This document presents an agenda for discussing identity-based secure distributed data storage schemes. The agenda includes sections on an abstract, introduction, existing systems, objectives, proposed systems, literature survey, system requirements, system design including data flow diagrams and class diagrams, testing, results and performance evaluation, and conclusions. The introduction discusses cloud computing services models. The existing systems section discusses database-as-a-service and its disadvantages. The proposed systems would provide two identity-based secure distributed data storage schemes with properties like file-based access control and protection against collusion attacks.