I too think you are being overly paranoid. Think of your cloud content as being a voice in the crowd, you are in amongst the background level of din. Unless you upload something to rise above the crowd, no one will notice you so you have a certain degree of privacy within the anonymity that that affords - though not to be taken as secure. Security is only really present when the effort to get something out weighs the value of having it.
The next thing - and don't take this the wrong way - I would trust Apple to secure your content on their servers more than I trust you to secure them at home. Reputational damage to Apple as a consequence of a data leak or breach means they maintain as good a security model as feasible. They employ large numbers of experts to help ensure they are doing as well as can be expected.
At this stage you would be better being paranoid about websites you visit and what they are harvesting from you or what digital dossier the likes of Google and Facebook have built on you based on your movements and activities so far. Next your internet provider, they collect data on your internet usage or your email provider or even your bank. For fraud prevention they log data about financial transactions up to and including location data and authentication methods used - like finger print recognition on your phone to use Apple or Google pay etc.
If you want to freak yourself out, do some reading into OSINT - Open Source Intelligence - and see how much information you can find on yourself out on the web - you will be amazed.
Unless your recordings are in some way illegal or morally questionable then yes worry about them being found, but worry about where the weakest link is and that weakest link I am afraid is reading this post right now. It isn't Apple or AWS or GCP or whatever Facebook is called today. Think about apps that harvest data from your phone or that track you or the content you seem to find enjoyable or the content that makes you jump over to amazon to make a purchase.
Unless they are looking for blackmail leverage, then having access to your picture of the frog is of no value to them. so they will go hunt elsewhere for data they can maliciously monetise.
If you feel like you are being watched, then good, because you are but not in that way. I hate to break it to you but you are just a number to all of these companies and criminals, just a revenue potential. Your credit card number is worth less than a dollar on the black market.
All of this assumes you are not an investigative journalist about to whistle blow on a world wide conspiracy. In which case you should be using protected corporate servers to hold this anyway - as per data protection laws.