• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Security analysis of access control model in hybrid cloud based on security entropy①

    2015-04-17 05:45:03CheTianwei車天偉
    High Technology Letters 2015年2期

    Che Tianwei (車天偉)

    (*The School of Computer Science and Technology, Xidian University, Xi’an 710071, P.R.China)(**The School of Computer Science and Technology , Northwestern Polytechnical University, Xi’an 710129, P.R.China)(***The PLA information Engineering University, Zhengzhou 450001, P.R.China)

    ?

    Security analysis of access control model in hybrid cloud based on security entropy①

    Che Tianwei (車天偉)②

    (*The School of Computer Science and Technology, Xidian University, Xi’an 710071, P.R.China)(**The School of Computer Science and Technology , Northwestern Polytechnical University, Xi’an 710129, P.R.China)(***The PLA information Engineering University, Zhengzhou 450001, P.R.China)

    To resolve the problem of quantitative analysis in hybrid cloud, a quantitative analysis method, which is based on the security entropy, is proposed. Firstly, according to the information theory, the security entropy is put forward to calculate the uncertainty of the system’s determinations on the irregular access behaviors. Secondly, based on the security entropy, security theorems of hybrid cloud are defined. Finally, typical access control models are analyzed by the method, the method’s practicability is validated, and security and applicability of these models are compared. Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.

    hybrid cloud, security entropy, classificatory access control model, directly unauthorized access, right about access, indirectly unauthorized access

    0 Introduction

    The key to access control model security proof is to find a recognized and self-evident security axiom, and then based on this security axiom, to deduce, or prove the security assumptions proposed in the model by means of this security axiom, so as to make it more reliable. However, even the proven Bell-La Padula(BLP) model[1,2]can’t prove the rationality, completeness and safety of “simple security axiom” and “ *-property axiom” that it proposed. So, some scholars point out that the security axioms in BLP cannot completely prove the security of BLP[3]. A complete access control model must clearly tell us which security requirements should be met, which access violation would be prevented, and how to reduce and prove the uncertainty of the access violation that the hybrid cloud allows.

    Entropy is a tool of measuring uncertainty, which was originally used in thermodynamics. Shannon introduces it to the information theory, and puts forward the concept of information entropy for disordered degree of information[4]. Since the information entropy theory is proposed, it has been applied in many fields such as engineering science and social science. Some scholars have successfully introduced it into the quantification analysis of information security risk and event uncertainty[5-7].

    This study, based on the thought and method that information entropy measures the uncertainty of things, puts forward the concept of security entropy, and by means of it, measures the uncertainty of system’s response to access violations, which provides a scientific quantitative method for the safety analysis of classificatory access control model.

    1 security entropy

    Clouds and large data have become the mainstream mode of service to enhance customer service quality, this service model is facing some security risks such as loss and leakage of user data. In order to meet the access control demand for cloud services, especially the access control requirement for multi-level cloud services to coexist user data of different grades and categories of cloud services at the same time, the access control should be able to support different security strength and support the joint control of different intensities between access control models, which is different from the traditional access control method. A quantitative method is presented for security requirements and security access control model assessment to meet the needs of multi-level cloud security assessment service access control model.

    1.1 Definition of security entropy

    In the cloud system, when a user sends an access request, the system will respond: to allow or to deny. And this response is the only one. To allow or to deny should not appear simultaneously. In addition, the access request is divided into two types: legal request and illegal request. If the system is seen as a black box, the system will give four kinds of response to user’s each access request, that is, “allow legall access”、“refuse legall access”、“allow access violation” and “refuse access violation”. Obviously, the response can be considered as a basis for judging if a system is good or bad. The more the denial responses to legitimate access gets, the poorer the system availability is. The more the allowable responses to violation access gets, the worse the system’s confidentiality is.

    In order to comprehensively measure the uncertainty of system’s response to various access requests, the security entropy is defined as follows:

    Definition 1(security entropy) : If a group of access request B=b1,b2,…,bqis seen as the input, the system’s request responses to each access result as the object of study, and variable X as this response results, then the value of X will be :to allow legitimate access, to deny legitimate access, to allow illegal access, and to deny illegal access, which is recorded as a1,a2,a3,a4respectively. If Symbol p(ai) stands for the statistical probability of ai, the probability space [X, p(X=ai)] of X will be

    Assigning weight wi, the impact factor of the system security, for each response result, the greater wiis, the higher the ai‘s influence to system safety is, otherwise the smaller the ai‘s influence is. If the distribution of wiis

    the security entropy of X will be

    (1)

    1.2 The meaning of safety entropy

    According to the common sense of information security, response a2gives negative effects on the usability of the system, and response a3gives negative effects on the confidentiality of the system, while response a1and a4have less influence on system security. Therefore, if we let w2, w3w1, w4, the meaning of safety entropy in Eq.(1) is the average uncertainty of the happened harmful responses. The bigger the value of security entropy is, the more the harmful response uncertainty is; the smaller the value of security entropy is, the less the response uncertainty is. As for the same set of access request, the smaller the security entropy of different access control model is, the less the possibility that model makes harmful response is.

    If w2>0,w3>0,w1=w4=0, and w2+w3=1, security entropy is the ground on which the system satisfies usability and confidentiality. If w2=1,w3=w1=w4=0, security entropy of Eq.(1) will be the ground on which the system satisfies usability. If w3=1,w1=w2=w4=0, security entropy of Eq.(1) will be the ground on which the system satisfies confidentiality.

    The number of the four responses is related to the number of input samples. If all input samples are legitimate accesses, a3and a4will be 0, and if all input samples are illegal access, a1and a2will be 0.In order to make the safety entropy reflect the system security accurately, the input samples must be complete. In addition, the responses are related to the number of input samples. If an input number of the access request is much more than others, the response will be distorted

    Therefore, when security entropy is calculated, the input samples (access requests) must be complete and its probability distribution must be uniform.

    The smaller the security entropy is, the less uncertainty of the harmful response that system does is, the more the security of the model is. When the security entropy approaches 0, then the model will achieve the theoretical security.

    1.3 Security entropy of different types of illegal accesses

    Whether an access is illegal is related to security requirements. According to the access control requirements in national grade of protection standard GB17859-1999[8], illegal access can be classified into three types: directly illegal access, right about access, and indirectly illegal access. The directly illegal access refers to explicitly violating the authorized strategy such as the access control matrix and so on.

    The right about access refers to the one which leads to violating information flow direction that the system stipulates, in other word, the one which leads information flow from high class to low class. The indirectly illegal access refers to the one that violates the authorized strategy through information indirect transmission.

    For instance, there are two users(s1、s2) and two resourses (o1、o2) in the hybrid cloud, and the relationship of security level is f(s1)?f(s2)?f(o1)=f(o2), the authorized strategy of the system is that “s1 read o2”, “s2 read o1”, “s2 write o2”.

    Let us see the following four events: b1: s2 read o1,b2: s2 write o2,b3:s1 read o2,b4:s1 read o1.Because b4 explicitly violates the authorized strategy, b4 is therefore directly illegal access, and the sequence of access b1b2b3 causes the information to flow from s1 into o1, which equals that s1 read o1 indirectly. Therefore b1b2b3 is indirectly illegal access. b1 and b3 cause the information flowing to the violation of the direction made by the system, so b1 and b3 are right about access.

    For the different types of illegal access, the meaning of Eq.(1) is different. If the illegal access is defined as “directly illegal access”, the security entropy of Eq.(1) is called “direct security entropy” recorded as HD(X).

    Again, if the illegal access is defined as “right about access”, the security entropy of Eq.(1) is called “mandatory security entropy” recorded as HM(X). If the illegal access is defined as “indirectly illegal access”, the security entropy of Eq.(1) is called “indirectly security entropy” recorded as HI(X).

    2 Safety conditions of classificatory access control model

    2.1 Security attributes based on security entropy of safety

    w2>0,w3>0,w2+w3=1。

    Theorem 1 (direct safety of access control model): Access control model has direct safety, if and only if

    Prove:

    It is proved that when HD(X)=0, the event “refuse legal access” and “allow access violation” will never happen, that is, p(a2)=p(a3)=0.

    The total number of aiis made as ni(i=1,2,3,4), n1+n2=s, n3+n4=t. Because a1、a2and a3、a4are different responses to the same access, p(a1)+p(a2)=s/(s+t), p(a3)+p(a4)=t/(s+t).

    Because w2>0,w3>0,w2+w3=1, so w1=w4=0。

    End.

    Similarly, theorems could be got as follows:

    Theorem 2 (mandatory safety of access control model): the access control model has mandatory safety, if and only if

    Theorem 3 (indirectly safety of access control model): the access control model has indirect safety, if and only if

    2.2 Safety theorem of classificatory access control model

    Symbol Θ2represents class 2 access control model, Θ3represents class 3 access control model, and Θ4represents class 4 access control model.

    Now, according to safety needs of class 2、3、4 information system, the safety theorem of classificatory access control model based on the above security attributes is put forward.

    Theorem 4 (safety of classificatory access control model):,Class 2 access control model Θ2satisfies safety needs, if and only if HD(X)|Θ2≡0, in which w2>0,w3>0,w2+w3=1; Class 3 access control model Θ3satisfies safety needs, if and only if HD(X)|Θ2≡0 and HM(X)|Θ3≡0, in which w2>0,w3>0,w2+w3=1; Class 4 access control model Θ4satisfies safety needs, if and only if HD(X)|Θ4≡0、HM(X)|Θ4≡0 and HI(X)|Θ4≡0, in which w2>0,w3>0,w2+w3=1;

    3 Analysis of typical access control model based on security entropy

    Now, the theory is applied to analyze the security of typical access control model, verify the practicability of this method, and point out the defect of these access control models.

    3.1 Security analysis to HRU model

    3.1.1 Direct safety

    The statistical probability distribution of responses is

    Since HD(X)|HRU≡0, model HRU can satisfy direct safety.

    3.1.2 Mandatory safety

    3.1.3 Indirect safety

    HI(X)|HRU>0, which shows that the HRU model doesn’t satisfy indirect safety.

    The above analysis shows that, model HRU satisfies direct safety, and doesn’t satisfy mandatory safety and indirect safety.

    3.2 Security analysis to BLP

    3.2.1 Direct safety and indirect safety

    Model BLP uses two methods: DAC and MAC in which, DAC uses the HRU model, so the direct safety and the indirect safety of the BLP model coincide with that of HRU, that is, BLP satisfies direct safety and doesn’t satisfy indirect safety.

    3.2.2 Mandatory safety

    So, HM(X)|BLP≡0, which shows that BLP satisfies mandatory safety.

    3.3 Security analysis to RBAC

    Model RBAC[9-11]assigns roles for users, and then based on these roles grants authorization. The RBAC’s rights management and access control manner are similar to HRU’s. so its safety is similar to that of HRU, which is, satisfying direct safety and not satisfying mandatory safety or indirect safety.

    3.4 Security analysis to FGBAC

    FGBAC[12]is the improved BLP, which introduces the information flow graph as a judgment auxiliary tool. In FGBAC, any directly illegal access, right about access and indirectly illegal access will be refused. So

    HD(X)|FGBAC=HM(X)|FGBAC=HI(X)|FGBAC≡0

    It shows that the model satisfies direct safety, mandatory safety and indirect safety.

    According to the above safety analysis of the typical access control model, and in the light of the safety needs of 2、3 and 4 class systems, it is concluded the typical model’ security and applicability are Table 1 and Table 2.

    Table 1 The security of typical access control model

    Table 2 The applicability of typical access control model

    In the simulation environment of achieving the RBAC, BLP and FGBAC models, the rationality of this method is tested. In the simulation environment, 30 users and 200 text types of resources have been. Through user behavior simulation program automaticly and randomly generated user access and randomly modified on three models of security rules and procedures, three audit tracking programs are established recording the determination result of each model. the security entropy is calculated according to the execution result shown in Table 3.

    Table 3 The security entropy result of typical access model

    4 Conclusion

    This study puts forward the concept of “security entropy” for measuring uncertainty of system’s response to access request, and proposes its security theorems based on security entropy. The theory can be widely applied to security analysis of access control mode and system.

    Based on the theory,this work analyses the typical access control model, verifies the practicability of the method, and concludes the security and application scope of the available models.

    Reference

    [ 1] Bell D E, Lapadula L J. Security Computer Systems:Mathematical Foundations and Model. Bedford:Mass Mitre Corp,1973. 66-79

    [ 2] David E B. Looking back at the bell-La Padula model. In: Proceedings of the 21st Annual Computer Security Applications Conference, Tuscon, USA, 2005. 337-351

    [ 3] Si T G, Tan Z Y , Dai Y Q. A Security Proof Method for Multilevel Security Models. Journal of Computer Research and Development, 2008,45(10): 1711-1717 (in Chinese)

    [ 4] Fu Z Y. Information Theory—Fundamental Theory and Application. Beijing: Press of Electronics Industry,2007 (in Chinese)

    [ 5] Wang G B, Huang H Z, Zhang X L. Risk Possibility Number——A New Model for Risk Evaluation and Prioritization Based on Maximum Entropy Theory. Acta Aeronautica Et Astronautica Sinica, 2009,30(9):1684-1690 (in Chinese)

    [ 6] Fu Y,Wu X P,Ye Q,et al. An Approach for information Systems Security Risk Assessment on Fuzzy Set and Entropy-Weight. Acta Electronica Sinica, 2010,38(7):1490-1494(in Chinese)

    [ 7] Zhao D M,Ma J F,Wang Y S. Model of fuzzy risk assessment of the information system. Journal on Communications, 2007, 28(4):51-56 (in Chinese)

    [ 8] GB/T 17859-1999. Classified Criteria for Security. Beijing: Standards Press of China,1999 (in Chinese)

    [ 9] Peter J. Third Generation Computer Systems. Computer Surveys, 1971,3(4):175-216

    [10] Sandhu R S, Coyne E J, Feinstein H L. Role-based access control models. IEEE Computer, 1996,29(2):38-47

    [11] Zhai D G, Xu Z,Feng D G. Violation of static mutual exclusive role constraints in dynamic role transition. Journal of computer research and development, 2008, 45(4):677-683(in Chinese)

    [12] Wang C, Chen X Y, Li N. An access control mode based on information flow graph. In: Proceedings of the International Conference on Computational Intelligence and Security, Sanya, China, 2011. 998-1000

    Che Tianwei, born in 1971,He received his Ph.D. in Computer Science and Technology School of Xidian University in 2014. His main research interests include computer architecture, information security, grid computing systems.

    10.3772/j.issn.1006-6748.2015.02.012

    ①Supported by the National Natural Science Foundation of China (No. 60872041, 61072066) and Fundamental Research Funds for the Central Universities (JYI0000903001, JYI0000901034).

    ②To whom correspondence should be addressed. E-mail: tianweiche@163.com Received on Jan. 28, 2014*, Ma Jianfeng*, Li Na**, Wang Chao***

    久久九九热精品免费| 色在线成人网| 香蕉丝袜av| 中文字幕人妻熟女乱码| 正在播放国产对白刺激| 99国产精品一区二区三区| 91字幕亚洲| 长腿黑丝高跟| 99在线视频只有这里精品首页| 黑人猛操日本美女一级片| 欧美人与性动交α欧美软件| 色在线成人网| 日日干狠狠操夜夜爽| 一进一出抽搐动态| 亚洲精品久久午夜乱码| 天堂俺去俺来也www色官网| 欧美黑人精品巨大| 亚洲国产精品一区二区三区在线| 欧美中文日本在线观看视频| 精品卡一卡二卡四卡免费| 午夜视频精品福利| 亚洲成av片中文字幕在线观看| 午夜福利在线观看吧| 婷婷丁香在线五月| 亚洲自偷自拍图片 自拍| 精品人妻1区二区| 成年人免费黄色播放视频| 一边摸一边抽搐一进一小说| 成人18禁高潮啪啪吃奶动态图| 精品福利观看| av视频免费观看在线观看| 交换朋友夫妻互换小说| 大码成人一级视频| 国产伦一二天堂av在线观看| 乱人伦中国视频| 国产黄a三级三级三级人| 两性夫妻黄色片| 最新美女视频免费是黄的| 国产精品98久久久久久宅男小说| 午夜免费观看网址| 久久精品91无色码中文字幕| 国产91精品成人一区二区三区| 99国产精品一区二区蜜桃av| 夫妻午夜视频| 久久国产精品影院| 国产真人三级小视频在线观看| 国产有黄有色有爽视频| e午夜精品久久久久久久| 日日爽夜夜爽网站| 欧美精品啪啪一区二区三区| 亚洲午夜精品一区,二区,三区| 日本wwww免费看| 久久久国产成人精品二区 | 一边摸一边抽搐一进一出视频| 日韩免费av在线播放| 精品一品国产午夜福利视频| 国产一区二区在线av高清观看| 欧美激情极品国产一区二区三区| 国产一区二区激情短视频| 国产亚洲欧美在线一区二区| 一个人免费在线观看的高清视频| 欧美日韩中文字幕国产精品一区二区三区 | 精品久久久精品久久久| 欧美日韩国产mv在线观看视频| 欧美日韩国产mv在线观看视频| av电影中文网址| 99国产精品一区二区三区| 久久婷婷成人综合色麻豆| 亚洲精品久久成人aⅴ小说| 久久久国产精品麻豆| 老鸭窝网址在线观看| 久久久久国产一级毛片高清牌| 亚洲专区字幕在线| 亚洲国产毛片av蜜桃av| 91av网站免费观看| 人妻久久中文字幕网| 久久久久国产精品人妻aⅴ院| 精品国产一区二区三区四区第35| 日韩高清综合在线| 国产成人av激情在线播放| 亚洲一区二区三区色噜噜 | 欧洲精品卡2卡3卡4卡5卡区| 国产无遮挡羞羞视频在线观看| 人人妻人人爽人人添夜夜欢视频| 美女 人体艺术 gogo| 热re99久久国产66热| 神马国产精品三级电影在线观看 | 黄色成人免费大全| 国产免费av片在线观看野外av| 视频在线观看一区二区三区| xxxhd国产人妻xxx| 国产av在哪里看| 欧美日韩亚洲综合一区二区三区_| 十分钟在线观看高清视频www| 免费日韩欧美在线观看| 久久亚洲精品不卡| 亚洲人成电影观看| 日韩大尺度精品在线看网址 | 国产精品日韩av在线免费观看 | 欧美日韩国产mv在线观看视频| 亚洲欧美日韩无卡精品| 人成视频在线观看免费观看| 国产在线精品亚洲第一网站| 乱人伦中国视频| 国产亚洲精品久久久久5区| 亚洲第一欧美日韩一区二区三区| 国产视频一区二区在线看| 亚洲男人天堂网一区| 香蕉国产在线看| 日日夜夜操网爽| 97碰自拍视频| 欧美成人性av电影在线观看| 人人澡人人妻人| 99久久久亚洲精品蜜臀av| 五月开心婷婷网| 日本wwww免费看| 免费在线观看视频国产中文字幕亚洲| 精品一区二区三卡| www.www免费av| 淫妇啪啪啪对白视频| 三上悠亚av全集在线观看| 国产成人精品在线电影| 国产单亲对白刺激| 精品少妇一区二区三区视频日本电影| 亚洲中文av在线| 日韩一卡2卡3卡4卡2021年| 欧美乱色亚洲激情| 一区二区日韩欧美中文字幕| 欧美乱妇无乱码| 真人做人爱边吃奶动态| 涩涩av久久男人的天堂| 69av精品久久久久久| 国内久久婷婷六月综合欲色啪| 亚洲成人免费电影在线观看| 香蕉丝袜av| 法律面前人人平等表现在哪些方面| 亚洲欧美激情在线| 国产一区二区激情短视频| 欧美丝袜亚洲另类 | 99re在线观看精品视频| 黄片大片在线免费观看| 久久 成人 亚洲| 国产成人系列免费观看| a级毛片在线看网站| 黄片播放在线免费| 人人妻,人人澡人人爽秒播| 一夜夜www| 国产精品一区二区在线不卡| 12—13女人毛片做爰片一| 午夜福利在线免费观看网站| 高清在线国产一区| 一进一出抽搐gif免费好疼 | 一进一出抽搐gif免费好疼 | 日本免费一区二区三区高清不卡 | 狂野欧美激情性xxxx| 国产精品一区二区精品视频观看| av有码第一页| 天堂影院成人在线观看| 日韩免费av在线播放| 天堂中文最新版在线下载| 多毛熟女@视频| 国产成人欧美| 国产成人精品久久二区二区91| 日韩高清综合在线| 可以在线观看毛片的网站| 亚洲自拍偷在线| 国产精品久久视频播放| 我的亚洲天堂| 搡老岳熟女国产| 99riav亚洲国产免费| 美女福利国产在线| 亚洲精品久久成人aⅴ小说| 男人操女人黄网站| 欧美 亚洲 国产 日韩一| 少妇被粗大的猛进出69影院| 日韩一卡2卡3卡4卡2021年| 水蜜桃什么品种好| 亚洲精品粉嫩美女一区| 欧美成人免费av一区二区三区| 亚洲精品成人av观看孕妇| 亚洲男人天堂网一区| 免费不卡黄色视频| 国产亚洲av高清不卡| 亚洲中文av在线| 熟女少妇亚洲综合色aaa.| 妹子高潮喷水视频| 久久人妻福利社区极品人妻图片| av国产精品久久久久影院| 涩涩av久久男人的天堂| 国产精华一区二区三区| 亚洲av片天天在线观看| 日韩欧美一区视频在线观看| av福利片在线| 久久香蕉精品热| 免费高清在线观看日韩| 在线播放国产精品三级| 精品电影一区二区在线| 欧美在线一区亚洲| 麻豆一二三区av精品| 男人舔女人下体高潮全视频| 欧美色视频一区免费| 欧美人与性动交α欧美软件| videosex国产| 国产高清videossex| 欧美日韩亚洲高清精品| 国产精品 国内视频| 亚洲色图综合在线观看| 99re在线观看精品视频| 久9热在线精品视频| 两性午夜刺激爽爽歪歪视频在线观看 | 97超级碰碰碰精品色视频在线观看| 亚洲色图av天堂| 国产黄a三级三级三级人| 国产亚洲欧美精品永久| 午夜精品国产一区二区电影| 日韩高清综合在线| 欧美乱色亚洲激情| 亚洲久久久国产精品| 亚洲成a人片在线一区二区| 国产精品野战在线观看 | 成人18禁在线播放| 变态另类成人亚洲欧美熟女 | 黄片大片在线免费观看| 国产精品乱码一区二三区的特点 | 热99re8久久精品国产| netflix在线观看网站| 18禁国产床啪视频网站| 国产极品粉嫩免费观看在线| av免费在线观看网站| 精品久久久久久久毛片微露脸| svipshipincom国产片| 嫩草影视91久久| 亚洲一区二区三区欧美精品| 免费在线观看视频国产中文字幕亚洲| 成年人免费黄色播放视频| www.精华液| 亚洲精品在线观看二区| 国产精品偷伦视频观看了| 成人永久免费在线观看视频| 99国产精品免费福利视频| 可以免费在线观看a视频的电影网站| 亚洲精品国产区一区二| 99国产精品一区二区蜜桃av| 一本大道久久a久久精品| 免费在线观看完整版高清| 欧美黄色淫秽网站| 亚洲精品国产区一区二| 色精品久久人妻99蜜桃| 亚洲一区二区三区不卡视频| 淫秽高清视频在线观看| 国产在线精品亚洲第一网站| 一进一出好大好爽视频| 精品日产1卡2卡| 久久久久久人人人人人| 一区二区三区精品91| 欧美日韩瑟瑟在线播放| 午夜福利在线免费观看网站| 黄色毛片三级朝国网站| 男女下面进入的视频免费午夜 | 欧美激情高清一区二区三区| 91精品国产国语对白视频| 少妇被粗大的猛进出69影院| 美女扒开内裤让男人捅视频| 天天影视国产精品| 免费不卡黄色视频| 999久久久国产精品视频| 亚洲人成电影观看| 国产乱人伦免费视频| 国产三级黄色录像| 国产成人av激情在线播放| 男人舔女人下体高潮全视频| 99久久综合精品五月天人人| 波多野结衣av一区二区av| 69精品国产乱码久久久| 水蜜桃什么品种好| 日日干狠狠操夜夜爽| 精品卡一卡二卡四卡免费| 99国产精品免费福利视频| 国产精品永久免费网站| 搡老岳熟女国产| 国产成人av教育| 国产亚洲精品久久久久久毛片| 日本免费a在线| 黄色毛片三级朝国网站| www.999成人在线观看| 欧美另类亚洲清纯唯美| 国产成人系列免费观看| x7x7x7水蜜桃| 老汉色∧v一级毛片| 视频在线观看一区二区三区| 黄色成人免费大全| 久久久久久久精品吃奶| 香蕉久久夜色| 免费高清在线观看日韩| 亚洲精品av麻豆狂野| 亚洲,欧美精品.| 高清av免费在线| 久久久国产欧美日韩av| 色婷婷av一区二区三区视频| 18禁观看日本| 日本一区二区免费在线视频| 亚洲国产欧美日韩在线播放| 成人手机av| 又紧又爽又黄一区二区| 大型av网站在线播放| 黑人操中国人逼视频| 亚洲熟妇中文字幕五十中出 | 国产亚洲欧美在线一区二区| 国产成人免费无遮挡视频| 亚洲精品一二三| 久久久国产一区二区| 国产三级在线视频| 性少妇av在线| 欧美日本亚洲视频在线播放| 国产97色在线日韩免费| 最好的美女福利视频网| 午夜老司机福利片| 嫩草影视91久久| 欧美人与性动交α欧美精品济南到| 女同久久另类99精品国产91| 十八禁人妻一区二区| 激情在线观看视频在线高清| 亚洲国产精品一区二区三区在线| 757午夜福利合集在线观看| 精品国产乱码久久久久久男人| 高潮久久久久久久久久久不卡| 国产真人三级小视频在线观看| 国产区一区二久久| 女人高潮潮喷娇喘18禁视频| 极品人妻少妇av视频| 亚洲专区中文字幕在线| 欧美人与性动交α欧美精品济南到| 丰满饥渴人妻一区二区三| 这个男人来自地球电影免费观看| 国产视频一区二区在线看| a级毛片在线看网站| 老司机深夜福利视频在线观看| 国产精品自产拍在线观看55亚洲| av电影中文网址| 18禁国产床啪视频网站| e午夜精品久久久久久久| 精品国产超薄肉色丝袜足j| 又大又爽又粗| 精品国产超薄肉色丝袜足j| 18禁裸乳无遮挡免费网站照片 | 成人18禁在线播放| 在线永久观看黄色视频| 黑人猛操日本美女一级片| 亚洲片人在线观看| 高清在线国产一区| 18禁国产床啪视频网站| 国产精品一区二区免费欧美| 老汉色av国产亚洲站长工具| 国产激情欧美一区二区| 亚洲精品粉嫩美女一区| 在线观看免费高清a一片| 啦啦啦 在线观看视频| 久久青草综合色| 国产成年人精品一区二区 | 亚洲九九香蕉| 成人永久免费在线观看视频| 最近最新中文字幕大全免费视频| 欧美激情久久久久久爽电影 | 黄片大片在线免费观看| 国产伦一二天堂av在线观看| 91成年电影在线观看| 精品高清国产在线一区| 91成年电影在线观看| 色播在线永久视频| 嫩草影院精品99| 丝袜美足系列| 少妇裸体淫交视频免费看高清 | 亚洲人成77777在线视频| 91精品国产国语对白视频| 国产三级黄色录像| 黑人操中国人逼视频| av在线天堂中文字幕 | 亚洲精品粉嫩美女一区| 久久久久久久久中文| 嫩草影院精品99| 美国免费a级毛片| 国产av精品麻豆| 国产熟女xx| 极品教师在线免费播放| 欧美精品啪啪一区二区三区| av超薄肉色丝袜交足视频| 亚洲欧美日韩另类电影网站| 国产精品偷伦视频观看了| 国产无遮挡羞羞视频在线观看| 欧美色视频一区免费| ponron亚洲| x7x7x7水蜜桃| 日本欧美视频一区| 在线av久久热| 丝袜在线中文字幕| 色综合站精品国产| 久久人妻熟女aⅴ| 午夜免费鲁丝| 天天躁狠狠躁夜夜躁狠狠躁| 国产色视频综合| av免费在线观看网站| 少妇裸体淫交视频免费看高清 | 又黄又爽又免费观看的视频| 精品久久久久久久毛片微露脸| av国产精品久久久久影院| 久久精品国产清高在天天线| 欧美黄色淫秽网站| 日本黄色视频三级网站网址| 国产亚洲精品久久久久5区| 国产激情欧美一区二区| 免费高清在线观看日韩| www日本在线高清视频| 夜夜爽天天搞| 日本黄色视频三级网站网址| 女警被强在线播放| 亚洲国产精品sss在线观看 | 欧美av亚洲av综合av国产av| 欧美日韩亚洲国产一区二区在线观看| 宅男免费午夜| 免费在线观看日本一区| 国产成人精品在线电影| 久久久久国产精品人妻aⅴ院| av超薄肉色丝袜交足视频| 亚洲成人免费电影在线观看| 免费在线观看黄色视频的| 日韩精品青青久久久久久| 国产精品亚洲av一区麻豆| 国产又色又爽无遮挡免费看| 久久国产精品人妻蜜桃| 久久久久久久午夜电影 | 18禁裸乳无遮挡免费网站照片 | 免费一级毛片在线播放高清视频 | 少妇的丰满在线观看| 精品少妇一区二区三区视频日本电影| 视频在线观看一区二区三区| 久久久久久人人人人人| 欧美黄色淫秽网站| 午夜福利一区二区在线看| 国产在线精品亚洲第一网站| 国产免费现黄频在线看| 亚洲国产精品合色在线| 午夜免费激情av| 999精品在线视频| 国产国语露脸激情在线看| 色在线成人网| 正在播放国产对白刺激| 国产一区二区在线av高清观看| 久久精品国产综合久久久| 久久人妻熟女aⅴ| 一级a爱视频在线免费观看| 一区二区三区精品91| 999久久久国产精品视频| 首页视频小说图片口味搜索| 在线永久观看黄色视频| 国产精品电影一区二区三区| 免费女性裸体啪啪无遮挡网站| 国产精品一区二区精品视频观看| 制服诱惑二区| 91成人精品电影| 自拍欧美九色日韩亚洲蝌蚪91| 久久天堂一区二区三区四区| 看片在线看免费视频| 性色av乱码一区二区三区2| 老司机在亚洲福利影院| 黄片大片在线免费观看| 国产精品影院久久| 夫妻午夜视频| 国产一区二区在线av高清观看| 日韩免费高清中文字幕av| 亚洲黑人精品在线| 亚洲成人久久性| 国产区一区二久久| 欧美午夜高清在线| 热re99久久国产66热| 久久99一区二区三区| 成人特级黄色片久久久久久久| 操出白浆在线播放| 亚洲国产精品999在线| 国产高清videossex| 国产一区二区在线av高清观看| 欧美人与性动交α欧美软件| 嫁个100分男人电影在线观看| 大型黄色视频在线免费观看| 亚洲欧美精品综合久久99| 精品国产一区二区三区四区第35| 大码成人一级视频| 美女大奶头视频| 性少妇av在线| 欧美+亚洲+日韩+国产| 午夜精品在线福利| 国产视频一区二区在线看| 国产精品 国内视频| 一边摸一边抽搐一进一出视频| 99精国产麻豆久久婷婷| 丝袜美足系列| 日本精品一区二区三区蜜桃| 久久久久精品国产欧美久久久| 久热这里只有精品99| 亚洲男人的天堂狠狠| 午夜a级毛片| 欧美中文综合在线视频| 国产主播在线观看一区二区| 亚洲欧美精品综合久久99| 国产不卡一卡二| 一进一出抽搐gif免费好疼 | 亚洲午夜精品一区,二区,三区| 亚洲欧美一区二区三区黑人| 欧美乱色亚洲激情| 18禁美女被吸乳视频| a级毛片黄视频| 国产精品久久久久久人妻精品电影| 久久久久国产精品人妻aⅴ院| 精品国产乱码久久久久久男人| 国产成+人综合+亚洲专区| 99国产综合亚洲精品| 咕卡用的链子| 中文字幕人妻丝袜制服| 亚洲av成人一区二区三| 91成年电影在线观看| 香蕉久久夜色| 日本免费a在线| 亚洲人成网站在线播放欧美日韩| 无人区码免费观看不卡| 80岁老熟妇乱子伦牲交| 国产1区2区3区精品| 日韩欧美免费精品| 亚洲三区欧美一区| 久久久国产成人精品二区 | 欧美最黄视频在线播放免费 | 国产熟女xx| 十八禁人妻一区二区| 国产男靠女视频免费网站| 中文字幕最新亚洲高清| 丝袜美腿诱惑在线| 午夜两性在线视频| 在线av久久热| www.999成人在线观看| 欧美性长视频在线观看| 国产av又大| 久久国产精品男人的天堂亚洲| 怎么达到女性高潮| 亚洲aⅴ乱码一区二区在线播放 | 国产激情久久老熟女| 在线天堂中文资源库| 曰老女人黄片| 国产成人一区二区三区免费视频网站| 国产精品国产av在线观看| 久久精品国产综合久久久| 久久久久九九精品影院| 涩涩av久久男人的天堂| 我的亚洲天堂| 人成视频在线观看免费观看| 伊人久久大香线蕉亚洲五| 在线播放国产精品三级| 亚洲九九香蕉| 亚洲一区二区三区色噜噜 | 新久久久久国产一级毛片| 久久国产精品人妻蜜桃| 18禁美女被吸乳视频| 99久久久亚洲精品蜜臀av| 亚洲精品国产一区二区精华液| 色综合站精品国产| 国产精品亚洲一级av第二区| av片东京热男人的天堂| 免费av毛片视频| 成人永久免费在线观看视频| 后天国语完整版免费观看| 一a级毛片在线观看| 看片在线看免费视频| 免费看十八禁软件| 日韩成人在线观看一区二区三区| 黄色a级毛片大全视频| 亚洲七黄色美女视频| 12—13女人毛片做爰片一| 午夜成年电影在线免费观看| 嫩草影院精品99| 亚洲精品在线美女| 中出人妻视频一区二区| 国产亚洲欧美在线一区二区| 黑人巨大精品欧美一区二区mp4| 亚洲一区高清亚洲精品| 亚洲熟妇熟女久久| 在线观看66精品国产| 国产精品亚洲av一区麻豆| 亚洲精品美女久久av网站| av免费在线观看网站| e午夜精品久久久久久久| 国产精品一区二区三区四区久久 | 狂野欧美激情性xxxx| 女生性感内裤真人,穿戴方法视频| 在线观看66精品国产| 亚洲成国产人片在线观看| 国产黄a三级三级三级人| 侵犯人妻中文字幕一二三四区| 国产麻豆69| 午夜免费观看网址| 欧美国产精品va在线观看不卡| bbb黄色大片| 在线免费观看的www视频| 精品高清国产在线一区| 国产精品成人在线| 精品一品国产午夜福利视频| 久久精品国产综合久久久| 男人操女人黄网站| 少妇被粗大的猛进出69影院| 高清欧美精品videossex| 国产精品美女特级片免费视频播放器 | 欧美黑人精品巨大| 午夜91福利影院| 麻豆国产av国片精品| 一进一出好大好爽视频| 老司机亚洲免费影院| aaaaa片日本免费| 亚洲精品美女久久av网站| 在线观看免费视频日本深夜|