This document reviews securing cloud data using fog computing. It proposes using user behavior profiling and decoy technology to detect unauthorized access to cloud data. User behavior profiling models normal patterns of how, when and how much a user accesses cloud data. Deviations from this baseline may signal a masquerade attack. Decoy information like fake documents are generated and can be returned to attackers, confusing them into thinking they have accessed real data when they have not. The document discusses these techniques and compares them to related work on using software decoys and addressing security and legal issues in cloud computing.