亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Trust assessment of business service workflow based on complex trust network*

        2015-02-15 02:19:18LuoYihang駱怡航FanYushunGuoXiaohui
        High Technology Letters 2015年1期

        Luo Yihang (駱怡航), Fan Yushun, Guo Xiaohui

        (*Department of Automation, Tsinghua University, Beijing 100084, P.R.China)(**China Tobacco Guangxi Industrial Co., Ltd, Guangxi 530001, P.R.China)

        ?

        Trust assessment of business service workflow based on complex trust network*

        Luo Yihang (駱怡航)**, Fan Yushun*, Guo Xiaohui**

        (*Department of Automation, Tsinghua University, Beijing 100084, P.R.China)(**China Tobacco Guangxi Industrial Co., Ltd, Guangxi 530001, P.R.China)

        For business service workflow, QoS-based services selection can’t guarantee whether the composite service satisfies user’s requirement after delivery, because once any service interrupts or quality of service (QoS) maliciously reduces, the quality of workflow will be reduced. Trustworthy services can provide reliable QoS, so trustworthiness research could improve the efficiency of services selection. This paper investigates trust assessment in the perspective of workflow. Firstly, trust network of business service workflow (TN-BSW) is proposed to analyze trust attributes; then, the trust measurement system of TN-BSW is investigated to assess the trust value quantitatively; and then, a trust-aware service recommendation model (TaSRM) is proposed to enhance the efficiency of QoS-basedservices selection; finally, experiment shows the feasibility of TN-BSWand the performance of TaSRM.

        business service workflow, trust attributes, trust assessment, quality of service (QoS), service selection

        0 Introduction

        The function of business service workflow is achieved by the composition of different abstract services, such as logistic service and payment service. Many concrete services can achieve the function of abstract service, such as EMS and UPS both of which can provide logistic service, but their qualities of service (QoS) are different.

        How to select service is the key problem of service system. Some previous works[1-6]investigated services selection problems based on QoS. Ref.[1] proposed the QoS framework for services selection. Ref.[2] proposed the ranking of services by QoS assessment. Refs[3-5] focused on composite services by QoS composition calculation. Ref.[6] proposed context-aware QoS to deal with dynamic services selection. Based on QoS, service with high QoS value and service workflow with high aggregated QoS value can be selected.

        However, these works ignored the problem: “Advertising QoS published before delivery might change after delivery”. The reason is: Business service has the characteristics of social, dynamic and subjective. In real case, once any service provider loses credibility, such as interrupting service and reducing QoS maliciously, the whole workflow will be affected. On one hand, the quality of workflow after delivery will deviate from advertising QoS; on the other hand, the whole workflow may be terminated with uncompleted response, so it can’t achieve user’s requirement. Obviously, QoS-based services selection can’t be aware of credit losses, while credit losses often happen in real business service scenario.

        For this shortage of QoS-based services selection, some works[7-9]research credit rating to measure services’ credit from users or third-party monitoring. By comparing the credits, services with low credit can be filtered. However, service’s credit might be deliberately rated high by its own providers or rated low by competitors. Therefore, malicious behaviors detecting[10,11]is to make credit rating more believable. However, in general, these two methods only deal with one type abstract service while not service workflow. One service with credible QoS can’t represent that the whole workflow’s quality is credible.

        In conclusion, credit rating and malicious behaviors detecting make QoS-based services selection more reliable, but it still can’t guarantee that the composite QoS satisfies user’s requirement after delivery.

        Trust relationship is the key factor to solve this shortage. On one hand, trustworthy services can provide reliable QoS; on the other hand, in services interaction, a high credible service tends to cooperate with others having the same or higher credit. Thus, if service workflow can be provided by trustworthy services, meanwhile, these services have good cooperative relationship, the quality of workflow could be guaranteed more reliably.

        By this motivation, two questions on the research of trust relationship should be solved.

        (1) How to measure the trustworthiness of a service and the trust relationship of business service workflow?

        (2) How to utilize this trust measurement in business services selection?

        This paper devotes to solve these two questions and contains 5 sections. Section 1 proposes trust network of business service workflow (TN-BSW); Section 2 presents the measurement system of TN-BSW; Section 3 proposes a Trust-aware Service Recommendation Model (TaSRM) and its algorithms to solve services selection problem; Experiment in Section 4 is to verify TN-BSWandTaSRM; Section 5 presents the conclusions.

        1 TN-BSW

        For business service, business correlations are formed gradually in the long-term interactions, such as partner and price alliance.It can be depicted by graph structure with nodes and links, as shown in Fig.1: node represents service, link represents business correlation, such asC(1, 2)representsthecorrelationbetweenservice1and2;theycanalsoformaloopcorrelation.

        Fig.1 Business correlation graph

        Service tends to cooperate with others having the same or higher credit, business correlations reflect trust relationships. We call it business correlation trust and classify it into Node-trust and Link-trust. For business service, reputation, business scope and transaction volume are main attributes and they affect trust relationships significantly. Further more, Node-trust can be measured by reputation level (RL), and Link-trust can be measured by business scope compatibility (BSC) and business compactness degree (BCD), which are corresponding to business scope and transaction volume.

        (1) Node-trust: Real service systems provide various reputation mechanisms to assess reputation. For example, Amazon defines five stars[12]; Alibaba defines gold supplier and a series of authentications[13]. Thus, reputation mechanism can be utilized to assess Node-trust.

        (2) Link-trust:On one hand, business scope reflects service function, such as payment service. BSC represents business scope compatibility between two services’ business scopes, for example, accessory manufacturer A only provides a special accessory to auto manufacturer B, another accessory manufacturer C can provide the same accessory and other accessories. To a certain extent, as the more compatiblescope, A can concentrate more on serving for B, and the intensity of trust between A and B is higher than C and B. On the other hand, BCD represents business compactness degree between two services, and it is reflected by transaction volume. The transaction might be product purchasing or service consumption. Stronger BCD reflects the deeper trust relationship.

        By the combination of Node-trust and Link-trust, a trust network of business service workflow (TN-BSW) is established as Fig.2 to illustrate the trust relationship.

        Fig.2 Trust network of business service workflow

        As shown in Fig.2, circles marked with “S” and “E” respectively represent the start and end of workflow. This workflow is composed of 5 abstract services (AS).AS3andAS4formaparallelstructureandothersformasequentialstructure.EachAShasmanycandidateservices,e.g.,S1,1isthefirstserviceinAS1,S3,5isthefifthserviceinAS3.Cooperationbetweenservicesindifferentabstractservicesformsbusinesscorrelation.

        Then,trustnetworkcanbeextractedwithNode-trustandLink-trust.Asanexample,oneworkflowinstancepathmarkedwithNode-trustandLink-trustisshowninFig.2(b).ByTN-BSW,trustrelationshipsofbusinessserviceworkflowcanbeshownintuitivelyandclearly.

        2 Trustmeasurementsystem

        TN-BSWconsidersservicetrust(Node-trust)andbusinesscorrelationtrust(Link-trust).ThissectionpresentsdetailedtrustmeasurementofTN-BSW.

        2.1Reputationlevel

        TakeSi,jrepresentsthejthserviceintheithabstractservice,herein,i=1,2,…,I.andj=1,2,…,Ji;IrepresentsthenumberofabstractserviceandJirepresentsthenumberofservicesintheithabstractservice.ReputationlevelofSi,jisdepictedasR(Si,j).

        2.2Businessscopecompatibility

        (1)

        whereS(Si,j)andS(Sk,l)representthebusinessscopeofserviceSi,jandSk,l.Theycanbeobtainedbyservicetags,whicharemoreconcretethanservicecategories.Forexample,inthewebsite(www.programmableweb.com),theAPI“GoogleMaps”iscategorizedasmappingandannotatedwiththetagsofmapping,places,vieweranddisplay.Thesetagsreflectitsbusinessscope.ThebusinessscopecompatibilitybetweenSi,jandSk,liscalculatedbysimilaritymeasurementofbusinessscope[14].S(Si,j)∩S(Sk,l)getsthenumberofmatchedscopes;S(Si,j)∪S(Sk,l)getsthetotalnumberoftheirscopes.Thus,thevaluedomainofBSC(Si,j,Sk,l)is[0, 1].BSC(Si,j,Sk,l)=0representstheirbusinessscopesareirrelative;BSC(Si,j,Sk,l)=1representstheirbusinessscopesarematchedabsolutely; 0

        2.3Businesscompactnessdegree

        (2)

        whereV(Si,j)andV(Sk,l)representthetotaltransactionvolumeofserviceSi,jandSk,l.Theycanbeobtainedbytransactionhistoryandformattedastransactiontimes.ThebusinesscompactnessdegreebetweenSi,jandSk,liscalculatedbysimilaritymeasurementoftransactionvolume[14].V(Si,j)∩V(Sk,l)getsthetransactiontimesbetweenthem;V(Si,j)∪V(Sk,l)getsthemaxtransactiontimes.Thus,thevaluedomainofBCD(Si,j,Sk,l)is[0, 1].BCD(Si,j,Sk,l)=0representsnotransactionbetweenthem;BCD(Si,j,Sk,l)=1representstheirtransactionsareabsolutelyfromeachother; 0

        Then,foraserviceworkflowinstancepathp,asinFig.2(b),theutilityvalueofRL,BCDandBSCcanberespectivelycalculatedasEq.(3).WRrepresentsthereputationweightvectorofservice,WBSCrepresentstheBSCweightvectorofbusinesscorrelation,WBCDrepresentstheBCDweightvectorofbusinesscorrelation,UR(p)representstheweightedaveragereputationofp,UBSC(p)representstheaggregatedBSCvalueofp,andUBCD(p)representstheaggregatedBCDvalueofp.

        (3)

        Theconcretemeasurementcanbeexpressedas:

        (4)

        Finally,thetrustutilityvalueofpathpintegratedwithNode-trustandLink-trustisexpressedas

        U(p)=δ1UR(p)+δ2UBSC(p)+δ3UBCD(p)

        (5)

        3 TaSRMandalgorithms

        3.1 TaSRM

        Based on the trust measurement system, Trust-aware service recommendation model (TaSRM) is established as Fig.3 to measure the trust of business service workflow instance paths (BSW-IP) and get the trustworthy BSW-IP.

        Fig.3 Trust-aware service recommendation model

        TaSRM sets two judgments and three layers.

        Judgment I:“Is there QoS requirement?”

        It represents that if a user has QoS requirement? This judgment can distinguish different users.User without QoS requirement is like a new user who isn’t familiar with QoS index or does not know their concrete requirement.

        Judgment II:“Is there local QoS?”

        It represents that if QoS requirement contains local QoS requirement? Local QoS requirement can be applied to some specific scenarios, for example, user specifies the accommodation fee or transportation cost in travel service.

        Layer I: User requirement acquirement

        User requirement contains requirements of function and QoS. Through service functionscomposition, abstract business service workflow can be obtained.

        Layer II: QoS-based services selection

        This layer gets the feasible BSW-IP. If the user has local QoS requirement, firstly local selection is triggered to select services by local QoS; then, use QoS-based services selection to optimize composite QoS by global QoS requirement to get the feasible BSW-IP.

        Layer III: Trust-based service recommendation

        This layer gets the trustworthy BSW-IP by trust measurement system. When there is no QoS requirement, directly adopt this layer to get service recommendation.

        3.2 Algorithms of TaSRM

        3.2.1 QoS-based services selection algorithm

        Table 1 QoS-based services selection algorithm

        3.2.2 Trust-based service recommendation algorithm

        In this stage, inputFWP_ListandTN-BSW;firstly,setweightvectors(WR,WBSC,WBCD),andsetparametersδ1,δ2andδ3;thencomputetrustutilityvalueofeachFWPby Eqs (4) and (5) to getU(pi);finally,sortU(pi)togetthelistoftrustworthyBSW-IP.ThisstageisshownasTable2.

        Table 2 Trust-based services recommendation algorithm

        In conclusion, TN-BSW and its measurement system are applied into TaSRM. TaSRM is to get the trustworthy BSW-IP on the premise of meeting QoS requirement.

        4 Experiments and analysis

        Experiments should investigate two issues.

        (1) Whether TaSRM can detect malicious behaviors and provide the trustworthy BSW-IP?

        (2) How about the execution efficiency of TaSRM?

        4.1 Paremeters setting

        4.1.1 Common parameter definitions

        Common parameter definitions are shown as Table 3.

        Table 3 Common parameter definitions

        4.1.2 Evaluation indicators definition

        There are two types of QoS: 1) Cost QoS, and users expect it lower, such as price and execution time; 2) Benefit QoS, users expect it higher, such as reputation and usability. Besides, three indexes are defined:

        QoS deviation degree represents the degree thatQoSEdeviatesfromQoSR.Itisformulizedas

        (6)

        User acceptance degree represents the degree that deviates from. It is formulized as

        (7)

        Recommendation Success Function represents if the selection result satisfies user’s requirement. For cost and benefit QoS,ρD≤ρAindicatesthatusersacceptthedeviation,sotherecommendationissuccessful;andρD>ρAindicatesthatthedeviationexceedsuser’sacceptance,sotherecommendationisfailed.Itisformulizedas

        (8)

        Inaddition,behaviorsofserviceprovidersreflectthetrustworthydegreeoftheirservices.Classifyprovidersintothreetypes(#A, #B, #C)andP(A),P(B)andP(C)respectivelyrepresenttheproportionoftheirnumbers.

        Provider A represents providers with high credible, who advertise QoS truth fully. They would makeQoSEconsistentwithQoSAevenifataprofitloss.

        Provider B represents providers with medium credit, who try to guarantee user’s benefit, althoughQoSEvariesfromQoSAasuncertaincommercialfactors.

        Provider C represents fraudulent providers, who maliciously overstate advertising QoS for more benefit, resulting thatQoSEdeviatesmuchfromQoSA.

        4.2 Simulation experiments

        The algorithms are programmed by Matlab 2009a and then run the experiments on DELL Optiplex 380 (Intel Core2 E7500 2.93GHz CPU, 1.96GB RAM).

        4.2.1 Common parameters assignment

        Common parameters assignment is shown as Table 4.

        Table 4 Common parameter assignment

        4.2.2 Experiment parameters assignment

        Three group experiments are designed to show the performance of TaSRM as to different service providers. Table 5 sets the parameters of three group experiments.

        Table 5 Experiment parameters assignment

        4.2.3Modelperformanceexperiment

        ComparativeexperimentisdesignedtoverifyTaSRM.QoS-SSM(QoS-basedservicesselectionmodel)referstoanotherofourpapers[16],whichsupportsQoScorrelationinQoS-basedservicesselection,whiledoesnotconsiderthetrustimpact.ThefollowingshowsthethreegroupexperimentsrespectivelyforProviderA,BandC.

        (1)ForProviderA

        a)Observation

        Fig.4 ESR distribution by interacting with Provider A

        b) Description

        Table 6 Coordinates of Fig.4

        Table 6 shows the coordinates of Fig.4. For one type user acceptance, one experiment repeats 30 execution times with random QoS to calculate execution success rate (ESR) as Eq.(9).S(p)referstoEq.(8),whichrepresentstheexecutiontimes.

        (9)

        c)Analysis

        AllservicesareprovidedbyProviderA.Whenuseracceptancerangesfrom#4to#1,userdemandbecomesstricterandESRbecomeslower.At#4,bothmodelscanrecommendservicessatisfyingQoSRateachtime,i.e.ESR=100%,butwithacceptancedegreedecreasing,bothmodelshavefailedrecommendation,i.e.ESR<100%.

        Thereasonis:allservicesarecredibleandQoSEisequaltoQoSA.BothmodelscangettheoptimalBSW-IPbyQoSA.Butforstrongeruserdemand,QoSEofoptimalBSW-IPmightdissatisfyQoSR.

        (2)ForProviderB

        a)Observation

        Fig.5 ESR distribution by interacting with Provider B

        b) Description

        Table 7 Coordinates of Fig.5

        Table 7 shows the coordinates of Fig.5. Coordinate Y represents the proportion of Provider B; the other is Provider A.For one type user acceptance and a certain rate of Provider B, one experiment repeats 30 execution times by random QoS to calculate ESR.

        c) Analysis

        On one hand, comparing with Fig.4, ESR of both models is decreasing; on the other hand, for one specific user acceptance type, with the increasing of Provider B rate,TaSRM achieves a higher ESR than QoS-SSM.

        (3) For Provider C

        a) Observation

        Fig.6 ESR distribution by interacting with Provider C

        b) Description

        Table 8 shows the coordinates of Fig.6. Coordinate Y represents the proportion of Provider C; the other is Provider A.For one type user acceptance and a certain rate of Provider C, one experiment repeats 30 execution times by random QoS to calculate ESR.

        Table 8 Coordinates of Fig.6

        c) Analysis

        Fig.6 and Fig.5 have different coordinate Y scales, one is[0%,30%] and the other is[0%,100%]. It indicates that ESR falls severely when Provider C increases and an example is shown in Table 9.

        Table 9 ESR Comparison (Provider B and Provider C)

        Obviously, ifP(C) continues increasing, ESR will fall more severely, and even no successful recommendation.

        In conclusion, Provider B and C can’t guaranteeQoSE=QoSAafterdelivery.QoS-SSMjustdependsonQoSA,soitisunawareofQoSchange,andESRwilldecreasemorecertainly.ForTaSRM,beforedelivery,TaSRMevaluatesandsortsthetrustvalueoffeasibleBSW-IP,thenselectsthemosttrustworthyone.AccordingtoQoSA,BSW-IPbyTaSRMmightnothavetheoptimalcompositeQoS,butit’sthemosttrustworthyonetomakeQoSEconsistentwithQoSA.Thus,TaSRMcanidentifymaliciousservicesandresisttheirselection.

        Inconclusion,fromFig.5andFig.6,ESRofTaSRMisobviouslyhigherthanQoS-SSM,especiallywhenthenumberofmaliciousservicesisincreasing.D.Executionefficiencyexperiment

        Anappropriateexecutiontimecanmakerecommendationeffective.Herein,changethenumberofabstractserviceandservicetosimulatedifferentserviceworkflows. 5typeworkflowsareconstructedinTable10.

        a)Observation

        b)Description

        CoordinateXrepresentsdifferentworkflowtypes,andcoordinateYrepresentsexecutiontime.ExecutiontimeofQoS-SSMcontainsonestep[16]andTaSRMcontainstwosteps:QoS-basedservicesselection(Step1)andTrust-basedservicesrecommendation(Step2).

        Table 10 Scale of services workflows

        Fig.7 Statistics of execution time

        c) Analysis

        The statistics of Fig.7 is presented in Table 11.

        Table 11 Statistics of execution time

        With workflow’s scale increasing, the execution times of two models are increased. The execution time of TaSRM’s Step 1 is close to QoS-SSM; TaSRM’s Step 2 adds an execution time with the range of [2.2s, 3.1s].

        Through analysis, QoS-SSM is to optimize the nonlinear combination of multi dimensional QoS[16], thus QoS-SSM depends on the numbers of abstract service and service; while trust measurement in TaSRM (Step 2) depends on the limited number of feasible BSW-IP from Step 1. Thus, Step 2 in TaSRM is lesscomplex than Step 1 and consumes less time.

        Therefore, although TaSRM adds a certain time comparing with QoS-SSM, it can get the trustworthy BSW-IP within the effective execution time. Further, TaSRM can recommend more reliable BSW-IP to users, as considering both QoS and trust for selection.

        E. Empirical study and insight

        For the real service system, an online marine logistic service platform (OMLSP)[17]is selected for investigation. It is a typical business services system with 5 main abstract services, including forwarder, ship owner, ship agency, insurance agency and online payment service. OMLSP just provides QoS query with single abstract service, e.g. querying ship agency by freight charge or reputation will return a list of ranked ship agencies. But it may be hard for users to select other services and composite a whole BSW-IP. Therefore, if assess trust value and apply TaSRM, the trustworthy BSW-IP can be obtained. For example, BSW-IP recommendation might be {forwarder 1, ship owner 4, ship agency 5, insurance agent 2, payment 2}, while not a single {ship agency 3}.

        In this perspective, trust assessment mechanism and TaSRM is feasible and effective to enhance the recommendation accuracy and user experience.

        5 Conclusions

        Services selection is a significant problem in business service management. This paper devotes to a trustworthy service recommendation to enhance the accuracy and reliability of QoS-based services selection.

        First, TN-BSW is established to combine service reputation (Node-trust) and business correlation trust (Link-trust); then the corresponding trust measurement system is proposed to calculate the trust utility value; based on it, the trust-aware service recommendation model can filter unreliable service and recommend trustworthy BSW-IP; finally, an experiment verifies the feasibility of TN-BSW and the performance of TaSRM.

        Reference

        [1] Herssens C, Faulkner S, Fouss F, et al. A framework for QoS driven selection of services. In: Proceedings of the 5th International Conference on Service Computing (SCC 08), Honolulu, USA, 2008. 537-538

        [2] Yau S S, Yin Y. QoS-based service ranking and selection for service-based systems.In: Proceedings of the 8th International Conference on Service Computing (SCC 11), Washington DC, USA, 2011. 56-63

        [3] Jaeger M C, Muhl G, Golze S. QoS-aware composition of web services: a look at selection algorithms.In: Proceedings of the 12th International Conference on Web Service (ICWS 05), Orlando, Florida, USA, 2005. 807-810

        [4] Haddad J E, Manouvrier M, Ramirez G, et al. QoS-driven selection of web services for transactional composition.In: Proceedings of the 6th International Conference on Web Service (ICWS 08), Beijing, China, 2008. 653-660

        [5] Zheng H Y, Yang J, Zhao W L. QoS analysis and services selection for composite services. In: Proceedings of the 7th International Conference on Service Computing (SCC 10), Miami, USA, 2010. 122-129

        [6] Lin D H, Shi C Q, Ishida T. Dynamic services selectionbased on context-aware QoS. In: Proceedings of the 9th International Conference on Service Computing (SCC 12), Honolulu, USA, 2012. 641-648

        [7] Xiong L, Liu L. A reputation-based trust model for peer-to-peer e-commerce communities. In: Proceedings of the 2003 International Conference on E-Commerce, Newport Beach, USA, 2003. 275-284

        [8] Daisaku S, Yoshiaki Y, Kuniaki U. Estimating credibility of reputaion on the web using contributor’s stance. SIG-KBS, 2006, 73:85-90

        [9] Zhu F Y, Yang G M, Tan Z H. A commodity’s reputation-based trust model of P2P e-commerce systems. In: Proceedings of the 4th International Conference on Genetic and Evolutionary Computing,Shenzhen, China, 2010. 430-433

        [10] Xu P, Gao J, Guo H. Rating reputaion: anecessary consideration in reputation mechanism. In: Proceedings of the 2005 International Conference on Machine Learning and Cybernetics, Guangzhou, China, 2005. 182-187

        [11] Maheswari S, Karpagam G R. Empirical evaluation of reputation based trust in semantic web.InternationalJournalofEngineeringScienceandTechnology, 2010, 2(10):5672-5678

        [12] Amazon Web Site. http://www.amazon.com.

        [13] Alibaba Web Site. http://www.alibaba.com.

        [14] Zhang Y, Liu Y D, Ji Z. Vector similarity measurement method.TechnicalAcoustics, 2009, 28(4): 532-538

        [15] Qin L. AHP-based teaching evaluation index system of weights. In: Proceedings of the 2012 Conference on Informatics and Management Science, Kunming, China, 2012. 449-457

        [16] Luo Y H, Fan Y S, Wang H Y. Business correlation-aware modelling and services selection in business service ecosystem.InternationalJournalofComputerIntegratedManufacturing, 2013, 26(8): 772-785

        [17] E-business for freight. http://en.shippingchina.com

        Luo Yihang, born in 1986. He is a Ph.D candidate of Automation Department at Tsinghua University. His research focuses on service quality control.

        10.3772/j.issn.1006-6748.2015.01.004

        *Supported by the Research Fund for the Doctoral Program of Higher Education of China (No. 20120002110034) and Initiative Scientific Research Program of Tsinghua University (No. 20111080998).

        *To whom correspondence should be addressed. E-mail: yihangluo@hotmail.comReceived on Oct. 8, 2013

        99久久er这里只有精品18| 日韩精品中文字幕免费人妻| 国产熟女av一区二区三区四季| 日本一区二区三区在线观看视频| 久久一区二区三区少妇人妻| 亚洲自偷自拍另类第1页| 国产成人精品一区二区三区视频 | 国产99一区二区三区四区| 一本色道久久爱88av| 精品国产aⅴ无码一区二区| 一区二区韩国福利网站| 国产人妖一区二区av| 婷婷色精品一区二区激情| 久久天天躁夜夜躁狠狠| 午夜精品久久久久成人| 中国精品视频一区二区三区| 狼人综合干伊人网在线观看| 久久99热只有频精品8国语| 在线播放免费人成毛片乱码| 风骚人妻一区二区三区| 亚洲精品无码永久在线观看 | 日韩女优精品一区二区三区| 永久黄网站色视频免费看| 国产三级在线观看播放视频| 国产精品无码久久久久久蜜臀AV| 国产成人亚洲精品一区二区三区| 麻豆视频av在线观看| 免费国产自拍在线观看| 亚洲精品美女久久久久久久| 国产精一品亚洲二区在线播放| 日韩欧美国产丝袜视频| 激情视频在线观看免费播放| 日本av一级片免费看| 国产综合在线观看| 成人片黄网站色大片免费观看app 亚洲av无码专区亚洲av | 无码人妻一区二区三区兔费| 亚洲粉嫩高潮的18p| 国产精品一区成人亚洲| 人妻经典中文字幕av| 成人无码av一区二区| 色窝窝免费播放视频在线|