This document proposes a system to protect medical big data stored in a healthcare cloud using fog computing and a decoy technique. The system creates a decoy medical big data gallery that is stored in fog computing and appears identical to attackers. The original medical data is encrypted and stored securely in the cloud. When a user accesses the system, their legitimacy is verified using user profiling before they can access the original data. This technique aims to provide full security by redirecting attackers to the decoy data, while legitimate users can access the real encrypted data after authentication. Various algorithms are used like blowfish encryption, LZW compression and authentication protocols to securely implement this system.