This document proposes two identity-based secure distributed data storage schemes. The first scheme provides confidentiality against chosen plaintext attacks, while the second achieves confidentiality against chosen ciphertext attacks. The schemes allow a file owner to independently set access permissions for individual files without help from a private key generator. They also protect against collusion attacks between receivers and proxy servers. To the best of the author's knowledge, these are the first identity-based distributed storage schemes that allow file-level access control and protect against collusion in the standard model.