Blockchain-based applications provide many promising opportunities to overcome the challenges associated with the Internet of Things (IoT) ecosystems (eg, centralized architecture, data integrity, and reliability). In particular, blockchain technology offers many desirable features for IoT infrastructures, such as decentralization, trustworthiness, trackability, and immutability. However, while logging all transactions in a distributed blockchain ledger provides transparency, it also makes it possible to compromise user's privacy, thus posing a grand challenge to IoT architects and implementers. Over the past years, a set of solutions have been proposed for various scenarios, to address these privacy issues. In this paper, we survey these solutions, classify, and analyze their advantages and disadvantages. We also introduce an evaluation framework to evaluate the quality of the privacy-preserving based on an adjustable weighting scheme. Finally, we rate the analyzed solutions based on their privacy ranks, and hope our evaluation can shed light on the future design of privacy-preserving solutions applicable for blockchain-based IoT platforms. K E Y W O R D S blockchain-based application, internet-of-things, privacy rank, privacy-preserving 1 INTRODUCTION Blockchain-based applications have been widely employed to address issues such as intensive centralizing, scalability, security, and reliability with Internet of Things (IoT) systems. IoT systems are characterized by multi-party ecosystems, with data exchange among different devices and parties. 1 The tamper-proof, immutability, and transparency features of blockchain make members able to trace all transactions (past and present), which provides a reliable way to identify data leakages or manipulation. 2-4 The integrity of huge amounts of IoT sensory data can be assured in a blockchain-based distributed cloud from sensor to service with no need to rely on trusted third parties. 5 Data provenance tracking can be provided by programmable smart contracts, which act as the policy evaluation entities and event loggers, and allows users to check all data transfers (eg, acquired automatically from IoT devices) and usage transactions providing assurance that only transactions conforming to the contract policies are authorized and registered in the blockchain. 6 IoT system restrictions, namely resource-constrained devices, low computational power, and limited capacity and bandwidth limit blockchain-IoT applications. For this reason, different projects, such as Maru,* Riddle&Code, † IOTA, ‡ and IBM's device democracy, aim to fit blockchain to IoT platforms, to achieve interoperability, trust machine-to-machine (M2M) interaction, data integrity, and device-based permission. Maru sensor platform, developed by chain of things