This document proposes two identity-based secure distributed data storage schemes. The schemes allow a file owner to independently decide access permissions for receivers without help from a private key generator. When a receiver queries the system, they can only access one of the owner's files, not all files. The schemes also protect against collusion attacks where receivers cannot obtain the owner's secret key even if they compromise proxy servers. The first scheme provides confidentiality against chosen plaintext attacks, while the second achieves security against chosen ciphertext attacks. To the best of the authors' knowledge, this is the first scheme that allows file-level access control and protects against collusion attacks in the standard model.