It is a normal utilization of the public DNS, except by offloading your secondary zones to the cloud-based DNS services, you are removing the possibility of someone DDoSing your on-premises server.
Serving DNS directly from your master on-premises server creates two issues:
1. latency. Whoever will be trying to resolve your public addresses has to get the responses from your server, regardless of where they are located. In cloud-based secondaries, they will get the resolution from closest geographically located pool.
2. Susceptibility to denial of service: because this is the single server seating behind your ISP, simply querying it repeatedly may slow-down legitimate queries.
Perhaps there are some cases where it makes sense, but the reasons got to be justified.