As we will authenticate users and providers before allowing storage of encrypted data it will be necessary to move the endpoints of the storage service into the appointments service, as it needs access to the key lists in order to authenticate users.
Alternatively we could generate short-lived authentication tokens in the appointments service that grant access to the storage service, keeping the two separate.