Preserving Privacy In Chronic Disease Big Data Manipulation For Fog To Minimize Latency And Enhance Security Using Decoy Implementation
Main Article Content
Abstract
The present disease stage is provided in this study, and sensitive data is stored securely on the cloud. The patient's chronic disease symptoms will serve as the input for the tests that will be suggested. Heart disease, asthma, diabetes mellitus, cancer, and many more are examples of chronic diseases. The test results serve as input parameters, and those parameters are then transferred to database ideals. The patient will receive a report detailing the patient's chronic disease stage after the mapping process is complete, and the information will be securely kept on the cloud. Fog handles all the data processing, while the cloud just stores the results. Decoy files are another way that fog computing is utilised to provide security. In order to fool attackers, decoy files include false or erroneous information. Unauthorised individuals receive it. Encryption is employed to reduce the impact of data theft attacks. The patient will receive a report in the mail outlining their chronic disease status as well as treatment options in various cities. For the purpose of anytime access, the report is kept on the cloud. For security reasons, the system only stores fake files. The fake file is used in the event that any unauthorised access attempts to retrieve data. The use of fog computing for security & cloud computing for storage has allowed us to maintain the privacy of patients' medical data.