• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Task Scheduling for Multi-Cloud Computing Subject to Security and Reliability Constraints

    2021-04-13 10:47:48QingHuaZhuSeniorMemberIEEEHuanTangJiaJieHuangandYanHou
    IEEE/CAA Journal of Automatica Sinica 2021年4期

    Qing-Hua Zhu, Senior Member, IEEE, Huan Tang, Jia-Jie Huang, and Yan Hou

    Abstract—The rise of multi-cloud systems has been spurred.For safety-critical missions, it is important to guarantee their security and reliability. To address trust constraints in a heterogeneous multi-cloud environment, this work proposes a novel scheduling method called matching and multi-round allocation (MMA) to optimize the makespan and total cost for all submitted tasks subject to security and reliability constraints. The method is divided into two phases for task scheduling. The first phase is to find the best matching candidate resources for the tasks to meet their preferential demands including performance,security, and reliability in a multi-cloud environment; the second one iteratively performs multiple rounds of re-allocating to optimize tasks execution time and cost by minimizing the variance of the estimated completion time. The proposed algorithm, the modified cuckoo search (MCS), hybrid chaotic particle search(HCPS), modified artificial bee colony (MABC), max-min, and min-min algorithms are implemented in CloudSim to create simulations. The simulations and experimental results show that our proposed method achieves shorter makespan, lower cost,higher resource utilization, and better trade-off between time and economic cost. It is more stable and efficient.

    I. INTRODUCTION

    VIRTUALIZATION computing has enjoyed wide applications in cloud computing, where virtual machines(VMs) are created on the same set of computer hosts. The ondemand provisioning of resources and dynamic scalability makes computing power an internet commodity [1]. Singlecloud computing models (where users use a single cloud) have several challenges [2], [3], such as service and resource unavailability, regulatory compliance, network latency between end users and cloud sites, and vendor lock-in [4]. Multi-cloud computing is a viable approach to tackle these issues, where users employ multiple independent clouds that do not rely on any underlying collaboration between cloud providers. It can provide users with better quality of service (QoS) [5] using diverse geographical locations for data storages [6] and better application resilience. It can also help in avoiding vendor lock-in [7], which enables their data centers to offer users a wide variety of services [8].

    Cloud task scheduling is a non-deterministic polynomialtime hard problem in general. It is challenging to efficiently find a better task scheduling solution in a multi-cloud environment because it involves not only service compositions but also the combination of many optimal objectives. In a business model, user tasks are submitted to a data center to obtain certain services in a paid manner, and cloud service providers (CSPs) tend to price their services based on the performance configuration of computing resources by a service-level agreement (SLA) [9]. Nowadays,large-scale complex applications consist of a variety of service components, which demand different combinations of security and reliability. Furthermore, on the cloud side, they require different levels of security and reliability.

    Since the requirements of user’s tasks are diverse, compared with traditional single cloud computing, each task may have more opportunities to find a suited cloud service in a multicloud system to avoid poor adaptability between tasks and cloud services, excessive computing time or cost waste, and information leakage due to insufficient service security [10].Thus, a multi-cloud system is crucial to ensure the needs of users. A low level of cloud resource reliability may cause service interruption or failure and also bring unnecessary loss to users [11]. In a multi-cloud environment, a CSP is chosen according to the different needs of a user’s tasks; thus, if services fail at a CSP, the services at other providers will support corresponding tasks. To a large extent, the user can also avoid service interruption risks. Therefore, it is necessary for users to select service policies based on their own needs and employ them to multiple CSPs.

    However, it is very challenging to choose a reasonable resource scheduling strategy for users in a heterogeneous multi-cloud environment, because limited cloud resources have different capacities and functions [12]. It requires a scheduling scheme that can not only efficiently complete task requests, but also maximize the utilization of VMs while meeting the user’s preferences that are translated into multiple QoS constraints. The task scheduling in this work is a nondeterministic polynomial-time hard problem. When the sum of the numbers of decision variables and constraints of the problem is large, there is no algorithm such that the desired solution can be obtained within polynomial time.

    The main contributions of this work are as follows. First, in the trust aspect, we propose a matching-degree strategy between user tasks and resources to provide users with the matching resources as best as possible to satisfy the user’s resource performance, security, and reliability preferences.Second, on the basis of the previous matching results, we propose task scheduling algorithms to optimize the overall tasks execution time (i.e., makespan) and total cost in a multicloud system by taking the variance of the estimated completion time of all submitted tasks on resources as a metric.

    The rest of this paper is structured as follows. Section II presents existing related works. Section III gives a description of the cloud system model and related QoS constraints.Section IV proposes a scheduling framework, and matching and multi-round allocation (MMA) algorithms. Section V conducts experimental analyses and comparisons with other scheduling algorithms to demonstrate the effectiveness of our proposed algorithms. Section VI summarizes this work and points out our future work.

    II. RELATED WORK

    Task scheduling aims to maximize the economic benefits of CSPs and achieve reasonable deployment of resources to meet user requirements. The task scheduling strategy in a cloud must satisfy the QoS requirements of user tasks, including deadline, time, economic cost, security [13]–[15], reliability[16], [17], etc. Unreasonable scheduling schemes would reduce the overall performance of cloud resources and may violate user’s QoS requirements.

    Many efforts have been made on task scheduling in a single cloud environment. There are some single objective traditional scheduling algorithms, such as max-min [18], min-min [19],and first-in-first-out (FIFO) [20]. Max-min and min-min cannot efficiently utilize resources, thereby leading to a serious load imbalance problem. The FIFO processes the tasks according to their arrival time, which causes some small tasks to take too long. In fact, it is difficult to believe that single objective task scheduling methods could provide better service for cloud users.

    Fig.1. Multi-Cloud development architectures.

    With the growth of task requests and resources, some methods based on evolutionary algorithms are adopted to optimize multiple objectives of task scheduling in a single cloud environment to promote service quality. An improved load balanced min-min algorithm is proposed in [21] by using a genetic algorithm (GA) in order to minimize the makespan and increase resource utilization. The work in [22] proposes a meta-heuristic based differential evolution (DE) algorithm to optimize the turnaround time and monetary cost for task scheduling in cloud computing. In [23], a method of initial optimization on the crossover mutation probability of an adaptive genetic algorithm using binary coded chromosomes is proposed to reduce the task execution time and cost. A multi-objective task scheduling GA-DE algorithm is proposed in [24], in which total time, cost and VM load balancing are taken into account simultaneously. However, the disadvantage of evolutionary algorithms lies in the great difficulty in compromising some factors, for example, such algorithms usually strive to increase time costs to gain economic advantage or vice versa. Thus, the existing multi-objective scheduling algorithms cannot directly be applied in a multicloud environment.

    In addition, much work has been done to solve the taskscheduling problem in a multi-cloud environment. The scheduling algorithms in a multi-cloud environment are classified and analyzed in [25]. The study in [26] proposes an integrated approach to predict the workload at the next time slot, which achieves accuracy and a fast learning speed in distributed clouds. Taha et al. [27] present a SLA-based service selection approach for task scheduling in a multicloud. Lin et al. [28] propose a workflow scheduling algorithm, called the multi-cloud partial critical path, to minimize workflow execution costs while meeting deadline constraints in a multi-cloud environment. Sooezi et al. [29]propose a massive data workflow scheduling algorithm based on communications in a multi-cloud environment, which minimizes workflow execution costs subject to user-defined deadline constraints. Evolutionary algorithms are also adopted to solve scheduling problems in a multi-cloud environment.Rodriguez and Buyya [30] present an algorithm based on the meta-heuristic optimization technique and particle swarm optimization (PSO), which aims to minimize the overall workflow execution cost while meeting deadline constraints.However, these scheduling algorithms mainly focus on scheduling architectures and single objective problems instead of multi-objective ones, ignoring security and reliability constraints.

    In a multi-cloud environment, the variety of resources makes security and reliability issues more prominent, but only a few studies consider their security and reliability. In [31], a multi-objective scheduling algorithm that utilizes PSO technology in a multi-cloud environment is proposed, and has the aim to minimize both the makespan and cost while considering reliability constraints. Kianpisheh et al. [32]propose a scheduling algorithm to minimize execution time and maximize the reliability with budget constraints in a cloud computing environment. A workflow scheduling strategy that takes account into security and budget is proposed in [33] to provide customers with shorter makespan with consideration of security constraints. Wen et al. [34] propose an algorithm to find deployments for workflow applications that are reliable but are less expensive and satisfy security requirements in federated clouds. The work in [35] proposes a multi-QoS(time, cost, security, and reliability) constrained task scheduling algorithm in a single cloud based on GA and PSO algorithms, which transforms the user’s QoS requirements into fitness functions for the optimization process. Although[36] proposes a GA based on QoS-aware (time, cost, and reliability) constraints perception in a multi-cloud environment, which allows users to choose a service optimization combination scheme according to their own preferences, this does not involve scheduling optimization on the underlying resources.

    As mentioned above, in a multi-cloud environment,although some related research has been done based on multi-QoS constraints, the existing work on scheduling optimization to meet the user’s quality of service requirements is far from satisfying both performance and trust QoS constraints.Therefore, to the authors’ best knowledge, there is no reported work that optimizes the makespan and total cost in a multicloud environment while considering both security and reliability constraints. The approach proposed in this work goes beyond existing approaches by considering both performance optimization and trust QoS constraints for resource scheduling.

    III. MODEL AND PROBLEM STATEMENT

    A. Cloud Model

    1) Multi-Cloud Architectural

    The inter-cloud structure is usually classified into a volunteer federation and multi-cloud [37]. The former refers to a group of CSPs voluntarily collaborating and exchanging resources to form federation clouds. The later means that the CSPs are essentially independent of each other when an application or its broker uses multiple clouds in an aggregation. The structure of a multi-cloud system is shown in Fig.1. It is divided into:

    a) Services: They carry out application provisioning and can be deployed either outside or inside of the cloud client;

    Fig.2. The roles in a multi-cloud brokering scenario.

    b) Libraries: It is necessary that application brokers directly deal with provisioning and scheduling application components across clouds. Inter-cloud libraries can be utilized by broker components to facilitate the usage of multiple clouds in an uniform way.

    In this study, we adopt an independent inter-cloud structure with a broker.

    2) Multi-Cloud Scheduling Architectural

    Fig.2 addresses the multi-cloud broker architecture [38],where there are three roles: users, cloud service providers, and cloud brokers. A cloud user requests virtual resources using a service description template, which can specify a user’s preferences for resources, including requirements for resource attributes, optimization goals, and constraints. In this work,the task priority is considered during task scheduling with guarantee that users who pay more can enjoy better service. A higher priority task will be scheduled to execute earlier than a lower priority one.

    Each CSP provides a variety of different VM instance types,which are defined based on hardware metrics, including CPU frequency, memory size, and data storage size. The two main functions of the cloud broker are: a) optimizing the configuration of virtual resources across a group of CSPs, and b) monitoring and managing these virtual resources. The cloud broker’s scheduler component is capable of generating an optimal deployment plan based on user’s demands on resources and cloud service offerings provided by CSPs.

    B. Problem Statement

    1) Cloud Security Evaluation

    In practice, every cloud-computing platform faces security threats from network attacks and system vulnerabilities all the time.

    In (1), a positive value of bkreflects that a security level is higher than the baseline level, whereas its negative value shows that a security level is lower than its baseline.

    Let slkdenote the security level of CSPk, which can be calculated as follows [39].

    If slkis greater than or equal to the baseline level, e.g., 1,then CSPkis safe, otherwise it is not safe, and the larger the value of slk, the higher the security for CSPk. For instance,considering a percentage like evaluation result, we would say that CSPkhas a security level of 20% over or under the defined baseline if slk= 1.2 or 0.8, respectively. Therefore,CSPkis considered secure in the former and insecure in the latter.

    Fig.3. Two-phase scheduling framework in a multi-cloud.

    2) Cloud Reliability Evaluation

    The IEEE Computer Society defines software reliability[40] as follows:

    a) The software does not increase the probability of a system failure during a given period; and

    b) The reliability quantification indicator is the average fault-free running time of the system during a specified period.

    Failures are almost inevitable for hardware and software, so cloud resources may fail at any time and affect the performance of the entire multi-cloud system. The work in[41] designs a mechanism to continuously update the reliability of cloud resources and provide reliability scheduling for cloud users. There are many VMs in each cloud, and a VM consists of several resources, thus, the reliability of a VM depends on the reliability of its each resource. Resource reliability mainly covers the reliability of disk and RAM. In [42], the reliability of the disk and RAM is 0.93 and 0.997, respectively via observations and calculations.In this work, these two values are initialized for resource reliability on the VM, and the following steps implement the VM resource reliability dynamic update.

    Step 1: Assign reliability initial values to all VM instances.Set 0.93 to the disk reliability value of each VM and 0.997 to the RAM reliability value. The reliability initial value of each VM instance is obtained by multiplying the two values.

    Step 2: VM reliability will be updated when each time a failure occurs on a VM. A counter initialized by zero is set for each VM’s disk and RAM. If the disk or RAM fails, the corresponding counter will increase by one, at the same time halving the reliability value of the failed disk or RAM. In this way, a discrete drop in component reliability can be simulated.

    Step 3: When the number of failures reaches the threshold and the disk or RAM counter reaches the threshold (set to 1.0 here), then the VM is replaced by its backup. In this case, it implies the reliability of the resource is too low.

    3) Time and Cost Evaluation

    IV. MATCHING AND MULTI-ROUND ALLOCATION ALGORITHMS

    A. Scheduling Framework

    The scheduling framework shown in Fig.3 has the following main modules.

    1) Matcher: It checks whether the user’s tasks in the queue are schedulable or not according to the existing VM types,then we can obtain the candidate VMs for corresponding tasks. Next, we calculate the matching degree between the task and all VM types in its candidate VMs list, and obtain the VM type with the highest matching degree for each task.

    2) Initial Allocator: The tasks should be arranged in a given order by which can be visited one by one for the following scheduling process. In this work, the submitted tasks have different priorities. The tasks are sorted by their priorities. In addition, for tasks with the same priorities, they are sorted by their size in an ascending order. Then, tasks are allocated to its most matching VMs and we achieve load balancing between the same types of VMs.

    3) Multi-Round Iterative Allocator: After the matching phase is completed, all tasks have been assigned the highest matching degree VMs. At this moment, if the assignment is adopted for a schedule, it would lead to the conclusion that the total completion time of some VMs is relatively large, while the completion time of some VMs is much less than the maximum. This causes some VMs to finish computing tasks early while other VMs will run for a long time, resulting in excessive total completion time. To avoid this issue, we design a multi-round iterative allocator to reallocate a task to a fitter VM, which can minimize the variance of the estimated completion time of all VMs. After the allocating phase, the tasks are reassigned to the VMs in the execution order.

    4) Cloud Manager: This is a centralized management center that monitors the receipt of information from VMs provided by individual CSPs, and can obtain the type of VMs and which VMs are idle and available.

    B. Scheduling Algorithm

    In this section, we propose a scheduling algorithm called matching and multi-round allocation (MMA) to achieve scheduling optimization for the entire process.

    1) Matching Phase

    After a series of tasks are sent to the task queue, a schedulability judgment is performed for each task, to decide whether the performance provided by a VM meets the minimum requirements of a task. If we provide users with a VM that does not meet the user’s task requirements, it violates the pre-signed SLA [43]. This will not only affect the QoS,but also seriously damage the reputation of CSPs. In the worst case, data leakage, service interruption, etc. will bring huge losses to users.

    In (5), f (i, k, j) = 1 indicates that vk,jcan satisfy the security and reliability requirements of ti, thus, the rigid trust QoS schedulability conditions can be satisfied, otherwise f (i, k, j) =0. When the rigid schedulability conditions are satisfied, we must further consider the performance QoS requirement condition of task scheduling, which will allow fewer resources to be allocated to certain tasks, and decrease resource usage.Therefore, we need to make a match between the task requirements and the resource attributes, in order to meet the performance QoS requirements of the user as best as possible without causing a waste of resources.

    Let FirstAllocate denote the allocated VM list obtained by Algorithm 3 in the matching phase. FirstAllocate[i]determines which VM is assigned to task ti. Algorithm 3 outputs the set of VMs that are candidates for tasks in which CandidateSet[i] denotes the candidates VM for tj.

    2) Allocating Phase

    In the above matching phase, Algorithm 3 finds the best virtual machine for each task. However, by this scheduling strategy, some types of VMs take a shorter time to finish their assigned tasks, while other types of VM finish their tasks in a longer time. It means the former is idle when the latter is busy.In other words, when some tasks are queuing at the overloaded VMs, it is necessary to improve upon the schedule given by Algorithm 3.

    Thus, in the allocation phase, we reallocate the VMs to the tasks to balance the workload of each type of VMs gradually by using multiple iterations.

    The estimated completion time (ECT) and estimated completion cost (ECC) of the task running on each VM are calculated by (12) and (13).

    As a criterion for whether each VM needs to perform task migration when a round of allocating is finished, the average estimated completion time (avgECT) of VMs is calculated as follows. Let |ck| denote the number of VMs in ck, k∈ Nm.

    Let VA denote the variance of the estimated completion time on all VMs.

    Therefore, shrinking avgECT can pave the way to reducing the total execution time and total cost of VMs. As we continually iterate through the allocation attempts, Algorithm 4 can find a point that minimizes avgECT and VA for all VMs.At this time, the execution time and cost are at the approximate equilibrium point of the relationship, which is rather difficult to find because the attributes of tasks and VMs are discrete. Hence, the execution time can be shortened and the total cost can be lower.

    Algorithm 4 implements the allocation phase.

    Case A: There is only one candidate VM type in CandidateSet[i] for ti. Adopt this candidate type as the current VM allocation (Line 11) and calculate the task completion time on the VM resource (Line 12).

    Case B: There are two or more candidate VM types in CandidateSet[i] for ti. By the end of the execution of ti, if the task completion time of the VM assigned for tiby the previous allocation is greater than avgECT × 0.75, we find the minimal task completion time for tiamong the candidates CandidateSet[i] (Lines 14–23); otherwise, the VM assigned by the previous allocation is chosen as the current allocation(Lines 25–26).

    After all the tasks have been handled, the current average completion time and current variance of all tasks on allocated VMs (avgNewECT, newECC, and newVA) are computed.Then, evaluate whether newVA and newECC are equal to or greater than those of the allocation in the previous iteration. If they are, the reallocation process terminates; otherwise, repeat the above allocation iteration.

    Essentially, compared with Algorithm 3, Algorithm 4 determines the load migration of tasks so that it can shorten the task completion time, better balance the workloads among different types of VMs, reduce the cost, and improve the utilization of cloud resources.

    3) Time Complexity

    Now, we analyze the time complexity of the algorithms. In Algorithm 1, for Lines 1–6, the time complexity of the computing cloud security level is O(n). Then, the time complexity of Lines 7–15 is O(m×n). As a result, the time complexity of Algorithm 1 is O(m×n). In Algorithm 2, for Lines 1–5, the time complexity of initialing VM reliability value is O(h). Then, the time complexity of Lines 16–25 is O(h×n). Thus, the time complexity of Algorithm 2 is O(n×h).In Algorithm 3, for Lines 5–27, the time complexity of the first allocation is O(n×h). Now we can get the time complexity O(n×h) of Algorithm 3. In Algorithm 4, for Lines 9–29, the time complexity of multi-round reallocation is O(n).For Lines 8–40, the time complexity of Algorithm 4 is O(n).Therefore, the time complexity of our proposed algorithms is polynomial.

    4) An Illustrative Example

    V. EXPERIMENTS AND PERFORMANCE EVALUATION

    The experimental environment includes an AMD Ryzen 5 PRO 1600 Six-Core Processor 3.4 GHz CPU, 8.0 GB memory, Windows 10 operating system, JDK7.0, and Cloud-Sim 4.0 [44], which is widely used in task scheduling simulation experiments.

    Adopt the following algorithms as benchmarks to validate the effectiveness of our proposed MMA algorithm: 1) Two conventional exact algorithms: min-min and max-min[45]–[47]; and 2) three evolutionary algorithms: modified cuckoo search (MCS) [48], [49], hybrid chaotic particle search(HCPS) [50], [51], and modified artificial bee colony(MABC) [52].

    TABLE I VALUES OF THE PARAMETERS DURING THE ALLOCATING PHASE OF Fig.4

    Fig.4. Execution time matrix and matching degree matrix of tasks.

    The reasons to choose these three evolutionary algorithms are summarized as follows.

    1) MCS can avoid to be trapped in a local optimal solution and guarantee a fast convergence to find a global optimal solution.

    2) HCPS has both the high precision of simulated annealing(SA) and fast convergence of PSO [50], [51].

    3) MABC has been effectively used to solve multi-modal and multi-dimensional optimization problems [52]. It uses fewer control parameters and its performance is better or similar to other algorithms [52].

    A. Performance Metrics

    The following performance indicators are used to evaluate the algorithms.

    1) Makespan

    The completion time is denoted by Makespan, which refers to the entire completion time of processing a set of user tasks on the available VMs. Makespan[k, j] represents the completion time of the tasks on vjin ck, which is defined by (16).

    It can be concluded from (16) that the minimum completion time of the tasks is the maximum value of the latest completion time for each virtual machine to process the assigned task. The smaller the value of Makespan is, the shorter the completion time of all the tasks.

    2) Total Cost

    The total cost is denoted by TotalCost, which refers to how much a user has to pay to a CSP according to the agreement after successfully completing all tasks. ECC[k, j] represents the estimated completion cost of the tasks on vjin ck, which is defined by (17).

    Assume that the unit price of a VM is only related to the computing performance of the virtual resource. A higher unit price indicates a more powerful computing of the virtual resource.

    3) The Average Resource Utilization of VMs

    AU denotes the average resource utilization of VMs. It is defined by

    where Execu[j] is the execution time of all tasks on vj. Its value directly reflects whether cloud resources are efficiently utilized.

    4) Load Balance

    B denotes the load balancing of service resources. It is defined as

    where Load[j] represents the load of vj, that is, the task completion time of vj; avl represents the average load of the VM, namely, its average task completion time. The smaller value of B implies a better workload balance.

    5) Runtime Overhead

    RO denotes the runtime of the algorithms. It reflects the performance of the algorithm to some extent. A good algorithm has a relatively small runtime overhead.

    B. Parameter Setting

    1) Parameter Setting of the MCS Algorithm

    Set the number of cuckoo nests to CN = 25. The number of dimensions of the nest is the number of tasks to be processed.Set the possibility of finding the cuckoo’s eggs, Pα= 0.25.The step size factor α of Levi’s flight α(i)=b?q×(exp(10(i?1)/N_iter ?1)?1)/(exp(10)?1) (i=1,2,...,N_iter) is set to change linearly with iterations i, where N_iter is the maximum number of iterations, i is the number of iterations,and q and b are two positive numbers satisfying q < b < 1. In this work, let q = 0.39 and b = 0.4. A larger α can enhance the exploration ability of MCS and avoid falling into a local optimum in the initial stage. During the execution process of MCS, a smaller α makes MCS stably converge at a better solution.

    2) Parameter Setting of the HCPS Algorithm

    C. Experiments and Analysis for Batch Tasks

    Set up the parameters for a multi-cloud and tasks as follows:1) m = 4, D = 12, h = 24, n = [10, 100, 200, 300, 400, 500] ×12; and 2) m = 4, D = 12, h = 48, n = [600, 700, 800, 900,1000, 1100] × 12, respectively. Table II presents task parameters. In order to simulate the diversity of tasks, we set up 12 types of tasks, the specific values of which are random.From task types 1 to 12, the task workload is gradually expanding and each task has a different priority due to its different user type. During simulation task expansion, tasks have different performance requirements for resources. For example, smaller tasks require-low-performance resources,and larger tasks require high-performance resources. Here, the performance of the resource is simplified to be proportional to the price of the resource.

    TABLE II TASK TYPES AND PARAMETERS

    TABLE III VM TYPES AND PARAMETERS

    Tables III lists the VM parameters in the experiment, which refers to the experimental data in [1]. In order to facilitate the calculation of the processing time of tasks, we assume that the processing speed of each VM is proportional to its CPU.Owing to the connection of the fiber network in a cloud and the flexible disk storage supply, this experiment assumes that these two factors are not considered.

    Table IV lists the specific parameter settings for security assessment of each CSP and baseline level of SSLO parameter values, which refer to the corresponding data in [39].

    1) Convergence Speeds of Three Benchmark Algorithms

    Use a task example with the size of 1100 × 12 to analyze the convergence speed of our proposed MMA algorithm and threebenchmark algorithms. In Figs. 5–7, the horizontal axis, major vertical axis, and minor vertical axis represent the number of iterations in an algorithm, Makespan, and TotalCost,respectively. Because of stochastic nature of evolutionary algorithms, each of three benchmark algorithms is executed independently for 30 times to obtain the averaged objective result and the convergence speed of the algorithm as the number of iterations increases.

    TABLE IV SECURITY EXPERIMENTATION PARAMETERS

    Fig.5 shows the convergence speed of the MCS algorithm,which is faster than that of HCPS. It can be seen that when the number of iterations for the algorithm is greater than 50, the algorithm is close to convergence.

    Fig.5. Convergence speed of MCS.

    Fig.6. Convergence speed of HCPS.

    Fig.7. Convergence speed of MABC.

    Fig.6 presents the convergence speed of the HCPS algorithm. It shows that with the increasing number of iterations, Makespan is continuously decreasing, and so is TotalCost. When the number of iterations is greater than about 160, the changes of Makespan and TotalCost are no longer obvious, which indicates that the algorithm has converged at this time.

    Fig.7 shows that the convergence speed of the MABC algorithm is slower than the previous two algorithms. When the number of iterations for the algorithm increases to about 40 000, Makespan and TotalCost gradually keep little changes, and the algorithm is close to convergence.

    2) Convergence Speed of the MMA Algorithm

    MMA algorithm with the polynomial complexity can obtain an exact solution. Using the same task example with the size of 1100 × 12 as an input, the MMA algorithm takes only seven iterations to reach the termination condition and converges. In Fig.8, the horizontal axis is the number of iterations, and the vertical axis is the change in Makespan and

    Fig.8. Convergence speed of MMA.

    3) Algorithm Runtime Overhead at Different Data Scales.

    The overhead of an algorithm refers to the running time taken for it to complete mapping of all tasks to the VMs.Table V shows the overhead of algorithms when the number of [10, 100, 200, 300, 400, 500] × 12 tasks are executed on 24 VMs, respectively. Table VI shows the overhead of algorithms when the number of [600, 700, 800, 900, 1000,1100] × 12 tasks are executed on 48 VMs, respectively. The unit of the runtime overhead in the table below is milliseconds. The data in Table V is the runtime overhead to obtain the desired solution.

    TABLE V ALGORITHM RUNTIME OVERHEAD FOR [10, 100, 200, 300, 400,500] ×12 TASKS ON 24 VMS

    TABLE VI ALGORITHM RUNTIME OVERHEAD FOR [600, 700, 800, 900, 1000,1000]×12 TASKS ON 48 VMS

    From Tables V and VI, we can conclude that as the task size increases, the runtime overhead of each algorithm increases.The max-min algorithm and min-min algorithm have very low runtime overhead due to their simple allocation operations.The MMA algorithm performs a series of operation calculations, so its overhead will be much higher. When the task size is small, the overhead of the HCPS algorithm is similar to that of the MCS algorithm. As the task size increases, the overhead of the MCS algorithm increases rapidly, while the overhead of the HCPS algorithm increases slowly. Therefore, in terms of overhead, the HCPS algorithm is superior to the MCS algorithm. The MABC algorithm has the largest runtime overhead. From the above analysis, we can see that our proposed MMA algorithm is still advantageous in terms of overhead.

    4) Results of Scenario 1: Scheduling [10, 100, 200, 300,400, 500] × 12 Tasks onto 24 VMs.

    Makespan, TotalCost, average resource utilization AU, and load balance B obtained by using four different algorithms to schedule tasks are shown in Figs. 9–12, respectively, where the horizontal axis represents the number of tasks for [10, 100,200, 300, 400, 500] × 12, respectively. We analyze the optimal solutions obtained by all algorithms.

    Fig.9 shows that the MMA algorithm has a greater advantage as the number of tasks increases. The results of the MCS, max-min, and MABC algorithm differ slightly in the makespan. The HCPS algorithm gets the longest makespan.This means that for small-scale tasks, the advantages of the HCPS algorithm cannot be fully utilized.

    Fig.10 shows the MMA and MCS algorithms always have a lower cost than others. The max-min and min-min algorithms do not achieve a better cost. Because they are traditional single-objective algorithms, they can only effectively reduce the makespan of the tasks.

    Fig.11 shows that as the number of tasks increases, the resource utilization rate of the algorithm increases, where MMA algorithm has the highest utilization rate even up to greater than 95%. When the number of tasks is small, the resource utilization of the HCPS algorithm is only about 50%.However, with an increase in the number of tasks, the HCPS algorithm is almost similar to MCS and max-min algorithms,and the resource utilization rate has reached about 80%. It can be seen that HCPS algorithm has certain advantages in processing multi-dimensional functions among the three benchmarks.

    Fig.9. Makespan versus task numbers in Scenario 1.

    Fig.10. Total cost versus task numbers in Scenario 1.

    Fig.11. Average resource utilization versus task numbers in Scenario 1.

    Fig.12. Load balance versus task numbers in Scenario 1.

    Fig.12 shows that the proposed MMA algorithm is the most stable in terms of load balancing for different numbers of tasks. When the number of tasks increases to a certain threshold, B is less than 0.46. The MCS algorithm also has great advantages in load balancing and is superior to max-min.

    5) Results of Scenario 2: Scheduling [600, 700, 800, 900,1000, 1100]×12 Tasks onto 48 VMs.

    To further verify the performance of the MMA algorithm,we expanded the task scale from [10, 100, 200, 300, 400, 500] ×12 to [600, 700, 800, 900, 1000, 1100] × 12 and the number of VMs also increased from 24 to 48.

    Fig.13 shows that the proposed MMA algorithm still has a great advantage in reducing Makespan when increasing the task size and the number of VMs. At the same time, MCS and max-min algorithms have the same ability to reduce Makespan. When the task scale is increased, the HCPS algorithm is better than MABC in reducing Makespan. It can be seen that the HCPS algorithm has certain advantages than MABC in processing multi-dimensional functions.

    Fig.14 shows that the proposed MMA algorithm is still slightly better than other algorithms in terms of TotalCost. In addition, MCS and HCPS algorithms are very close to MMA in terms of TotalCost. max-min, min-min, and MABC perform poorly on TotalCost.

    Fig.15 shows the resource utilization of each algorithm as the task scale and VM numbers increases. It can be seen that even if the task size is increased, the resource utilization of the MMA algorithm is still higher than other algorithms. The resource utilization of the max-min, MCS and HCPS algorithms can all reach 80%. However, the resource utilization of min-min and MABC algorithms can only reach about 50%.

    Fig.13. Makespan versus task numbers in Scenario 2.

    Fig.14. Total cost versus task numbers in Scenario 2.

    Fig.15. Average resource utilization versus task numbers in Scenario 2.

    Fig.16 shows that even if the task scale and VM numbers increases, the MMA and MCS algorithms do very well in load balancing. We can also find that the min-min and MABC algorithms cannot do well in load balance, because the former always allocates tasks to high-performance VMs, and the latter has difficulty in finding a better solution.

    Therefore, the above results of experiments show that our proposed MMA algorithm has great advantages in many metrics.

    D. Experiments and Analysis for Workflow Tasks

    For workflows, Table IV is also used for security assessment of each CSP and the baseline level of SSLO parameter values.

    Fig.16. Load balance versus task numbers in Scenario 2.

    We take four real-world scientific workflows [53] as the input, which are CyberShake_1000, Epigenomics_997,Inspiral_1000, and SIPHT_1000. In this work, we focus on the scheduling of cloud resources under the constraints of security and reliability, thus, we simplify details of data transmission among data-intensive workflow tasks and handle the precedence among the tasks.

    By the MMA algorithm and benchmark algorithms, we conducted scheduling simulations for these four types of workflows. A directed acyclic graph (DAG) can characterize the dependencies among the tasks of a workflow, where vertices represent the tasks and a directed edge denotes the precedence constraint between two tasks. The highest priority is assigned to one or more tasks (vertices in a DAG) which have no predecessor (parents) tasks, are called entry tasks.Except for the entry tasks, a task can be executed only after its parent tasks are finished. The priorities of entry tasks are numbered Level-1. Then, we number the level of each successor (child) vertex of Level-1 vertices. In a top-down manner, each task can be assigned with a unique priority(Level-number). Therefore, the proposed MMA algorithm can be employed to schedule a workflow under the addressed security and reliability constraints.

    1) Convergence Speed

    Since the convergence speed of each algorithm for the four workflows are similar, we present the convergence speed of algorithms only for a CyberShake_1000 workflow.

    For a CyberShake_1000 workflow, Figs. 17–20 show the convergence speeds of different algorithms. The execution of needs only three iterations to obtain a solution, which has both lower TotalCost and shorter Makespan than those by three benchmark algorithms.

    For the other workflows, i.e., CyberShake_1000,Epigenomics_997, and Inspiral_1000, Algorithm 4 performs three iterations at most to obtain a good solution.

    2) Runtime Overhead

    Due to the polynomial computational complexity of the MMA algorithm, its runtime overhead is significantly lower than that of each evolutionary algorithm. Table VII presents the runtime of algorithms.

    3) Scheduling Results for Workflows

    Figs. 21–24 plot the performance of different algorithms in makespan, cost, average resource utilization, and load balancing for four types of workflows, respectively. Figs. 21–24 indicate that MMA algorithm can obtain the best performancewhen it schedules four types of workflows compared with the scheduling results obtained by benchmark algorithms.

    TABLE VII ALGORITHM RUNTIME OVERHEAD FOR WORKFLOwS ON 48 VMS

    Fig.18. Convergence speed of MCS for CyberShake_1000.

    Fig.19. Convergence speed of MABC for CyberShake_1000.

    VI. CONCLUSIONS AND FUTURE WORK

    Fig.20. Convergence speed of MMA for CyberShake_1000.

    Fig.21. Makespans of different workflows.

    Fig.23. Average resource utilization of different workflows.

    Aimed at the problem of tasks scheduling in a multi-cloud environment subject to security and reliability constraints, we propose a matching strategy and resource allocation algorithms for user tasks in a multi-cloud system with heterogeneous types of VMs. Candidate resources are initially allocated for the tasks so that they meet the user’s performance and trust QoS demands while achieving the best matching degree. Upon this pre-allocation scheme, multiple rounds of re-allocation are performed to find a schedule that can optimize tasks execution time and cost by minimizing the variance of the estimated completion time, provide the user with matching resources as much as possible, satisfy the user’s performance and trust QoS requirements, and balance the workload well among different types of VMs. Hence, the overall completion time and cost are reduced, and resource utilization and workload balancing are improved to obtain higher QoS for users.

    Fig.24. Load balance of different workflows.

    Our proposed method can be applied to scheduling cloudcomputing resources in the scenarios of both batch tasks and workflows. For example, a large amount of different types of business-to-business transaction packages, or real-world workflows, may be submitted to a multi-cloud system to be processed. These tasks should be scheduled efficiently to be processed under the security and reliability requirements in a multi-cloud system. In this work, we do not consider some features of the task itself, such as deadlines and data transmission among the workflow tasks. Our future work will focus on such issues.

    日日摸夜夜添夜夜爱| 内射极品少妇av片p| 你懂的网址亚洲精品在线观看 | www.av在线官网国产| 亚洲成人久久性| 国产成人91sexporn| 69人妻影院| 51国产日韩欧美| 日本一本二区三区精品| 婷婷精品国产亚洲av| 神马国产精品三级电影在线观看| 九九热线精品视视频播放| 在现免费观看毛片| 日韩大尺度精品在线看网址| 两个人的视频大全免费| 天堂√8在线中文| 欧美成人a在线观看| 国产精品伦人一区二区| 欧美+日韩+精品| 亚洲av中文av极速乱| 久久99热这里只有精品18| а√天堂www在线а√下载| 99热全是精品| 国产精品不卡视频一区二区| 99国产极品粉嫩在线观看| 成年女人永久免费观看视频| 可以在线观看的亚洲视频| 亚洲av成人精品一区久久| av福利片在线观看| 久久婷婷人人爽人人干人人爱| 搡老妇女老女人老熟妇| 中文字幕制服av| 成人永久免费在线观看视频| 国产一区二区三区av在线 | 岛国毛片在线播放| 久久精品久久久久久噜噜老黄 | 久久精品国产99精品国产亚洲性色| 精品久久久久久久人妻蜜臀av| 国产精品一区二区性色av| 国产精品免费一区二区三区在线| 97热精品久久久久久| 成年av动漫网址| 久久精品国产亚洲av涩爱 | 欧美成人免费av一区二区三区| 国产亚洲精品av在线| 亚洲精品久久久久久婷婷小说 | 日日摸夜夜添夜夜爱| 午夜精品国产一区二区电影 | 美女xxoo啪啪120秒动态图| 极品教师在线视频| 大香蕉久久网| 国产精品久久久久久精品电影| 色播亚洲综合网| 晚上一个人看的免费电影| av在线亚洲专区| 久久99蜜桃精品久久| 激情 狠狠 欧美| 三级毛片av免费| 国产成人午夜福利电影在线观看| 免费看a级黄色片| 九九热线精品视视频播放| 美女 人体艺术 gogo| 免费一级毛片在线播放高清视频| 2022亚洲国产成人精品| 一夜夜www| 如何舔出高潮| 国产高清不卡午夜福利| 国产精品,欧美在线| 性色avwww在线观看| 国产色爽女视频免费观看| 美女脱内裤让男人舔精品视频 | 亚洲欧美精品综合久久99| 伦精品一区二区三区| 2021天堂中文幕一二区在线观| 黑人高潮一二区| 18禁在线无遮挡免费观看视频| 中文字幕免费在线视频6| 黄色一级大片看看| 美女国产视频在线观看| 亚洲最大成人手机在线| 可以在线观看毛片的网站| 欧美精品一区二区大全| 97在线视频观看| 欧美xxxx性猛交bbbb| a级一级毛片免费在线观看| 国产精品综合久久久久久久免费| 国产一区二区三区在线臀色熟女| 人妻久久中文字幕网| 看十八女毛片水多多多| 黑人高潮一二区| 麻豆成人午夜福利视频| 麻豆一二三区av精品| 日韩精品青青久久久久久| 淫秽高清视频在线观看| 成年免费大片在线观看| 免费观看精品视频网站| 亚洲精品日韩在线中文字幕 | 久久久久久久久久成人| 97人妻精品一区二区三区麻豆| 最近视频中文字幕2019在线8| 人妻少妇偷人精品九色| 午夜视频国产福利| 久久99精品国语久久久| 岛国在线免费视频观看| 九九爱精品视频在线观看| 少妇高潮的动态图| 久久久成人免费电影| 一本久久精品| 国产色爽女视频免费观看| 人体艺术视频欧美日本| 亚洲真实伦在线观看| 97人妻精品一区二区三区麻豆| 五月伊人婷婷丁香| 久久精品国产清高在天天线| 久久久午夜欧美精品| 亚洲精品日韩av片在线观看| 日韩欧美三级三区| 乱人视频在线观看| 亚洲七黄色美女视频| 国产片特级美女逼逼视频| 免费黄网站久久成人精品| 黄色欧美视频在线观看| 国产免费男女视频| 婷婷精品国产亚洲av| 2021天堂中文幕一二区在线观| 久久久久久久久大av| 一级毛片久久久久久久久女| videossex国产| 最近的中文字幕免费完整| 级片在线观看| 国产av麻豆久久久久久久| 欧美日韩一区二区视频在线观看视频在线 | 高清日韩中文字幕在线| 国产一区二区激情短视频| 免费搜索国产男女视频| a级毛色黄片| 欧美日本视频| 草草在线视频免费看| 亚洲精品影视一区二区三区av| 人妻久久中文字幕网| 成人亚洲欧美一区二区av| 色综合亚洲欧美另类图片| 久久6这里有精品| 国产69精品久久久久777片| 国产免费男女视频| av免费在线看不卡| 日本欧美国产在线视频| 午夜视频国产福利| 少妇丰满av| 午夜亚洲福利在线播放| 国产麻豆成人av免费视频| 欧美另类亚洲清纯唯美| 青春草视频在线免费观看| 精品不卡国产一区二区三区| 久久99蜜桃精品久久| 床上黄色一级片| 国产精品精品国产色婷婷| 亚洲最大成人手机在线| 99久国产av精品| 国产欧美日韩精品一区二区| 免费av不卡在线播放| 黄片无遮挡物在线观看| 97超视频在线观看视频| 久久6这里有精品| 99热全是精品| 联通29元200g的流量卡| 人体艺术视频欧美日本| 久久精品久久久久久噜噜老黄 | 日韩强制内射视频| 欧美xxxx性猛交bbbb| 99热这里只有精品一区| 两个人的视频大全免费| 99久久无色码亚洲精品果冻| 国产大屁股一区二区在线视频| 色哟哟哟哟哟哟| 黄色视频,在线免费观看| 欧美另类亚洲清纯唯美| 日日啪夜夜撸| 午夜福利视频1000在线观看| 看免费成人av毛片| 有码 亚洲区| 晚上一个人看的免费电影| 亚洲第一区二区三区不卡| 成人特级av手机在线观看| 欧美成人免费av一区二区三区| 免费观看在线日韩| 99九九线精品视频在线观看视频| 老师上课跳d突然被开到最大视频| 变态另类成人亚洲欧美熟女| 免费电影在线观看免费观看| 69人妻影院| 丰满的人妻完整版| 日本欧美国产在线视频| 嫩草影院入口| 最近手机中文字幕大全| 最近最新中文字幕大全电影3| 国产老妇女一区| 国内揄拍国产精品人妻在线| 欧美性猛交╳xxx乱大交人| 韩国av在线不卡| 久久亚洲国产成人精品v| 免费看a级黄色片| 黄色视频,在线免费观看| 日韩一区二区三区影片| 欧美日本视频| 亚洲国产精品sss在线观看| 18禁在线播放成人免费| 日本黄色片子视频| 国产高潮美女av| 黑人高潮一二区| 久久久久网色| 欧美日本视频| 亚洲欧美精品专区久久| 美女cb高潮喷水在线观看| 在线国产一区二区在线| 亚洲国产欧洲综合997久久,| 免费看日本二区| 三级国产精品欧美在线观看| 岛国在线免费视频观看| 亚洲国产日韩欧美精品在线观看| 精品午夜福利在线看| 极品教师在线视频| 久久欧美精品欧美久久欧美| 毛片女人毛片| 中文资源天堂在线| 国产黄a三级三级三级人| 欧美极品一区二区三区四区| 边亲边吃奶的免费视频| 69av精品久久久久久| 观看免费一级毛片| 男女下面进入的视频免费午夜| 久久九九热精品免费| 久久鲁丝午夜福利片| 国产成人91sexporn| 桃色一区二区三区在线观看| 两个人的视频大全免费| 成人无遮挡网站| 麻豆成人av视频| 久久久成人免费电影| 久久99热6这里只有精品| 日本-黄色视频高清免费观看| 日本免费a在线| 亚洲av成人精品一区久久| 亚洲精品成人久久久久久| 欧美色视频一区免费| 人妻制服诱惑在线中文字幕| 久久精品综合一区二区三区| 精品久久久噜噜| 男女下面进入的视频免费午夜| 午夜激情欧美在线| 亚洲中文字幕一区二区三区有码在线看| 观看美女的网站| 国内精品久久久久精免费| 3wmmmm亚洲av在线观看| 成年免费大片在线观看| 日本黄色视频三级网站网址| 国产国拍精品亚洲av在线观看| 国产美女午夜福利| 国产成人午夜福利电影在线观看| 日韩三级伦理在线观看| 直男gayav资源| 亚洲激情五月婷婷啪啪| 黄色视频,在线免费观看| 秋霞在线观看毛片| 免费在线观看成人毛片| 国产亚洲av片在线观看秒播厂 | 国产极品天堂在线| 波多野结衣高清作品| 午夜老司机福利剧场| 久久久久久久久久久丰满| 熟女电影av网| 日韩三级伦理在线观看| 能在线免费观看的黄片| 欧美高清成人免费视频www| 亚洲精品久久久久久婷婷小说 | 免费不卡的大黄色大毛片视频在线观看 | 两性午夜刺激爽爽歪歪视频在线观看| 91aial.com中文字幕在线观看| 国产精品女同一区二区软件| 女的被弄到高潮叫床怎么办| 伦理电影大哥的女人| 菩萨蛮人人尽说江南好唐韦庄 | 久久人人爽人人爽人人片va| 国产探花在线观看一区二区| 亚洲成人精品中文字幕电影| 国产成人影院久久av| 国产成人一区二区在线| 高清日韩中文字幕在线| 午夜激情欧美在线| 日本成人三级电影网站| 国产黄a三级三级三级人| 免费在线观看成人毛片| 不卡视频在线观看欧美| 青春草亚洲视频在线观看| 国产精品麻豆人妻色哟哟久久 | 国产熟女欧美一区二区| 亚洲欧美日韩卡通动漫| 国产伦理片在线播放av一区 | 久久人妻av系列| 精品国产三级普通话版| 成熟少妇高潮喷水视频| 男人舔女人下体高潮全视频| 欧美极品一区二区三区四区| 国产一区二区在线观看日韩| 亚洲av成人av| 亚洲欧美清纯卡通| 日韩欧美国产在线观看| 九草在线视频观看| 在线观看一区二区三区| 一区二区三区免费毛片| 黄色日韩在线| 少妇猛男粗大的猛烈进出视频 | 高清毛片免费观看视频网站| 夫妻性生交免费视频一级片| videossex国产| 国产成人freesex在线| 91久久精品国产一区二区三区| 精品久久久久久久久久免费视频| 久久中文看片网| 国产久久久一区二区三区| 国产精品无大码| 麻豆乱淫一区二区| 神马国产精品三级电影在线观看| 免费在线观看成人毛片| 人人妻人人澡欧美一区二区| 乱系列少妇在线播放| 国产一级毛片七仙女欲春2| 日韩欧美精品免费久久| 插逼视频在线观看| 国产亚洲精品久久久com| 国产老妇女一区| 六月丁香七月| 不卡视频在线观看欧美| 亚洲av熟女| 欧美变态另类bdsm刘玥| 激情 狠狠 欧美| 中文字幕av在线有码专区| 色哟哟·www| 国产在线精品亚洲第一网站| 亚洲国产欧洲综合997久久,| 国产精品久久电影中文字幕| 亚洲第一区二区三区不卡| 又粗又硬又长又爽又黄的视频 | 在线免费观看不下载黄p国产| 不卡视频在线观看欧美| 久久久久久久久大av| 精品欧美国产一区二区三| 免费观看精品视频网站| 最好的美女福利视频网| 性色avwww在线观看| 亚洲国产日韩欧美精品在线观看| www.色视频.com| 人妻系列 视频| 国产熟女欧美一区二区| 日本av手机在线免费观看| 久久人妻av系列| 日日撸夜夜添| 国产成人精品一,二区 | 亚洲在久久综合| 青春草亚洲视频在线观看| kizo精华| 一个人免费在线观看电影| 国产精品人妻久久久久久| 综合色av麻豆| 日韩成人伦理影院| 一个人免费在线观看电影| 熟妇人妻久久中文字幕3abv| 搡老妇女老女人老熟妇| 99久久九九国产精品国产免费| 天美传媒精品一区二区| 伦理电影大哥的女人| 免费搜索国产男女视频| 欧美区成人在线视频| 欧美成人一区二区免费高清观看| 国产精品一区二区在线观看99 | 美女黄网站色视频| 亚洲三级黄色毛片| 亚洲精品国产成人久久av| 亚洲三级黄色毛片| 久久久久久伊人网av| 久久草成人影院| 我的老师免费观看完整版| 校园人妻丝袜中文字幕| 国产欧美日韩精品一区二区| 欧美日韩在线观看h| 国产精华一区二区三区| 国产成人一区二区在线| 国产精品一区二区三区四区久久| 国产单亲对白刺激| 寂寞人妻少妇视频99o| 69av精品久久久久久| 免费看光身美女| 岛国在线免费视频观看| 小说图片视频综合网站| 日本一二三区视频观看| 午夜福利高清视频| 最近的中文字幕免费完整| 2022亚洲国产成人精品| 欧美成人精品欧美一级黄| 欧美日本亚洲视频在线播放| 成人亚洲精品av一区二区| 男人舔女人下体高潮全视频| 中文在线观看免费www的网站| 免费不卡的大黄色大毛片视频在线观看 | 成人午夜高清在线视频| 变态另类成人亚洲欧美熟女| 久久久色成人| 亚洲精品久久久久久婷婷小说 | 最近最新中文字幕大全电影3| 久久中文看片网| 国产色婷婷99| 丰满乱子伦码专区| 国产伦一二天堂av在线观看| 国产黄片视频在线免费观看| 夫妻性生交免费视频一级片| 欧美色视频一区免费| 日本免费一区二区三区高清不卡| 非洲黑人性xxxx精品又粗又长| 久久人人精品亚洲av| 国产单亲对白刺激| 精品一区二区免费观看| 国产 一区 欧美 日韩| 国产精品,欧美在线| 久久久a久久爽久久v久久| 天堂√8在线中文| 午夜免费男女啪啪视频观看| av在线播放精品| 色综合色国产| 亚洲最大成人手机在线| 波多野结衣高清无吗| 日本黄色片子视频| 婷婷六月久久综合丁香| 日韩欧美国产在线观看| 亚洲欧洲日产国产| 内射极品少妇av片p| 天天躁日日操中文字幕| 麻豆久久精品国产亚洲av| 三级国产精品欧美在线观看| 人妻少妇偷人精品九色| 少妇人妻一区二区三区视频| 尤物成人国产欧美一区二区三区| 国产精品一区二区三区四区久久| 91精品一卡2卡3卡4卡| 综合色丁香网| 波野结衣二区三区在线| 国产真实乱freesex| 2021天堂中文幕一二区在线观| 国产精品蜜桃在线观看 | 亚洲一区高清亚洲精品| 久久99热这里只有精品18| 欧美一级a爱片免费观看看| 亚洲精品国产成人久久av| 久久精品国产亚洲av涩爱 | 欧美+亚洲+日韩+国产| 婷婷色av中文字幕| 国产精品久久久久久精品电影| 免费观看精品视频网站| 一级毛片久久久久久久久女| 成人亚洲欧美一区二区av| 亚洲欧美日韩高清专用| av天堂在线播放| 中文字幕免费在线视频6| 99热只有精品国产| 91精品一卡2卡3卡4卡| 99国产精品一区二区蜜桃av| 亚洲中文字幕日韩| 欧美xxxx性猛交bbbb| av免费观看日本| 国内久久婷婷六月综合欲色啪| 欧美精品国产亚洲| 国产免费男女视频| 一本久久中文字幕| 日日啪夜夜撸| 国内久久婷婷六月综合欲色啪| 亚洲熟妇中文字幕五十中出| 91精品一卡2卡3卡4卡| 免费搜索国产男女视频| 两个人的视频大全免费| 亚洲精品456在线播放app| 亚洲欧美成人综合另类久久久 | 精品久久久久久久末码| 人妻夜夜爽99麻豆av| 色视频www国产| 午夜a级毛片| 男女那种视频在线观看| 亚洲国产欧洲综合997久久,| 亚洲在线观看片| 国产精品免费一区二区三区在线| 日本三级黄在线观看| 黄片无遮挡物在线观看| 可以在线观看的亚洲视频| 欧美日韩综合久久久久久| 嫩草影院新地址| av在线亚洲专区| 中国国产av一级| 亚洲国产日韩欧美精品在线观看| a级毛片a级免费在线| kizo精华| 听说在线观看完整版免费高清| 亚洲精华国产精华液的使用体验 | 午夜免费男女啪啪视频观看| 国产一区二区亚洲精品在线观看| 美女被艹到高潮喷水动态| 国产黄a三级三级三级人| 国产欧美日韩精品一区二区| 国产一区二区在线av高清观看| 欧美一级a爱片免费观看看| 国产精品一区二区三区四区久久| 成人美女网站在线观看视频| 亚洲国产欧洲综合997久久,| 国内精品久久久久精免费| 一边亲一边摸免费视频| 在线国产一区二区在线| 好男人视频免费观看在线| 精品一区二区三区人妻视频| 久久精品国产亚洲网站| 搡女人真爽免费视频火全软件| 亚洲在线自拍视频| 日本av手机在线免费观看| 日本-黄色视频高清免费观看| 色视频www国产| 国产精品,欧美在线| 欧美日本视频| 最近手机中文字幕大全| 亚洲自拍偷在线| av在线老鸭窝| 99九九线精品视频在线观看视频| 国产熟女欧美一区二区| 夜夜夜夜夜久久久久| 美女黄网站色视频| 亚洲,欧美,日韩| 夜夜爽天天搞| 日韩精品青青久久久久久| 久久精品国产亚洲av天美| 精品久久久久久久久av| 久久鲁丝午夜福利片| 国产片特级美女逼逼视频| 黄片wwwwww| 联通29元200g的流量卡| 日韩av在线大香蕉| 日韩av不卡免费在线播放| 久久精品国产亚洲av天美| 亚洲无线在线观看| 日本成人三级电影网站| 久久99热6这里只有精品| 99久久中文字幕三级久久日本| 日日摸夜夜添夜夜添av毛片| 亚洲欧美清纯卡通| 国产 一区精品| 级片在线观看| 免费大片18禁| 久久精品91蜜桃| 国产一级毛片在线| 亚洲国产欧美在线一区| 岛国毛片在线播放| 久久精品夜色国产| av免费在线看不卡| 亚洲在久久综合| 精品一区二区三区视频在线| 精品久久久久久久久亚洲| 美女被艹到高潮喷水动态| 毛片一级片免费看久久久久| 久久热精品热| 中文字幕人妻熟人妻熟丝袜美| 噜噜噜噜噜久久久久久91| 熟女电影av网| 蜜桃亚洲精品一区二区三区| 国产成人福利小说| av天堂中文字幕网| 人妻系列 视频| 国产精品人妻久久久影院| 国内精品一区二区在线观看| 国产黄色视频一区二区在线观看 | videossex国产| 久久99蜜桃精品久久| 日韩大尺度精品在线看网址| 久久韩国三级中文字幕| 蜜臀久久99精品久久宅男| 亚洲av成人精品一区久久| 岛国在线免费视频观看| 亚洲精品乱码久久久久久按摩| 乱码一卡2卡4卡精品| 99九九线精品视频在线观看视频| 国产成人精品久久久久久| 成人亚洲精品av一区二区| 淫秽高清视频在线观看| 欧美三级亚洲精品| 一卡2卡三卡四卡精品乱码亚洲| 国产成人福利小说| 亚洲成人av在线免费| 久久精品国产99精品国产亚洲性色| 亚洲内射少妇av| 三级男女做爰猛烈吃奶摸视频| 国产人妻一区二区三区在| 国产精品av视频在线免费观看| 少妇的逼水好多| 国产亚洲av嫩草精品影院| 少妇人妻一区二区三区视频| 国产欧美日韩精品一区二区| 99riav亚洲国产免费| 五月伊人婷婷丁香| 亚洲三级黄色毛片| 久久午夜福利片| 成人三级黄色视频| 免费观看精品视频网站| 精品久久久久久久末码| 国产真实伦视频高清在线观看| 亚洲在线观看片| 亚洲精品影视一区二区三区av| 91aial.com中文字幕在线观看| 美女被艹到高潮喷水动态| 18禁裸乳无遮挡免费网站照片| eeuss影院久久| 97超碰精品成人国产| 99在线视频只有这里精品首页|