This document presents a secure fog computing system utilizing the emoticon technique for dual-layer encryption, which combines cryptography and steganography to enhance data confidentiality and security. It discusses the architecture of fog computing, the advantages of processing data at the edge of the network, and the importance of robust data security measures to combat threats such as data theft. The proposed method addresses the limitations of existing encryption solutions by hiding encrypted data within emoticons, thereby increasing security while noting the requirement for additional memory in the process.