This document discusses fog computing as a new technique to provide security in cloud computing environments. It proposes using fog computing to extend cloud computing by placing user data closer to the end user and providing additional security features like validating authorized data access and confusing attackers with decoy documents. The key idea is to minimize damage from stolen data by decreasing its value to attackers through disinformation like decoys. This technique aims to make cloud systems more secure and transparent to users.