1) The document discusses various identity-based secure distributed data storage schemes including atomic proxy crypto systems, identity-based crypto systems introduced by Shamir, and identity-based proxy encryption proposed by Ivan and Dodis. 2) It also covers identity-based proxy re-encryption proposed by Green and Ateniese where a proxy server can transfer a ciphertext from an original decryptor to a designated decryptor using a re-encryption key. 3) These schemes are classified into two types based on how the re-encryption key is generated: either by the original decryptor or by a private key generator.