This document discusses security issues and solutions in fog computing. It begins with an introduction to fog computing and its architecture. It then discusses some real-world applications of fog computing like vehicular networks and smart cities. It identifies security loopholes in the fog computing architecture like information injection and denial of service attacks. It also outlines some fog security techniques and concludes by emphasizing the need to address security issues in fog computing.