HbarSuite Docs
  • Welcome to HbarSuite
  • HbarSuite Developer Documentation
    • HbarSuite Smart Engine Applications
      • @hsuite/cross-chain-exchange
      • @hsuite/dao
      • @hsuite/exchange
      • @hsuite/launchpad
      • @hsuite/multisig
      • @hsuite/nft-exchange
    • HSuite Libraries
      • @hsuite/api-key
      • @hsuite/auth-types
      • @hsuite/auth
      • @hsuite/client-types
      • @hsuite/client
      • @hsuite/dkg-types
      • @hsuite/hashgraph-types
      • @hsuite/health
      • @hsuite/helpers
      • @hsuite/ipfs
      • @hsuite/smart-config
      • @hsuite/smart-network-types
      • @hsuite/smart-transaction-types
      • @hsuite/smartnode-sdk
      • @hsuite/snapshots
      • @hsuite/subscriptions-types
      • @hsuite/subscriptions
      • @hsuite/throttler-types
      • @hsuite/throttler
      • @hsuite/users-types
      • @hsuite/users
      • @hsuite/validators-types
  • General Documentation
    • Tokenomics
      • Tokenomics v1
      • Tokenomics V2
    • Smart Apps and Interaction
      • Subscription-Based Model
      • Token-Gate Model
    • The Smart Node Network
      • security-layer
        • Security Layer Integration
        • Setting Up Secure Clusters
        • Generating and Sharing Keys Collaboratively
        • Protecting Secrets with Shamir's Method
        • Managing Cluster Membership
        • Handling Node Expulsion and Replacement
        • Automating Responses to Network Changes & Key Rotation
        • Ensuring Continuous Operation and Recovery
      • Understanding Validators in Our System
        • Type of Validators Explained
    • What is a Smart Node?
  • Restful APIs Documentation
Powered by GitBook
On this page
  • Adding New Nodes
  • Removing Nodes Safely
  • Membership Management Process
  1. General Documentation
  2. The Smart Node Network
  3. security-layer

Managing Cluster Membership

PreviousProtecting Secrets with Shamir's MethodNextHandling Node Expulsion and Replacement

Last updated 4 months ago

Adding New Nodes

  • When new nodes join the network, they are added to existing clusters.

  • The system ensures that the addition of new members maintains the required security thresholds.

Removing Nodes Safely

  • If a node needs to be removed—due to maintenance, failure, or security concerns—the system carefully redistributes its key shares.

  • This ensures that the integrity and security of the cluster remain intact even after changes in membership.

Membership Management Process

  1. Node Addition Protocol

    • Verification of new node credentials

    • Integration into existing cluster structure

    • Distribution of necessary key shares

    • Update of cluster configuration

  2. Node Removal Workflow

    • Secure deactivation of target node

    • Recovery of assigned key shares

    • Redistribution of responsibilities

    • Update of cluster security parameters

  3. Security Maintenance

    • Continuous monitoring of cluster health

    • Automatic threshold adjustments

    • Regular security audits

    • Backup procedures for critical data

Cluster Membership Management