The document proposes a method to secure data from theft in cloud computing using fog computing. It involves combining user behavior profiling to detect abnormal access and deploying decoy documents. Decoy documents that look like real data are used to confuse attackers if abnormal access is detected. By making it hard to distinguish real data from fakes, this integrated approach aims to increase security of personal and business data stored in the cloud.