This project proposes a new approach called "Fog Computing" to secure data in the cloud. It monitors for abnormal data access patterns which could indicate unauthorized access. When unauthorized access is detected and verified, it launches a "disinformation attack" by providing the attacker with large amounts of decoy documents along with the real user data. This is intended to protect the real data by confusing the attacker. Experiments in a local file setting provide preliminary evidence this approach could significantly improve security for user data stored in the cloud.