• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain

    2024-03-02 01:34:32YurongLuoWeiYouChaoShangXiongpengRenJinCaoandHuiLi

    Yurong Luo,Wei You,Chao Shang,Xiongpeng Ren,Jin Cao and Hui Li

    School of Cyber Engineering,State Key Laboratory of Integrated Service Network,Xidian University,Xi’an,710126,China

    ABSTRACT The dynamic landscape of the Internet of Things (IoT) is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among the pivotal applications within the realm of IoT,as a significant example,the Smart Grid(SG)evolves into intricate networks of energy deployment marked by data integration.This evolution concurrently entails data interchange with other IoT entities.However,there are also several challenges including data-sharing overheads and the intricate establishment of trusted centers in the IoT ecosystem.In this paper,we introduce a hierarchical secure data-sharing platform empowered by cloud-fog integration.Furthermore,we propose a novel non-interactive zero-knowledge proof-based group authentication and key agreement protocol that supports one-to-many sharing sets of IoT data,especially SG data.The security formal verification tool shows that the proposed scheme can achieve mutual authentication and secure data sharing while protecting the privacy of data providers.Compared with previous IoT data sharing schemes,the proposed scheme has advantages in both computational and transmission efficiency,and has more superiority with the increasing volume of shared data or increasing number of participants.

    KEYWORDS IoT data sharing;zero-knowledge proof authentication;privacy preserving;blockchain

    1 Introduction

    More than 15 billion devices including smart grid sensors will build up a new IoT application model consisting of massive clusters of edge fog nodes and mega cloud centers in the next 10 years[1].These devices are trending towards data processing and decision-making capabilities from sensing the environment.The rapid expansion of the IoT has also created an enormous quantity of multimodal data [2].Intelligent applications require deep integration and collaboration of multi-source data, specifically in the smart grid, events, such as power transmission strategy development, fault handling and billing.For example,accurate weather forecasts or environmental monitoring data are used to guide power transmission strategies[3].The Smart Grid(SG)has established a wide-ranging and intelligent energy transmission network based on information flow.SGs are characterized by distributed management,intelligent control and two-way(communication&electricity)information[4].Sensors are involved throughout the service of the smart grid, and contemporary smart grids connect to the Internet of Things to bring people more comprehensive electrical applications and information services with higher quality.Meanwhile,the widespread deployment of power equipment in IoT-based SGs will generate large-scale and diversified energy data[5]that can support other IoT applications.Data sharing between smart grids and other IoT applications is extremely valuable, so effective management and secure sharing of data are the key secure requirements for SGs[6].

    The smart grid is essentially an intelligent network consisting of massive sensors and electrical devices that link to the Internet.SGs achieve identification, positioning, monitoring, control and management, with a view to achieving the effect of interconnection of power networks and their customers [7].The SG’s two-way communication information is mainly derived from data collected by the IoT(internal and external of the SG power grid chain).Given that the IoT is a collaborative ecosystem and the huge data resources need to be used wisely and maximally, the secure sharing or trading of data is of extreme importance.At the same time, as an important part of the industrial Internet of Things, the smart grid data interaction and sharing with other IoT applications are the foundation of integrated applications.A large number of third-party data trading platforms have been established, but most of them are based on centralized architectures, whereby all data storage and transmission is done on a single central control system,which poses a challenge to trust establishment for the stakeholders of data sharing.At the same time,for power systems,large amounts of data are difficult to store and manage in a distributed manner[8].Current third-party data trading platforms can provide storage of data to IoT devices through a cluster of servers in the cloud.However,as the number of devices and data increases, it will lead to a surge in transmission, an increase in latency and a decrease in sharing efficiency.Most of the data traded in third-party platforms are enterpriselevel data, and there are often few transactions for the fragmented data held by individual users,which results in a shortage of diversified data sources.The introduction of fog nodes can promote sporadically distributed IoT devices with low computing power like SG devices for low-latency data sharing[9].

    The increased scale of individual users is also very valuable for the smart grid which can contribute to the diversification and enrichment of data sets.However,individual users are reluctant to trade their data on a platform because the transaction process is cumbersome and the transmission costs and trust establishment far outweigh the benefits.Blockchain is a distributed database that enables secure,tamper-evident data storage in a non-centrally backed,non-secure environment[10].In addition,it has the following advantages such as public verifiability,data traceability and tamper-proof,which can be a better solution for individual users’data transactions.Blockchain and cloud-fog-based architecture can provide a secure and convenient trading platform for individuals with low data amounts, and also facilitate the purchase of personal data by data buyers such as smart home manufacturers.Considering that malicious nodes can arbitrarily access data resources, it is a key point to achieve entity authentication in data processing.In addition,depending on data security requirements,data providers prefer to authenticate the data purchaser to know their true identity [11].Because data providers have to analyze the purchaser’s intention and the subsequent processing of the data.Also,they need to define the scope of data use after ownership has been transferred to avoid the misuse of those data.European Union (EU) and China data protection regulations explicitly require identity authentication of the data controller(i.e.,the data consumer in a data transaction).Art.13 of the EU General Data Protection Regulation(GDPR)[12]states that the identity of the data collector should be provided to the data owner.Current blockchain-based data-sharing solutions focus on solving technical problems such as bidding for transactions and transferring data ownership, and cannot achieve entity authentication,which may result in data misuse remaining untraceable after the transfer of data even with the use of blockchain.

    In this paper,we propose and implement a privacy-preserving decentralized secure data sharing platform namedZobricfor smart grid and IoT devices.The main innovations and contributions of this paper are as follows:

    (1) We design a cloud-fog enabled and privacy-preserving hierarchical data sharing model and introduce Hyperledger Fabric technology to build a identity management and transaction architecture for IoT nodes with low power consumption.The platform adopts a scheme where fog nodes collect, encrypt and publish data from the same management domain, and cloud servers act as transit points to store data.The proposed scheme can solve the problems of data encryption and transmission difficulties caused by limited computing resources.

    (2) We propose a non-interactive zero-knowledge proof-based group authentication and key agreement protocol that supports batch data sharing transactions and one-to-many sharing sets of data.The true identity of the data provider can only be known to the data consumer,which effectively protects the privacy of data providers.A transaction grouping method is adopted in which data is classified and tagged based on the source.Platform users join transaction groups according to the type of data they are sharing,using the Fabric channel to achieve a private transaction channel and a low blockchain storage consumption.The solution improves the efficiency of data transactions and enables the accurate transfer of data ownership with privacy preserving and untraceability.

    (3) We develop and realize a series of smart contracts to autonomously build,update and control cloud server data access lists to enable the reliable flow and efficient sharing of data collected from large-scale distributed and resource-constrained devices.

    (4) We employ a formalization security analysis tools and demonstrate that our proposed solution can resist against various protocol attacks and achieve several security properties including authenticity and confidentiality.And we implement experimental performance simulations to validate that the proposed IoT/SG data-sharing architecture enables the efficient and secure exchange of sensory data,which is more suitable for devices at scale,across domains and with low computing power.

    The structure of this paper is as follows.We introduce related work in Section 2 and explain some background knowledge in Section 3.Section 4 describes the system and the security model.In Section 5, the proposed scheme is described in detail.We give the security proof and performance analysis of the scheme in Section 6 and Section 7,respectively.Finally,Section 8 concludes the article.

    2 Related Work

    The data sharing/trading platforms currently in use are mainly hosted by large corporations or national governments and all employ a centralized trading architecture,such as Factual Open Platform[13]for location data and services.Such centralized trading platforms cannot provide data marketing for individual users between different IoT applications because the cost of monitoring the transfer of data ownership is extremely high.In addition,centralized platforms have access to the plaintext of data and cannot prevent platforms from misusing data or eavesdropping on users’privacy information[14].

    Access control mechanisms are the general security solution for data distribution, so control models with a third-party authorization are proposed for IoT data security[15,16].Zhang et al.[17]proposed an access control scheme using Ciphertext-Policy Attribute-Based Encryption(CP-ABE)in fog computing which realizes data sharing and attribute revocation but not trading for individuals.Data sharing is generally achieved using ciphertext and attribute-based encryption technology[18]on untrusted cloud storage servers which require a large computational overhead due to data processing.Sun et al.[19]designed a privacy-preserving data management model based on edge service layer and attribute-based encryption.Tan et al.[20]proposed a blockain-enabled access control framework for green IoT smart devices.The schemes based on CP-ABE can achieve one-to-many public cloud data sharing,but they cannot simultaneously share multiple pieces of data.Moreover,the above solutions do not take into account the identity management issues of both parties to the data exchange.

    There is a category of blockchain-based IoT/SG data sharing platforms designed for trading bidding solutions [21,22].They deployed smart contracts to make auctions for crowdsourcing data trading.Li et al.[23]proposed a framework of blockchain-enhanced decentralized IoT data trading,which cannot provide the secure solution for data sharing.Dixit et al.[24] presented a marketplace model and architecture to support trading of streaming data and yet focused on deal negotiation.Yu et al.[25]proposed a blockchain-enabled security data access control scheme.Boo et al.[26]introduced zero-knowledge proof protocol and designed a blockchain-based IoT data trading framework which supports traditional one-to-one data transmission, but cannot authenticate the transaction entities.?zyilmaz et al.[27] proposed a distributed marketplace for central-free machine learning data trading.However,the scheme does not protect the shared data with encryption.Chen et al.[28]developed a data batch aggregation mechanism for smart grids based on double-blockchain which introduces more consensus overhead.Zhang et al.[29] proposed a privacy-preserving and userdefined data sharing architecture with fine-grained access policy, utilizing blockchain technology and attribute-based cryptosystem.Walshe et al.[30] proposed a non-interactive zero-knowledge proof (NIZKP) authentication protocol for IoT devices with multi-rounds of challenges and high computational overhead.However, none of the above schemes enable the authentication of both parties to a transaction.Table 1 shows the properties comparison between the proposed scheme and previous related schemes.

    Table 1: Comparison with previous related schemes

    3 Preliminaries

    3.1 Non-Interactive Zero-Knowledge Arguments[31]

    3.1.1 Quadratic Arithmetic Program(QAP)Generator

    For a finite field F and integers 1 ≤l≤m,a QAP relationRis a set of binary pairs(φ,ω)in whichφ=(a1,...,al)∈Flis the statement andFora0=Σ 1,letui(X),vi(X)andwi(X)be degreen-1 polynomials,φandωsatisfy(X)modt(X).

    3.1.2 Zero-Knowledge Arguments

    A publicly verifiable zero-knowledge argument for relationRis a set of probabilistic polynomial algorithms(Setup,Prove,Vfy,Sim)as follows:

    Setup(R,λ)→(σ,τ):Setup derives a Common Reference String(CRS)σas a public parameter and a simulation trapdoorτfor the relationR.

    Prove(R,σ,φ,ω)→π:Prover porduces an argumentπwith inputingσand(φ,ω)∈R.

    Vfy(R,σ,φ,π)→{0,1}: Verifier enters the CRSσ, theφand the argumentπas input, and verification returns 0 for reject or 1 for accept.

    Sim(R,τ,φ)→π: Simulator produces an argumentπwith inputs the trapdoorτand the statementφ.

    Non-interactive zero-knowledge algorithms in[31]has been proven to have COMPLETENESS,ZERO-KNOWLEDGE,and COMPUTATIONAL KNOWLEDGE SOUNDNESS security capabilities defined as follows.

    COMPLETENESS.Completeness denotes that,a trustworthy prover can persuade verifiers who correctly executeVfywith the true statements.That is,Pr[(σ,τ)←Setup(R);π←Prove(R,σ,φ,ω):Vfy(R,σ,φ,π)=1]≈1.

    ZERO-KNOWLEDGE.Zero-knowledge denotes that, public parameters, including statement,will not disclose confidential information.That is,for any polynomial time adversariesA,Pr[(σ,τ)←Setup(R);π←Prove(R,σ,φ,ω):A(R,z,σ,τ,π)=1]-Pr[(σ,τ)←Setup(R);π←Sim(R,τ,φ):A(R,z,σ,τ,π)=1]≈0.

    COMPUTATIONAL KNOWLEDGE SOUNDNESS.Soundness denoted that,provers cannot prove to verfier without witness,nor can they generate false statement to passVfy.That is,for any polynomial time adversaries,Pr[(σ,τ)←Setup(R);(φ,π)←A(R,z,σ):φ /∈LRandVfy(R,σ,φ,π)=1] ≈ 0.Strengthening soundness to knowledge soundness, if there exists an extractor which can generate a witness every time that the adversary produces a valid argument, it know all about the adversary’s state including any random coins.Formally, for any polynomial time adversariesAwith a non-uniform polynomial time extractorXAsuch thatPr[(σ,τ)←Setup(R);((φ,π);ω)←RandVfy(R,σ,φ,π)=1]≈0.

    3.2 Elliptic Curve Discrete Logarithm Problem[32]

    An elliptic curveGover the field of integers moduloqFqis a point set(x,y)∈∪0,where 0 is the point at infinity.And the point can satisfy the equationy2≡x3+ax+bmodqwhere 4a3+27b2/=0 modq.For algebraic sum and scalar multiplication over groupGand a base pointP,there is a computational hard prolem ECDLP without known polynomial time algorithm to solve it.The problem is defined as follows:

    Elliptic Curve Discrete Log Problem(ECDLP):GivenPand a pointQ∈G,whereQ=zP,findzfrom.

    4 System and Security Model

    4.1 System Model of Zobric

    Based on the typical system architecture in IEEE IoT data management standards[33],the system architecture of the proposed IoT data market platform is shown in Fig.1,which consists of multiple parties.The following three roles of stakeholders in the proposed platform are defined.

    Figure 1:Cloud-fog enabled IoT data market platform

    Data Provider (DP).Data provider is defined as a party owning the data and wishing to sell or share it.The DP consists of a cluster of IoT sensors,which collect various types of data,and a cluster control center with high computing/storage/information transmission capability,which manages and controls the group devices.In this architecture,data transaction activities are carried out by the Data Control Center on behalf of the Data Provider.

    Data Consumer(DC).Data consumer is defined as a party who wishes to purchase or receive data from Data provider.Generally,data consumers need to purchase data in their real identity and reach a data use agreement with the data provider in order to be granted ownership of the data.

    Data Trading Services Platform.The service platform is a system for data trading.It consists of two entities:the Cloud Server(CS)and the Blockchain Server(BS)nodes,which provide infrastructure services for data providers and data consumers.For HyperLedger Fabric, BS nodes include CA,Orderers,Endorsers,Comitters and Anchors.

    4.2 Adversary Model and Assumption

    Without loss of generality,we set up the Dolev-Yao intruder model[34]as a security model within the IoT data trading platform.Adversaries in this model have access to all messages passing over the public network and may be legitimate entities or pretend to be legitimate users who can initiate sessions with or receive messages from any entity within the system.But an adversary is also limited in his ability to extract the private key through public key cracking,or to obtain information from the private storage portion of other entities.In addition,the following security assumptions are applied to the trust relationships of the system entities.

    1.Threat model of entities.External attackers have the same capabilities as described in the Dolev-Yao model.The internal potential adversaries are defined as follows.Individual users of the platform may try to disguise,replay and sell fake,invalid or duplicate data,at the same time,data buyers may misuse of shared data.Cloud storage servers are assumed to be honest-butcurious,specifically,the cloud servers execute the contents of smart contracts correctly but also attempt to view the data it stores.

    2.Blockchain security.Data stored on the blockchain is public to all nodes.Consortium blockchain peers are authorized to register to the platform but there might be malicious nodes.Edge nodes (Data providers and consumers) are endorsors for the blockchain and realize consensus based on Practical Byzantine Fault Tolerance(PBFT)[35].

    3.Consensus fault tolerance.Invalid nodes in fabric refer to nodes that cannot perform validity verification due to downtime or malicious operations.From the PBFT principle,the amount of invalid nodes(including malicious nodes)in the system must not exceed 1/3 of the committee validator nodes.

    4.3 Security Goals

    The Zobric platform is designed with the following security goals.

    1.Mutual Authentication.Data providers need to authenticate data consumers and clarify the flow of data for the sake of traceability of subsequent data processing.In addition, data providers need to achieve mutual authentication with data consumers under the premise of lacking an authentication center.

    2.Secure One-to-Many Data Sharing.If a data provider sells several sets of data to multiple data consumers using one-to-one data sharing schemes,it will result in a significant increase in transaction volume and computational cost of data provider in a distributed system.In addition, as cloud servers or data trading platforms are untrusted, the platform should also support secure sharing among data providers in bulk in the IoT environment.

    3.Privacy Preserving.Data providers are unwilling to disclose the trading or sharing status of the data.Meanwhile,data plaintext should not be accessed by unauthorized entities,including cloud servers.So the identity of the data provider should be secret during the transaction process,meanwhile the data consumer can be associated with the data provider.

    4.Data Access Control.Data transactions should guarantee that only authenticated data consumers who are authorized for the data have access to the specified data.This setting should be controlled by the data provider, but could be operated by the cloud server.Data providers should dynamically adjust the policy for data access control in real-time based on the transaction.

    5.Traceability, Auditable and Integrity of Data Transaction Records.In an IoT environment without a trusted center,data trading platforms need to record data transactions information for accountability including the entities of the transaction, data type, data volume, etc.In order to provide post-transaction fairness and negotiability,data transaction records should be guaranteed to be traceable and tamper-resistant upon consensus.In addition,records of data ownership transfer should be auditable.

    6.Resisting against Multiple Typical Attacks.The proposed authentication and data sharing protocols should be executable and resistant to existing protocol attacks such as replay attacks,Man-in-the-middle attacks,forgery attacks,data stealing and so on.

    5 Zobric Design

    The proposed IoT Data Market Platform Zobric runs on 3 layers: (1) The bottom layer is the data aggregation layer where data collection is performed by various IoT terminal devices; (2) The middle layer is the data control and transmission layer, in which the device group control center performs data sharing control and the establishment of secure channels for data transmission among IoT devices; (3) The top layer is the sharing and trading layer, where the data is traded or shared among the data provider,the demander and the cloud storage server,with secure authentication and key agreement protocol and smart contracts.The secure data transaction procedures are shown in Fig.2 and described as follows in detail.

    Figure 2:Procedures for zobric data sharing

    1) Identity registration,where the nodes involved in data transactions register in the data trading platform with the help of BS.

    2) Transaction group creation, where a data provider issues a data announcement or a data consumer initiates a data request to create a transaction group (Fabric Channel) to protect transaction privacy.

    3) The data provider encrypts the data using symmetric encryption with a data protection key and uploads it to the cloud server side.This step can be repeated multiple times for multiple sets of data.Then DP will issue data uploading transactions and wait for transaction confirmation.

    4) The group authentication and key agreement protocol would be executed among the data provider and the data consumers to negotiate data protection keys.

    5) The data provider and data consumers negotiate data bids/payments,etc.

    6) The data provider summarizes the valid data trades mentioned above,and only one blockchain data authorization transaction is issued,(with a list of storage addresses created by the cloud server)to authorize the data for the data consumers.

    7) Once the data authorization transaction is confirmed, a smart contract is triggered to create/update a list of data access rights on the cloud server and the data consumers side.

    8) The cloud server control the access of the consumers based on list of permissions.

    9) The authenticated data consumer can download the data and use the data encryption key to decrypt the data.

    5.1 Group Authentication and Key Agreement Protocol

    5.1.1 Registration and Setting Up Phase

    The notations used in the protocol and their corresponding definitions are shown in Table 2.On the registration phase, DPs and DCs need to register in the Fabric-based consortium chain to join the trading platform.The blockchain consists of identity management nodes and Fabric-CA.In this scheme,the node identity registration is done based on the existing registration architecture,and the registration process will be done under TLS (Transport Layer Security) protection.The registration procedures are as follows.

    Table 2: Definition of notation

    1.The data transaction nodeithat wishes to join the platform sends a registration request(ispecific,si)to the blockchain service node,i-specificmeans that the real identity of nodei,such as the combination of the username and its transaction identity,siis the secret of nodei,such as the password.

    2.After receiving the request message,the platform verifies the identity with consortium policy and generates an unprecedented identityIDifor nodei, and the blockchain service node generates the public/private key pair(PKi,SKi)and certificateCerti,then replies((PKi,SKi),Certi)to the node.

    Blockchain service nodes(BSs)will set public parameters for transaction validation and authentication initialization on the setting up phase.

    (1) The BS in the trading platform performs authentication initialization, selects the security parameterk∈Z?,and generates the authentication system parameters as follows:

    (1.1) Choose an elliptic curve G1of prime orderq.Assuming that the generator of the curve isP.Choose the master keysBS∈,the public key isPBS=sBSP.

    (1.2) Choose three hash functions as follows,H1:{0,1}?×G1×G1→,H2:{0,1}?×{0,1}?×G1×{0,1}?×G1→,H3:{0,1}?×{0,1}?×G1×{0,1}?→,and expose public parameters{G1,q,P,PBS,H1,H2,H3}.

    (1.3) Choose a nonceri∈, computeRi=riPandh1i=H1(IDDCi,Ri,PBS).Then compute a partial private keyki=(ri+sBSh1i)modq,and sendK1i=(ki,Ri)to theDCithrough a secure channel.

    (2) TheDCigenerates the aggregated signature key pair(APKi,ASKi)as follows:

    (2.1) After receiving theK1i,check whether the equationkiP=Ri+h1iPBSholds,if it holds,go to the next step.

    (2.2) Generate a random number assDCiand computeK2i=sDCiP,then set the public keyAPKi=(K2i,Ri)and the private keyASKi=(sDCi,ki).

    (3) TheBSgenerates the zero-knowledge proof authentication parameters for theDPas follows:

    (3.1) InvokeNIZK(σ,τ)←Setup(R)as described in Section 3, in which the calculation constraints for relationRare as follows, they are a series of polynomials that form computational problems.

    Balance:Assumed that this transaction includesm-l-1 pieces of data, for each dataDIj(l+2 ≤j≤m)in data listDLto be traded: Σ

    Trade authority:For uploading transaction block serial number forDIj(generally,privacy protection is performed)should be equal to trade transaction block which points out the upload block serial number.

    Data ownership authentication:For eachj(l+2 ≤j≤m)and a Hash functionH4:{0,1}→,satisfy the following equation.

    (3.2) For each witnesses(al+1,...,am)∈,al+1=SKDC aj=GSDIj,l+ 2 ≤j≤m, anda0= 0,statment(a1,...,al)∈can be determined based onR.Vpubj=DIjandVtransj=SigPKDP(DIj).The equation holds relationR:h(X)t(X),in whicht(X)is an(n-2)th degree polynomial.

    (3.3) AssumingG,His the arbitrary generator of group G2and G3, respectively.The DC chooses a random nonce ∈,and the BS chooses random noncesα,β,γ,δ,x∈.Setτ=(α,β,γ,x)and compute the public verification parameter common reference stringσ

    according to the following equation:

    5.1.2 Trading Group Formation and Negotiation

    1.For registered users, the corresponding data trading channel can be connected according to the demand.

    2.The data provider broadcasts the data sets information in the channel,such as data size,content summary, data price, etc.The data consumers(1-i)wishing to purchase this data join the group for this transaction and execute the group authentication and key agreement protocol in 5.1.4 with the data provider.

    5.1.3 Data Uploading Transaction

    Data providers can select the datasets to be uploaded depending on consumer feedback in the trading channel, and this operation increases the probability that the data will be purchased.For a data providerDP, it generatesDI=H(Data)and storage encryptionGSfor one set of data, then it applies to upload the encrypted data to the cloud.The cloud server will check if theDIappears repeatedly,if not,it will accept the request and assign a storage addressDAtoDI.After the upload is completed,theDPwill initiate an upload transaction with(DI,SigPK(DI),SigPK(H(DI,GS))).TheDPcan repeat this operation by uploading multiple sets of data for sale.It should be noted that data trading can only be carried out after the uploading transaction confirmation.

    5.1.4 Group Authentication and Key Agreement

    As shown in Fig.3,the authentication and key agreement procedures are as follows:

    (1) At first, theDPbroadcasts a list of tradable dataDIl+ 1...Dn,m≤nwithin the trading channel, and provides the nameTN=(TradingNumber)and valid timeTVof this trading.Note that during this period,the DP does not need to send its real ID and can use a temporary ID to achieve trading anonymity.

    (2) Within the validity period, allDCican choose the data they want to buy and generate a purchase listPLi=(DIj...).Then theDCichooses a random nonceyi∈and a timestampT1i, and computes the signature onH(TN)according to the following equations:Yi=yiP,h2i=H2(H(TN),IDDCi‖PLi,APKi,T1i,Yi),h3i=H3(H(TN),IDDCi‖PLi,APKi,T1i),Wi=(h2iyi+h3i(sDCi+ki))modq.TheDCireplies the messageM1i=(IDDCi‖PLi,Yi,Wi,T1i)to theDP.(3) After receiving different response messagesM1i (i= 1,···,N)beforeTV,theDPaggregates these messages by computing these equations:h1i=H1(IDDCi‖PLi,Ri,PBS),h2i=H2(H(π),IDDCi‖PLi,APKi,T1i,Yi),h3i=H3(H(π),IDDCi‖PLi,APKi,T1i).Then theDPcomputes the aggregated signatureand verifies whether the equationholds,if it holds,theseDCis are valid,otherwise,theDPdetects every member according to the equationWiP-h2iYi=h3i(K2i+Ri+h1iPBS),if it holds,the member and itsPLiis valid.

    (6) After confirming payment,theDPsends the messageM3i=EncPKDCi (GSPLi,DAPLi,TN,IDDCi)to thoseDCis who have successfully purchased data and been authenticated.For the dataDIisold toDCk..DCj, theDPissues a transaction withinSigPKDP(List(DIi,DCk...Dj),DIi∈DL)which indicates the ownership transfer list of every dataDIiinDL.

    (7) After receiving the messageM3i,respectiveDCidecrypts theM3ito obtain theGSDIjit wants.The hash header in the transaction can be indexed to the data provider.Alternatively,the DC can directly try downloading data from the cloud.

    Figure 3:Group authentication and key agreement protocol

    5.2 Fabric Smart Contract ZobricCC Design

    The data provider publishes a transaction to record the trading.Specifically, the transaction provides data access lists inDLand the accessible data addresses.

    5.2.1 Transaction Block Design

    The structure of the published transaction block is shown in Fig.4.ChannelHeaderincludes the transaction ID (Txid), timestamp (Timestamp), and channel information (ChannelId).SignatureHeadercontains the certificate of the block creator, his ID (mspid) and a nonce.The header also contains the period information used to identify the logical time window that is used to resist replay attacks.ChaincodeSpeccontains the version, name and timeout of the smart contract.

    Proposal Responserecords the response to a smart contract call.Chaincode Endorse Actioncontains the Endorser name and its Signature.

    Figure 4:Transaction block structure

    Inputis the function of the proposed smart contract including the transaction,the data provider signature (DPSign), the address of the data on the cloud server (DA), and the data consumer ID list(DCs).Transaction amount(TAmount),and this part are specified by the smart contract.When updating the access list,Inputcontains the UpdateAccessList(function name),the IP address of the cloud server, the user name (DC) to be updated and the data address to be added (NewDA).The content of theInputis specified by the Zobric smart contract(ZobricCC).Fig.5 shows the contents of each part when recording transactions and updating the permission list.

    5.2.2 Smart Contract Functional Design

    After the authentication procedures are finished,the smart contract is invoked for authorization.When a Smart Contract is executed,the Invoke method is first called,then the function of the Invoke and the parameters are analyzed before the relevant process is executed.The Invoke flows are shown in Fig.6.

    Figure 5:Contents of input function

    Figure 6:Smart contract invocation flow

    (1)RecordTransaction.When a request is received to record a transaction, the transaction ID(TxId) in the ChannelHeader is first checked for uniqueness and a transaction record can be identified based on this ID.The request parameters are then bound to an object called transaction,which mainly contains the data provider signature,data address,data consumers,transaction amount and other information as shown in Fig.5Input(1).The transaction is then checked for reasonableness, mainly to detect the existence of the user, and whether there are duplicate purchases.The TxId and transaction information is stored as a key-value pair in the state database after the test is completed and recorded in the chain.

    (2)UpdateAccessList.After the transaction has been recorded,the access list on the cloud server also needs to be updated so that the consumer who has purchased the data has permission to obtain the data address.The smart contract receives a call with the function UpdateAccessList.After parsing the parameters, it first checks the permissions and the validity of the user and the transaction by querying the transaction information related to that user with the function queryByDC().The UpdateRequest() method is then called to construct an update request,serialising the parameters,such as the user to be updated,the permissions to be added,and the validity of the permissions.The cloud server receives the request and updates the permission lists.

    (3)RecordAuthentication.Before a transaction is issued, the authentication and key agreement protocol needs to be completed,while protecting the privacy of data providers.The structure of ZKP is defined in the smart contract,which includes the transaction ID and the proofπ.Similar toRecordTransaction,this function detects whether the transaction ID is unique,then binds the parameter to a ZKP object and stores the transaction ID and ZKP as a key-value pair in the state database.When the DC needs to use the parameter,it can query the parameter by calling queryProof(TransactionID).

    6 Security Analysis and Discussion

    6.1 Correctness Analysis

    (1)Mutual authentication.The data provider authenticates all data consumers by verifying the aggregated signatures.The correctness of the signature algorithm is verified as follows:

    The correctness of the aggregation algorithm is verified as follows:

    The aggregated signature algorithm is based on the ECDLP, and the proof of security can be found in[36].The data consumers signs the fresh identity proofTNwith secret keysDCito respond to the authentication challenge.Moreover,zero-knowledge arguments in the proposed protocol have been proven to be computational knowledge soundness,that is,the DC who hasSKDCand knows theGSPLcan construct the convinced proofπ.This proves the identity of the DC and its ownship of all data in the data listDL.

    (2)Key distribution and secure data sharing.The scheme can ensure the security of data sharing.Firstly,the DP authenticates the data consumers and verifies the applicant for their required data list.Secondly,the DP encrypts the data key using the public key of data consumer,which ensures that only authenticated and payment confirmed consumers can obtain the key.Thirdly,the DP releases the data access list specified in the transaction and triggers the smart contract to update the data access permission list on the cloud server side.Even if the cloud server is untrustworthy or there exists disguised attackers,the data sharing security can be guaranteed.

    (3)Privacy protection.The DP does not need to provide a real ID for data transaction validation,that protects the trading status of the DP.Meanwhile, zero-knowledge arguments will not disclose the information about the DP and data keys, onlyDLaccess permission transfer can be observed on the public channel.Therefore, the proposed solution can achieve the protection of transaction and identity privacy information of data providers.Consumers who have purchased data, can obtain the DP’s identity information through the association of trading transactions.

    6.2 Formal Security Verification

    We use the formal verification tool Tamarin [37] to perform formal security verification of the proposed authentication and key distribution protocol.Tamarin prover is an effective tool, which has been applied to numerous protocols including Transport Layer Security (TLS) [38], for symbol modeling and analysis of security protocols.

    After inputting the security protocol model to Tamarin, it will specify the agents to perform the behavior simulations of different roles, the rules for the adversary and the rules for the security properties required by the protocol.And then Tamarin will automatically construct a security proof.We rewrite”rules”to define protocols and adversaries using an expressive language based on multiset.Subsequently, we convert the protocol into executable code in the Tamarin tool by the following four steps.(1) Function construction, where the equations and cryptographic algorithms within the protocol are written as functions to be called by the protocol.Some of the cryptographic algorithms such as hashing and asymmetric encryption are already included in the Tamarin tool.(2) The infrastructure(e.g.,authentication server)is modeled and the protocol environment is described using multiset rewriting rules that operate on the state of the system.(3)The proposed protocol is modeled by invoking the above rules and functions to compose a protocol flow that simulates the message transfer and computational operations between entities.(4) The security properties are modeled.In our protocol, we need to verify the mutual authentication between the data provider and the data consumers, the confidentiality and the integrity of keys, the resistance of the protocol to attacks,and other security properties.In this simulation, we write 6 types of rules to represent the actions of the proposed protocol,which include initialization,nonce generation,registration,key revealation,message transmission,and message validation,as shown in Fig.7.

    For the authentication properties of the protocol, Tamarin formalizes the entity resistance to attacks,such asAlivenessfor fake identity,Weak agreementfor replay attacks andInjective agreementfor Man-in-the-Middle attacks.Other claims likeExecutableandSecretrepresent the enforceability and confidentiality of the protocol, respectively.We model the data provider and multiple data consumers in Tamarin.As shown in Fig.8,the simulation results indicate that the multi-party entities in our protocol can be authenticated securely and are resistant to various attacks,with no valid attacks found under the Tamarin simulation.

    Figure 7:Protocol modeling in Tamarin

    Figure 8:Protocol security simulation results in Tamarin

    7 Performance Evaluation

    Performance includes the following two parts:the proposed protocol performance and blockchain service performance.On the protocol performance, we use algorithm simulation to evaluate it by comparing with other solutions in terms of computational cost and transmission cost.On blockchain service performance,we use the Hyperledger Caliper framework to evaluate the performance of Fabric in terms of permission distribution throughput and transaction confimration delay.

    This work is based on the Hyperledger Fabric version 1.4.0.Firstly, we deploy the Golang environment,Docker,and Docker Compose.The system uses Docker to establish a virtual machine for multi nodes environment simulation.The zero-knowledge proof adopted in this scheme is developed based on the Libsnake framework.For the convenience of use,we compile the executable binary ZKP.The tools and versions used during the compilation process are as shown in Table 3.

    Table 3: Zero-knowledge proof compiler version

    For the web service environment of trading platform,the testing browser is Microsoft Edge,and the specific version information is as shown in Table 4.

    Table 4: Web service environment

    7.1 Proposed Protocol Performance

    7.1.1 Computational Cost

    In this section, we simulate and calculate the time consumed by the proposed protocol by comparing the results with other related schemes in [24,25,28,30].We use the MIRACL library algorithms and the libsnake library for zero-knowledge proof to evaluate time consumption.The symmetric and asymmetric encryption algorithm adopts AES-256 and ECC-164, respectively.The results are shown in Table 5.

    Table 5: Cryptographic algorithm time cost

    Forndata consumers,each purchasingmpieces of data,the time consumption comparison of the solutions is shown in Table 6.

    Table 6: Time cost comparison

    As shown in Fig.9, the proposed protocol has the advantage on the computational efficiency when the number of data consumers or the number of datasets increases, because our solution can aggregate and verify data consumers,as well as simultaneously verify the ownership of multiple sets of data.Specifically,in our protocol,data consumers do not need to perform more validation calculations when purchasing more datasets.

    Figure 9: (Continued)

    7.1.2 Transmission Overhead

    On the transmission overhead, the size of transmission messages are evaluated other than the trading data itself.In platform construction, the hash output length of the elliptical curve is 512 bits and theID, timestamp is 16 bits.AndProofsize for Groth 16 in our scheme is 0.2 kb which is 0.08%of the proof size in Factual(250 kb)[13].The transmission overhead comparison is shown in Table 7 and Fig.10.As shown in Fig.10,the proposed protocol has fewer interaction rounds and lower message transmission consumption for verification than other related schemes.Similarly,when purchasing multiple data sets,data consumers do not need to incur additional transmission costs.

    Figure 10:Transmission Overhead Comparison

    Table 7: Transmission overhead

    7.2 Blockchain Service Performance

    Caliper is a benchmark testing framework specifically designed to test the permission distribution throughput and transaction confirmation delay.Currently,it supports multiple performance indicators,including transaction success rate,transaction throughput,and transaction latency.We simulate the impact of different transaction request rates on Fabric throughput and transaction latency when the block size is 50 MB.The following data are obtained as shown in Table 8.

    Table 8: Permission distribution throughput and transaction confirmation delay

    As shown in Fig.11,as the transaction request rate increases,the initial throughput also increases linearly, but after reaching a certain bottleneck (around 80 tps), the throughput maintains about 75 tps.When the transaction request rate is low,the transaction latency is maintained at around 0.6 s,but when the transaction request rate is higher than around 80 tps,the delay of the transaction starts to increase.Overall,the transaction confirmation time on this platform is in seconds,which is userfriendly.

    Figure 11:Permission distribution throughput and transaction confirmation delay

    8 Conclusion

    More and more intelligent sensing devices are connected to the internet,causing a rapid growth of networking data volume.The collaborative,integrated,and intelligent development of the Internet of Things requires data sharing and transaction support between multiple domain nodes.We designed a decentralized IoT secure data sharing platform that allows individual users to freely and conveniently join.The fog and cloud enabled trading platform realizes decentralized identity management and trading organization, balancing the security and the efficiency of data sharing.For the identity authentication module of the platform, we also innovatively combine the zero-knowledge proof technology with aggregated signature, authenticate the data provider and data ownership through the zero-knowledge proof identity authentication algorithm.The supplier simultaneously verifies the identities of multiple consumers through the aggregated signature algorithm.The proposed scheme can realize the secure one to many data sharing under the protection of transaction sensitive information,and reduce the computational overhead and transmission overhead,which is very suitable for the large amount of secure data sharing among resource-limited devices.

    Acknowledgement:The authors would like to acknowledge Ministry of Science and Technology of the People’s Republic of China and National Natural Science Foundation of China (NSFC) for the financial support through National Key R&D Program of China (No.2022YFB3103400) and NSFC under Grant 61932015 and Grant 62172317.The authors would like to give thanks to the School of Cyber Engineering, Xidian University, China, for promoting this research and providing the laboratory facility and support.

    Funding Statement:This work is supported by the National Key R&D Program of China (No.2022YFB3103400),the National Natural Science Foundation of China under Grants 61932015 and 62172317.

    Author Contributions:The authors confirm contribution to the paper as follows:study conception and design:Y.Luo,J.Cao;methodology:Y.Luo,W.You;data collection:C.Sahng,Y.Luo;analysis and interpretation of results:Y.Luo,C.Shang;draft manuscript preparation:X.Ren,Y.Luo,C.Shang;supervision:H.Li.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:Not applicable.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产97色在线日韩免费| 亚洲精品视频女| 亚洲欧洲日产国产| 精品亚洲成国产av| 久久精品久久精品一区二区三区| 国产一区二区三区av在线| 伊人久久国产一区二区| 美女福利国产在线| 成人毛片60女人毛片免费| 韩国精品一区二区三区| 国产视频首页在线观看| 国产成人精品福利久久| 99久国产av精品国产电影| 汤姆久久久久久久影院中文字幕| 美女视频免费永久观看网站| 又粗又硬又长又爽又黄的视频| 不卡视频在线观看欧美| 久久久久久久大尺度免费视频| 丝袜美足系列| 最近最新中文字幕大全免费视频 | 97人妻天天添夜夜摸| 精品亚洲成a人片在线观看| 久久久久久伊人网av| 精品亚洲成国产av| 精品少妇内射三级| 99久久中文字幕三级久久日本| 熟女av电影| 麻豆精品久久久久久蜜桃| 大码成人一级视频| 久久99一区二区三区| 亚洲av综合色区一区| 国产成人av激情在线播放| 五月开心婷婷网| 亚洲av免费高清在线观看| 两性夫妻黄色片| 男人舔女人的私密视频| 国产激情久久老熟女| 久久精品国产亚洲av高清一级| 国产精品一二三区在线看| 少妇人妻久久综合中文| 在线精品无人区一区二区三| 美国免费a级毛片| 国产精品无大码| 亚洲第一青青草原| 热re99久久精品国产66热6| 国产激情久久老熟女| 日本-黄色视频高清免费观看| 97在线人人人人妻| 国产片内射在线| 中文字幕另类日韩欧美亚洲嫩草| 晚上一个人看的免费电影| 久久久久久久精品精品| 精品一区二区三区四区五区乱码 | 久久久久久人人人人人| 日韩成人av中文字幕在线观看| 大陆偷拍与自拍| 18禁观看日本| 午夜免费鲁丝| 亚洲欧洲国产日韩| 亚洲av日韩在线播放| 国产淫语在线视频| 久久久久国产精品人妻一区二区| 精品一区在线观看国产| 日韩精品有码人妻一区| 色网站视频免费| 丝袜在线中文字幕| 美国免费a级毛片| 国产成人免费观看mmmm| 欧美激情高清一区二区三区 | 欧美少妇被猛烈插入视频| 久久鲁丝午夜福利片| 水蜜桃什么品种好| 国产亚洲欧美精品永久| 日本欧美视频一区| 成人国语在线视频| 日韩一区二区三区影片| 亚洲成人av在线免费| 亚洲av电影在线观看一区二区三区| 男女午夜视频在线观看| av网站免费在线观看视频| 日本爱情动作片www.在线观看| 亚洲三级黄色毛片| 爱豆传媒免费全集在线观看| 在线观看免费视频网站a站| av免费观看日本| a级毛片黄视频| 国产精品免费大片| 久久久久国产一级毛片高清牌| 久久精品国产自在天天线| 又大又黄又爽视频免费| 国产97色在线日韩免费| 成人国产麻豆网| 国产精品偷伦视频观看了| 国产成人精品久久二区二区91 | 黄色视频在线播放观看不卡| 国产1区2区3区精品| 黑人猛操日本美女一级片| 亚洲av.av天堂| 亚洲av.av天堂| 日本wwww免费看| 欧美人与性动交α欧美精品济南到 | 精品99又大又爽又粗少妇毛片| 国产精品久久久久久久久免| 精品国产超薄肉色丝袜足j| 亚洲五月色婷婷综合| 国产在视频线精品| 性色avwww在线观看| 丝袜美足系列| 丰满少妇做爰视频| 久久精品国产综合久久久| 亚洲欧美一区二区三区久久| 黄色毛片三级朝国网站| 色视频在线一区二区三区| 9色porny在线观看| 亚洲精品国产一区二区精华液| 免费久久久久久久精品成人欧美视频| 欧美日韩亚洲国产一区二区在线观看 | 亚洲欧美成人精品一区二区| 18禁国产床啪视频网站| 日韩视频在线欧美| 在线亚洲精品国产二区图片欧美| 两个人看的免费小视频| 免费观看性生交大片5| 欧美国产精品一级二级三级| 看十八女毛片水多多多| 精品一品国产午夜福利视频| 亚洲精品第二区| 中文乱码字字幕精品一区二区三区| 最近中文字幕高清免费大全6| 啦啦啦在线观看免费高清www| 成人国产av品久久久| 卡戴珊不雅视频在线播放| 成人18禁高潮啪啪吃奶动态图| 欧美精品国产亚洲| 最近最新中文字幕免费大全7| 日本午夜av视频| 午夜福利网站1000一区二区三区| 麻豆av在线久日| 日日撸夜夜添| 91在线精品国自产拍蜜月| 国产片特级美女逼逼视频| 丝袜在线中文字幕| 国产日韩欧美在线精品| 日韩,欧美,国产一区二区三区| 边亲边吃奶的免费视频| 亚洲伊人久久精品综合| 激情五月婷婷亚洲| 国产在视频线精品| 久久久久久久大尺度免费视频| 日韩视频在线欧美| 黄色一级大片看看| 街头女战士在线观看网站| 熟女少妇亚洲综合色aaa.| 国产成人a∨麻豆精品| 欧美精品亚洲一区二区| 久久久a久久爽久久v久久| 亚洲国产精品999| 久久久久久久久久久久大奶| 777米奇影视久久| 丝袜美足系列| 国产成人欧美| 熟女av电影| 天天躁夜夜躁狠狠久久av| 日韩一卡2卡3卡4卡2021年| 成人影院久久| 热99国产精品久久久久久7| 成年av动漫网址| 在线精品无人区一区二区三| 国产成人精品久久二区二区91 | 亚洲国产精品一区二区三区在线| 日韩中字成人| 国产亚洲最大av| 9热在线视频观看99| 在线观看人妻少妇| 岛国毛片在线播放| 久久久久久久久久久久大奶| 日韩一卡2卡3卡4卡2021年| 久久青草综合色| 99热全是精品| av在线老鸭窝| 波野结衣二区三区在线| 久久精品国产自在天天线| 看免费av毛片| 久久人人爽人人片av| 久久婷婷青草| 成年女人毛片免费观看观看9 | 欧美 亚洲 国产 日韩一| 久久精品国产鲁丝片午夜精品| 国产毛片在线视频| 久久人妻熟女aⅴ| 亚洲欧美成人综合另类久久久| 久久青草综合色| 老汉色∧v一级毛片| 国产午夜精品一二区理论片| 午夜福利在线观看免费完整高清在| 又大又黄又爽视频免费| 国产av国产精品国产| 秋霞在线观看毛片| 少妇被粗大的猛进出69影院| 男的添女的下面高潮视频| 哪个播放器可以免费观看大片| 成人国产麻豆网| 桃花免费在线播放| 一本—道久久a久久精品蜜桃钙片| 亚洲综合色惰| 18禁裸乳无遮挡动漫免费视频| 成人国产av品久久久| 熟女少妇亚洲综合色aaa.| 视频区图区小说| 精品一区二区三区四区五区乱码 | 色吧在线观看| 亚洲av成人精品一二三区| 99香蕉大伊视频| 亚洲成国产人片在线观看| 国产男人的电影天堂91| 丰满少妇做爰视频| 亚洲av在线观看美女高潮| 性高湖久久久久久久久免费观看| 一区在线观看完整版| 亚洲色图综合在线观看| 男人舔女人的私密视频| 五月开心婷婷网| 精品一区二区三区四区五区乱码 | 国产一级毛片在线| 国产探花极品一区二区| 国产熟女午夜一区二区三区| 黄色怎么调成土黄色| 久热久热在线精品观看| 国产一区二区激情短视频 | www.精华液| 成人国产麻豆网| 春色校园在线视频观看| 天天躁狠狠躁夜夜躁狠狠躁| 国产av精品麻豆| 欧美国产精品一级二级三级| 美女国产高潮福利片在线看| 欧美变态另类bdsm刘玥| 熟女电影av网| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲精品成人av观看孕妇| 九草在线视频观看| 极品人妻少妇av视频| 色婷婷久久久亚洲欧美| 人妻 亚洲 视频| 日本色播在线视频| 我的亚洲天堂| 极品少妇高潮喷水抽搐| 欧美最新免费一区二区三区| 亚洲国产欧美在线一区| 9热在线视频观看99| 久久韩国三级中文字幕| 久久 成人 亚洲| 欧美成人精品欧美一级黄| 国产一区二区激情短视频 | 91国产中文字幕| 久久人人爽av亚洲精品天堂| 最近的中文字幕免费完整| 亚洲男人天堂网一区| 91aial.com中文字幕在线观看| 人人妻人人添人人爽欧美一区卜| 妹子高潮喷水视频| 亚洲,欧美,日韩| 如日韩欧美国产精品一区二区三区| 啦啦啦中文免费视频观看日本| 蜜桃国产av成人99| 岛国毛片在线播放| 免费在线观看黄色视频的| 午夜福利视频精品| 在线观看人妻少妇| 男的添女的下面高潮视频| 中文字幕最新亚洲高清| 妹子高潮喷水视频| 久久鲁丝午夜福利片| 视频区图区小说| 亚洲国产最新在线播放| 国产亚洲av片在线观看秒播厂| 欧美xxⅹ黑人| 男女边吃奶边做爰视频| 麻豆精品久久久久久蜜桃| 亚洲国产日韩一区二区| 精品久久久久久电影网| 性色avwww在线观看| 巨乳人妻的诱惑在线观看| a级毛片在线看网站| 国产日韩一区二区三区精品不卡| 亚洲美女搞黄在线观看| 色网站视频免费| 午夜激情久久久久久久| 国产精品免费视频内射| 久久毛片免费看一区二区三区| 成人手机av| videossex国产| 国产免费又黄又爽又色| 午夜福利在线观看免费完整高清在| 激情五月婷婷亚洲| 日韩制服丝袜自拍偷拍| 欧美精品人与动牲交sv欧美| 成人免费观看视频高清| 最黄视频免费看| 国产精品久久久久成人av| 免费少妇av软件| 久久99蜜桃精品久久| 免费观看性生交大片5| 黑人巨大精品欧美一区二区蜜桃| 亚洲第一区二区三区不卡| 国产男女内射视频| 国产精品一二三区在线看| 亚洲av电影在线进入| 亚洲精品乱久久久久久| 亚洲精品日本国产第一区| 人妻一区二区av| 又大又黄又爽视频免费| 超碰成人久久| 免费在线观看完整版高清| 又大又黄又爽视频免费| 国产老妇伦熟女老妇高清| 国产精品不卡视频一区二区| 日本午夜av视频| av不卡在线播放| 少妇被粗大的猛进出69影院| 香蕉国产在线看| 午夜福利视频精品| 午夜影院在线不卡| 汤姆久久久久久久影院中文字幕| 精品少妇久久久久久888优播| 高清在线视频一区二区三区| 在线看a的网站| 久久影院123| 久久精品国产a三级三级三级| 国产成人精品久久二区二区91 | 精品国产乱码久久久久久小说| 中文乱码字字幕精品一区二区三区| 国产精品不卡视频一区二区| 国产欧美日韩综合在线一区二区| 热99国产精品久久久久久7| 久久av网站| 久久精品国产自在天天线| 国产精品嫩草影院av在线观看| 深夜精品福利| 亚洲伊人久久精品综合| 人妻少妇偷人精品九色| 国产伦理片在线播放av一区| 欧美bdsm另类| 国产片特级美女逼逼视频| 久久精品国产亚洲av涩爱| 亚洲伊人久久精品综合| 免费黄色在线免费观看| 亚洲精品美女久久av网站| 一级片'在线观看视频| 免费看av在线观看网站| 国产精品一区二区在线观看99| 高清av免费在线| 国产无遮挡羞羞视频在线观看| 亚洲人成77777在线视频| 国产精品三级大全| 晚上一个人看的免费电影| 成年美女黄网站色视频大全免费| xxx大片免费视频| 男人爽女人下面视频在线观看| 蜜桃在线观看..| 国产国语露脸激情在线看| 日本欧美国产在线视频| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 一级毛片 在线播放| 久久久久精品性色| 日韩,欧美,国产一区二区三区| 免费不卡的大黄色大毛片视频在线观看| 最近2019中文字幕mv第一页| 亚洲国产日韩一区二区| av免费在线看不卡| 麻豆乱淫一区二区| 亚洲人成77777在线视频| 国产精品免费大片| 熟妇人妻不卡中文字幕| 国产免费福利视频在线观看| 天堂8中文在线网| 免费黄网站久久成人精品| 男女下面插进去视频免费观看| 人人澡人人妻人| 亚洲国产精品国产精品| 中文天堂在线官网| 校园人妻丝袜中文字幕| 午夜福利视频在线观看免费| a级毛片在线看网站| 男男h啪啪无遮挡| 国产又色又爽无遮挡免| 人人妻人人澡人人看| 97人妻天天添夜夜摸| 亚洲人成77777在线视频| 制服人妻中文乱码| 亚洲伊人色综图| 丝袜人妻中文字幕| 我要看黄色一级片免费的| 亚洲精品美女久久久久99蜜臀 | 在线精品无人区一区二区三| 爱豆传媒免费全集在线观看| 妹子高潮喷水视频| 久久精品国产亚洲av高清一级| 观看美女的网站| 欧美精品高潮呻吟av久久| 日产精品乱码卡一卡2卡三| 亚洲综合精品二区| 亚洲,欧美,日韩| 国产成人精品婷婷| 丝袜在线中文字幕| 日韩人妻精品一区2区三区| av电影中文网址| 九草在线视频观看| 国产片内射在线| 少妇精品久久久久久久| 免费观看a级毛片全部| 国产 精品1| 欧美最新免费一区二区三区| 久久综合国产亚洲精品| 国产免费又黄又爽又色| 一区在线观看完整版| 777久久人妻少妇嫩草av网站| 黄色配什么色好看| 一级片'在线观看视频| 精品99又大又爽又粗少妇毛片| 老鸭窝网址在线观看| videossex国产| 国产探花极品一区二区| 高清av免费在线| 纯流量卡能插随身wifi吗| 久久精品国产亚洲av高清一级| 日日爽夜夜爽网站| 少妇的逼水好多| 美女国产视频在线观看| 精品国产超薄肉色丝袜足j| 男女下面插进去视频免费观看| 精品卡一卡二卡四卡免费| 精品人妻熟女毛片av久久网站| 国产男女内射视频| av线在线观看网站| 2022亚洲国产成人精品| 2021少妇久久久久久久久久久| 看免费成人av毛片| 亚洲av电影在线观看一区二区三区| 精品一品国产午夜福利视频| 国产97色在线日韩免费| 欧美成人午夜免费资源| 久久精品亚洲av国产电影网| 久久99蜜桃精品久久| 有码 亚洲区| tube8黄色片| 视频区图区小说| 超碰97精品在线观看| 男女免费视频国产| 热re99久久国产66热| 国产一区二区三区综合在线观看| 夫妻午夜视频| 久久精品国产鲁丝片午夜精品| 中文欧美无线码| 在现免费观看毛片| 人人妻人人澡人人爽人人夜夜| 欧美日韩视频高清一区二区三区二| 青春草视频在线免费观看| 亚洲av男天堂| 狠狠精品人妻久久久久久综合| 如日韩欧美国产精品一区二区三区| 王馨瑶露胸无遮挡在线观看| 欧美日本中文国产一区发布| 久久影院123| 人妻 亚洲 视频| 一本色道久久久久久精品综合| 国产 精品1| 国产白丝娇喘喷水9色精品| 一区二区三区四区激情视频| 黄片小视频在线播放| 丰满乱子伦码专区| 97在线人人人人妻| 男女下面插进去视频免费观看| 亚洲成人手机| 亚洲精品一二三| 欧美日韩精品成人综合77777| 欧美日韩精品网址| 国产免费福利视频在线观看| 亚洲精品国产av成人精品| 国产男女超爽视频在线观看| 高清不卡的av网站| 欧美人与善性xxx| 久久久久人妻精品一区果冻| 一区福利在线观看| 中国三级夫妇交换| 十八禁高潮呻吟视频| 国产成人91sexporn| 亚洲伊人色综图| 亚洲欧美成人综合另类久久久| 18禁动态无遮挡网站| 日本av免费视频播放| 国产无遮挡羞羞视频在线观看| 亚洲精品自拍成人| 最近的中文字幕免费完整| 日韩一本色道免费dvd| 97精品久久久久久久久久精品| 亚洲av中文av极速乱| 下体分泌物呈黄色| 国产成人精品无人区| 久久国内精品自在自线图片| 国产av精品麻豆| 日韩欧美精品免费久久| 成人亚洲精品一区在线观看| 亚洲精品av麻豆狂野| 大香蕉久久网| 在线观看美女被高潮喷水网站| 美女午夜性视频免费| 成人国产av品久久久| 99热网站在线观看| 国产爽快片一区二区三区| 亚洲av成人精品一二三区| 亚洲精品国产av蜜桃| 又大又黄又爽视频免费| 999久久久国产精品视频| 日韩中字成人| 久久久久久人人人人人| 成人黄色视频免费在线看| 999精品在线视频| 午夜av观看不卡| 热re99久久精品国产66热6| 免费人妻精品一区二区三区视频| 97精品久久久久久久久久精品| 一级,二级,三级黄色视频| 亚洲欧美中文字幕日韩二区| 中文天堂在线官网| 狂野欧美激情性bbbbbb| 日韩一本色道免费dvd| 99热全是精品| 亚洲精品,欧美精品| 国产日韩欧美视频二区| 国产精品国产三级专区第一集| 韩国av在线不卡| av在线观看视频网站免费| 激情视频va一区二区三区| 亚洲人成电影观看| 久久精品久久久久久久性| 国产精品偷伦视频观看了| 国产无遮挡羞羞视频在线观看| 如日韩欧美国产精品一区二区三区| 国产精品一二三区在线看| 亚洲精品,欧美精品| 久热久热在线精品观看| 中文字幕人妻熟女乱码| 国产爽快片一区二区三区| 精品一区二区免费观看| 久久精品国产鲁丝片午夜精品| 女人精品久久久久毛片| 久久久久久久国产电影| 欧美bdsm另类| 精品99又大又爽又粗少妇毛片| 搡女人真爽免费视频火全软件| 国产欧美日韩一区二区三区在线| 国产极品粉嫩免费观看在线| 亚洲国产精品国产精品| 日韩伦理黄色片| 精品国产超薄肉色丝袜足j| 精品人妻偷拍中文字幕| 久久午夜福利片| 久久精品国产亚洲av涩爱| 一边亲一边摸免费视频| 国产精品蜜桃在线观看| 纵有疾风起免费观看全集完整版| 国产成人av激情在线播放| 精品亚洲成国产av| 日产精品乱码卡一卡2卡三| 大片免费播放器 马上看| 国产不卡av网站在线观看| 国产国语露脸激情在线看| 如何舔出高潮| 国产精品偷伦视频观看了| 亚洲成人一二三区av| 少妇被粗大猛烈的视频| 国产成人欧美| 日韩精品有码人妻一区| 91成人精品电影| 欧美日韩亚洲国产一区二区在线观看 | 国产精品一二三区在线看| 哪个播放器可以免费观看大片| 久久久久久人妻| av免费在线看不卡| 亚洲精品久久成人aⅴ小说| 国产精品一区二区在线不卡| 亚洲在久久综合| 天天躁日日躁夜夜躁夜夜| 亚洲av日韩在线播放| 在线免费观看不下载黄p国产| 欧美精品一区二区免费开放| 亚洲国产欧美日韩在线播放| 七月丁香在线播放| 国产精品香港三级国产av潘金莲 | 国产成人精品在线电影| 欧美国产精品va在线观看不卡| 婷婷色麻豆天堂久久| 欧美成人精品欧美一级黄| 久久久久久伊人网av| 亚洲第一av免费看| 免费av中文字幕在线| 老汉色av国产亚洲站长工具| 亚洲,一卡二卡三卡| 成人亚洲欧美一区二区av| 国产精品久久久久久精品电影小说| 91午夜精品亚洲一区二区三区| 亚洲成人一二三区av| 日韩不卡一区二区三区视频在线| 少妇精品久久久久久久| 国产人伦9x9x在线观看 | 日韩成人av中文字幕在线观看| videosex国产| 女性被躁到高潮视频| 久久精品亚洲av国产电影网| 下体分泌物呈黄色| 欧美日韩成人在线一区二区| 18禁动态无遮挡网站| 精品久久蜜臀av无| 久久毛片免费看一区二区三区|