Return to Article Details Preserving Privacy In Chronic Disease Big Data Manipulation For Fog To Minimize Latency And Enhance Security Using Decoy Implementation Download Download PDF