近最新中文字幕大全免费视频| 女性被躁到高潮视频| 狠狠婷婷综合久久久久久88av| 亚洲av成人一区二区三| 黄色视频,在线免费观看| 亚洲色图综合在线观看| 久久午夜亚洲精品久久| 又黄又粗又硬又大视频| 精品免费久久久久久久清纯 | 午夜免费成人在线视频| 99久久国产精品久久久| 欧美+亚洲+日韩+国产| 久久久国产成人免费| 成人特级黄色片久久久久久久 | 99国产精品一区二区三区| 免费高清在线观看日韩| 香蕉久久夜色| 一夜夜www| 91九色精品人成在线观看| 亚洲av电影在线进入| 真人做人爱边吃奶动态| 日本黄色日本黄色录像| 高清av免费在线| 亚洲国产成人一精品久久久| 午夜福利视频精品| 12—13女人毛片做爰片一| 亚洲av日韩精品久久久久久密| 色婷婷av一区二区三区视频| 亚洲五月色婷婷综合| 久久久国产精品麻豆| 久久久国产一区二区| 日韩免费av在线播放| 久久久久久久久久久久大奶| 在线观看免费高清a一片| av在线播放免费不卡| 波多野结衣一区麻豆| www日本在线高清视频| 捣出白浆h1v1| 久久久国产一区二区| 男人舔女人的私密视频| 一级,二级,三级黄色视频| 色播在线永久视频| 久久毛片免费看一区二区三区| 精品一区二区三区四区五区乱码| a级毛片黄视频| 成人免费观看视频高清| 男男h啪啪无遮挡| 90打野战视频偷拍视频| 中文字幕高清在线视频| 国产精品自产拍在线观看55亚洲 | 手机成人av网站| 人成视频在线观看免费观看| 9热在线视频观看99| 狠狠狠狠99中文字幕| 757午夜福利合集在线观看| 最近最新中文字幕大全免费视频| 国产精品一区二区精品视频观看| 十八禁人妻一区二区| 成人特级黄色片久久久久久久 | 国产精品1区2区在线观看. | 两人在一起打扑克的视频| 国产日韩欧美亚洲二区| 精品午夜福利视频在线观看一区 | 十分钟在线观看高清视频www| 午夜福利视频在线观看免费| 亚洲国产欧美在线一区| 精品人妻在线不人妻| 免费久久久久久久精品成人欧美视频| kizo精华| 91老司机精品| 国产午夜精品久久久久久| 亚洲色图综合在线观看| 黑丝袜美女国产一区| 一本综合久久免费| 亚洲国产精品一区二区三区在线| 亚洲专区国产一区二区| 日本av免费视频播放| 少妇粗大呻吟视频| 菩萨蛮人人尽说江南好唐韦庄| videos熟女内射| 欧美一级毛片孕妇| 少妇被粗大的猛进出69影院| 91大片在线观看| 深夜精品福利| 国产成人精品久久二区二区免费| 国内毛片毛片毛片毛片毛片| 老司机在亚洲福利影院| 久久精品亚洲av国产电影网| 男人舔女人的私密视频| 久久精品国产99精品国产亚洲性色 | 91av网站免费观看| 老司机在亚洲福利影院| 青草久久国产| 午夜视频精品福利| 精品久久久久久电影网| 丁香六月天网| 久久久国产一区二区| 亚洲伊人色综图| 91国产中文字幕| 久久久久久久大尺度免费视频| 成年人黄色毛片网站| 777久久人妻少妇嫩草av网站| 精品免费久久久久久久清纯 | 1024香蕉在线观看| 日日爽夜夜爽网站| 中文字幕另类日韩欧美亚洲嫩草| 黄色视频在线播放观看不卡| 免费人妻精品一区二区三区视频| 亚洲 国产 在线| 女人精品久久久久毛片| 国产主播在线观看一区二区| 91老司机精品| 天天添夜夜摸| 欧美日韩精品网址| 成人黄色视频免费在线看| 日韩制服丝袜自拍偷拍| 色综合欧美亚洲国产小说| 在线永久观看黄色视频| 久久99热这里只频精品6学生| 国产一区二区激情短视频| 丰满少妇做爰视频| 69av精品久久久久久 | 精品国产一区二区久久| 欧美在线黄色| 精品第一国产精品| 精品久久久久久久毛片微露脸| 99国产精品一区二区三区| 色精品久久人妻99蜜桃| 欧美日韩黄片免| 免费在线观看黄色视频的| 在线观看人妻少妇| 男女高潮啪啪啪动态图| 老汉色av国产亚洲站长工具| 王馨瑶露胸无遮挡在线观看| 久久99一区二区三区| 一边摸一边做爽爽视频免费| 人人妻人人澡人人看| 丁香欧美五月| 国产日韩一区二区三区精品不卡| 色94色欧美一区二区| 中文字幕精品免费在线观看视频| 国产深夜福利视频在线观看| 少妇的丰满在线观看| 另类亚洲欧美激情| 亚洲精品av麻豆狂野| 大陆偷拍与自拍| 欧美精品啪啪一区二区三区| 一边摸一边抽搐一进一小说 | 日韩三级视频一区二区三区| 亚洲自偷自拍图片 自拍| 色精品久久人妻99蜜桃| 中文字幕制服av| 久久精品国产99精品国产亚洲性色 | 亚洲av日韩精品久久久久久密| 无限看片的www在线观看| 久久天躁狠狠躁夜夜2o2o| 每晚都被弄得嗷嗷叫到高潮| 狂野欧美激情性xxxx| 国产av一区二区精品久久| 免费在线观看日本一区| 一夜夜www| 日韩一区二区三区影片| 无人区码免费观看不卡 | 黄色a级毛片大全视频| av有码第一页| 激情在线观看视频在线高清 | 丁香六月欧美| 亚洲av第一区精品v没综合| 黄网站色视频无遮挡免费观看| 午夜老司机福利片| 人妻 亚洲 视频| 日日夜夜操网爽| 亚洲av第一区精品v没综合| 日韩中文字幕欧美一区二区| 性少妇av在线| 亚洲自偷自拍图片 自拍| 麻豆av在线久日| 大型黄色视频在线免费观看| 自拍欧美九色日韩亚洲蝌蚪91| 免费在线观看完整版高清| 成人精品一区二区免费| 纵有疾风起免费观看全集完整版| 每晚都被弄得嗷嗷叫到高潮| 777米奇影视久久| 国产精品二区激情视频| 我要看黄色一级片免费的| 高清毛片免费观看视频网站 | 又黄又粗又硬又大视频| 国产精品偷伦视频观看了| 日本五十路高清| 国产精品欧美亚洲77777| 大香蕉久久网| 无限看片的www在线观看| 嫁个100分男人电影在线观看| 久久人人97超碰香蕉20202| 熟女少妇亚洲综合色aaa.| 一二三四社区在线视频社区8| 色视频在线一区二区三区| 一二三四社区在线视频社区8| 亚洲 欧美一区二区三区| 黄色视频不卡| 黄色毛片三级朝国网站| 国产在线免费精品| 黄片播放在线免费| 十八禁网站免费在线| 精品国内亚洲2022精品成人 | 亚洲美女黄片视频| 久久精品国产99精品国产亚洲性色 | 天堂俺去俺来也www色官网| 亚洲人成电影观看| 久久婷婷成人综合色麻豆| 女警被强在线播放| 女人高潮潮喷娇喘18禁视频| 中文字幕色久视频| 日韩精品免费视频一区二区三区| 一级毛片电影观看| 久久av网站| 日日爽夜夜爽网站| 精品久久久久久久毛片微露脸| 搡老熟女国产l中国老女人| 国产伦人伦偷精品视频| 美女国产高潮福利片在线看| 色精品久久人妻99蜜桃| 建设人人有责人人尽责人人享有的| 亚洲熟女精品中文字幕| 亚洲 国产 在线| 在线av久久热| 日韩欧美一区视频在线观看| 亚洲欧洲精品一区二区精品久久久| www.999成人在线观看| 少妇猛男粗大的猛烈进出视频| 国产精品av久久久久免费| 欧美国产精品va在线观看不卡| 91精品三级在线观看| 欧美日韩福利视频一区二区| 91九色精品人成在线观看| 老鸭窝网址在线观看| 在线观看www视频免费| 午夜精品久久久久久毛片777| 中文字幕制服av| 亚洲国产av影院在线观看| 国产一区有黄有色的免费视频| 欧美中文综合在线视频| 日本精品一区二区三区蜜桃| 亚洲 欧美一区二区三区| 日韩熟女老妇一区二区性免费视频| 成人精品一区二区免费| 久久中文字幕一级| 国产老妇伦熟女老妇高清| 久久免费观看电影| 国产亚洲一区二区精品| 欧美日韩福利视频一区二区| 99国产极品粉嫩在线观看| 亚洲精品乱久久久久久| 久久亚洲精品不卡| 国产片内射在线| 捣出白浆h1v1| 在线观看舔阴道视频| 亚洲精品中文字幕一二三四区 | 19禁男女啪啪无遮挡网站| 黑人操中国人逼视频| 久久久久久久精品吃奶| 日韩一区二区三区影片| 别揉我奶头~嗯~啊~动态视频| av天堂在线播放| 欧美日韩亚洲国产一区二区在线观看 | 日日摸夜夜添夜夜添小说| 日韩欧美免费精品| 欧美日韩精品网址| 亚洲色图 男人天堂 中文字幕| 日韩欧美国产一区二区入口| 菩萨蛮人人尽说江南好唐韦庄| 国产精品久久久人人做人人爽| 日韩免费高清中文字幕av| 69精品国产乱码久久久| 欧美变态另类bdsm刘玥| 亚洲自偷自拍图片 自拍| 国产极品粉嫩免费观看在线| 国产91精品成人一区二区三区 | 如日韩欧美国产精品一区二区三区| 久久精品熟女亚洲av麻豆精品| 99九九在线精品视频| 99riav亚洲国产免费| www.自偷自拍.com| 国产激情久久老熟女| 十八禁网站免费在线| 国产精品熟女久久久久浪| 久久久久国内视频| 动漫黄色视频在线观看| 美女午夜性视频免费| 欧美在线一区亚洲| 欧美精品啪啪一区二区三区| 久久免费观看电影| 黄网站色视频无遮挡免费观看|