Fog Computing: Security Challenges and Countermeasures