{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T21:40:24Z","timestamp":1776202824795,"version":"3.50.1"},"reference-count":139,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T00:00:00Z","timestamp":1602115200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Major Technical Innovation Project of Hubei","award":["2018AAA046"],"award-info":[{"award-number":["2018AAA046"]}]},{"name":"Major Technical Innovation Project of Hubei","award":["61872431"],"award-info":[{"award-number":["61872431"]}]},{"name":"Major Technical Innovation Project of Hubei","award":["2017060201010162"],"award-info":[{"award-number":["2017060201010162"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2018AAA046"],"award-info":[{"award-number":["2018AAA046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872431"],"award-info":[{"award-number":["61872431"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017060201010162"],"award-info":[{"award-number":["2017060201010162"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Applied Basic Research Project of Wuhan","award":["2018AAA046"],"award-info":[{"award-number":["2018AAA046"]}]},{"name":"Applied Basic Research Project of Wuhan","award":["61872431"],"award-info":[{"award-number":["61872431"]}]},{"name":"Applied Basic Research Project of Wuhan","award":["2017060201010162"],"award-info":[{"award-number":["2017060201010162"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,10,8]]},"abstract":"<jats:p>With the advent of the era of big data, privacy issues have been becoming a hot topic in public. Local differential privacy (LDP) is a state-of-the-art privacy preservation technique that allows to perform big data analysis (e.g., statistical estimation, statistical learning, and data mining) while guaranteeing each individual participant\u2019s privacy. In this paper, we present a comprehensive survey of LDP. We first give an overview on the fundamental knowledge of LDP and its frameworks. We then introduce the mainstream privatization mechanisms and methods in detail from the perspective of frequency oracle and give insights into recent studied on private basic statistical estimation (e.g., frequency estimation and mean estimation) and complex statistical estimation (e.g., multivariate distribution estimation and private estimation over complex data) under LDP. Furthermore, we present current research circumstances on LDP including the private statistical learning\/inferencing, private statistical data analysis, privacy amplification techniques for LDP, and some application fields under LDP. Finally, we identify future research directions and open challenges for LDP. This survey can serve as a good reference source for the research of LDP to deal with various privacy-related scenarios to be encountered in practice.<\/jats:p>","DOI":"10.1155\/2020\/8829523","type":"journal-article","created":{"date-parts":[[2020,10,11]],"date-time":"2020-10-11T12:56:58Z","timestamp":1602421018000},"page":"1-29","source":"Crossref","is-referenced-by-count":76,"title":["A Comprehensive Survey on Local Differential Privacy"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6347-7805","authenticated-orcid":true,"given":"Xingxing","family":"Xiong","sequence":"first","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan 430072, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0694-0856","authenticated-orcid":true,"given":"Shubo","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan 430072, China"}]},{"given":"Dan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan 430072, China"},{"name":"Hubei Water Resources Research Institution, Wuhan 430070, China"}]},{"given":"Zhaohui","family":"Cai","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan 430072, China"}]},{"given":"Xiaoguang","family":"Niu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan 430072, China"}]}],"member":"311","reference":[{"key":"1","first-page":"1","article-title":"Differential privacy","author":"C. Dwork"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1142\/s0218488502001648"},{"key":"3","first-page":"24","article-title":"L-diversity: privacy beyond k-anonymity","author":"A. Machanavajjhala"},{"key":"4","first-page":"106","article-title":"t-Closeness: privacy beyond k-Anonymity and l-diversity","author":"N. Li"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"6","first-page":"429","article-title":"Local privacy and statistical minimax rates","author":"J. C. Duchi"},{"key":"7","first-page":"1054","article-title":"RAPPOR: randomized aggregatable privacy-preserving ordinal response","author":"\u00da. Erlingsson"},{"issue":"8","key":"8","first-page":"1","article-title":"Learning with privacy at scale","volume":"1","author":"Differential Privacy Team Apple","year":"2017","journal-title":"Apple Machine Learning, Journal"},{"key":"9","first-page":"3572","article-title":"Collecting telemetry data privately","author":"B. Ding"},{"key":"10","article-title":"Collecting and analyzing data from smart device users with local differential privacy","author":"T. T. Nguy\u00ean","year":"2016"},{"issue":"7","key":"11","first-page":"1981","article-title":"Survey on local differential privacy","volume":"29","author":"Q. Ye","year":"2018","journal-title":"Journal of Software"},{"key":"12","first-page":"1655","article-title":"Privacy at scale: local differential privacy in practice","author":"G. Cormode"},{"key":"13","article-title":"Local differential privacy: a tutorial","author":"B. Bebensee","year":"2019"},{"key":"14","first-page":"4","article-title":"Mobile data collection and analysis with local differential privacy","author":"N. Li"},{"key":"15","first-page":"1","article-title":"A survey of local differential privacy for securing internet of vehicles","author":"P. Zhao","year":"2019","journal-title":"The Journal of Supercomputing"},{"key":"16","first-page":"1","article-title":"Context-aware Data Aggregation with Localized Information Privacy","author":"B. Jiang"},{"key":"17","first-page":"107","article-title":"Relationship privacy: output perturbation for queries with joins","author":"V. Rastogi"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2016.2584610"},{"key":"19","article-title":"Context-aware local differential privacy","author":"J. Acharya","year":"2019"},{"key":"20","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"C. Dwork"},{"key":"21","first-page":"94","article-title":"Mechanism design via differential privacy","author":"F. McSherry"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"23","first-page":"903","article-title":"A rate-disortion perspective on local differential privacy","author":"A. D. Sarwate"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2831619"},{"key":"25","first-page":"2189","article-title":"Randomized requantization with local differential privacy","author":"S. Xiong"},{"key":"26","article-title":"Information-theoretic metrics for local differential privacy protocols","author":"M. Lopuha\u00e4-Zwakenberg","year":"2019"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/3168389"},{"key":"28","article-title":"Four accuracy bounds and one estimator for frequency estimation under local differential privacy","author":"M. Lopuha\u00e4-Zwakenberg","year":"2019"},{"key":"29","first-page":"2879","article-title":"Extremal mechanisms for local differential privacy","author":"P. Kairouz"},{"key":"30","article-title":"Local privacy, data processing inequalities, and statistical minimax rates","author":"J. C. Duchi","year":"2013"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1389735"},{"key":"32","first-page":"515","article-title":"Exponential separations in local differential privacy","author":"M. Joseph"},{"key":"33","first-page":"94","article-title":"The role of interactivity in local differential privacy","author":"M. Joseph"},{"key":"34","first-page":"1161","article-title":"Lower bounds for locally private estimation via communication complexity","author":"J. Duchi"},{"key":"35","first-page":"2436","article-title":"Discrete distribution estimation under local privacy","author":"P. Kairouz"},{"key":"36","first-page":"729","article-title":"Locally differentially private protocols for frequency estimation","author":"T. Wang"},{"key":"37","first-page":"127","article-title":"Local, private, efficient protocols for Succinct histograms","author":"R. Bassily"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.14778\/3339490.3339496"},{"key":"39","first-page":"1120","article-title":"Hadamard response: estimating distributions privately, efficiently, and with little communication","author":"J. Acharya"},{"key":"40","article-title":"MURS: practical and robust privacy amplification with multi-party differential privacy","author":"T. Wang"},{"key":"41","article-title":"Mutual information optimally local private discrete distribution estimation","author":"S. Wang"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2018.2809790"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2632069"},{"key":"44","first-page":"638","article-title":"Collecting and Analyzing Multidimensional Data with Local Differential Privacy","author":"N. Wang"},{"key":"45","first-page":"2008","article-title":"Calibrate: frequency estimation and heavy hitter identification with local differential privacy via incorporating prior knowledge","author":"J. Jia"},{"key":"46","first-page":"1877","article-title":"Utility-optimized local differential privacy mechanisms for distribution estimation","author":"T. Murakami"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.07.004"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1109\/jstsp.2015.2425831"},{"key":"49","article-title":"Locally differentially private data collection and analysis","author":"T. Wang","year":"2019"},{"key":"50","first-page":"249","article-title":"Computing aggregates over numeric data with personalized local differential privacy","author":"M. Akter"},{"key":"51","first-page":"289","article-title":"Private spatial data aggregation in the local setting","author":"R. Chen"},{"key":"52","first-page":"621","article-title":"Estimating numerical distributions under local differential privacy","author":"Z. Li"},{"key":"53","first-page":"58","article-title":"Is interaction necessary for distributed private learning","author":"A. Smith"},{"key":"54","first-page":"2545","article-title":"Locally private mean estimation: Z-test and tight confidence intervals","author":"M. Gaboardi"},{"key":"55","article-title":"Locally private Gaussian estimation","author":"M. Joseph","year":"2018"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2718487"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0015"},{"key":"58","first-page":"247","article-title":"Multiple privacy regimes mechanism for local differential privacy","author":"Y. Ye"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0022"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2019.2949041"},{"key":"61","first-page":"721","article-title":"Linear queries estimation with local differential privacy","author":"R. Bassily"},{"key":"62","first-page":"131","article-title":"Marginal release under local differential privacy","author":"G. Cormode"},{"key":"63","first-page":"212","article-title":"CALM: Consistent adaptive local marginal for marginal release under local differential privacy","author":"Z. Zhang"},{"key":"64","first-page":"1","article-title":"A privacy-preserving data aggregation of mobile crowdsensing based on local differential privacy","author":"F. Peng"},{"key":"65","first-page":"226","article-title":"High-dimensional crowdsourced data distribution estimation with local privacy","author":"X. Ren"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2812146"},{"key":"67","first-page":"192","article-title":"Heavy hitter estimation over set-valued data with local differential privacy","author":"Z. Qin"},{"key":"68","first-page":"127","article-title":"Locally differentially private frequent itemset mining","author":"T. Wang"},{"key":"69","first-page":"1088","article-title":"PrivSet: set-valued data analyses with locale differential privacy","author":"S. Wang"},{"key":"70","first-page":"317","article-title":"PrivKV: key-value data collection with local differential privacy","author":"Q. Ye"},{"key":"71","first-page":"1598","article-title":"Collecting preference rankings under local differential privacy","author":"J. Yang"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.1002\/int.22261"},{"key":"73","first-page":"1","article-title":"Local private ordinal data distribution estimation","author":"S. Wang"},{"key":"74","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2019.2899097"},{"key":"75","article-title":"Learning new words","author":"A. G. Thakurta","year":"2017"},{"key":"76","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2018.2885749"},{"key":"77","first-page":"821","article-title":"PrivTrie: effective frequent term discovery under local differential privacy","author":"N. Wang"},{"key":"78","first-page":"425","article-title":"Generating synthetic decentralized social graphs with local differential privacy","author":"Z. Qin"},{"key":"79","first-page":"84","article-title":"A two-phase algorithm for generating synthetic graph under local differential privacy","author":"Y. Zhang"},{"key":"80","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2018.2877045"},{"key":"81","first-page":"703","article-title":"Analyzing subgraph statistics from extended local views with decentralized differential privacy","author":"H. Sun"},{"key":"82","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2020.2985524"},{"key":"83","first-page":"5819","article-title":"Local differential privacy with K-anonymous for frequency estimation","author":"D. Zhao"},{"key":"84","first-page":"2375","article-title":"Local differential privacy for evolving data","author":"M. Joseph"},{"key":"85","first-page":"441","article-title":"PROCHLO: strong privacy for analytics in the crowd","author":"A. Bittau"},{"key":"86","first-page":"2468","article-title":"Amplification by shuffling: from local to central differential privacy via anonymity","author":"\u00da. Erlingsson"},{"key":"87","doi-asserted-by":"publisher","DOI":"10.1145\/2666468"},{"key":"88","first-page":"4130","article-title":"Collect at once, use effectively: making non-interactive locally private learning possible","author":"K. Zheng"},{"key":"89","first-page":"965","article-title":"Empirical risk minimization in non-interactive local differential privacy revisited","author":"D. Wang"},{"key":"90","first-page":"898","article-title":"Noninteractive locally private learning of linear models via polynomial approximations","author":"D. Wang"},{"key":"91","first-page":"6628","article-title":"On sparse linear regression in the local differential privacy model","author":"D. Wang"},{"key":"92","first-page":"521","article-title":"Privacy amplification by iteration","author":"V. Feldman"},{"key":"93","first-page":"14103","article-title":"User-specified local differential privacy in unconstrained adaptive online learning","author":"D. Van Der Hoeven"},{"key":"94","first-page":"1626","article-title":"Local private hypothesis testing: chi-square tests","author":"M. Gaboardi"},{"key":"95","first-page":"4605","article-title":"Locally private hypothesis testing","author":"O. Sheffet"},{"key":"96","first-page":"2067","article-title":"Test without trust: optimal locally private distribution testing","author":"J. Acharya"},{"key":"97","first-page":"310","article-title":"The structure of optimal private tests for simple hypotheses","author":"C. L. Canonne"},{"key":"98","article-title":"Differentially private federated learning: a client level perspective","author":"R. C. Geyer","year":"2017"},{"key":"99","article-title":"Learning differentially private recurrent language models","author":"H. B. McMahan"},{"key":"100","article-title":"Differentially private meta-learning","author":"J. Li","year":"2019"},{"key":"101","article-title":"Protection against reconstruction and its applications in private federated learning","author":"A. Bhowmick","year":"2018"},{"key":"102","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2952146"},{"key":"103","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2897005"},{"key":"104","article-title":"Differentially private high dimensional sparse covariance matrix estimation","author":"D. Wang","year":"2019"},{"key":"105","first-page":"4788","article-title":"Lower bound of locally differentially private sparse covariance matrix estimation","author":"D. Wang"},{"key":"106","first-page":"284","article-title":"An improved gap-dependency analysis of the noisy power method","author":"M. F. Balcan"},{"key":"107","first-page":"1589","article-title":"Minimax-optimal privacy-preserving sparse PCA in distributed systems,","author":"J. Ge"},{"key":"108","first-page":"4795","article-title":"Principal component analysis in the local differential privacy model","author":"D. Wang"},{"key":"109","first-page":"619","article-title":"Clustering algorithms for the centralized and local models","author":"K. Nissim"},{"key":"110","first-page":"2288","article-title":"Practical locally private heavy hitters","author":"R. Bassily"},{"key":"111","first-page":"5436","article-title":"Differentially private K-means with constant multiplicative error","author":"H. Kaplan"},{"key":"112","first-page":"461","article-title":"Distributed private heavy hitters","author":"J. Hsu"},{"key":"113","first-page":"143","article-title":"Privacy via pseudorandom sketches","author":"N. Mishra"},{"key":"114","first-page":"85","article-title":"Communication complexity in locally private distribution estimation and heavy hitters","author":"J. Acharya"},{"key":"115","first-page":"435","article-title":"Heavy hitters and the structure of local privacy","author":"M. Bun"},{"key":"116","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2019.2927695"},{"key":"117","first-page":"433","article-title":"Differentially private frequent itemset mining from smart devices in local setting","author":"X. Zhang"},{"key":"118","first-page":"375","article-title":"Distributed differential privacy via shuffling","author":"A. Cheu"},{"key":"119","first-page":"638","article-title":"The privacy blanket of the shuffle model","author":"B. Balle"},{"key":"120","article-title":"On the power of multiple anonymous messages","author":"B. Ghazi"},{"key":"121","first-page":"124","article-title":"Supporting both range queries and frequency estimation with local differential privacy","author":"X. Gu"},{"key":"122","first-page":"82","article-title":"Broadening the scope of differential privacy using metrics","author":"K. Chatzikokolakis"},{"key":"123","first-page":"159","article-title":"Answering multi-dimensional analytical queries under local differential privacy","author":"T. Wang"},{"key":"124","doi-asserted-by":"publisher","DOI":"10.14778\/3352063.3352085"},{"key":"125","first-page":"79","article-title":"Practical differential privacy for location data aggregation using a Hadamard matrix","author":"P. Sangiamchit"},{"key":"126","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2791588"},{"key":"127","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2019.2922963"},{"key":"128","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00774-8"},{"key":"129","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101888"},{"key":"130","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719870379"},{"key":"131","first-page":"901","article-title":"Geo-indistinguishability: differential privacy for location-based systems","author":"M. E. Andr\u00e9s"},{"key":"132","first-page":"262","article-title":"Local Differential Privacy on Metric Spaces: Optimizing the Trade-Off with Utility","author":"M. Alvim"},{"key":"133","first-page":"540","article-title":"Privacy-preserving personalized recommendation: an instance-based approach via differential privacy","author":"Y. Shen"},{"key":"134","first-page":"180","article-title":"EpicRec: towards practical differentially private framework for personalized recommendation","author":"Y. Shen"},{"key":"135","first-page":"1763","article-title":"Differentially private matrix factorization","author":"J. Hua"},{"key":"136","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2018.2805356"},{"key":"137","first-page":"164","article-title":"\u2018When and where do you want to hide?\u2019\u2013recommendation of location privacy preferences with local differential privacy","author":"M. Asada"},{"key":"138","first-page":"235","article-title":"Effective matrix factorization for recommendation with local differential privacy","author":"H. Zhou"},{"key":"139","first-page":"747","article-title":"Blender: enabling local search with a hybrid differential privacy model","author":"B. Avent"}],"updated-by":[{"DOI":"10.1155\/2021\/9874067","type":"corrigendum","label":"Corrigendum","source":"publisher","updated":{"date-parts":[[2021,5,29]],"date-time":"2021-05-29T00:00:00Z","timestamp":1622246400000}}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8829523.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8829523.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8829523.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,12]],"date-time":"2020-12-12T02:33:26Z","timestamp":1607740406000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8829523\/"}},"subtitle":[],"editor":[{"given":"Angel M.","family":"Del Rey","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,10,8]]},"references-count":139,"alternative-id":["8829523","8829523"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8829523","relation":{"corrigendum":[{"id-type":"doi","id":"10.1155\/2021\/9874067","asserted-by":"object"}]},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2020,10,8]]}}}