02852nas a2200277 4500000000100000000000100001008004100002260001200043653001500055653002600070653001700096653001700113653002300130653001600153653001100169653002100180100002700201700003000228700003400258245006600292856005800358300000800416490001300424520212300437022001402560 9998 d c02/202510aBlockchain10aBusiness Intelligence10aCryptography10aImmutability10aInternet of things10aReferencing10aSafety10aSmart Industries1 aYesid Díaz Gutiérrez1 aJuan Manuel Cueva-Lovelle1 aDiana Carolina Candia Herrera00aSecurity Model For the Internet of Things, Through Blockchain uhttps://www.ijimai.org/journal/bibcite/reference/3550 a1-90 vIn press3 aDue to the proliferation of computer crimes related to information vulnerability handled by people and entities and evidenced in attacks of financial, commercial, personal and even family nature; a need has been identified to implement, security strategies and protocols in each and every one of these areas, which make possible the effective protection of the integrity and privacy of data. Regarding this, there are protection schemes such as cryptography and reliable time stamping which undoubtedly have managed to partially solve this problem by attacking structural and crucial points. However, the evolution in the technology field has been currently represented in the fourth industrial revolution and its context towards 4.0 technologies and smart industries; various technologies have been positioned in the emerging and disruptive categories, among which the Internet of Things (IoT) stands out. This technology has become the target of multiple computer attacks, due to the processes of Extraction, Transformation, Loading and Transmission of large volumes of data. Alongside its widespread connection to the Internet, it’s become a strategic target for such attacks. A possible alternative solution to this situation is blockchain, which allows information to be public and stored in different blocks, which makes it easier to guarantee the integrity of information based on the following aspects: • Identification of the attacked and / or compromised information, which can be marked as invalid information. • Public report of the attack. • Information backup in another block to facilitate its recovery. In this regard, it is important to highlight that these functional and technological characteristics offered by the blockchain, facilitate the management of information and its integrity. However, it is necessary and essential to previously guarantee the structure of the information generated; as some processes of Business Intelligence (BI), such as the Extraction, Transformation and Load scheme (ELT), would be of great relevance and support during the development of this procedure. a1989-1660