This document presents two identity-based secure distributed data storage schemes. The first scheme is secure against chosen plaintext attacks, while the second is secure against chosen ciphertext attacks. Both schemes allow a file owner to independently set access permissions for receivers. When a receiver makes a query, they can only access one file rather than all files from the owner. The schemes also protect against collusion attacks.