This document proposes two identity-based secure distributed data storage schemes. The first scheme is secure against chosen plaintext attacks, while the second is secure against chosen ciphertext attacks. Both schemes allow a file owner to independently set access permissions and prevent unauthorized access or modification of outsourced files by proxy servers. The proposed schemes were designed to address confidentiality and integrity issues with existing distributed data storage systems by incorporating identity-based cryptography and access control set by the file owner.